ENCRYPTED ELECTRONIC MESSAGING EXCHANGE
20210377317 · 2021-12-02
Assignee
Inventors
Cpc classification
H04L67/02
ELECTRICITY
H04L63/0861
ELECTRICITY
H04M3/2281
ELECTRICITY
H04L51/56
ELECTRICITY
H04L51/066
ELECTRICITY
H04L63/30
ELECTRICITY
H04L63/0892
ELECTRICITY
H04L51/04
ELECTRICITY
H04M3/42382
ELECTRICITY
H04W48/02
ELECTRICITY
H04L51/42
ELECTRICITY
International classification
Abstract
A computer-implemented system and method for secure electronic message exchange includes receiving an encrypted message between one of an inmate or an outside user. The message is transmitted between the users without decrypting the message at the server to ensure privacy. In various configurations, the message is stored at the server in encrypted form and a notification message is transmitted to a recipient. The recipient may then request retrieval of the message from the server. After being authenticated, the encrypted message is provided to the recipient without being decrypted at the server.
Claims
1. A messaging platform for processing text-based messages involving an inmate of a controlled environment facility, comprising: a database; a transceiver; and one or more processors configured to: receive an encrypted message designated as being either to or from the inmate; store a copy of the encrypted message in the database for later retrieval; send a notification to a message recipient that the encrypted message is available for retrieval; receive a retrieval request from the recipient for the encrypted message; and provide the encrypted message to a recipient device associated with the recipient in response to the retrieval request.
2. The messaging platform of claim 1, wherein the encrypted message is provided to the recipient device in encrypted form.
3. The messaging platform of claim 1, wherein the encrypted message is stored in the database in encrypted form.
4. The messaging platform of claim 1, wherein the one or more processors are further configured to authenticate the recipient in response to receiving the retrieval request.
5. The messaging platform of claim 4, wherein the authenticating includes: receiving personal identification information from the recipient; retrieving previously-stored authentication information from the database; and comparing the received personal identification information to the previously-stored authentication information.
6. The messaging platform of claim 1, wherein the providing of the encrypted message to the recipient device includes transmitting the encrypted message to the recipient device.
7. The messaging platform of claim 1, wherein the providing of the encrypted message to the recipient device includes decrypting the encrypted message and sending the decrypted message to the recipient device.
8. A method for processing text-based messages involving an inmate of a controlled environment facility, the method comprising: receiving an encrypted message designated as being either to or from the inmate; storing a copy of the encrypted message in a database for later retrieval; sending a notification to a message recipient that the encrypted message is available for retrieval; receiving a retrieval request from the recipient for the encrypted message; and providing the encrypted message to a recipient device associated with the recipient in response to the retrieval request.
9. The method of claim 8, wherein the encrypted message is stored in the database in encrypted form.
10. The method of claim 8, wherein the encrypted message is provided to the recipient device in encrypted form.
11. The method of claim 8, further comprising authenticating the recipient in response to receiving the retrieval request.
12. The method of claim 11, wherein the authenticating includes: receiving personal identification information from the recipient; retrieving previously-stored authentication information from the database; and comparing the received personal identification information to the previously-stored authentication information.
13. The method of claim 8, wherein the providing of the encrypted message to the recipient device includes transmitting the encrypted message to the recipient device.
14. The method of claim 8, wherein the providing of the encrypted message to the recipient device includes: decrypting the encrypted message; and sending the decrypted message to the recipient device.
15. A wireless communication device configured to provide message exchange involving an inmate of a controlled environment facility, the wireless communication device comprising: a user interface device configured to display message information to a user of the wireless communication device; an input device configured to receive input commands from the user; a transceiver configured to transmit and receive signals with a backend server; and one or more processors configured to: receive a message and a message recipient identifier from the user via the input device; encrypt the received message; generate a message package for transmission to the backend server, the message packaged including the encrypted message and the recipient identifier; and cause the transceiver to transmit the message package to the backend server.
16. The wireless communication device of claim 15, wherein the message is a text-based message.
17. The wireless communication device of claim 15, wherein the one or more processors are further configured to receive a notification from the backend server that an incoming message has been received that designates the user as recipient.
18. The wireless communication device of claim 17, wherein the one or more processors are further configured to: receive an instruction from the user via the input device to request retrieval of the incoming message from the backend server; and cause the transceiver to transmit a retrieval request to the backend server in response to the receiving of the instruction.
19. The wireless communication device of claim 18, wherein the one or more processors are further configured to: receive an incoming message package from the backend server in response to the transmitting of the retrieval request, the incoming message package including an encrypted incoming message; decrypt the encrypted incoming message; and display the decrypted incoming message to the user via the user interface.
20. The wireless communication device of claim 18, wherein the one or more processors are further configured to: receive a stream of incoming message data from the backend server that includes decrypted incoming message data; and display the received incoming message data to the user via the user interface.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0047] A further understanding of the invention can be obtained by reference to a preferred embodiment set forth in the illustrations of the accompanying drawings. Although the illustrated embodiment is merely exemplary of systems for carrying out the invention, both the organization and method of operation of the invention, in general, together with further objectives and advantages thereof, may be more easily understood by reference to the drawings and the following description. The drawings are not intended to limit the scope of this invention, which is set forth with particularity in the claims as appended or as subsequently amended, but merely to clarify and exemplify the invention.
[0048] For a more complete understanding of the invention, reference is now made to the following drawings in which:
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
DETAILED DESCRIPTION OF THE DRAWINGS
[0056] As required, a detailed illustrative embodiment of the invention is disclosed herein. However, techniques, systems and operating structures in accordance with the invention may be embodied in a wide variety of forms and modes, some of which may be quite different from those in the disclosed embodiment. Consequently, the specific structural and functional details disclosed herein are merely representative, yet in that regard, they are deemed to afford the best embodiment for purposes of disclosure and to provide a basis for the claims herein, which define the scope of the invention. The following presents a detailed description of the preferred embodiment of the invention (in addition to some alternative embodiments).
[0057] Starting first with
[0058] After the inmate composes the message at inmate composition station 102 located at institution site 100, the message is sent to multi-function unit (MFU) 104. Preferably, MFU 104 is located in the institution's mailroom, but other locations are foreseeable. The inmate messages are loaded into MFU 104. MFU 104 scans the messages and the messages are electronically sent to central station 106. Central station 106 is preferably located remote to the institution and is preferably connected to MFU 104 via an Internet Protocol (IP) connection. At central station 106, conversion engine 108 converts the written or typed text messages received from MFU 104 into digital data that can be processed by server 110. Although only one server 110 is pictured, multiple servers may be used commensurate with the amount of data requirements: Central station 106 further includes such elements as routers and data services via local telephone company provided circuits (not shown in
[0059] The aforementioned conversion can be done by such means, including, but not limited to, optical character recognition (OCR) and intelligent character recognition (ICR). Once conversion engine 108 converts the message as necessary, server 110 at central station 106 associates each message with the intended recipient and the message sender. Server 110 checks to see if the attempted message exchange is acceptable. Server 110 also checks to ensure that the intended recipient and the inmate are authorized to communicate. It further provides keyword and phrase scans of the messages. In the preferred embodiment, the site staff are allowed to view messages and approve the before sending the message to the recipient. Additionally, the system notifies the intended recipient of the message that the inmate has sent a message and provides for secure access and user log in for the recipient to view the message from the inmate and compose messages to the inmate.
[0060] The system preferably provides secure socket layer (SSL) protection of data sent to and received from server 110. The typed or written text messages are stored as an image or converted to another format as required and made available for viewing by the intended recipient on server 110. Server 110 provides a user-friendly interface for viewing and composing messages preferably via the Internet. It enables users to set up accounts and provides for billing for system usage. Server 110 also is capable of providing such features including, but not limited to, language translation, file encryption, filtering, file storage and file preparation. Finally, messages received by the external party or the inmate are blocked from being forwarded, copied, etc.
[0061] Next,
[0062] The user is then prompted to choose a password (step 208). Other authentication means are foreseeable as well, such as a personal identification number (PIN) or biometric identification means. Using the account number and password, the user logs into the system (step 210). If the user already has an account when he or she initially attempts to log into the system (step 200), the user proceeds directly to the log in step (step 210). After successful log in, the user views messages received from the inmate or composes messages to be sent to the inmate (step 212). The system then provides security checks (step 214) whereby the message is checked for such things as keywords, and content. If the message passes the security checks, it is then sent to the institution (step 220). If, however, the message fails the security checks, it is sent to an administrator (step 216). At this point, the message and all other relevant file data are stored in a database (step 218). The system preferably bills the appropriate account a monthly service fee. In alternative embodiments, other billing methods, such as billing for the number of messages sent or for message length, may be utilized. The preceding processes are preferably performed by server 110 located at central station 106. However, it is foreseeable that other servers or devices can be utilized to perform these functions. The message is sent to MFU 104 where the message is converted to a viewing format as required by the institution (step 220). The administrator preferably views the message and decides whether to allow the sending of the message (step 222). If the message passes the administrator check, the inmate is notified (step 224) and the inmate reads the message (step 226). If the message fails the administrator's check, it is blocked from the inmate (step 228).
[0063]
[0064] If the message instead passes the security check (step 304), the system sends a notification to the recipient stating that a new message from the inmate is available for viewing over the secure system site (step 308) and the message is stored (step 310). The recipient logs into the secure site preferably via an Internet browser (step 312) and views the message (step 212). The recipient also has the option of sending a message to the inmate at this point. If the recipient chooses to do so, the recipient then proceeds to compose a message (step 212).
[0065]
[0066] Computer control platform 401 is monitored and controlled, either actively or passively, by an administrator. Computer control platform 401 contains one or more servers, which processes the electronic messages, prepares and routes the electronic messages, performs security checks and encrypts the electronic messages. It also stores the electronic messages. In addition, computer control platform 401 prepares notifications to send to either the inmate or the external third party. It also has a secure platform for communication between the inmate and third party. Both the inmate and third party use this platform to send messages back and forth. Further, administrators can remotely or locally access the system via a workstation (not shown). In the remote access set up, the administrator accesses the system via the Internet to perform various administrative functions (i.e., viewing messages, setting control parameters, performing database searches, printing reports, etc.).
[0067]
[0068] Computer control platform 523 is monitored and controlled, either actively or passively, by an administrator. The administrator may perform various administrative functions via a local workstation (not shown) or remotely by accessing the system via the Internet. Computer control platform 523 contains one or more servers, which processes the electronic messages, prepares and routes the electronic messages, performs security checks and encrypts the electronic messages. It also stores the electronic messages. In addition, computer control platform 523 prepares notifications to send to either the inmate or the external third party. It also has a secure platform for communication between the inmate and third party. Both the inmate and third party use this platform to send messages back and forth.
[0069] Central control platform 511 also contains central telephone control platform 521. Central telephone control platform 521 connects user telephonic communication devices 501a-n with external party telephonic communication devices 507a-n via connections 513a-n and 517a-n, respectively. Central telephone control platform 521 enables inmates to telephonically communicate with an external third party. Central telephone control platform 521 provides for control, monitoring, and billing. Further, central control platform 511 enables conversion between voice and text messages. For example, if the system receives a voice message, the system can convert the voice message to a text format for viewing.
[0070]
[0071] If, however, the inmate again incorrectly inputs the proper identification, the session terminates and an administrator may be electronically notified (step 121). When this second attempt failure occurs, the session is checked to see if the user ever logged in (step 129). If the user was not logged in, then the system is exited (step 131). Preferably, a monthly service fee is charged to the appropriate account. However, fees can be also be charged based on a variety of different methods, including, but not limited to, a charge per email or IM, a per minute charge, or a charge for the length of messages sent or received. Also, the system may be set up such that a third party can pay for the email or IM communication. Once messages have been archived (step 117), the system exits (step 131).
[0072] The system can be configured to allow only one log on attempt. Also, the system may be configured to allow for more than one attempt. Both of these can be controlled at the administrator's option. Additionally, the system may be triggered to automatically monitor or record communication after a certain number of attempts rather than terminate the session. Further, the system can be set to monitor or record any session that the administrator desires, such as for certain users that have previously attempted to engage in criminal activity via the system.
[0073] The inmate decides whether to email or IM and the inmate writes either an email (step 109) or an IM (step 123). If the inmate chooses to compose an email, after the inmate writes the email, it is subjected to security measures including a content check and authentication that the potential recipient has an acceptable address (step 111). If the email passes through security, an email notification is sent to the recipient containing a log in identification, password and directions to a secure site that he or she can visit to view the sent message (step 113). The inmate is then prompted to log out (step 115). If the inmate chooses instead to continue, the process reverts back. The inmate is prompted to choose whether to IM or email (step 107). If the inmate logs out, the messages are archived (step 117). If the email fails to pass the security check (step 111), the session is terminated and the administrator is notified (step 121). In addition, at this point, a check of whether the user was logged in and if messages were sent occurs (step 129) and if verified, and messages are archived (step 117). If the message is confidential as protected by attorney-client privilege, it is locked so that it cannot be accessed by unauthorized sources.
[0074] If the inmate chooses to write an IM instead of an email (step 107), the inmate writes an IM and attempts to send it (step 123). The instant message is subjected to the same security measures as an email (step 125). If the message fails to pass, the session is terminated and the administrator is notified (step 121). Next, the system checks to see if the user was logged in and if any messages were sent (step 129). If yes, the messages are archived and stored (step 117) and the system exits (step 131). When an IM passes the security constraints (step 125), a message is sent to the external recipient (step 127).
[0075] After the message is sent (step 127), the contacted external party is notified of the attempted contact by the inmate (step 141). For example, the external party can be notified of the attempted contact by the inmate, through an email, or via a third-party instant messaging platform. The response can result in three different scenarios. The first is that there is no reply from the external party after a set interval of time (step 133). When this occurs, the user is prompted to log out or continue and attempt another electronic message exchange (step 115). Additionally, the user has the option of sending another message to the external party to set up a time and date when he or she wishes to hold a future IM conversation. If the user logs out, messages are archived and stored as previously discussed (step 117). If instead the inmate decides to attempt another message, the user is prompted to choose if he or she wants to write an email or IM (step 107).
[0076] The second possibility when the external party is notified is that the external party declines the conversation and the administrator is notified (step 143). The user is prompted to log out or continue (step 115) and the process continues.
[0077] The final possibility is that the external party accepts the invitation to join the inmate in an instant messaging conversation (step 135). Further, the external party logs into the secure site and a conversation ensues. The conversation is monitored via such methods as word spotting. If inappropriate conversation ensues, the conversation is terminated immediately (step 137). If not, the conversation continues for a set length of time, after which the system terminates the conversation. The user is then prompted to log out (step 115) and the loop repeats.
[0078] The system can be also be configured to automatically log out after a user has been logged in for a set time period. In this embodiment, the system is also set to notify the user at given intervals to warn the user of the remaining time before automatic log out occurs.
[0079]
[0080] While the invention has been described with reference to the preferred embodiment and several alternative embodiments, which embodiments have been set forth in considerable detail for the purposes of making a complete disclosure of the invention, such embodiments are merely exemplary and are not intended to be limiting or represent an exhaustive enumeration of all aspects of the invention. The scope of the invention, therefore, shall be defined solely by the following claims. Further, it will be apparent to those of skill in the art that numerous changes may be made in such details without departing from the spirit and the principles of the invention. It should be appreciated that the invention is capable of being embodied in other forms without departing from its essential characteristics.