System and method for visitation management in a controlled environment

ABSTRACT

A system is described herein that facilitates the easy scheduling and conducting of prison visitations. The system provides a remotely-accessible means for visitors to authenticate themselves, check the availability of those they wish to visit, and schedule a visit with that individual. As part of this process, the system tracks the availability of prison inmates as well as the devices and visit sites that are available to those inmates. In this manner, the system can quickly identify the availability of different inmates in order to provide on-demand scheduling capabilities to potential visitors. The system is connected to multiple facilities as well as public networks, and therefore can be remotely accessed. Additionally, the system also functions to monitor visits while they are in progress, as well as to store visit recordings for future review. Because the system is networked, remote monitors can access the review system in order to monitor visits or review recordings. The system also employs rigorous authentication and other security measures to ensure the safety and security of the visitors, the inmates, the staff, as well as others within the prison facility.

BACKGROUND

Field

The disclosure relates to a coordinated communication system thatschedules, facilitates, and monitors a variety of different inmatecommunications.

Background

Prison facilities and other controlled environments have historicallyprovided very limited communication options to residents. However, inorder to better facilitate inmate rehabilitation, today's controlledfacilities seek to offer a wide variety of communication services toinmates. Such services may include traditional telephone calls, email,video visitation, video calling, SMS text messaging, among others. Inaddition to enhancing the communication options available to inmates,controlled facilities are also seeking to provide greater flexibilityregarding when and where inmates are permitted to carry out suchcommunications.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

Embodiments are described with reference to the accompanying drawings.In the drawings, like reference numbers indicate identical orfunctionally similar elements. Additionally, the left most digit(s) of areference number identifies the drawing in which the reference numberfirst appears.

FIG. 1 illustrates a block diagram of an exemplary visitation controlsystem:

FIG. 2 illustrates a block diagram of an exemplary visitation controlunit;

FIG. 3 illustrates a block diagram of an exemplary application serverthat may be incorporated into the visitation control unit;

FIG. 4 illustrates a block diagram of exemplary storage devices used bythe visitation control system:

FIG. 5 illustrates a flowchart diagram of an exemplary method forscheduling a visitation session using the visitation control system;

FIG. 6 illustrates a flowchart diagram of an exemplary visitationmethod;

FIG. 7 illustrates a flowchart diagram of a second exemplary visitationmethod; and

FIG. 8 illustrates a block diagram of a general purpose computer thatmay be used to perform various aspects of the present disclosure.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the invention. Rather, the scope ofthe invention is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, etc.), and others. Further, firmware, software, routines,instructions may be described herein as performing certain actions.However, it should be appreciated that such descriptions are merely forconvenience and that such actions in fact results from computingdevices, processors, controllers, or other devices executing thefirmware, software, routines, instructions, etc. Further, any of theimplementation variations may be carried out by a general purposecomputer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, andhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the invention that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or adapt for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such adaptations and modificationsare intended to be within the meaning and plurality of equivalents ofthe exemplary embodiments based upon the teaching and guidance presentedherein. It is to be understood that the phraseology or terminologyherein is for the purpose of description and not of limitation, suchthat the terminology or phraseology of the present specification is tobe interpreted by those skilled in relevant art(s) in light of theteachings herein.

Overview

Numerous studies have shown that visitation between inmates andoutsiders is an extremely important part of rehabilitation. Allowing foran inmate to keep in contact is friends and family significantly helpsto reduce recidivism as well as to prepare an inmate for life afterprison. Because most inmates are eventually released back into thepublic, any steps to minimize problems with their re-assimilation withsociety are highly beneficial.

Typical visitation procedures in controlled environments are designed tobalance the inmate's ability to communicate with the security risksassociated therewith. For example, each individual inmate is typicallyprohibited from contacting certain persons, such as former victims,judges, jury men/women, etc. For this reason, as well as to reduce theworkload of the institution staff tasked with researching and approvingeach visitor, a whitelist or blacklist is usually associated with theinmate. A blacklist identifies individuals that the inmate is prohibitedfrom calling, whereas the whitelist identifies individuals the inmate ispermitted to call. When the system employs a blacklist, the inmate ispermitted to contact anybody not listed. Conversely, when using awhitelist, the inmate is permitted to call only the individuals on thelist.

Visitations between inmates and members of the general public cangenerally occur using any of several different methods. A common, butrisky, example is a face-to-face visit. In this type of visit, theinmate and visitors are usually located in a common area overseen byCorrections Officers. Direct contact is not necessarily prohibited, butis usually closely monitored and limited. Such direct face-to-facevisitation is the most difficult to monitor and control because itoccurs outside of the purviews of the communication system.Additionally, this type of visit requires physical screening of thevisitor to ensure that they do not bring in any contraband. Anotherdisadvantage of this type of visit is the facility's ability to enforcerules.

Because of the heavy risks associated with face-to-face contact, acommon modification to this type of visitation has been to place aphysical barrier between the individuals, such as a Plexiglas window.This addresses a number of the problems associated with face-to-facevisitation. For example, the individuals will usually communicatethrough the glass via telephone handsets. Because the communications areelectronic, they can be monitored by the visitation system.Additionally, there is a significant reduction in the likelihood of theoutside visitor exchanging contraband with the inmate. However, there isstill a problem with allowing outsiders into the prison facility.

Additionally, it is not always easy for outside family members tophysically travel to the prison location. Therefore, another form ofvisitation is facility-based video visitation. In this form, both theinmate and the visitor are at different locations within the prisonfacility, but are electronically connected via a video conferencingdevice/system. The individuals communicate with each other usingtelephone handsets or other similar devices with a speaker andmicrophone. Further, in order to facilitate the video aspect of thecommunication, each user is equipped with a camera for capturing videoinformation and a display for displaying the video informationtransmitted from the other user.

Similar to facility-based video visitation is remote video visitation.As its name implies, this form of visitation is similar tofacility-based video visitation, except that while the inmate remains inthe facility, the outside party is at a remote location. The videocommunication is then performed over the internet, for example. In thisform of visitation, the inmate need not necessarily be restricted to aparticular location for the video communication, but can use a PID(personal inmate device).

For each of these different visitation types, there is a certain amountof planning and recordkeeping required. In some facilities, software,such as a Jail Management System (JMS), automates part of therecordkecping, storing inmate information along with visitor informationin the computer system. In more sophisticated JMS installations, thesoftware can also perform basic enemy checking, employee checking, andpast felony checking on visitors with the data already stored in the JMSdatabase.

In light of the above, the present disclosure provides a system andmethod of facilitating different types of visitations in acontrolled-access environment. This consists of a system that providesscheduling services to coordinate actual visits, provides the exchangeof the electronic communications between the parties, performsmonitoring of the audio and/or video for rules violations or othersecurity risks, etc. By providing a coordinated system for managing thedifferent forms of visitation, significant burden can be removed fromprison staff while simultaneously enhancing the prisoner's communicationoptions.

Visitation System

FIG. 1 illustrates a block diagram of an exemplary visitation controlsystem 100. The visitation control system 100 includes a visitationcontrol unit 102 configured to communicate with a variety of devicesover a variety of different communications networks. For example, thevisitation control unit 102 interfaces with a LAN 104 to communicatewith several local devices, such as data storage 106, control stations108, video communications devices 110, audio communication devices 112,and wireless devices 103/105. In an embodiment, the visitation controlunit 102 is also connected to a wireless access point (e.g., a router)101, which may provide connectivity to the wireless devices 103/105.

In an embodiment, the visitation control unit is also connected to anyor all of a Wide-Area Network (WAN) 114, the Internet 116, and thePublic Switched Telephone Network (PSTN) 122. The WAN 114 may facilitatecommunications with other nearby prisons, such as those within the samecounty, state, etc. Audio and/or video devices 124 located at thoseother facilities may provide cross-facility visitations between inmates.In an embodiment, WebRTC may be utilized in place of an SIP protocolover a WAN or the Internet, each of which provides a dedicated, privatelink between the visitation control unit and remote devices.

The Internet 116 is utilized to provide access to remotely distributedcontrol stations, scheduling clients 118, and home visitation devices120. The PSTN can be used to provide connectivity to basic telephonesand other communication devices over traditional data networks.

Data Storage

FIG. 2 illustrates a block diagram of an exemplary visitation controlunit 200 that may represent an exemplary embodiment of the visitationcontrol unit 102. The visitation control unit 200 includes a videoserver 212, an audio server 214, a web server 216, and an applicationserver 218, that are all connected to each other via a network bus 210.

Each of the servers 212-218 can be constructed as individual physicalhardware devices, or as virtual servers. The number of physical hardwaremachines can be scaled to match the number of simultaneous userconnections desired to be supported in the visitation management system.

The video server 212 can consist of any number of servers, and isconnected to each of the video visitation devices. The video server 212serves many roles necessary to facilitate the secure communicationbetween the visitors. For example, in an embodiment, the video serverperforms the switching required to electrically connect two or morevisitation station units together for a visitation session. In anembodiment, the video server 212 also sends the audio and/or videoinformation to a monitoring station 180 for monitoring thecommunication. The monitoring station 180 can be located on-site or at aremote monitoring location, and allows corrections officers or others tomonitor the visit in real-time, on delay, or in the form of an audio oraudio/video recording.

Because there may be a variety of different video communicationstandards employed by different video visitation devices that wish toparticipate in video communications, in an embodiment, the video server212 may also perform real-time format conversion. The conversion myconvert incoming signals to be compatible with on-site devices, or mayconvert outgoing signals to be compatible with recipient devices.

The audio server 214 can consist of any number of servers, and connectsaudio devices to the video visitation system 100. As with the videoserver 212, the audio server also sends the audio information to amonitoring station for monitoring the communication, in an embodiment.In an embodiment, the audio server 214 is configured to detect three-waycalls in the audio stream, such as by the detection of a hook-flash orother indicating event, has the ability to detect and respond toDual-Tone Multi-Frequency (DTMF) inputs, and any other event that can begenerated by a telephone. In an embodiment, the audio server 214 isfurther capable of ringing the telephone devices and connecting tooutside lines via the PSTN to route audio to outside sources, such asland lines and/or cellular phones.

The web server 216 may also consist of any number of servers, and isconfigured to run Apache, Microsoft Internet Information Server, orother web server software. The primary function of the web server is toroute requests and other communications from visitation controlstations, remote visitation scheduling clients, and home visitationdevices into the appropriate destination within the visitation controlunit. In an embodiment, the web server can also serve as a maintenancepoint into the visitation control unit 200, by which servicing,configuring, and updating can be performed. In an embodiment, the webserver 216 is connected to both the public Internet and the internalnetwork of the facility.

FIG. 3 illustrates an exemplary application server 300, which mayrepresent the application server 218 depicted in FIG. 2. The applicationserver 300 functions as the primary logic processing center in thevisitation management system 100. The application server 300 includesone or more central processing units (CPU) 310 connected via a bus 314to several other peripherals. Such peripherals include an input device320, such as a keyboard and/or mouse, a monitor 322 for displayinginformation, and a network interface card 316 and/or a modem 318 thatprovide network connectivity and communication.

The application server 300 also includes internal data storage 324. Thisdata storage 324 is non-volatile storage, preferably in the form of oneor more magnetic hard disk drives (HDDs). The data storage 324 is usedto store a variety of important files, documents, or other digitalinformation, such as the operating system files, application files, userdata, and/or temporary recording space.

The application server 300 also includes system memory 322. The systemmemory is preferably faster and efficient than the data storage 324, andis configured as random access memory (RAM) in an embodiment. The systemmemory 322 contains the runtime environment of the application server,storing temporary data for any of the operating system 330, java virtualmachine 332, java application server 334, and visitation control logic336.

FIG. 4 illustrates a block diagram of exemplary storage devices 400 usedby the visitation control system 200. As shown in FIG. 4, in addition tothe storage on the application server, there may also be one or moredatabases and associated Network Attached Storage devices connected tothe application server 300 via the network. For purposes of thisdisclosure, the term “database” should be understood to encompass arelational database application or a remotely defined data store inaddition to a traditional relational database.

As shown in FIG. 4, the storage devices 400 provide access to a widevariety of data. Inmate data 410 preferably includes information aboutindividual inmates, such as name, address, commitment information, etc.These records may be directly entered, or may be obtained from an InmateTelephone System or Jail Management System. Configuration data 420 canbe stored to provide configuration details for upcoming visits. Suchconfigurations may include the connection details of one or morehardware devices anticipated to be used for the visit, such as the videoand audio servers, web servers, application servers, and remote devices.The configuration data 420 allows the system to be configured with avariety of different hardware types and manufacturers, and allow formore error-free visitations.

Visitation history data 430 stores information relating to completedvisits. The information included within these records may consist of theinmate involved in the visit, the outside party involved in the visit,the resources used for the visit, including the type of devices used byeach of the parties, the date/time of the visit, the visit duration,etc. This information can be populated by the visitation managementsystem 100 by tracking and monitoring visits, and recording the dataassociated therewith.

Scheduling data 440 stores visitation events that have not yet occurredas well as historical visit information (e.g., visitation sessionrecords). In this regard, the scheduling data 440 stores a calendar ofscheduled visits, as well as information relating to those scheduledvisits, such as the parties to be involved, their contact information,and the visitation devices to be used by those individuals. Thevisitation schedule records may include links to data relating to any ofthe involved parties, including inmates, visitors, and correctionalstaff (if needed). In an embodiment, a separate data store can be usedto store the visitation session records. Further, in an embodiment, thevisitation session records may include a link to the original visitationsession reservation, any recordings or transcripts of the visitationsession, and/or a list of the actual resources used, if they differedfrom the scheduled resources.

Although information regarding the visitors may be directly stored inthe respective databases, a visitor database 450 may be provided in anembodiment to separately store visitor information. Visitors may then beidentified in various ones of the data stores by name or identifieronly. This name/identifier may include a link to full biographicalinformation of the visitor in the visitor data store 450.

In an embodiment, it is also desirable to store actual recordings of thevisitation data. There are many reasons to store such information,primarily monitoring. However, because video and audio files consumesignificant amounts of storage space, this data is preferably stored ona Network Attached Storage (NAS) device 460 configured as a mass storagedevice. The data stores 410-450 may include links and/or pointers torecording data located on the NAS device 460. In order to reduce therequired size of the NAS device 460, the NAS device preferably includesa backup routine to transfer recording data to permanent storagedevices, such as archival permanent storage or optical disks, after apredetermined time has elapsed since the initial recording of that data.The NAS device 460 is connected to the data stores by way of a network490.

System Operation

The system provides visitation between a variety of different devicesand individuals. For starters, regardless of the visit type, the devicesbeing used to conduct the visit are coupled to the visitation system100, even in the instance of face-to-face visits. For example,communication signals from each of the devices are provided to the audioserver 214 or the video server 212. In the case of traditional phones,because they are not connected directly to each other, the audio serveris configured to provide line power and logical switching services.Further, because of the integrated nature of the system, the phones canbe connected to other types of devices in real-time, whichadvantageously increases the flexibility of the system.

In an embodiment, the system 100 is also configured to facilitate theuse of smart devices (wired or wireless). Like in the case of line-wirephones, the wireless devices are also coupled to the audio and/or videoservers. Because of the modular use of these types of devices, thesystem 100 preferably performs authentication techniques in thisembodiment so as to ensure that the participants are who they claim tobe. The respective servers could also provide interactive feedback tothe devices, such as the display of elapsed time on the visit, or timeremaining, as well as other informational data about the visit.

With the above in mind, the operation of the system will first bedescribed with respect to FIG. 5, which illustrates a flowchart diagramof a method 500 for scheduling a visitation. Although the physicaldevices and components that form the system have largely already beendescribed, additional details regarding their more nuanced operationwill be described below with respect to FIGS. 5-7.

A website (or other scheduling interface) may be managed by, or onbehalf of the controlled facility, either individually or as part of alarger network of controlled facilities. This website provides aninteractive platform for users of the visitation system to schedule andcarry out visits with residents of the controlled facility. Thus, thewebsite's backend links to or communicates with the application server218 via the web server 216.

Scheduling a Visit

A user wishing to schedule a visitation must first be signed up with thewebsite. This signup process is largely typical, requiring the user tosubmit identifying information and select a user name and password.However, unlike typical registrations, in an embodiment, the system mayadditionally assign the user a globally-unique (within the visitationsystem) PIN code for which the user can independently identifythemselves to the system. Additionally, the system may require certainnon-conventional information (such as biometrics) in order to verify theuser's identity to a high degree of likelihood. As discussed above, thisis particularly important for security purposes, to ensure that thesystem can properly vet the inmate's contacts. As will allauthentication procedures described herein, upon a predetermined numberof failed attempts to authenticate themselves, the user will bepermanently prohibited access (at least until the individual can confirmtheir identity with another authorized individual and have their accountunlocked).

Once registered, the user logs on to the website (510 a) and selects thedetention facility in which the desired inmate is being held (512 a). Ifthe user is already at the facility, then the visitor may log into alocal kiosk (510 b). Additionally, in an embodiment, the system permitsauthorized personnel (e.g., Correctional Officers) to schedule visits ona user's behalf. As such, a user may contact an Officer (511), who thenaccesses the scheduling system (512 b).

Once the user (or Office in the latter case) has gained access to thescheduling system of the particular facility associated with the desiredinmate, the user then searches for the inmate (514) and identifies thedesired inmate to the system. The application server 218 receives theselection from the web server 216, and accesses the inmate data 410associated with the desired inmate as well as the visitor dataassociated with the visitor. From this data, the application server 218determines whether the inmate is listed on the visitor's inmate list(516) (e.g., a list of inmates with which the visitor has been approvedto communicate).

If the inmate is not on the visitor list (516-N), then the visitor mayrequest that the inmate be added to his/her list (518). In someinstances, approval may not be required, such as in the case of approvedsocial workers, direct family members, etc. However, in many cases,approval is required (520-Y). When such approval is required, thevisitor makes a request for the inmate to be added to his/her approvedlist (532), and the visit scheduling temporarily terminates (534) untila later date at which the visitor has been approved.

If the inmate is on the visitor list (516-Y) or if no approval isrequired to add the inmate (520-N), then the application server 218accesses scheduling data 440 and populates a calendar of availability(522) to provide to the visitor. This calendar may be in the form of agraphical depiction (such as an actual calendar), or may simply listavailable days/times for the particular inmate. The calendar ispopulated by examining both the availability schedule of the inmatebased on the inmate data 410 (including the inmate's daily schedule) aswell as the general availability of visitation devices from thescheduling data 440.

Using the availability calendar, the visitor selects a day/time for thevisit (524/526). In an embodiment, the availability calendar firstprovides broad availability, such as available days, for selection. Oncethe desired day is selected (524), then a more narrow availability (suchas time blocks within the selected day) is provided. The user can thenselect the desired time from the available time blocks (526).

Once the selection has been made, the application server 218 updates thescheduling data 440 to include the newly-scheduled visit and sends aconfirmation notice to the visitor (528). In an embodiment where thevisit will occur using a community device within the prison, theapplication server 218 also updates the availability of that particulardevice in the system so that it is blocked off for the scheduled timeperiod and can not be reassigned to another visitor. Once the schedulingdata has been updated, the visit has been scheduled (530).

Carrying Out an in-Person Visit

FIG. 6 illustrates a flowchart diagram of an exemplary method 600 forcarrying out an in-person visit. At the outset, the visit procedurebegins (610). This may consist of the application server monitoring thescheduling data 440 and determining that a visit is set to begin apredetermined amount of time later. The application server 200 may thenissue notifications to one or more of the visit participants, such asvia an automated call, SMS text message, and/or email. At a time nearerto the scheduled appointment, the application server 200, stillmonitoring the scheduling data 440, may notify a visitation guard of theapproaching visitation appointment.

At a time near the appointment, the visitor arrives at a visitation area(612). The visitor waits in a staging area until his/her name is called,either by the system or an on-duty Corrections Officer (614). Thevisitor presents identification information, either to the system, orthe Officer in order to verify his/her identity (616). In the formerscenario, the visitor may present their information, including photoidentification and previously-assigned PIN number to the visitationcontrol station 108, which relays the information to the applicationserver 200 for authentication.

In an embodiment, the visitation control station 108 may also acquireinstantaneous authentication information, such as biometric information.For example, the visitation control station 108 may include one or morebiometric scanners, such as a fingerprint reader for capturingfingerprint data, camera for capturing facial information, stereoscopiccamera for capturing 3-dimensional image data, infrared camera forcapturing heat signature data, signature pad for capturing a signatureof the individual, microphone for capturing voice information, amongothers. The system can be configured for any of these types ofauthentication information. For example, authentication can be performedbased on facial architecture in the case of 3D images, or based onsignature analysis, etc. Alternatively, or additionally, the visitationcontrol station may include any number of other identificationimplementations, such as an RFID reader for identifying a radiofrequency tag previously issued to the visitor, etc. In order to performthe authentication, the system compares the captured biometricinformation to stored information and determines whether they match to apredetermined degree.

Once authenticated, in an embodiment, the system issues a one-time useaccess code to the user. Such a one-time use access code adds anotherlevel of security to the system by allowing only the authorized andauthenticated user to use the visitation device at the designated time.In an embodiment, as an alternative to issuing a one-time access code,the system can instead perform a multi-level authentication process,requiring the individual to submit their globally-unique ID and at leastone form of biometric data for authentication. In an embodiment,authentication is also performed on the inmate.

The visitor then proceeds to the visitation booth (618). At thevisitation booth, the visitor lifts the handset and enters the one-timeaccess code (620).

While the visitor is being authenticated, etc., the inmate is alsotaking steps to begin the visitation. For example, the inmate is firstmoved from the housing unit to the visitation area (613). In anembodiment, this occurs after the application server notifies theCorrections Officer of the impending appointment. At the scheduled time,the inmate is moved to the visitation booth (615). When ready, theinmate lifts the handset and enters his own personal telephone ID (621).In an embodiment, the telephone ID is the ID number or PIN assigned tothe inmate for him to identify himself to the phone system for purposesof making general telephone calls, as well as for requesting otherservices.

Once both the visitor and the inmate have picked up their respectivephones or have in some other way begun the visit, the visit proceeds(622). As previously discussed, the communications exchanged between theparties are also provided to the audio server 214, which performsreal-time monitoring of the conversation (if permitted), or forwards theconversation data to a monitoring station, such as monitoring station180 for review by an officer or other trained individual.

In an embodiment, live monitors can perform live monitoring of any visitat the monitoring station 180 or at a remote terminal. The remoteterminal can be a personal device, such as a smartphone or tablet, orcan be a home computer. In the same manner that the visitation system iscapable of sending audio/video data to the live monitor, the livemonitor can also instruct the visitation system to notify anotherindividual, and to forward the visitation data to the other individualfor additional monitoring.

During the visit, there are several different safeguards that can bemonitored in an ongoing fashion. For example, images and/or audio datacan continue to be captured for authentication purposes. Such ongoingauthentication can be performed in either a continuous or a periodicfashion. Additionally, computer or live monitored can also be performedin order to detect whether either party to the visit violates aparticular rule, such as the exchange of contraband, or engaging inforbidden topics of conversation. As a result of detecting a rulesviolation by the visitation system, the visitation system can beconfigured to take any number of different actions. For example, thevisitation system can interrupt the visit and issue a pre-recordedwarning, issue a notification to a live monitor, or terminate the call.Similarly, if a live monitor is involved, the live monitor has theability to barge into the call to state a warning, terminate the call,etc.

The visit proceeds until either party terminates the visit by hanging upthe receiver, until the time expires, or until the monitoring system ormonitoring individual detects a rules violation and terminates the callin response. In this regard, the application server monitors the timeand the pre-designated duration of the visit, and can cut the lines'access upon expiration of the visit.

Once the visit has terminated, the application server detects thetermination and writes a visitation record into the visitation historydata store 430. In an embodiment, the audio server 214 also temporarilystores the communication until the visit ends. Once the visit hasterminated, the application server notifies the audio server, at whichtime the audio server sends the recorded audio to the NAS storage device460 for long-term archival.

Following the termination of the visit, the visitor is directed out ofthe facility (626) and the inmate is returned to the housing unit (628).Once separated, the visit completes (630).

Carrying Out a Remote Visit

FIG. 7 illustrates a flowchart diagram of an exemplary method 700 forcarrying out a remote visit. At the outset, the visit procedure begins(710). This may consist of the application server monitoring thescheduling data 440 and determining that a visit is set to begin apredetermined amount of time later. The application server 200 may thenissue notifications to one or more of the visit participants, such asvia an automated call, SMS text message, and/or email.

In this exemplary embodiment, the visit is initiated by the inmate.However, it should be understood that the following description isapplicable in reverse for a visitor-initiated visit. In this example,the inmate selects the desired conference type on his/her assignedmultifunction wireless device, such as for example a video call (720).Once selected, the inmate enters his PIN (730).

Authentication is then carried out on the prisoner (735). This caninclude performing biometric verification using the device's microphonefor voice authentication, camera for facial authentication, or anon-board fingerprint scanner for fingerprint identification, as well asany of the other biometric authentications that have been describedherein. In addition, and unique to remote visits, location verificationcan also optionally occur. Specifically, the visitation system canreceive GPS data from smart devices, RF geofencing information, or 3Dimage verification, among other location data to allow the system toverify that the caller is within a predetermined area. Theauthentication information is sent by the inmate's device to theapplication server, which carries out authentication using the inmatedata 410. Once authenticated (740), the inmate dials the outgoing numberof the visitor to attempt the visit (745). This causes the applicationserver to dial out to the visitor.

Upon receiving the call from the application server, the visitor answers(750). The application server 200 then prompts the user to enter his/herPIN (755) and provide biometric information in the same manner asdescribed above (760). Using the acquired biometric information, theapplication server 200 performs authentication of the visitor. Once thevisitor has been successfully authenticated (765), the visit proceeds(770) until either party hangs up, funds are depleted or until timeexpires. The termination of the visit may occur in the same manner asdescribed above.

As with the in-person visit, there are several different safeguards thatmay occur during the visit that can be monitored in an ongoing fashion.For example, images and/or audio data can continue to be captured forauthentication purposes. Such ongoing authentication can be performed ineither a continuous or a periodic fashion. Additionally, computer orlive monitored can also be performed in order to detect whether eitherparty to the visit violates a particular rule, such as the exchange ofcontraband, or engaging in forbidden topics of conversation. As a resultof detecting a rules violation by the visitation system, the visitationsystem can be configured to take any number of different actions. Forexample, the visitation system can interrupt the visit and issue apre-recorded warning, issue a notification to a live monitor, orterminate the call. Similarly, if a live monitor is involved, the livemonitor has the ability to barge into the call to state a warning,terminate the call, etc.

During the visit, the communication information is provided to the audioserver 214, and the video server 212 in the case of a video visit. Theservers capture the respective data for real-time monitoring purposes(if permitted). Additionally, once the visit has terminated, theapplication server updates the visitation history data 430 with a recordof the visit (775), and the servers transmit their recordings to the NASstorage device for long-term archival. Once the data has beentransmitted and the records have been updated, the visit is consideredto be complete (780).

Exemplary Computer Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the methods of FIGS. 5-7 can beimplemented in the environment of one or more computer systems or otherprocessing systems. An example of such a computer system 800 is shown inFIG. 8. One or more of the modules depicted in the previous figures canbe at least partially implemented on one or more distinct computersystems 800.

Computer system 800 includes one or more processors, such as processor804. Processor 804 can be a special purpose or a general purpose digitalsignal processor. Processor 804 is connected to a communicationinfrastructure 802 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 800 also includes a main memory 806, preferably randomaccess memory (RAM), and may also include a secondary memory 808.Secondary memory 808 may include, for example, a hard disk drive 810and/or a removable storage drive 812, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 812 reads from and/or writes to a removable storage unit816 in a well-known manner. Removable storage unit 816 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 812. As will be appreciated bypersons skilled in the relevant art(s), removable storage unit 816includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 808 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 800. Such means may include, for example, aremovable storage unit 818 and an interface 814. Examples of such meansmay include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 818 and interfaces 814 which allow software anddata to be transferred from removable storage unit 818 to computersystem 800.

Computer system 800 may also include a communications interface 820.Communications interface 820 allows software and data to be transferredbetween computer system 800 and external devices. Examples ofcommunications interface 820 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface820 are in the form of signals which may be electronic, electromagnetic,optical, or other signals capable of being received by communicationsinterface 820. These signals are provided to communications interface820 via a communications path 822. Communications path 822 carriessignals and may be implemented using wire or cable, fiber optics, aphone line, a cellular phone link, an RF link and other communicationschannels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 816 and 818 or a hard disk installed inhard disk drive 810. These computer program products are means forproviding software to computer system 800.

Computer programs (also called computer control logic) are stored inmain memory 806 and/or secondary memory 808. Computer programs may alsobe received via communications interface 820. Such computer programs,when executed, enable the computer system 800 to implement the presentdisclosure as discussed herein. In particular, the computer programs,when executed, enable processor 804 to implement the processes of thepresent disclosure, such as any of the methods described herein.Accordingly, such computer programs represent controllers of thecomputer system 800. Where the disclosure is implemented using software,the software may be stored in a computer program product and loaded intocomputer system 800 using removable storage drive 812, interface 814, orcommunications interface 820.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

CONCLUSION

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The invention has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the invention should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A visitation management system for allowing avisit participant to visit with an inmate of a controlled environmentfacility, the visitation management system comprising: an authenticationsubsystem that includes: a database that stores identifying informationof the visit participant; an identification number system configured toassign a globally-unique identification number to the visit participant;a biometric input device configured to capture biometric information ofa purported visit participant; and an authenticator configured tocompare the captured biometric information of the purported visitparticipant to biometric information of the visit participant stored inthe database, and to authenticate or decline the purported visitparticipant based on the comparison; a visit scheduling subsystem thatincludes: a scheduling database that stores schedule information ofvisitation sites, as well as of the inmate, each item of scheduleinformation including a link that provides additional information whenactivated; an interface unit that is configured to provide the scheduleinformation to the visit participant, and receive a visit slot selectionfrom the visit participant, wherein the visit scheduling subsystemupdates the schedule information based on the visit slot selection; anda visit monitoring subsystem that includes: a server configured toreceive audio and/or video data of the visit in real-time; a monitoringstation configured to monitor the received audio and/or video data, todetect a violation of a predetermined rule, and to analyze the receivedaudio and/or video data for one or more of a hook-flash event or a DTMFinput for purposes of detecting an unauthorized three-way call attempt.2. The visitation management system of claim 1, wherein the monitoringstation includes an algorithm for analyzing the received audio and/orvideo data to automatically detect the violation.
 3. The visitationmanagement system of claim 2, wherein upon the detection of theviolation, the monitoring station is configured to notify a selectedreviewer of the violation.
 4. The visitation management system of claim1, wherein the interface unit is configured to provide the scheduleinformation in graphical form.
 5. The visitation management system ofclaim 1, further comprising a schedule generator configured to correlatea schedule of a visitation site with a schedule of the inmate in orderto generate the schedule information that is provided to the visitparticipant.
 6. The visitation management system of claim 1, furthercomprising a log generator configured to, after termination of thevisit, store a log that includes duration information, time information,and participant information of the visit.
 7. The visitation managementsystem of claim 6, further comprising a record database that stores arecording of the visit in association with the log.
 8. A visitationmanagement system for allowing a visit participant to visit with aninmate of a controlled environment facility, the visitation managementsystem comprising: a registration subsystem configured to register avisit participant; an authentication subsystem configured to receiveidentifying information from a purported visit participant, and toauthenticate the purported visit participant as the visit participantbased on the received identifying information; a visit schedulingsubsystem configured to access a scheduling database that includes aplurality of data records and stores schedule information of visitationsites, as well as of the inmate, to provide available visit slots to thevisit participant, and to receive a visit slot selection from the visitparticipant, and a visit monitoring subsystem configured to analyze dataof the visit for one or more of a hook-flash event or a DTMF input forpurposes of detecting an unauthorized three-way call attempt, whereineach data record includes a link that provides additional informationwhen activated.
 9. The visitation management system of claim 8, whereinthe visit monitoring subsystem is further configured to monitor thevisit for violation of a predetermined rule.
 10. The visitationmanagement system of claim 8, wherein the registering includes capturingbiometric identification information of the visit participant andissuing the visit participant a globally-unique identification number.11. The visitation management system of claim 10, wherein theregistering further includes storing the biometric identificationinformation in association with the globally-unique identificationnumber.
 12. The visitation management system of claim 8, wherein theauthentication includes receiving a personal identification number ofthe purported visit participant and comparing the received personalidentification number to the stored globally-unique identificationnumber.
 13. The visitation management system of claim 12, wherein theauthentication further includes identifying the stored biometricidentification information based on the comparison, receiving biometricinformation of the purported visit participant, and correlating thereceived biometric information to the stored biometric identificationinformation.
 14. The visitation management system of claim 13, whereinthe authentication is configured to succeed or fail based on thecorrelating.
 15. The visitation management system of claim 8, whereinthe visit scheduling subsystem is configured to retrieve inmateavailability information and visit site availability information fromone or more databases, and to compare the inmate availabilityinformation and the visit site availability information in order toidentify the available visit slots.
 16. A method for scheduling a visitbetween a visit participant and an inmate of a controlled environmentfacility, the method comprising: authenticating a purported visitparticipant as the visit participant; retrieving availabilityinformation of the inmate; accessing a scheduling database that includesa plurality of data records and that stores schedule information ofvisitation sites, as well as of the inmate; generating a schedule ofavailability that includes a plurality of available visit slots based onthe plurality of data records; providing the schedule of availability tothe visit participant; receive an available visit slot selection fromthe visit participant; update a visit schedule based on the selection,the visit schedule including a plurality of schedule entries, each ofthe plurality of schedule entries including a link that providesadditional information when activated; receive data of a visit; andanalyze data of the visit for one or more of a hook-flash event or aDTMF input for purposes of detecting an unauthorized three-way callattempt.
 17. The method of claim 16, wherein the authenticating includescomparing an identification number of the purported visit participant toa stored identification number of the visit participant, and comparingbiometric information of the purported visit participant to storedbiometric information of the visit participant.
 18. The method of claim16, further comprising retrieving availability information of at leastone of a visit site or a visit equipment, wherein the generating of theschedule includes correlating the inmate availability information to theavailability information of the at least one of the visit site or thevisit equipment.
 19. The method of claim 16, wherein the schedule ofavailability is generated graphically as part of a graphical userinterface, and wherein the available visit slot selection is receivedvia the graphical user interface.
 20. The method of claim 18, whereinthe updating of the visit schedule includes updating the availabilityinformation of the inmate and updating the availability information ofthe at least one of the visit site or the visit equipment.