Patent classifications
H04M3/205
MUTUAL DISABLING UNIT FOR MULTIPLE PHONES
A secure phone system comprising a plurality of Voice over IP (VoIP) phones, each having an enhanced security implant device, a Mutual Disabling Unit (MDU) and a method of operating the system for securing VoIP phones located in the same room by disabling a VoIP phone while a call is active in another phone in order to prevent audio eavesdropping.
Mutual disabling unit for multiple phones
A secure phone system comprising a plurality of Voice over IP (VoIP) phones, each having an enhanced security implant device, a Mutual Disabling Unit (MDU) and a method of operating the system for securing VoIP phones located in the same room by disabling a VoIP phone while a call is active in another phone in order to prevent audio eavesdropping.
DETECTION OF PRIVACY BREACH DURING A COMMUNICATION SESSION
A method of identifying a breach in privacy during a communication session, including communicating with a remote communication device using a local communication device, analyzing an audio signal from the remote communication device to identify an audio input/output configuration of the remote communication device, determining from the audio input/output configuration if a breach in privacy is signified.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
MITIGATING AN INDUCED ELECTRICAL SIGNAL FROM AN APPLIANCE IN A POWERED-OFF STATE
An isolation unit may include input pins to receive an electrical signal induced by ambient sound waves incident on an appliance in a powered-off state, one or more first transformers, connected to the input pins, to electrically isolate the induced electrical, one or more second transformers, connected to the first transformers, to provide a common mode choke function on the induced electrical signal, one or more inductors, connected to the one or more second transformers, one or more resistors, connected to the one or more inductors, wherein the one or more inductors and the one or more resistors are configured to limit an amplitude of a current of the induced electrical signal, and output pins, connected to the one or more inductors, to receive a modified electrical signal from the one or more inductors to propagate the modified electrical signal to a downstream cable.
INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
SYSTEM AND METHOD FOR DETECTING AND CONTROLLING CONTRABAND DEVICES IN A CONTROLLED ENVIRONMENT
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
System and method for detecting and controlling contraband devices in a controlled environment
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
System and method for detecting and locating contraband devices in a secure environment
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring and control provided by the inmate communication system provided by the correctional facility, and thus pose a significant security risk. The present disclosure provides details of a system and method that leverages the sanctioned mobile devices and the wireless infrastructure of the inmate communication system to scan for and triangulate the location of contraband devices. The mobile and wireless infrastructure devices scan for transmissions indicative of a contraband device and send alerts to each other and to a central monitoring system. The central monitoring system then leverages multiple alerts to determine a location of the contraband device using multiple triangulation techniques. The triangulation may also be performed by the mobile devices themselves.
REAL TIME SWITCHING FROM UNSECURED TO SECURED SIGNALING CHANNEL
Calls that can be secure (e.g., are conducted with end-to-end encryption) may originate with some or all of the call being unsecured. Then, upon a triggering event such as a user deciding that sensitive information will be discussed or a “sniffer” determining that the call is being monitored by a spoofed endpoint, triggers a transition of the call from an unsecure connection to a secure connection without terminating and reestablishing the call. Accordingly, an unsecure call, such as one utilizing Transmission Control Protocol (TCP) signaling and Real-Time Transport Protocol (RTP) and transitioned to Transport Layer Security (TLS) and Secure RTP (SRTP) to allow a previously unsecured call to become secured with end-to-end encryption.