Method and apparatus for providing secured per-call adminstration, management, and control of communications between a secured party and a remote party
09800830 · 2017-10-24
Assignee
Inventors
Cpc classification
H04N7/147
ELECTRICITY
H04M7/00
ELECTRICITY
H04M2201/50
ELECTRICITY
H04M15/08
ELECTRICITY
H04L12/14
ELECTRICITY
H04L65/1076
ELECTRICITY
H04M3/2281
ELECTRICITY
H04M15/00
ELECTRICITY
H04M7/006
ELECTRICITY
H04M3/56
ELECTRICITY
H04L65/1096
ELECTRICITY
H04M17/20
ELECTRICITY
H04L65/403
ELECTRICITY
H04M3/38
ELECTRICITY
International classification
H04M3/38
ELECTRICITY
H04M7/00
ELECTRICITY
H04M15/08
ELECTRICITY
H04M17/00
ELECTRICITY
Abstract
A secured party audio and audio/video communication system and method providing administration, management and control that includes a portable secured communication device in possession solely of a secured party positioned in a secured environment, the portable secured communication device being exclusive to the secured party and communicatively connectable only to a secured connection management system, in a secured connection management system hosting a secured communication device interface, hosting a remote communication device interface, storing in the database information related to the secured party, the portable secured communication system, and the external party, at least one of which includes a predetermined connection parameter, creating the selective communication between the portable secured communication device and only the remote communication device response to the stored database information and controlling a duration of the communication as a function of the predetermined connection parameter as stored in the database.
Claims
1. A secured party audio and audio/video communication system providing secured per-call administration, management and control, comprising: a secured party device in possession solely of a secured party positioned in a secured environment where the secured party device is not accessible to any person other than the secured party, the secured party device being exclusive to a particular secured party among a plurality of secured parties in the secured environment and being only communicatively connectable to a secured local wireless communications system providing secured party communications only to a secured connection management system, the secured party device having a processor, a non-transitory memory, and a wireless communication interface and no other communication interface for selective connection only to the local secured wireless communication system, a secured party device user interface having a screen including a keypad, a video camera, a microphone, and an audio device; the local secured wireless communication system having a first interface for communicatively coupling to the wireless communication interface of the secured party device and a second interface for communicative coupling only to the secured communication management system, the local secured wireless system configured to enable audio and audio/video communications only between the secured party device and the first interface and preventing any communication between the secured party device of the particular secured party and any other communication device; the secured connection management system having a processor and a non-transitory memory that includes a database and having web-hosted based communications interfaces that are operatively and communicatively connected via a network to the local secured wireless communication system and to one or more remote communication devices, the secured connection management system configured as the only system component for controlling, administering, and managing the establishment of the audio or audio/video secured party communication between the secured party device and a particular one of the one or more remote communication devices that is pre-registered to a particular one of one or more authorized visitors of the particular secured party, the secured connection management system configured with computer executable instructions stored in the non-transitory memory for: storing in the database information related to the particular secured party, the secured party device, the local secured wireless communication system, and the one or more pre-registered remotely located communication devices to which communication to the secured party device of the particular secured party is limited, and a predetermined connection parameter for the secured party communication between the particular secured party and the particular authorized visitor; receiving a request from either user interface of the secured party device or from the particular remote communication device to establish the secured party communication therebetween in real time responsive to the receipt of the request; verifying an authority to establish the secured party communication in real time upon receipt of the received request; in response to a successful verifying, establishing in real time after the successful verifying the requested secured party communication as a web-hosted communication between the user interface of the secured party device and only the particular remote communication device responsive to the stored database information for the particular secured party; and controlling the established secured party communication as a function of the stored predetermined connection parameter.
2. The system of claim 1, further comprising the secured connection management system configured with computer instructions for: receiving funds over a communication interface from a financial payment service that are uniquely associated with a future secured party communication between the secured party device of the particular secured party and the pre-registered remote communication device of the particular authorized visitor as controlled by the secured connection management system; and storing the received funds in the database, wherein the controlling of the duration of the established secured party communication is also a function of the received funds stored in the database.
3. The system of claim 1 wherein the secured connection management system includes a secured party web interface operable with the secured party device through the local secured wireless system and an registered visitor web interface operable with the remote communication device, the secured connection management system controlling, administering and management the communication therebetween through interfacing between the secured party web interface and the registered visitor web interface.
4. The system of claim 1 wherein the plurality of secured parties are inmates and the secured environment is a correctional facility in which the inmates are interned.
5. The system of claim 1 wherein the local secured wireless communication system is located in the secured environment providing the secured party communication as the only communications connections to the secured party device, and only communicatively coupled to the secured connection management system for management and control thereof through the local secured wireless communication system, the local secured wireless communication system including at least one secured router, server, and wireless access points and all communication connections therebetween and with the secured connection management system.
6. The system of claim 1, wherein the secured connection management system includes an administrative workstation web interface for management of the database and the stored information therein, wherein the secured connection management system providing the web-hosted administrative interface to the administrative workstation for selective remote and secured monitoring of the established secured party communication between the secured party device and the particular remote communication device and to receiving the predetermined connection parameter related to one or more of a registering of the visitor, the receiving of the request from either the user interface of the secured party device or from the particular remote communication device, the establishing of the secured party communication, the verifying of the authority to establish the secured party communication of the received request, and the establishing the requested secured party communication as a web-hosted communication.
7. The system of claim 6 wherein the administrative workstation web interface and the secured connection management system are configured for receiving a registration of each remote communication device and an authorization of the particular authorized visitor for each remote communication device and storing information of each registered remote communication device and the each authorized visitor for the particular secured party in the database.
8. The system of claim 1 wherein the predetermined connection parameter is selected from the list of a duration of the secured party communication, an amount of prefunded communications funds, a type of the secured party communication, an authorized time of day and a day of week for the secured party communication; and receiving and storing in the database a value for the predetermined connection parameter.
9. A method of providing a secured party per-call audio and audio/video communication in real time responsive to a received request, the steps comprising: a. in a local secured wireless communication system located in a secured environment having a plurality of secured parties, with each party having a secured party device for wirelessly communicating solely with the local secured wireless communication system, the local secured wireless communication system having a first interface for communicatively coupling to a wireless communication interface of each secured party device and a second interface for communicative coupling only to a secured communication management system over a network, and being configured for establishing a wireless web-based communication with each of the plurality of secured party devices over the first interface to only the secured wireless communication system and with no other communication device or system; establishing over the second interface the secured party communication between a particular secured party device and a particular pre-registered visitor via the secured connection management system; preventing any communication through the local secured wireless communication device of a particular secured party device to another secured party device of the plurality of secured party associated with another one of the secured parties; b. in a secured connection management system having a processor and a non-transitory memory that includes a database and having web-hosted communications interfaces that are operatively and communicatively connected to the local secured wireless communication system and to one or more remote communication devices that are pre-registered to the particular pre-registered visitor of the particular secured party, the secured management system configured as the only system component for controlling, administering, and managing the establishment of the secured party communication to a particular secured party device with computer executable instructions for: hosting a secured party device web-based interface providing secured and selective access to the particular secured communication device; hosting a remote communication device web-based interface providing selective access to the registered remote communication device that is remotely positioned external to the secured environment; storing in the database information related to the particular secured party, the secured party device, the local secured wireless communication system, and the one or more pre-registered remotely located communication devices to which communication to the secured party device of the particular secured party is limited, and a predetermined connection parameter for the secured party communication between the particular secured party and the particular authorized visitor; receiving a request from either user interface of the secured party device or from the particular remote communication device to establish the secured party communication therebetween in real time responsive to the receipt of the request; verifying an authority to establish the secured party communication in real time upon receipt of the received request; in response to a successful verifying, establishing in real time after the successful verifying the requested secured party communication as a web-hosted communication between the user interface of the secured party device and only the particular remote communication device responsive to the stored database information for the particular secured party; and controlling the established secured party communication as a function of the stored predetermined connection parameter.
10. The method of claim 9, wherein the secured connection management system for includes instructions for: registering the particular authorized visitor to be authorized to communicate with the particular secured party using the secured connection management system; and enabling, without intervention from a third party including an administrative workstation, the secured party using the secured party device and the registered visitor using the remote communication device for performing one or more of the operations selected from the group consisting of viewing a received video message from a non-selected particular secured party and the registered visitor; recording and sending a video message as the secured party communication to the remote communication device of the pre-registered visitor; initiating a video communication as the secured party communication with the remote communication device of the pre-registered visitor; and instituting a VoIP communication with the remote communication device of the pre-registered visitor as the secured party communication.
11. The method of claim 9, the secured connection management system further configured for: providing an audio/video recording facility forming part of and operatively connected to secured connection management system; and using the audio/video recording facility to record at least a portion of the established secured party communication or a portion thereof.
12. The method of claim 11, the secured connection management system further configured for: determining if the remote communication device of the pre-registered visitor is exempt from having the secured party communication with the secured party being a particular type of communications, the particular type of communication selected from the group consisting of a video message, an audio/video visitation, and a VoIP telecommunication recorded; and determining if the secured party communication between the secured party and the registered visitor is exempt from having the established secured party communication recorded, and if so, suppressing the recording thereof.
13. The method of claim 9, wherein the secured connection management system is configured for: receiving funds over a communication interface from a financial payment service that are uniquely associated with a future secured party communication between the secured party device of the particular secured party and the pre-registered remote communication device of the particular authorized visitor as controlled by the secured connection management system; and storing the received funds in the database, wherein the controlling of the duration of the established secured party communication is also a function of the received funds stored in the database.
14. The method of claim 9, wherein in the secured connection management system the hosting of the secured party device interface is hosting a secured party web interface operable with the secured party device and the hosting of the registered visitor web interface is hosting registered visitor web interface, wherein the secured connection management system controlling, administering and management the communication therebetween through interfacing between the secured party web interface and the registered visitor web interface.
15. The method of claim 9, wherein the plurality of secured parties are inmates and the secured environment is a correctional facility in which the inmates are interned.
16. The method of claim 9 wherein the local secured wireless communication system is located in the secured environment providing the secured party communication as the only communications connections to the secured party device, and only communicatively coupled to the secured connection management system for management and control thereof through the local secured wireless communication system, the local secured wireless communication system including at least one secured router, server, and wireless access points and all communication connections therebetween and with the secured connection management system.
17. The method of claim 9, wherein the secured connection management system further includes hosting an administrative workstation web interface for operatively connecting an administrative workstation to the secured connection management system for management of the database and the stored information therein, wherein the secured monitoring of the established secured party communication between the secured party device and the particular remote communication device and to receiving the predetermined connection parameter related to one or more of a registering of the visitor, the receiving of the request from either the user interface of the secured party device or from the particular remote communication device, the establishing of the secured party communication, the verifying of the authority to establish the secured party communication of the received request, and the establishing the requested secured party communication as a web-hosted communication.
18. The method of claim 17 wherein the administrative workstation web interface and the secured connection management system are configured for receiving a registration of each remote communication device and an authorization of the particular authorized visitor for each remote communication device and storing information of each registered remote communication device and the each authorized visitor for the particular secured party in the database.
19. The method of claim 9 wherein the predetermined connection parameter is selected from the list of a duration of the secured party communication, an amount of prefunded communications funds, a type of the secured party communication, an authorized time of day and a day of week for the secured party communication; and receiving and storing in the database a value for the predetermined connection parameter.
20. The method of claim 9, further comprising providing a possession of the secured party device to the particular secured party to be used solely by the particular secured party in the secured environment, the provided secured party device being a portable communication device and being exclusive to the particular secured party and registered with the local secured wireless communication systems and the secured connection management system; the provided secured party device being only communicatively connectable to the local secured wireless communication system and being only communicatively connectable to the secured connection management system, the device having user interface with a screen, a keypad, a video camera, a microphone, and an audio device and configured to only communicate with the secured party web hosted interface of the secured connection management system.
21. The method of claim 9 wherein the request for the secured party communication is initiated by the secured party using the secured party interface of the secured party device and wherein the requested secured party communication is a request for a message and wherein the established secured party communication is a message communication.
22. The method of claim 9 wherein the request for the secured party communication is initiated by the secured party using the secured party interface of the secured party device and wherein the requested secured party communication is a request for a Voice Over the Internet (VOIP) audio communication and wherein the established secured party communication is a VOIP communication.
23. The method of claim 9 wherein the secured connection management system is configured to perform the steps of monitoring a current status of the pre-registered visitor and providing over the secured party interface the monitored current status of the pre-registered visitor.
24. The method of claim 9 wherein the secured connection management system is configured to perform the steps of monitoring a current status of the secured party device and providing over a registered visitor interface the monitored current status of the secured party device.
25. The system of claim 1 wherein the request for the secured party communication received from the secured party device of the particular secured party and wherein the requested secured party communication is a request for a message and wherein the established secured party communication is a message communication.
26. The system of claim 1 wherein the request for the secured party communication is received from the remote device of the particular registered visitor and wherein the requested secured party communication is a request for a Voice Over the Internet (VOIP) audio communication and wherein the established secured party communication is a VOIP communication.
27. The system of claim 1 wherein the secured connection management system is configured to monitor a current status of the pre-registered visitor; and provide over the secured party interface the monitored current status of the pre-registered visitor.
28. The system of claim 1 wherein the secured connection management system is configured to monitor a current status of the secured party device; and provide over a registered visitor interface the monitored current status of the secured party device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Various aspects, features, and attendant advantages of the present disclosure will become more fully appreciated as the same becomes better understood when considered in conjunction with the accompanying drawings, in which like reference characters designate the same or similar parts throughout the several views, and wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
(29) It should be understood that throughout the drawings, corresponding reference numerals indicate like or corresponding parts and features.
DETAILED DESCRIPTION
(30) The following description is merely exemplary in nature and is not intended to limit the present disclosure or the disclosure's applications or uses.
(31) The present disclosure provides a system for providing video and/or telephonic visitation between inmates incarcerated in a prison, and visitors located remotely from the prison. Visitors each have an authorized, Internet connected computer or other Internet appliance including Voice Over Internet Protocol (VoIP) capability. Visitation may be initiated by either the inmate or the remote visitor.
(32) As used herein the term VoIP refers to a specific method of packaging voice signals for transmission over an Internet connection. However, the applicant believes that other methods, protocols, etc. for packaging voice signals for Internet transmission may exist or may emerge in the future. Consequently, as used herein the term VoIP is intended to include any and all existing or emerging voice transmission methods or protocols in addition to the specific method chosen for purposes of disclosure (i.e., VoIP).
(33) Referring first to
(34) Each device 100a, 100b has four fundamental elements depicted. Each device 100a, 100b has a forward-facing camera 102a, 102b; a screen 104a, 104b; a built-in microphone shown schematically at reference numbers 106a, 106b, respectively; and a headphone jack 108a, 108b, respectively.
(35) Each device 100a, 100b has a wireless communications interface. For purposes of disclosure, a so-called “Wi-Fi” interface has been chosen as a communications interface. It will be recognized by those of skill in the art that other wireless interfaces currently exist and that the pace of development in wireless digital communication is rapid. Consequently, the disclosure is not considered limited to a particular wireless communications interface. Rather, the disclosure is intended to include any suitable wireless interface whether known or yet to be developed in addition to the Wi-Fi interface chosen for purposes of disclosure.
(36) Each device 100a, 100b has a unique identifier that may be transmitted by the wireless interface to identify a particular device 100a, 100b. Such unique identifiers include but are not limited to a Media Access Control address (“MAC” address) or the like. MAC addresses are most often assigned by the manufacturer of the wireless interface included within a device 100a, 100b and are typically stored in the device's hardware, not specifically identified, for example, in read-only memory, or some other firmware mechanism. Such MAC addresses are referred to as burned-in addresses.
(37) It will be recognized that exemplary devices 100a, 100b contain electronic support circuitry and a power supply (e.g., a rechargeable battery). Such devices 100a, 100b are considered to be well known and may be purchased as off-the-shelf devices. Optionally, such devices 100a, 100b may be custom built for the application and may contain security features, not specifically identified, designed to allow more secure operation in a correctional facility environment.
(38) In a prison, any communication apparatus for use by inmates has heretofore been an apparatus constructed using “prison hardened” techniques and materials. Inmates have used such apparatus for all communications with the outside world.
(39) The present disclosure supplements or replaces such apparatus with the devices 100a, 100b individually “owned” (i.e., purchased, rented, or leased) by individual inmates from the prison or from the system operator of the prison visitation system. The HomeWAV Web Access Visitation for Correctional Facilities by HomeWAV, LLC of Virginia Beach, Va. USA, hereinafter the HomeWAV system or simply the system, is assumed to be the system operator for purposes of disclosure.
(40) Referring now to
(41) As used herein, reference number 100x is used to generically refer to any and all devices for example, devices 100a, 100b.
(42) Using the devices 100x with the system 200 and methods of the present disclosure, inmates may communicate only with the HomeWAV system. Each device 100x is pre-programmed such that it can only access the HomeWAV system. As used herein, the term pre-programmed refers to either software or hardware modifications or add-ons that limit an off-the-shelf device to exclusive communication with the HomeWAV system. Prisoners are allowed access to only those applications and programs on the HomeWAV system that have been approved by the prison. Specifically, device 100x is pre-programmed to prevent uncontrolled access to the Internet.
(43) More specifically, each device 100x may be pre-programmed so that it will only link with a particular wireless 202 router located within the prison. It is especially important to note that no two devices 100x are allowed to communicate directly with one another, and each device will only be allowed to communicate with visitors who have been approved to visit with the inmate to whom the particular device has been assigned.
(44) Communication capabilities usually associated with an off-the-shelf electronic appliance such as cell phones, smart phones, or tablet computers, etc. may be modified. In device 100x, any existing cellular network communications or open wireless network communication (i.e., Wi-Fi) is typically disabled.
(45) HomeWAV system 200 incorporates security features that make it practical for an individual inmate to posses his or her own device 100x. For example, each device 100x may require biometric input from a particular inmate for the device to be activated. In most embodiments, a unique prisoner-generated personal identification number (PIN) may be required for device 100x activation. Further, HomeWAV system 200 limits each device 100x to communicating with the IP addresses of a particular inmate's approved visitors' equipment as controlled by the HomeWAV, LLC website 210 via portion 208a of the “cloud”. It will be recognized that while three “cloud portions” 208a, 208b, 208c are shown on
(46) Three devices 100x, representative of any number of such devices 100x found in a prison, are shown communicating with a wireless router 202 via communications paths 204a, 204b . . . 204n using a built-in Wi-Fi communications interface, not specifically identified, within devices 100x.
(47) Router 202 may have an integrated server, for example, an Interface Device shown schematically at reference number 220, or it may be connected, along with other routers, not shown, with a server, not shown, located elsewhere in the prison. The prison's routers, servers, and associated connections, none of which are shown, constitute the prison's local area network (LAN), not specifically identified. The prison's LAN is, in turn connected to the wide area network (WAN) outside of the prison via a communications portion 206 that may include the prison's Internet Service Provider (ISP), not specifically identified. The prison's LAN is thereby connected to the Internet, shown schematically as cloud portion 208a.
(48) A prison administration workstation, not shown, but described in detail in the '569 patent is connected to the HomeWAV website 210 via another Internet connection shown schematically as portion 208b of the cloud.
(49) Outside visitors communicate with the HomeWAV website 210, via the Internet, shown schematically as cloud portion 208c.
(50) The HomeWAV website 210 maintains and accesses databases of visitors 216 and of inmates and prisons 218. Using information from databases, the HomeWAV visitation system 200 acts as a gate keeper whereby only registered visitors are connected to registered inmates with whom that visitor is specifically authorized to visit.
(51) Based on input from Prison Administration 212 all or selective portions of an inmate's communication may be disabled. Single, identified groups (e.g., a cell block, etc.), or all devices 100x may be disabled by prison administration 214. In addition to complete disabling of devices 100x, hours of operation may be imposed on a device by device basis at the discretion of prison administration 214. Additional control may be exercised by prison administration 212 as also described in detail in the priority '569 patent.
(52) The HomeWAV system 200 of
(53) The HomeWAV system 200 of
(54) The novel concept of letting inmates have individual communications devices under their own control opens numerous possibilities for enhanced visitation via VoIP telephone and/or video visitation.
(55) Refer now also to
(56)
(57)
(58) Once the inmate has entered his or her ID Number 312, a status message 314 that indicates that the information is being validated is displayed. In addition, a rotating icon 316 indicates that the device 100x is processing the information. The entered Inmate ID Number 312 is checked against a list of authorized inmate numbers possibly stored in device identification database 208. In addition, the MAC Address or similar unique ID of the device 100x is checked against a list of authorized devices 100x. In some cases, the MAC Address is checked against the Inmate ID Number 312 to ensure that the correct inmate is using the device 100x.
(59) Assuming that the MAC address etc. is valid and the inmate has entered a valid Inmate ID Number 312, one of two screens will be displayed to the inmate.
(60) If this is the first time signing into the HomeWAV system from device 100x, a new screen 320 (
(61) If, however, it is not the first time the inmate has logged into the HomeWAV system from device 100x, then screens 320 and 330 (
(62) Once the PIN 324 is entered, screen 350 (
(63) Once the PIN 324 is validated, a new screen 360 (
(64) When the loading is complete, the Inmate sees screen 370 (
(65) The device 100x is constrained via hardware, software, firmware, or by other means believed to be known to those of skill in the art such that the only options that an inmate may choose are displayed on screen 370. The four Options are: 1) viewing received video messages 388; 2) creating and sending a video message 390; 3) initiating a video visit with an authorized visitor 392; and 4) initiating a VoIP phone call to an authorized visitor 394. The inmate selects the desired action by touching the appropriate controls on the screen of device 100x.
(66) Screen 370 presents the inmate a list of visitors 386 who have registered and prepaid for minutes for visitation with that particular inmate. The priority '569 patent includes a complete discussion of visitor registration and payment procedure. Consequently, neither visitor registration nor payment procedures are further discussed herein.
(67) An “Indicator Key” link 372, when selected, produces pop-up box 374. Pop-up box 374 shows the definitions of all possible colors of indicator(s) 376. Selecting control 378 removes pop-up box 374 from the screen.
(68) The message “Welcome “John Doe” (the actual inmate name is displayed) 380 is displayed at the top of the screen 370. A logout control 382 near the upper right corner of screen 370, when activated, logs the inmate out of the HomeWAV system.
(69) A “Test your audio and video” button 396 allows the inmate to test the operational readiness of his or her device 100x and to ensure that audio volume is properly adjusted.
(70) One or more lines of information 384 (only one line shown for simplicity) give the inmate the current status of all potential (i.e., registered) visitors. When multiple potential visitors are registered, a line for each such visitor is displayed. The scrolling functions of device 100x are used to select and highlight the desired visitor with whom the inmate wishes to communicate.
(71) The Visitor Name 386 is shown adjacent status indicator 376. Four option buttons 388, 390, 392, 394 allow the inmate to “View Messages”, “Send Message”, “Send Video Call”, and “Send Audio Call”, respectively.
(72) A message 398, typically provided in both English and Spanish, reminds the inmate that any audio call or video visit may be monitored and/or recorded.
(73) Selecting “View Messages” control 388 causes screen 400 (
(74) A central portion of screen 400 displays an image 408 originated by the person leaving the message being viewed.
(75) Volume level may be adjusted using control 410.
(76) Play button 412, Pause button 414, and Next Message button 416 each perform the indicated action.
(77) Pressing Exit button 404 returns the inmate to home screen 370.
(78) Another action selectable from home screen 370 is to record and send a video message. This is accomplished using the Send Messages button 390. Pressing Send Messages button 390 causes screen 420 (
(79) The name 422 of the visitor to whom the inmate is sending a message is displayed near the top of screen 420. Again, Exit button 404 returns the inmate to home screen 370.
(80) An image 424 of the inmate creating the message is displayed in a central portion of screen 420.
(81) Microphone level is adjustable using control 410.
(82) Two action buttons, Cancel 426 and Record 428 are used to control the recording of a message to be sent.
(83) Selecting record button 428 causes screen 430 (
(84) Most of screen 430 needs no additional explanation as it is in large part a replication of screen 420 previously discussed.
(85) A status message 436 indicates the amount of recording time remaining during which the inmate should complete his or her recording.
(86) Two action buttons, Stop Recording 432 and Cancel 434 perform the indicated functions. Selection of the Stop Recording button 432 causes screen 440 (
(87) Screen 440 allows the inmate to select several functions related to the just-recorded message. He or she may choose to re-record the message by selecting Re-record button 442. When selected, Re-record button 442 returns the inmate back to screen 420 where he or she may re-record his or her message.
(88) Send button 444 sends the message to the selected visitor and, once sent, the inmate is returned to home screen 370.
(89) Review button 446 allows the inmate to play back his or her message.
(90) Cancel button 448 discards any recorded message and return the inmate to home screen 370.
(91) Once back at home screen 370 the inmate may select another action.
(92) The inmate may initiate a video visit to the selected visitor by pressing Send Video Call control 392. When Send Video Call control 392 is selected, screen 450 (
(93) Message 454 indicates the name of the visitor being called 456 and the number of rings 460.
(94) Cancel button 458 terminates the calling process.
(95) Assuming the visitor being called 456 answers, screen 470 (
(96) A hang up control 472 is used to terminate the call. Video 474 captured by camera 102a (
(97) Visitor originated video 476 is displayed in a right panel of screen 470.
(98) The maximum time remaining for the visit 478 is displayed above the upper right hand corner of visitor originated video 476. The maximum time for a visit may be a prison-imposed time maximum or may indicate the number of prepaid minutes remaining in an inmate's account.
(99) At the conclusion of the call, either the inmate or the visitor may hang up, control 472. The inmate is then returned to home screen 370.
(100) Finally, an inmate may initiate a VoIP call to a selected visitor by selecting “Send Audio Call” button 394. Selecting button 394 causes screen 480 (
(101) A status message “Call Started” 482 is displayed.
(102) A message 484 Calling “Jane Smith” (actual visitor's name is shown) 486 and a count of the rings 490 is also displayed.
(103) A Cancel button 488 is used to terminate the calling process.
(104) When the visitor being called answers, screen 500 (
(105) Call time remaining 506 is displayed on screen 500 under telephone icon 504.
(106) Inmate originated video messages, VoIP phone calls or video visits have been described hereinabove. Device 100x is also adapted and configured to directly receive visitor originated VoIP telecommunications and video visitations.
(107) Such video visitations and/or VoIP telecommunications are received directly by the inmate without any intervention by prison personnel.
(108) A visitor who has been registered by the prison and who has placed funds in an account associated with the inmate with whom he or she wishes to visit logs into the HomeWAV system from his or her computer. As mentioned hereinabove, the term computer is used herein to represent any device capable of VoIP and/or video communication with the HomeWAV system.
(109) The visitor station displays a login screen 510 (
(110) Once the user name 512 and password 514 are entered, the visitor selects the Login button 516 to log into the HomeWAV system. Alternately if the user wishes to terminate the process, he or she selects the Exit button 518.
(111) Upon logging in, the user is presented with screen 530 (
(112) An “Indicator” link 542, when selected, causes a pop-up box 570 to appear. Pop-up box is shown in
(113) One of the selectable actions available to the registered visitor is to view messages received from an inmate. A “New Messages” shows a count 540 of messages received but not yet viewed by the visitor. Pressing the “View Messages” button 544 causes a “View Incoming Messages” screen 580 (
(114) Screen 580 shows a list 582 of received messages. Each message has a date & time stamp 584, an inmate name 586, and an associated “Play” button 588.
(115) Selecting a “Play” button 588 associated with the message desired to be played displays the message in a display window 590. A playback control panel 590 controls playback control using standard symbols believed to be universally known. Playback control panel 592 typically contains “Stop” and “Play” control, a “Speaker Volume Control”, and “Elapsed Time Display”, etc. None of these playback controls are individually identified. It will be recognized that other control may be added or some existing controls may be removed. Consequently, the disclosure is not considered limited to a particular set of playback controls. Rather, the disclosure is intended to include any combination of playback controls.
(116) Each video message received may be viewed a predetermined number of times after which it will be automatically erased from the System. The number of times is typically chosen by the system operator (i.e., HomeWAV).
(117) When a visitor has played all messages of interest, selecting “Return to Registered Inmates” control 594 returns the user to Registered Inmates Screen 530.
(118) For each inmate name 548, four action buttons are provided: “Send Message”, “Send Video Call”, “Send Audio Call”, And “Add Minutes”.
(119) When the visitor selects the “Send Message” button 554, screen 600 (
(120) Upon selecting the “Stop Recording” control 622, a third screen, screen 640 (
(121) All of the screens 600, 620, and 640 have a message details box 616 that displays the name of the inmate selected to receive the message, 610. In addition, a “Send” button is included to actually send the message to the inmate 610. However, before the message is sent, the visitor should acknowledge that the cost of sending the message will be the cost of one video minute. The user acknowledges this by clicking check box 612. Once acknowledged, the message is sent when the “Send” button is selected.
(122) Once the message is sent, the visitor is returned to the Registered Inmates Screen 530.
(123) If the visitor wishes to initiate a video visit, he or she selects “Send Video Call” 556 and a new screen 660 (
(124) Screen 660 displays a status message “Visit Started” 662. In addition, another status message 666 displays the name of the inmate being called.
(125) A Cancel button 666 may be selected to cancel the establishment of a video visit. An additional control 668 likewise cancels the establishment of a video visit.
(126) If cancelled, the visitor is returned to the Registered Inmates Screen 530.
(127) If the device 100x in possession of the inmate being called is turned on and, assuming that the inmate's privileges have not been suspended, inmate's device 100x displays screen 680 (
(128) Screen 680 displays the message “Start Visit” 682. A message “Mary Smith is calling. Connect?” 684 is also displayed. The inmate should use either “Yes” button 686 or “No” button 688 to either accept or reject the visit, respectively. A control 670 also declines the visit and returns the inmate's device to its home screen 370 (
(129) If the inmate chooses to accept the visit by selecting the “Yes” button 686 screen 700 (
(130) A visitor may initiate a VoIP telecommunication with the selected inmate by selecting a “Send Audio Call” button 558 associated with the desired inmate from the Registered Inmates Screen 530. Upon selecting the “Send Audio Call” button 558, screen 720 (
(131) If the device 100x in possession of the inmate being called is turned on and, assuming that the inmate's privileges have not been suspended, screen 104 of inmate's device 100x displays screen 740 (
(132) Screen 740 displays the message “Start Call? 742. A message “Mary Smith is calling. Connect?” 744 is also displayed. The inmate should use either “Yes” button 746 or “No” button 748 to either accept or reject the call, respectively. A control 750 also declines the call a returns the inmate's device to its home screen 370 (
(133) If the inmate chooses to accept the call by selecting the “Yes” button 746 screen 760 (
(134) The call duration 764 is displayed on the visitor's screen 760.
(135) An “End Call” button 766 provides a mechanism whereby the visitor may terminate the call.
(136) When the VoIP call is ended, the visitor is returned to the Registered Inmate Screen 530.
(137) Finally, the visitor may add funds to an account associated with a particular inmate. By selecting the “Add Minutes” button 560 associated with the particular inmate, the new screen 780 is displayed on the visitor's screen. Screen 780 has two portions, a HomeWAV order portion 782 and a PayPal payment portion 784.
(138) Screen 784 displays “Minutes to visit with Smith, John” 786. The price per minute (i.e., Item price) 788, usually set by the system operator, is also displayed.
(139) The visitor enters the number of minutes he or she wishes to purchase in a quantity box 790. Selecting the “Update” link 792 updates the Item Total 793.
(140) A Shipping and Handling charge 794 may be imposed by the system operator. In the case chosen for purposes of disclosure, the Shipping and Handling charge 794 is $0.50.
(141) Finally, the total for the transaction 798 is displayed.
(142) The only way to add funds to an inmate's visitation account is by using an on-line payment service. The well known PayPal® has been chosen for purposes of disclosure. Those of skill in the art will recognize that other on-line payment services exist, any suitable one of which may be substituted for PayPal®. Consequently, the disclosure is intended to include any suitable on-line payment service. Consequently, the disclosure is not considered limited to the PayPal® on-line payment service chosen for purposes of disclosure.
(143) Assuming the visitor has previously set up a PayPal account, he or she enters an e-mail address 800 and a password 802, and selects the Login button to sign in to their PayPal® account. Once signed in the financial transaction is completed.
(144) If the user does not already have a PayPal® account set up, the “Don't have a PayPal account?” link 808 is selected.
(145) A “Cancel and return to HomeWAV, LLC”. Link 810 terminates the Add Minutes operation.
(146) At the conclusion of the “Add Minutes” process, the user is returned to the Registered Inmates Screen” 530.
(147) The operation of the novel inmate visitation system of the present disclosure wherein either inmates or visitors may originate video visitations or VoIP telecommunications has been described in detail hereinabove. It will be recognized that the operation of the inventive system depends upon “infrastructure” described in detail in the '569 patent. For that reason, some points regarding the information described and claimed in the '569 patent are reiterated below.
(148) As has been described in detail in the priority '569 patent a prison administrator workstation (PAWS) may be located within the prison and also connected to either a network or directly to a network controller and/or switch. In alternate embodiments, the PAWS may have its own modem associated and connected directly to the Internet. Also the PAWS may be located outside the prison when desired.
(149) An Internet connection is typically provided between Internet interface/modem and the Internet “cloud” represented schematically at reference number 214 in FIG. 2 of the '569 patent.
(150) A visitor workstation or Internet “appliance” also described in detail in the '569 patent is also connected to Internet by a suitable Internet connection.
(151) A HomeWAV, LLC website supports a web server. The web server runs application code that implements the applications of the novel remote web-based visitation system of the disclosure. In the embodiment chosen for purposes of disclosure, the applications, discussed in detail herein below, are implemented in either JAVA or PHP (http://www.php.net). PHP is a server-side HTML embedded scripting language that provides web developers with a full suite of tools for building dynamic websites. In addition, some custom Adobe® Flash® ActionScript codes are provided to interact with flash.homeway.com discussed in detail in the '569 patent. ActionScript is a dialect of ECMAScript (i.e., it is a superset of the syntax and semantics of the language more widely known JavaScript), and is used primarily for the development of websites and software targeting the Adobe Flash Player platform. ECMAScript is the scripting language standardized by Ecma International in the ECMA-262 specification and ISO/IEC 16262 specifications. The language is widely used for client-side scripting on the web.
(152) It will be recognized that website design and implementation is believed to be well known to those of skill in the art. Consequently, alternate web development tools/languages may be utilized to develop similar applications. Consequently, the disclosure is not considered limited to the development tools and/or languages chosen for purposes of disclosure. Rather, the disclosure is intended to include any suitable languages, scripts, etc.
(153) The HomeWAV, LLC website also embodies and supports storage provided to contain application code and the databases necessary to implement the remote web-based visitation system of the disclosure.
(154) A second website associated with the remote web-based visitation system of the disclosure is Flash.HomeWAV.com website. Flash.HomeWAV.com website records and stores all audio/video (A/V) visits. As discussed in detail in the '569 patent, certain A/V visits by clergy or legal representatives may be exempt from recording. Typically, all other A/V visits are recorded by one or more A/V servers. Storage devices retain A/V transcripts of all visits not exempt from the recording requirement.
(155) Finally, one or more HomeWAV Administrators at workstations that include a computer and a modem that are connected to the Internet through an Internet connection provide certain gate keeping and administrative functions by interacting with HomeWAV website. Such gate keeping and administrative functions are also discussed in detail in the '569 patent.
(156) Since other modifications and changes varied to fit particular operating requirements and environments will be apparent to those skilled in the art, the disclosure is not considered limited to the example chosen for purposes of disclosure, and covers all changes and modifications which do not constitute departures from the true spirit and scope of this disclosure.
(157) When describing elements or features and/or embodiments thereof, the articles “a”, “an”, “the”, and “said” are intended to mean that there are one or more of the elements or features. The terms “comprising”, “including”, and “having” are intended to be inclusive and mean that there may be additional elements or features beyond those specifically described.
(158) Those skilled in the art will recognize that various changes can be made to the exemplary embodiments and implementations described above without departing from the scope of the disclosure. Accordingly, all matter contained in the above description or shown in the accompanying drawings should be interpreted as illustrative and not in a limiting sense.
(159) It is further to be understood that the processes or steps described herein are not to be construed as necessarily requiring their performance in the particular order discussed or illustrated. It is also to be understood that additional or alternative processes or steps may be employed.