Secure video visitation system

ABSTRACT

Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation Application of U.S. application Ser.No. 17/150,784, filed Jan. 15, 2021, which is a Continuation Applicationof U.S. application Ser. No. 16/432,570, filed Jun. 5, 2019, now U.S.Pat. No. 10,897,596, issued Jan. 19, 2021, which is a ContinuationApplication of U.S. application Ser. No. 15/621,676, filed Jun. 13,2017, now U.S. Pat. No. 10,321,094, issued Jun. 11, 2019, which is aContinuation Application of U.S. application Ser. No. 15/002,073, filedJan. 20, 2016, now U.S. Pat. No. 9,681,097, issued Jun. 13, 2017, eachof which is incorporated herein in its entirety.

BACKGROUND Field

The disclosure relates to video communications, and specifically tovideo communications implemented via an inmate personal device in acontrolled environment facility.

Related Art

American prisons house millions of individuals in controlledenvironments all over the country. The rights of these prisoners arelargely restricted for a number of reasons, such as for their safety andthe safety of others, the prevention of additional crimes, as well assimple punishment for crimes committed. However, these prisoners arestill entitled to a number of amenities that vary depending on thenature of their crimes. Such amenities may include phone calls,commissary purchases, access to libraries, digital media streaming, aswell as others.

One such amenity that is currently in the process of being provided toinmates of correctional facilities is that of video conferencing, alsoknown as video calling. However, like with all such services, videoconferencing services present a number of challenges that are unique toprisons.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

Embodiments are described with reference to the accompanying drawings.In the drawings, like reference numbers indicate identical orfunctionally similar elements. Additionally, the left most digit(s) of areference number identifies the drawing in which the reference numberfirst appears.

FIG. 1 illustrates an exemplary video conferencing environment;

FIG. 2A illustrates a perspective view of an exemplary videoconferencing kiosk;

FIG. 2B illustrates a block diagram of an exemplary video conferencingkiosk;

FIG. 3A illustrates a perspective view of an exemplary person inmatedevice; and

FIG. 3B illustrates a block diagram of an exemplary person inmatedevice;

FIG. 4 illustrates a flowchart diagram of an exemplary method forcompleting a video call; and

FIG. 5 illustrates a block diagram of a general purpose computer thatmay be used to perform various aspects of the present disclosure.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

Embodiments may be implemented in hardware (e.g., circuits), firmware,computer instructions, or any combination thereof. Embodiments may beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices, or other hardware devices Further, firmware,routines, computer instructions may be described herein as performingcertain actions. However, it should be appreciated that suchdescriptions are merely for convenience and that such actions in factresults from computing devices, processors, controllers, or otherdevices executing the firmware, routines, instructions, etc. Further,any of the implementation variations may be carried out by a generalpurpose computer, as described below.

For purposes of this discussion, the term “module” shall be understoodto include at least one of hardware (such as one or more circuit,microchip, processor, or device, or any combination thereof), firmware,computer instructions, and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the disclosure that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or adapt for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such adaptations and modificationsare intended to be within the meaning and plurality of equivalents ofthe exemplary embodiments based upon the teaching and guidance presentedherein. It is to be understood that the phraseology or terminologyherein is for the purpose of description and not of limitation, suchthat the terminology or phraseology of the present specification is tobe interpreted by those skilled in relevant art(s) in light of theteachings herein.

Those skilled in the relevant art(s) will recognize that thisdescription may be applicable to many different communicationsprotocols, and is not limited to video communications.

As previous discussed, there are many unique concerns associated withproviding video communications to inmates of a controlled facility. Tofurther complicate matters, it is preferable to provide videocommunications to inmates via personal inmate devices (PIDs). In otherwords, certain facilities may be outfitted to allow inmates to carry anduse their own personal devices, in the form of tablet computers,smartphones, etc. that they are permitted to use for personal calls,digital content streaming, among other uses.

However, attempting to utilize inmate PIDs for video calling createssignificant security concerns that are additional to the alreadynumerous security complications associated with simple audio telephonecalls. For example, the use of video in the call can allow outsiders toprovide detailed prohibited visual information to inmates in the form ofpictures, schematics, video instructions, etc. Further, inmates wouldalso be in a position to transmit prohibited information to outsiderssuch as prison layouts (via a visual scan, e.g.), guard or other inmateidentities, and sexual content, among others.

With these concerns in mind, it is preferable to disable the camera onthe PID so that control of the view being provided to outsiders isremoved from the inmate. By providing a fixed camera, the prison (andnot the inmate) control a substantial portion of the information beingprovided to outsiders. With this objective in mind, the followingdescription is provided of a system in which an inmate PID functionstogether with a fixed camera to provide secure video communications toinmates.

An Exemplary Video Conferencing Environment

FIG. 1 illustrates an exemplary video conferencing environment 100. Inthe environment 100, a kiosk unit 110 disposed at a particular location.In an embodiment, the kiosk unit 110 is disposed at a predeterminedlocation, such as a facility telephone bay, or a more private conferenceroom. In the former arrangement, the kiosk unit 110 may be arranged withother kiosk units and/or telephone units as part of a public callingarea. In either arrangement, the communications will be closelymonitored.

In an embodiment, the kiosk unit 110 has a fixed orientation, such thata camera of the kiosk unit 110 captures a fixed location fortransmission. This is the most restrictive configuration, and isdesigned to provide maximum protection against the transmission ofunauthorized visual data transmissions. In an alternative embodiment,the kiosk unit 110 and/or the camera is pivotable along the horizontalplane. In such an embodiment, the degree of pivot is restricted to arelatively small amount to provide moderate protection against thetransmission of unauthorized visual data transmissions. In still anotherembodiment, the kiosk unit 110 or the camera can be freely movable. Thisembodiment is discussed in further detail below.

The kiosk unit 110 includes an interface connection 135 that provides acommunication interface to a Personal Inmate Device 150. As discussedabove, the PID 150 can be any portable device assigned to a particularprisoner to provide certain electronic services, such as telephone andcommissary services, to that particular prisoner. Using the interfacecommunication 135, the PID 150 cooperatively operates with the kioskunit 110 to provide video communication services for the inmate, as willbe discussed in further detail below.

Exemplary Kiosk Unit

FIG. 2A illustrates a perspective view of an exemplary videoconferencing kiosk 200. The kiosk 200 includes at least a camera 210 anda display 220. In an embodiment, the kiosk 200 also includes aninterface port 230 and an interface connection 235, as will be discussedin further detail below. The kiosk 200 may represent an exemplaryembodiment of the kiosk unit 110.

As shown in FIG. 2A, the kiosk 200 includes a camera 210 or other visualinput device. The camera 210 captures visual information in the form ofstill and/or video images from the video conferencing environment 100that will form the inmate's video transmissions. As discussed above,there are multiple embodiments for the positioning of the camera. Thereis, of course, a significant security concern associated with thecapture of visual data from inside the correctional facility. Andalthough this security concern takes precedence, it can nonetheless bebalanced against the usefulness of the video conferencing kiosk.

With this balance in mind, in a preferred embodiment, the camera ismounted at a fixed position on the kiosk 200, but its focal directioncan be vertically adjusted within a predetermined degree. To provide anexample, the camera 210 is positioned 66 inches off the ground, and itsfocal direction can be adjusted 10 degrees from horizontal either up ordown. Such a configuration enhances the usefulness of the kiosk byallowing it to compensate for the different heights of differentindividuals, while maintaining a high degree of visual security.

The kiosk 200 also includes a display 220. The display 220 is primarilyused for displaying the incoming visual data received from the outsideparty to the call. However, in an embodiment, the display 220 is alsoused to display other information, such as status information, callinginstructions, calling rules, warnings, etc. In an embodiment, thedisplay also interfaces with the PID 150 to provide instructions to theinmate dictated from the PID, as will be discussed in further detailbelow.

As discussed above, the kiosk 200 also includes the interface port 230and the interface connection 235. The interface port 230 is acommunication port for interfacing with the PID 150. The interface portlinks to the PID 150 via the interface connection 235, and is used tosend and receive information with the PID 150, as will be discussed infurther detail below.

FIG. 2B illustrates a block diagram of the exemplary video conferencingkiosk 200. As shown in FIG. 2B, the video conferencing kiosk 200includes several operational components. The components include thecamera circuit 215 that functionally supports the camera 210, and whichmay include one or more charge coupled device (CCD) or CMOS image sensorarrays, and a display circuit 225 that functionally supports the display220, and which may include one or more display pixel arrays and drivingcircuits for displaying digital visual information.

The video conferencing kiosk 200 also includes a communication circuit250 for communicating with a backhaul and/or central site server. Thecommunication circuit 250 may communicate wirelessly using one or moreradios, and/or over hardlines using coaxial, Ethernet, or fiberopticcommunications. The communication circuit 250 performs the basiccommunications exchanges with the outside party to facilitate theaudio/visual communication. The video conferencing kiosk 200 alsoincludes an interface circuit 240 that functionally supports theinterface port 230, and that communicates with the PID 150 and exchangesinformation therewith. The video conferencing kiosk 200 also includes amemory 260 that can be utilized for a variety of different functions,such as for the temporary storage of display information, programinstructions, authentication information, etc.

A processor 280 performs the central control of the various componentsof the video conferencing kiosk 200, such as the execution of programinstructions, the movement of data and instructions among the componentsand PID 150, as well as other general processing functions.

Exemplary Personal Inmate Device

FIG. 3A illustrates a perspective view of an exemplary personal inmatedevice 300. The PID 300 includes a display 320. In order to save costs,PIDs are typically not specifically constructed for prison use, butrather are physically modified or software-modified consumer devices,such as modified iPADs®, Kindle Fires®, or Android®—based tabletcomputers, among others. As such, the PID 300 often includes a camera310, even though it may not be desirable to allow inmates personalaccess to a such a camera.

The PID 300 also includes some means for user input. Although the PID300 can include a physical keyboard, the PID 300 will more typicallyprovide input via its display 320 using a touchscreen interface. Theremay be other input mechanisms that will be known to a person of ordinaryskill in the art.

FIG. 3B illustrates a block diagram of a personal inmate device that, inan embodiment, corresponds to the PID 300. As shown in FIG. 3B, the PID300 includes a camera circuit 315 that functionally supports the camera310, and that may include one or more CCD or CMOS image sensor arrays.The PID 300 also includes a display circuit 325 that drives display ofimage and/or video information to the display 320. In an embodiment, thedisplay circuit 325 includes an array of display pixels for displayingdigital image data.

In an embodiment, the PID 300 also includes a biometric input device335. The biometric input device 335 may be any device capable ofacquiring biometric data of a user. As such, the biometric device 335may include a microphone for capturing voice data, a camera forcapturing facial or eye information, a fingerprint scanner for obtainingfingerprint information, among others. Such biometric information isuseful for authenticating the user of the PID in order to ensure it isbeing used by the person to whom it is assigned.

In an embodiment, the authentication is performed by the kiosk unit 200directly. For example, in the case of facial recognition, the camera 210and the camera circuit 215 capture the image data of the subjects face.The kiosk unit 200 then either performs the authentication of the userbased on a facial comparison, or transmits the data to a centralauthentication server. In a further embodiment, the camera 210 of thekiosk unit 200 can include a plurality of cameras configured in astereoscopic arrangement to allow for the capture of multiple images ofthe subject at slightly different orientations. The camera circuit 215is then configured to render the captured images as a singlestereoscopic 3-dimensional image. In this case, facial architecturecomparisons can be performed as part of the authentication process,either by the kiosk itself or an authentication server. In anotherembodiment, the camera of the capturing device (e.g., either the kioskunit 200 or the PID 300) can include infrared capabilities to allow forheat signature authentication.

The PID 300 also includes a communication device 305 for communicatingwith a backhaul and/or central site server. The communication device 305preferably communicates wirelessly using one or more radios. Thecommunication device 305 is capable of facilitating communicatingbetween the PID 300 and an outside party via one or more communicationservers. This configuration is particularly useful to the inmate formaking personal telephone calls, where physical restrictions are notneeded to the same degree as video communications. However, for videocommunications and other more high-security communication functions,communication can be facilitated by the kiosk interface 340. The kioskinterface 340 exchanges information, such as authentication informationand/or communication data, with the kiosk unit 200.

The PID 300 also includes a memory 350 that can be utilized for avariety of different functions, such as for the temporary storage ofdisplay information, program instructions, authentication information,etc. A processor 380 performs the central control of the variouscomponents of the PID 300, such as the execution of programinstructions, the movement of data and instructions among the componentsand kiosk unit 200, as well as other general processing functions.

Cooperative Video Calling

As discussed above, the purpose of the PID 300 is to provide the inmatewith a number of personal services that the inmate can access from hiscell during his/her own time. Such services can encompass any that don'trequire an elevated security level, such as a telephone call (which willtypically be monitored, other than calls to the inmate's attorney orother such privileged communications), streaming services (which arehighly regulated), or commissary services (which are very restricted).Therefore, when the PID 300 is used for performing any of thesefunctions, the PID 300 can employ the use of its communication device305 for communicating with the prison system.

However, when the inmate seeks to make a video call, a higher level ofsecurity is required. Thus, rather than allowing the inmate to usesolely his PID 300 to carry out a video call, software on the devicerequires cooperative interactions with a video conferencing kiosk, suchas video conferencing kiosk 300. The process for making a video callwill now be described with respect to FIG. 4 .

FIG. 4 illustrates a block diagram of an exemplary method for making avideo call using the exemplary system.

As shown in FIG. 4 , the method begins with a user of the PID 300initiating a video calling procedure (410). This can occur in a varietyof different ways in different embodiments. For example, in embodiments,the video call can be initiated by the user providing a particular inputto the PID 300, such as the selection of an icon or the input of acommand, by detecting a link to a video calling kiosk (such as by usingplug-n-play detection, for example), or by inputting a particularcommand to an input device of the kiosk. Other means for initiating thevideo calling procedure and/or providing a command to perform the samewill be apparent to a person of ordinary skill in the art.

Following the initiation of the video calling procedure, software on thePID 300 (or in the kiosk, depending on the location of video callinitiation) verifies that a link has been established between the PID300 and the kiosk unit 200 (420). Such a link may be verified by, forexample, performing a handshake procedure with the kiosk unit 200. Thishandshake procedure may be carried out, for example, by transmitting anotification signal to the kiosk via the kiosk interface 340, theinterface link 235, and the device interface 240, and receiving anacknowledgement or other reply signal in response via the same. Othermeans for verifying the link will be apparent to a person of ordinaryskill in the art.

As part of the verification procedure, the verification algorithmdetermines whether the link has been established (425). Thisdetermination may be provide a predetermined amount of time or a numberof attempts within which the link may be established before making afinal determination regarding the link status. If the softwaredetermines that the link has not been established (425—N), then the callis terminated (480) and the method ends (490). If, on the other hand,the software determines that the link has been established, then themethod proceeds. This verification step aids in security to ensure thatthe user is at the designated location, and is set up to utilize thekiosk unit 200 for carrying out the video call.

Upon determining that the link has been established, the software nextcarries out an authentication procedure (430). As part of thisprocedure, the PID 300 uses the biometric device 335 to capturebiometric information of the user. In an embodiment, additionalinformation, such as a PIN, credit card number, or other identifyinginformation, can also be acquired from the user to enhanceauthentication. The PID 300 uses the acquired authentication informationto verify the identity of the user. In an embodiment, the PID 300communicates the authentication information to a central site server ofthe prison via its communication device 305. A comparison of theacquired information is made to stored information, and anauthentication determination is transmitted back to the PID 300.

If the user is not authenticated (435—N), then the software terminatesthe video call (480) and the method ends (490). On the other hand, ifthe user is authenticated (435—Y), then the software initiates the videocall (440). The initiation of the video call is preferably carried outby the kiosk unit 200 by receiving an input from the user identifyingthe party-to-be-called, and transmitting calling data to the centralsite server.

Several additional security steps may occur as part of the video callingprocedure, which preferably take place at the central site server. Thesesteps may include verifying that the inmate is permitted to call theoutside party, verifying a sufficient balance in the inmate's accountfor completing the video call, etc.

In an embodiment, following the initiation of the video call, thecontrol signals from the kiosk unit 200 cause the camera 310 of the PID300 to become disabled. By disabling the camera 310 of the PID 300, theinmate will be unable to capture prohibited image data. The PID 300 cannotify the kiosk unit 200 as to the disabling of the camera 310 using averification or other notification signal. In other embodiments, thisstep may be accomplished in other ways, or may be disregardedaltogether. For example, in an embodiment, the kiosk unit 200 can beconfigured to only process and/or transmit image information capturedfrom its own camera 210. In another embodiment, an exchange protocol maybe designed for communication between the kiosk 200 and the PID 300 thatis particularly strict, and does not permit for the exchange of imagedata. Other embodiments may include any number of other means forignoring the camera capture of the PID 300 and/or utilizing only thecomponents of the kiosk 200 for capturing and transmitting image data.

Next, the camera 210 and the display 220 of the kiosk unit 200 areenabled (460). Once enabled, the camera 210 begins capturing image datawithin its field of view for transmission to the called party. Likewise,the display 220 begins displaying video information received from thecalled party. In some embodiments, the display 220 may also displayadditional information, such as that previously discussed.

Once enabled, the call can then be connected to the outside party forcarrying out the video call (470). During the video call, in thisembodiment, local voice and video data are captured by the kiosk unitand transmitted to the outside party via the central site server.Likewise, voice and video data from the outside party are transmitted tothe kiosk unit 200 via the central site server to be displayed andoutput to the inmate.

By ensuring that the camera 310 of the PID 300 is either disabled or atleast that its image capture information is prohibited from being usedin the video call, the necessary security precautions to enable videocalling using the PID 300 can be effected.

SECOND EMBODIMENT

Because the PID 300 and the kiosk unit 200 must be linked in order tocarry out the video call, the functional operations that are performedto carry out the video call can be performed by the kiosk unit 200, bythe PID 300, or shared between the two devices. For example, in anembodiment, because the PID 300 is already capable of independentlycommunicating with the central site server (and thus outside callers),the system can be configured such that the video calling communicationsare also carried out by the PID 300. This embodiment is particularlyuseful to avoid duplicative hardware. In other words, because a radio orother communication hardware is already available in the PID 300, it isnot needed in the kiosk 200, thus saving costs.

In this embodiment, it is particularly important to ensure that the PID300 camera 310 is disabled prior to call completion (450) in order toensure that the user is prevented from transmitting prohibited imagedata. In this embodiment, the kiosk unit 200 functions only to captureimage data for transmission and display image data received from theoutside party. This information is exchanged with the PID 300 via thekiosk interface 340, interface link 235 and the device interface 240.

In this embodiment, the kiosk unit 200 does not transmit or receive thecommunications data with the central site server. Rather, thesefunctions are performed by the PID 300 itself. This adds an additionallayer of security, because the central site server can perform deviceauthentication on the inmate's PID 200 in the manner that is generallyperformed for regular voice calls. In this embodiment, during the call,the video data and preferably the voice data are captured by the kioskunit 200. The kiosk unit 200 forwards this data to the PID 300 via theinterface link 235. The PID 300 receives the data via its kioskinterface 340, and the processor 380 packetizes or otherwise preparesthe data for transmission to the central site server via itscommunication device 305.

This embodiment can be particularly beneficial to reduce the expense andredundancy of the kiosk unit 200. And although allowing use of theinmate PID 300 for the video communication would otherwise raisesecurity concerns, those concerns are largely alleviated by requiringthe display and camera of the PID 300 to be disabled during the call.

Exemplary Computer System Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the method of flowcharts 400 can beimplemented in the environment of one or more computer systems or otherprocessing systems. An example of such a computer system 500 is shown inFIG. 5 . One or more of the modules depicted in the previous figures canbe at least partially implemented on one or more distinct computersystems 500.

Computer system 500 includes one or more processors, such as processor504. Processor 504 can be a special purpose or a general purpose digitalsignal processor. Processor 504 is connected to a communicationinfrastructure 502 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 500 also includes a main memory 506, preferably randomaccess memory (RAM), and may also include a secondary memory 508.Secondary memory 508 may include, for example, a hard disk drive 510and/or a removable storage drive 512, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 512 reads from and/or writes to a removable storage unit516 in a well-known manner. Removable storage unit 516 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 512. As will be appreciated bypersons skilled in the relevant art(s), removable storage unit 516includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 508 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 500. Such means may include, for example, aremovable storage unit 518 and an interface 514. Examples of such meansmay include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 518 and interfaces 514 which allow software anddata to be transferred from removable storage unit 518 to computersystem 500.

Computer system 500 may also include a communications interface 520.Communications interface 520 allows software and data to be transferredbetween computer system 500 and external devices. Examples ofcommunications interface 520 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface520 are in the form of signals which may be electronic, electromagnetic,optical, or other signals capable of being received by communicationsinterface 520. These signals are provided to communications interface520 via a communications path 522. Communications path 522 carriessignals and may be implemented using wire or cable, fiber optics, aphone line, a cellular phone link, an RF link and other communicationschannels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 516 and 518 or a hard disk installed inhard disk drive 510. These computer program products are means forproviding software to computer system 500.

Computer programs (also called computer control logic) are stored inmain memory 506 and/or secondary memory 508. Computer programs may alsobe received via communications interface 520. Such computer programs,when executed, enable the computer system 500 to implement the presentdisclosure as discussed herein. In particular, the computer programs,when executed, enable processor 504 to implement the processes of thepresent disclosure, such as any of the methods described herein.Accordingly, such computer programs represent controllers of thecomputer system 500. Where the disclosure is implemented using software,the software may be stored in a computer program product and loaded intocomputer system 500 using removable storage drive 512, interface 514, orcommunications interface 520.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

CONCLUSION

The disclosure has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure.

What is claimed is:
 1. A wireless communication device for use in acontrolled environment facility, comprising: a radio configured towirelessly send and receive wireless signals; a connection portconfigured to receive a link communication cable and to exchangecommunication information via the link communication cable; and one ormore processors configured to: receive a call initiation operation froma user, the call initiation operation being one of a video callinitiation or a non-video call initiation; in response to the callinitiation operation being the video call initiation: verifying that thelink communication cable is detected; and transmitting communicationdata via the connection port in response to the verifying; and inresponse to the call initiation operation being the non-video callinitiation, transmitting communication data via the radio.
 2. Thewireless communication device of claim 1, wherein the one or moreprocessors are further configured to: in response to the call initiationoperation being the video call initiation, establishing a call with awireless communication terminal via the radio; receive audio and videodata of an outside user via the radio; and transmit the received audioand video data of the outside user to an external device via the linkcommunication cable.
 3. The wireless communication device of claim 2,further comprising: an audio detection device; a display device; and anaudio output device, wherein the one or more processors are furtherconfigured to: in response to the call initiation operation being thevideo call initiation, disable the audio detection device and thedisplay device.
 4. The wireless communication device of claim 2, whereinthe one or more processors are further configured to: in response to thecall initiation operation being the video call initiation, receive audioand video data of the user from the external device via the linkcommunication cable.
 5. The wireless communication device of claim 4,wherein the one or more processors are further configured to cause theradio to wirelessly transmit the received audio and video data of theuser to the wireless communication terminal.
 6. The wirelesscommunication device of claim 2, wherein the one or more processors arefurther configured to perform a handshake with the external device. 7.The wireless communication device of claim 6, wherein the handshakeincludes transmitting via the link communication cable user credentialsto the external device.
 8. A method for wirelessly communicating in acontrolled environment facility, comprising: receiving call initiationoperation from a user, the call initiation operation being one of avideo call initiation or a non-video call initiation; in response to thecall initiation operation being the video call initiation: verifying aphysical link is present; and transmitting communication data via thephysical link in response to the verifying; and in response to the callinitiation operation being the non-video call initiation, wirelesslytransmitting communication data via a radio.
 9. The method of claim 8,further comprising: in response to the call initiation operation beingthe video call initiation, establishing a call with a wirelesscommunication terminal via the radio; receiving audio and video data ofan outside user via the radio; and transmitting the received audio andvideo data of the outside user to an external device via the physicallink.
 10. The method of claim 9, further comprising: disabling an audiodetection device and a display device in response to the call initiationoperation being the video call initiation.
 11. The method of claim 9,further comprising receiving audio and video data of the user from theexternal device via the physical link in response to the call initiationoperation being the video call initiation.
 12. The method of claim 11,further comprising wirelessly transmitting, via the radio, the receivedaudio and video data of the user to the wireless communication terminal.13. The method of claim 9, further comprising performing a handshakewith the external device.
 14. The method of claim 13, wherein thehandshake includes transmitting, via the physical link, user credentialsto the external device.
 15. A communication system, comprising: awireless communication device, comprising: a radio configured towirelessly send and receive wireless communication signals; a firstconnection port configured to receive a link communication cable and toexchange communication information with an external device via the linkcommunication cable; and one or more processors; and the external devicecomprising: a second connection port configured to receive the linkcommunication cable and to exchange communication information with thewireless communication device; a display device; and an audio outputdevice, wherein the one or more processors are configured to: receive acall initiation operation from a user, the call initiation operationbeing a video call initiation; verify that the link communication cableis connected between the connection port and the external device; andtransmit communication data via the connection port to the externaldevice.
 16. The system of claim 15, wherein the one or more processorsare further configured to: establish a call with a wirelesscommunication terminal via the radio; receive audio and video data of anoutside user via the radio; and transmit the received audio and videodata of the outside user to the external device via the linkcommunication cable.
 17. The system of claim 16, wherein the wirelesscommunication device further comprises: an audio detection device; adisplay device; and an audio output device, wherein the one or moreprocessors are further configured to disable the audio detection deviceand the display device.
 18. The system of claim 16, wherein the one ormore processors are further configured to receive audio and video dataof the user from the external device via the link communication cable.19. The system of claim 18, wherein the one or more processors arefurther configured to cause the radio to wirelessly transmit thereceived audio and video data of the user to the wireless communicationterminal.
 20. The system of claim 16, wherein the one or more processorsare further configured to perform a handshake with the external device.