H04M3/387

SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES
20230231947 · 2023-07-20 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

System and method for assessing security threats and criminal proclivities
11553079 · 2023-01-10 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

METHOD AND SYSTEM TO INTERCEPT ACCIDENTAL EMERGENCY CALLS IN A DEVICE REPAIR FACILITY
20170374185 · 2017-12-28 ·

A system for intercepting accidental emergency calls in a facility, the system including at least one dead air network element configured within the facility, the at least one dead air network element providing a cellular signal stronger than live cellular signals as seen by electronic devices within the facility, wherein electronic devices connecting to the at least one dead air network element cannot reach emergency services.

System and method for facilitating communications between inmates and non-inmates

A system and method for incoming and outgoing RCS messages with inmates includes a database including a plurality of user records, wherein the user records include a plurality of user profiles and a plurality of inmate profiles, wherein each of the user profiles includes a user ID, a mobile ID, a carrier, and at least one inmate account number. Each of the inmate profiles includes an inmate user ID, a carrier, a current account balance, and at least one user account number. The system and method also includes an application server including a processor programmed to receive a RCS message from a new user profile, determine a carrier of the user profile, process the new user profile based on the carrier, wherein the carrier is determined by a triggering event, and send the new user profile to an appropriate list for future RCS messaging.

System and methods for a multi-factor remote user authentication
11762972 · 2023-09-19 ·

A system of security for a remote user authentication service (RUAS) comprising: an authentication server, mobile wireless device with a SIM card embedded in the mobile wireless device and a RUAS logic that provide a multi-factor remote user authentication service, where one of the factors is a “what you have” factor of authentication, an electronic token in physical possession of the user that is interfaced with the authentication server over the global computer network; the SIM card, embedded in the mobile wireless device, emulates the electronic token to provide the “what you have” factor, thus obviating the need for the business to provision and for the user to carry a separate physical electronic token.

Authentication and authorization via vocal track frequency channel

A verification and authorization method, system, and computer program product include verifying, via a receiving device that receives a verification sound packet, an identity of a trusted caller via the verification sound packet, the verification sound packet including an asymmetrically encrypted payload sent by the trusted caller.

System and method for facilitating communications between inmates and non-inmates

A system and method for incoming and outgoing electronic messages with inmates includes a database including user records having user profiles and inmate profiles, and action event records. The system and method are programmed to associate at least one inmate account number with a specific SIM card or phone number, detect the triggering event, trigger the action event to be performed based on the triggering event, perform the action event data based on the action event. The action event data includes determining whether the user profile is a current user or a new user, receiving at least one inmate account number associated with the message, processing the message according to predetermined criteria, upon determining that the user profile is a current user pairing the message with the at least one inmate account number, and sending the message to the at least one inmate account number.

AUTHENTICATION AND AUTHORIZATION VIA VOCAL TRACK FREQUENCY CHANNEL

A verification and authorization method, system, and computer program product include verifying, via a receiving device that receives a verification sound packet, an identity of a trusted caller via the verification sound packet, the verification sound packet including an asymmetrically encrypted payload sent by the trusted caller.

SYSTEMS AND METHODS FOR CALLER VERIFICATION
20210092227 · 2021-03-25 ·

Briefly, claimed subject matter may relate to a caller verification system having a signaling resource for forming a communications channel for a call placed between a call source and a call destination. The signaling resource may generate a call setup record having parameters relevant to the formed communications channel. The call verification system may additionally include a call verification device that provides call parameters to the signaling resource and receives from the signaling resource, an indication of a match between the provided call parameters and the parameters of the call setup record.

SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES
20210021703 · 2021-01-21 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.