throbber
US007333798B2
`
`(12)
`
`United States Patent
`Hodge
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,333,798 B2
`Feb. 19, 2008
`
`(54) TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`75
`(
`)
`
`_
`Inventor‘ Stephen Lee Hodge’ Aubrey’ TX (Us)
`
`7/1999 Baker et a1. ......... .. 379/26502
`5,923,746 A *
`8/1999 Richardson et a1.
`379/88.26
`5,943,403 A *
`7/2000 Kennedy e161. .......... .. 380/247
`6,084,967 A *
`8/2000 Baumann
`455/410
`6,104,922 A *
`6,182,221 B1* 1/2001 Hsu et a1.
`713/186
`6,213,391 B1 *
`4/2001 Lewis
`235/380
`
`.
`.
`.
`(73) Asslgnee: Value Added commumcatlons’ Inc"
`Plano’ TX (Us)
`
`6,219,439 B1* 4/2001 B
`6,282,566 Bl* 8/2001 Leggstral. ....... ..
`6,377,699 Bl* 4/2002 Musgrave e161.
`
`382/115
`709/217
`382/117
`
`*
`
`_
`) Nome?
`
`(
`
`_
`_
`_
`_
`SubJect to any (1150121111169 the term Ofthls
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 442 days.
`
`(21) Appl. NO.Z 10/215,367
`
`(22) Filed;
`
`Aug 8, 2002
`
`(65)
`
`Prior Publication Data
`
`US 2004/0029564 A1
`
`Feb. 12, 2004
`
`(51) Int. Cl.
`(2006.01)
`H04Q 7/20
`(52) us. Cl. ................. .. 455/411;455/410;379/93.02;
`379/14205
`(58) Field of Classi?cation Search .............. .. 455/410,
`455/411, 563, 405, 406, 555, 560, 414.1,
`455/445, 55; 379/ 88.19, 8802, 114-03, 265-01,
`379/ 142.1, 142.2, 142.05, 142.06, 93.02;
`726/5; 713/169, 202; 380/247; 235/379
`See application ?le for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`i i
`
`’
`’
`5,485,507 A *
`5,502,759 A *
`
`greePd
`arm ge’
`1/1996 Brown et a1.
`3/1996 Cheng e161.
`
`"""""" " 37495/
`"
`
`.. 379/8808
`.. 379/8802
`
`5,655,013 A *
`
`8/1997 Gainsboro . . . . . .
`
`. . . .. 379/188
`
`5,717,743 A *
`
`2/1998 McMahan et a1. ........ .. 379/188
`
`6,389,397 B1 *
`5/2002 Otto ...................... .. 704/270
`6,668,045 Bl* 12/2003 Mow ....... ..
`379/8819
`6,687,733 B2 *
`2/2004 Manukyan .
`..... .. 709/200
`6,819,219 Bl* 11/2004 Bolle e161. .............. .. 340/552
`6,836,556 B1* 12/2004 Bromba et a1. ........... .. 382/124
`6,950,508 B1* 9/2005 Grii?ths ......... ..
`.. 379/201.01
`2002/0042879 A1* 4/2002 Gould et a1.
`.... .. 713/176
`2002/0177433 Al* 11/2002 Bravo e161. .............. .. 455/411
`
`FOREIGN PATENT DOCUMENTS
`2 148 569 A * 5/1985
`
`GB
`
`* cited by examiner
`.
`.
`.
`Przmar Exammerilean Gelm
`.
`y
`_
`(74)’4’wmey’Agw” "r Flrmiward‘g‘ Ohvo
`(57)
`ABSTRACT
`
`A secure telephone call management system is provided for
`authenticating users of a telephone system in an institutional
`facility. Authentication of the users of the telephone call
`management system is accomplished by using a personal
`identi?cation number, biometric means, and/or radio fre
`quency means. The secure telephone call management sys
`tem includes accounting software capable of limiting access
`to the system based on funds in a user’s account or other
`related limitations. The system includes management soft
`Ware capable of implementing Widespread or local changes
`to the system and is further capable of modifying or setting
`b
`f
`t
`t
`any Hum er 0 user accoun Parame ers'
`
`5 Claims, 36 Drawing Sheets
`
`Trunk Lines
`
`<—111
`
`“)5
`Electronic
`\ Switchboard
`Device
`
`Audio
`“7* Recorder
`
`I
`“Sgseml
`/
`Serial
`
`Central
`Site Server
`T
`
`i
`l
`Y
`Biometric @Lf?ill RF Transmitter
`
`113
`
`109
`
`107
`
`108
`
`101 /'
`
`Admin.
`
`4120
`
`Workstation
`
`Shadow
`Workstation
`
`+123
`
`.
`.
`Investigatwe <_
`Workstation
`‘25
`
`CMS (WAN)
`
`GTL 1005
`IPR of U.S. Pat. No. 7,529,357
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheetlrof36
`
`US 7,333,798 B2
`
`“Sammie?
`
`coumumviogstow8mm
`
`
`_.mmfilvgofimnfim—flH—=ooEEommN
`
`
`
`u.u>§wumo>£.m
`cosmpmfiogWofilvM
`
`dag
`
`:TvmafiaMESH
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 2 0f 36
`
`US 7,333,798 B2
`
`
`
`DMU Alllmmw
`
`
`
`V/QN TFUA
`
`k F 3‘ EN M8
`
`020 0%! Eu; 5 mUQ
`
`mHQ /
`UHF TEN ‘A _
`>\:~ ) ea /
`
`mmU :N
`
`
`
`62-09 0.6 “Era Iuwu
`
`2a SN Ely. u: Em
`
`_ mom
`2: %
`
`+ >\
`
`zzé 1'
`56E n2 Ema
`
`
`
`
`
` mam P RN Almom
`
`_ 5m \ 88>
`
`@325
`
`mi Ma
`
`N .U?m
`
`:_ _
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 3 of 36
`
`US 7,333,798 B2
`
`
`
`lelv
`
`nmm
`
`l
`
`UmUSN05
`
`
`
`mmm.fimm
`
`m:
`
`QZm
`
`3i3mc2m:
`
`.095gm
`
`6x
`
`$3..
`
`AOZEZOUwN
`
`.UOMA
`
`.MQQ<
`
`HQOUHQ
`
`:m
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 4 0f 36
`
`US 7,333,798 B2
`
`.UOME
`
`HZOH
`
`HQOUEQ
`
`2cm
`
`25¢
`
`mow k @omb
`
`Fmw
`
`ZTMQZTP
`
`mmw
`
`‘I 5
`
`wow wow
`
`
`
`.2200 I4 @785
`
`All h;
`
`
`
`pi; mow
`
`0%
`U
`
`

`

`U.S. Patent
`
`Feb.19,2008
`
`Sheet5 0f36
`
`US 7,333,798 B2
`
`Omaha—22m
`
`mHZZAaw
`
`”you—<72vuUhOhmHMOL Sm
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 6 0f 36
`
`US 7,333,798 B2
`
`0mm |' Min
`
`F ME
`
`w .Uwm
`
`Em
`
`m8 $53
`
`35200
`
`" wmam m
`
`
`@ @ wmDm
`.oizou ‘ - $2.122:
`
`53722 2.2 @EEw
`
`new
`
`hwi
`
`m2
`
`M5350”;
`qomhzou as
`
`Sm
`
`\
`
`wwam
`
`mow
`
`\ VEQBEZ
`HV F
`ZHmm
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 7 0f 36
`
`US 7,333,798 B2
`
`mow \ll'
`
`
`
`HMOm 03H.
`
`Min +
`
`mow
`
`.
`
`N
`
`
`
`E502 MES
`
`$5502
`
`5“ - Sou 12mm
`
`
`which
`
`DOG
`
`.06”:
`
`SEE
`
`20%
`
`in
`
`P95 3
`
`II_
`
`In
`
`:00
`
`tn
`
`
`
`W55» Sou
`
`we“
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet8 0f36
`
`US 7,333,798 B2
`
`_Ev.UOMm
`
`HU~O>
`
`5956
`
`an“:
`
`><-m<
`
`vwmm
`
`FaggomuAImom
`
`”Hm—”EDM—Onflm2w
`
`mom
`
`
`
`093w
`
`F5252
`
`cm:
`
`Eém
`
`<H<Q
`
`w.UE
`
`
`
`lm;
`
`
`
`Joann/HODA<UOA
`
`mmDm
`
`3%
`
`......................................................................................................................................................................................................................................................................................................................................................................................................................................
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 9 0f 36
`
`US 7,333,798 B2
`
`Rom 1|‘ PMAwD
`
`_ 2552
`/
`@oo
`
`20
`
`wmxuiram
`
`
`
`MAD HEHH
`
`, 03H
`
`E15 Q Eon
`
`So I"
`
`
`
`Sou ‘Zn-mm
`
`which
`
`NJUM
`
`:0
`
`so.
`
`00w
`
`m5
`
`PMOMEOU
`
`OED
`
`mom
`
`605
`
`2E2
`
`2oz
`
`E3
`|_
`
`1:63
`
`155200
`
`wmam
`
`@ .UE
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 10 0f 36
`
`US 7,333,798 B2
`
`S2 1/
`
`coo“
`
`H 2:
`
`moi
`
`moi
`
`:2
`
`m2:
`
`

`

`U.S. Patent
`U.S. Patent
`
`be
`Feb. 19, 2008
`w
`
`F5:
`
`5:
`
`mo:
`
`.xx»:
`
`
`
`.M43,m‘n.,..‘1,4,2”;
`
`co:
`
`63f011t
`Sheet 11 0f 36
`hS
`
`w8:
`
`we:
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`3.3%a.
`
`pmI
`
`:dam
`
`m8:9.mt.
` ;.LkL.IImime-J?3.3.3...5—,.”4
`
`.Eywhw..gm...xii;:fin$3.3“.
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 12 of 36
`
`US 7,333,798 B2
`
`[\
`
`8
`
`mos,.mV.n...,.,.1......l;§ii-¥rhr»£-i
`
`
` iE.§r{ilv{f
`
`,1._,...mg.............:ilii--lai.LVi,iylbfimm_%E-i
`
`
`
`
`
`.1111}!S'll,l.§1|7)l..in.r|..Ti;E1|!.~..lu.|Ifrilllfrllllllllll‘illl.all-1|.-II‘D
`wag..nu.mg.—“gainW38
`.A.1.3$13!.(Iii:1:41;.,.a.|l|il.l‘5lr(i!(|l1lxdIIIIIJIP2.31)..Ewas.“3Eng
`
`
`
`
`
`NM.Ufim
`
`TA2..“
`
`mymag
`
`sii‘?tllll
`
`
`
`
`......:.iLrIrllll.‘..l.lc1“vqlusrf5c.slnriiulrx|l§lrlfl.[illiil{riff-la:mumg:m53mfimEmaa
`
`
`
`.i.+.;.i.....:.r§r.e:21.55.3391.5591.119.1=e.:e,.§,..¢<..5.é!.b,r,512::6:4E,””in.“
`.:.¢|i.....l3..rllvltull..r.o¢.._Di..l..l,_i.tl.£lvull.l3.“.Em”a?iwflwfili
`,2:.:1mill...
`
`
`
`gamma”.mgfiwsfiafi
`$5.5mflwmEB_
`
`I!V.Z.,J.|il.|.|i~l..|‘ml|l€lr\1
`
`_..3:11.1141:2.:.§.,..,..,K.i.§r33.1...
`
` . 'rg‘vg—firzrm,,3".
`.
`,
`
`3‘-F
`,» 522-}?.21“?
`
`
`
`.féwfiazaamw::fiyw?imfixfiawmfl_
`
`wafizmfimvxSEES.”wan—£133».u.,
`
`
`
`
`
`
`
`
`
`SEom“oomfi
`
`momfi1/
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 13 0f 36
`
`US 7,333,798 B2
`
`Q02
`
`22
`
`2 .UHH
`
`:2
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 14 0f 36
`
`US 7,333,798 B2
`
`w T1 m2;
`
`hymn-“331.05 uni
`
`
`
`
`
`(Lani-r 15!: ii;
`
`No:
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 15 0f 36
`
`US 7,333,798 B2
`
`.n
`
`Mn.» .
`
`£2 a“ 3 w
`
`.w}. ‘M
`
`.
`
`
`
`m‘ , . Q2 .
`
`q .
`
`.
`
`:2 in .w 7 u. 1
`
`$2 ,. 3
`
`$2 .
`
`_ 3
`
`q.
`
`
`
`3. pr X _
`
`.
`
`_. , , M F 3 w
`
`w s. . .. 3
`
`22 .3 . i ???m
`
`
`
`, _ E. s .3
`
`
`
` . .G q 33.. 3...
`
`
`
`
`
`
`
`. all 11:012. ii
`
`.gmg?
`
`
`
`. Ur ml‘ ,mtlialllla vvlfai‘lvnlill
`
`
`
`
`
`22 Q: :2
`
`mo:
`
`mo:
`
`002
`
`
`
`In; .UFH
`
`a2
`
`om:
`
`m8 @315
`
`mo:
`
`52
`
`\ m5
`
`/ 82
`
`/ mm:
`
`5.2
`
`mm:
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet16 0f36
`
`US 7,333,798 B2
`
`
`
`
`.1ll.75154111111!trlri15...:-
`.1111511
`
`”my«2,«my.-moJ.oz”.
`
`33%
`
`“or
`
`«.3.
`
`an}
`
`um}
`
`
`.311MHW.HM.H#..11.2.1hm}.
`mm}want
`3%mm?oz
`no}.no}02
`
`”war“
`
`
`
`1mg,Amman.
`
`3}an}02
`
`an}no}.02.
`
`
`
`mvfi,mvmwm
`
`83
`
`:3
`
`82
`
`002
`
`
`
`
`
`.33%.:Em.occsum_mh.u_m_=31
`
`+82
`
`111Flt-11.1.5
`£23:m111
`
`am}NSmmummnm
`
`
`
`.l...|.l|..lililll|zlitlkt
`
`3}mommmowmnm
`
`
`1”}.quSmmmomwnmtf.
`may“;mNN_.5mmB111.
`.1011’1‘1111111!II:1,
`
`infllis
`
`3;,Hm,r530.3
`all8}.mNPBmmmmm
`
`8}WmEmmmmmnm
`
`we,38538
`
`”myREES
`
`mew:
`
`22
`
`:2
`
`SS
`
`22
`
`mmww
`
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`29,1b.eF
`Feb. 19, 2008
`
`Sheet 17 0f 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`0a,1
`
`
`
` .m22.3%W.23%MWW26mm”.U98%w.wEggmayEggm.$33w3.8%w.egg.
`
`«2933 E}.Is\l4.ll§§irlifil
`
`Wm
`
`Nmmmfimr
`
`w£$fi£mmfigm
`
`5555
`
`=3.me
`
`S.Umm
`
` ma.
`
`ritiifisafiflnxlilslill‘llii.u...3...(Xr}
`
`
`.xizlvit;).3.le.if:!flllz...liarutniii
`
`no:
`
`
`
`2: :: mo: no: mo: mo: 5: /
`
`mo:mo:5:/
`
`co:
`
`3w 5: i E
`
`3233icmin.U3....3.
`
`1.!
`
`
`
`ti
`(Lt-1‘
`
`am3.3
`@gg Hg
`
`
`
`magma.ammwfignm
`
`ommwfimw
`
`.wmqmuumr
`
`wmfifimw
`
`“m“wtm.
`
`$5me
`
`3meme
`
`mmwfimr
`
`
`
`
`
`.mrwmmhfimmU...hmmmpfimmwfianmpmtmmm
`
`
`
`
`
`U.3.”me.prhmmwfimm
`
`h.“£mea.53533p:53.fifimfifism
`
`
`
`Emma.fififlusm
`
`mwfimpfi
`
`w x $4
`
`m3Q
`
`N.
`
`mu5E.2BEES
`
`£35:
`
`Egg
`
`Manama
`
`33
`
`Es
`
`$35
`
`35
`
`$03
`
`mg1
`
`nu.
`
`an.
`
`anmEu.
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 18 0f 36
`
`US 7,333,798 B2
`
`w 2, 5m»
`
`n
`
`Ewgmzm N:
`
`2 .UFH
`
`
`
`2M: 5: :M: :2 32: SE 8M: % 2: 52
`
`
`
`
`
`8M:
`
`girl-Iii:
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 19 0f 36
`Sheet19 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`moi
`mama
`
`002
`oomfi
`
`S9
`Mama
`
`w
`
`
`
`v3.2.5.) 1!!
`
`a.03
`a .UE
`
`LE: ED.
`
`
`
`
`
`“haiku—H.mfi.m..:=—u:mm*flfin:fl1In
`
`

`

`U.S. Patent
`
`Feb.19,2008
`
`Sheet20 0f36
`
`US 7,333,798 B2
`
`
`
`xlrtrxlif
`
`“gnaw—3a.¥—3_mu..n>vmwI«.
`
`cm.UE—
`
`mmommmow
`
`28:238
`
`moon
`
`
`

`

`U.S. Patent
`
`9a1
`
`12teehS
`
`US 7,333,798 B2
`
`
`
`
`
`b.cBEoELga—tou3233.0.333253.9clamR33.3.:23:39aogfiL9E380gfinumamm333.5
`
`
`
`
`
`
`
`89339mm0€333»NLa...333399$..
`
`rm...L
`
`
`
`Eafifiifiud.%3:33...."aaflmES3:.cfiEnu.”3333:8£3me
`
`3.23.33anms32:3322:3Emnsmfi
`
`
`
`
`
`mm;asxufin23:33.2:39%323:5...€99onmagnum,.
`
`35.3.2%3333333.30$.23:38_
`
`
`
`
`
`335mcaEunas.33:0:BEaG..
`
`cfiEoELmano39«33“gm332mman:
`
`
`
`23:ENDED“.5.
`
`
`
`mIMWD1530mm
`
`
`
`,£033.3mfinuwe:m5.£.££Enu3.3333clam.
`
`
`
`
`
`
`
`EEE.._.,1ENE;
`8a8:v/.
`
`
`
`.303.2.a».3
`
`
`
`003.
`
`
`
`
`
`
`
`.3§¥$Em££§ufllumb«33331.39.£155.:NIKE»?!1..£112....«Itiva’Iim51?up???.r.fcéc.fiufrw.ltp9......
`
`
`
`
`
`
`
`SHN
`
`new
`
`003
`
`:5
`
`mZN
`
`95
`
`HN.Umm
`
`
`

`

`U.S. Patent
`
`mF
`
`US 7,333,798 B2
`
`m3%m83
`
`M8%
`
`
`
`
`
`wUEEMnE,.
`
`NN.Umm
`
`nghagE23@255
`
`3mm
`
`

`

`U.S. Patent
`
`Feb.19,2008
`
`Sheet23 0f36
`
`US 7,333,798 B2
`
`
`
`wig$3mi.fix»...
`
`Tn.
`
`12.1.1.._.%.......,.....13.1.1.wtnfifimma.
`
`
`
`
`
`
`
`.1.151:1...g§g1.zv??ig“5....in:J‘»...«.49..1......12.:
`
`i5...»...uhvkl.1d1.1.9..
`
`
`.mamrvaaxww:,JAMW.,s...41t.I....(:1...
`.1$113.11!
`
`
`
`00mm
`
`Hmmm
`
`memm
`
`Memmmfimmnfimm
`
`3.Umm
`
`nemm
`
`QOMNkmfimm
`
`
`
`

`

`U.S. Patent
`
`Feb.19,2008
`
`Sheet24 0f36
`
`US 7,333,798 B2
`
`#Nwm
`
`mmvm
`
`mmwm
`
`nmvm
`
`
`
` r.,‘.rfilwsflg.u
`
`vm.UHm
`
`
`
`éflm‘wflw..
`
`33.3%flag.3
`
`oovm
`
`mmwm
`
`mfivm
`
`Hmfim
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 25 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`mafia.”mam.1mm$.93.an
`
`
`
`
`
`
`
`
`.“Ngislt$r$Exit...Ti...l;.....ila§.§.5§>5......»I...r....13.}...25.....6...........3...!.1...
`
`
`
`
`
`
`..‘...I.ll|ll.l.ittill).iilrilv.).(15.1.!.1.l..Ii..§Ili.l.\.€lr.1|.1.l.-ilv.l.ll.u33131.1.x\L...gamma“..
`
`..Hmm-Earn._1.1.1..a..a....zI..1.
`_..Nmm#83?
`
`
`.11....11:.LL..|..$1.1...ILlill.l...l.|{.LLKIIEE.Eybxerbtlili...ilk-l
`MNBdmmnw.
`311$}.Il.4ll.(.{f...(.lt...5..!.$.ix?-\e)..isia..\.§....l.vltlt§llnlrL1..
`
`
`.11I;...5511.ling»!!!1......I..|r.I..916.i.
`
`
`
`III-ELEIIII.1.....SL11-aix9.275-5.1r.1.¥:.ili.x.§lt.s.}lra<bL;{51.5.....i...M..Emma”.
`
`
`
`........~».n.p:.41...».....
`
`mm.Umm
`
`.Bdme
`
`....
`
`
`
`
`
`
`
`.irriiirll‘iiléifblltt.lilriiz.‘.3.six‘avilIalio.g...32.2.!Stilt.1.\.01.5.3!ital........izsrilf...‘.....i.21l..lwlta5.
`
`
`,amm.3...»
`
`
`
`.i..l;.l_lvl...1.5.2.1)...2-3.3.1.}...533......5.331.!!!.II..321....(...
`
`
`
`2..i..fataabgirilxnhixfiai.1.)}.1-T...
`
`
`
`
`
`
`
`..1..............................a.1.1..«311.4...E3.3.31.2...
`
`.mmawmha.
`.$ENE
`
`:12.--£45..
`mmfimk...
`..If...)5....)1:34.111...momma
`
`
`
`.31...u....fv...11:A
`Bmmfi
`Eda”...
`
`8..figwwmfi
`
`8mm
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 26 of 36
`
`US 7,333,798 B2
`
`:3!!!)
`
`
`3{1.113.}...flyk.z..i§l.l%Tul‘fll
`[33Emma,Qua”
`
`.23BEE
`
`.23has?8.33
`
`
`
`.35Emma“.3.3mm
`
`$3BE?88a:1...x$:!rr1¥..l+!;.;:!1..I!k5!);
`
`
`
`8 .m..33E5983ml“;
`
`w.
`«$14,454:. w
`
`.wm;
`
`'
`
`..
`
`x3
`
`n1.«-.‘.x“~‘r-.M,u.
`
`
`
`303598.x.4...:v..2:.lll.|)l.-|.I:nvi.\llv£l.l.vul.l{I33.
`42..4.....
`
`
`
`II‘l‘lallultit-aaénbt
`
`
`.mmamthmmmfiw.
`.3
`
`Com2mmgcom
`mcm:8$8883888
`
`
`

`

`U.S. Patent
`
`Feb.19,2008
`
`Sheet27 0f36
`
`US 7,333,798 B2
`
`,m...._,
`'7 ‘6'“ \m.
`
`__
`r
`,
`3 ‘ saxwflufiiu.
`
`n
`
`mmdw
`5N.Umm
`
`
`.‘t
`
`
`' «firm 5 ilk-‘35:»WA».EW‘WHF.53?“
`
`50.8monmSum
`
`
`

`

`U.S. Patent
`
`eF
`
`on1
`
`nv1‘
`
`nv
`
`oo
`
`teeh“5
`
`asf0
`
`cu
`
`US 7,333,798 B2
`
`mmmmwm
`km#Nwm
`{KEVJ.av,,..,_hmfimm memm
`
`
`.smwxmw...V
`
`

`
`E
`
`8 f
`
`i
`
`wN.UHm
`
`mmwm
`
`comm
`
`b_wm
`
`oflwm
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 29 of 36
`
`US 7,333,798 B2
`
`2929
`
`FIG.29
`
`2900
`
`2921
`
`2915
`
`2913
`
`2911
`
`2901
`
`

`

`U.S. Patent
`
`01,,
`
`00m
`
`hS
`
`f003t
`
`US 7,333,798 B2
`
`mmmmom
`
`cm.Umm
`
`b.33
`9‘poem
`“wmfiom
`%fifiOm
`
`
`
`
`«mafia—emuIAll!ooom
`
`Hoom
`
`moom
`
`moom
`
`meow
`
`mfiom
`
`hfiom
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 31 of 36
`
`US 7,333,798 B2
`
`,«4.x.
`
`‘.memmmmmra
`
`.w,
`
`_H_m 2.3amine.»
`
`
`
`w.
`
`_qflw§§nfifififi
`.,4m,
`
`in...»
`
`Hm.UHm
`
`“5::
`
`5.92..#5.
`
`oofim
`
`4/8:
`
`Hofim
`
`mofim
`
`mofim
`
`hc_m
`
`

`

`U.S. Patent
`
`Feb
`
`.19,2008
`
`Sheet32 0f36
`
`9US7
`
`333,798 B2
`
`mzfimumfixmhwfl comm
`
`
`
`
`
`050a.«mannammmomomo
`
`
`
`Guamanaghvvvomomo
`
`
`
`hmmstuZHhmM—aNNNomomo
`
`
`
`
`
`mamammHAquflHoaommmo
`
`
`
`moqdbdMoonnadommmo
`
`
`
`MubmaoquHBHoaommmo
`
`
`
`933memoaommmo
`
`mm.0:—
`
`moaommmo
`
`wadommma
`
`.xl;
`
`
`

`

`U.S. Patent
`
`US 7,333,798 B2
`
`JmIA9340AnneuwIA9340DonemmwNHvNNFmAHovcubvuwdooouxma\NHoaaommmoomummumdooowxmd\udmoaommmoomwoovmvdm
`
`
`
`
`
`
`
`
`
`
`
`
`
`13IAA240oouoDDDhmmMDDwmmuhvumd000N\0N\NdNadommma
`1%IdnfldummnaNmmmmomuhmmmnwoumoDooN\m4\4dNNNomomo
`
`
`
`
`CuInAfiduDonaNwmmmomwhmmonwmuvaOODNXmaanHOHOmmmo
`
`
`
`
`
`
`
`
`131HnfldumonoooormmmbovmaumHuMHHDDN\NO\HONadommmo
`
`
`
`
`mulanflduoouoNmmmmomwbmomuwmumoGoowxmdxaaNNNomomo
`00I4AEdUnbouDNmmmmommnm.n¢uDNumoooo~xoaxaammmomomo%I4REDmmnoNmmmmOmNnmmduodnmoOODNxmdxdaNNNomomo
`
`
`
`
`
`
`
`
`
`
`
`
`
`mmIAAflfiucomaNmmmmomunmmwnuvumoooouxnaxadHaaomomo
`
`
`
`
`LuIAAEQUmonoNmmmmomwnmHNummanODDN\M4\NHHoqommmo
`
`
`
`
`kmIdundoAVHHmammmommemmnhmnwoooo~xoaxaaNNNOmomo
`AwIAnadumonooomrmmmrovvonmvumflDoowxmd\wdNoaommmn
`
`
`
`
`.4:.l..£klz::.Ila-3.3.2.115:3:51..1.3.1.... 2mm00mm50mmmemmmomm5mm
`
`
`MIAundo00.0bommmomwbmN4.mm.Haooowxodxaamm¢vm~aa
`
`
`
`
`IdAENUmamaNmmmmowubmnwuumnmoooowxoaxdammmomomo
`
`
`
`
`
`IdAfiduammohommmomthmauvvumaaaa~xmaxaammvwmwaa
`
`
`
`
`I4AfiduDonabommwomthvmummumfloaow\moxaaMvamuaa
`
`
`
`
`
`IAAmduoouoNmmmmomwnmmqnbvnma000N\maxmddoaommmo
`
`
`
`
`undohauoNmmmwomwnmNonmmnmoooow\ndxaaAddomomo
`
`
`
`
`EubauuNmmmmammhmNNHNHumo000N\04\4H«Haemomo
`
`
`
`35......ll:noamnwmommpm$3....anumowxnwx:iaowomd.......:..
`
`
`
`
`
`
`DonaNmmmmommemNanHmDDDDN\04\4HAddomomo
`
`cemm
`
`mm.UHH
`
`

`

`U.S. Patent
`
`Feb.19,2008
`
`Sheet34 0f36
`
`US 7,333,798 B2
`
`
`
`HovM
`
`um.UHm
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 35 of 36
`
`US 7,333,798 B2
`
`“mofiwwam
`
`u:52.3:333_Q:_E.2232:
`
`momm
`
`:mm
`
`3mm
`
`
`
`1/5mm
`
`:HQMNHg
`
`0385.5.8saga-MAImomm
`
`
`
`
`
`3mm
`
`mm.Umm
`
`OBQQRa2535Na
`
`083.53”
`
`oSQflaggflflflfi
`
`9832:.”ACanada.—
`
`095829
`
`8033“.“
`
`SQQERH
`
`
`
`2.fich..923.52823?...BLunch:
`
`mBAOZH
`
`mEAOZM02mEAUZHmm;mflqozwmm;mmfiuzmmm».mHAUZHmu?mmSDZHmm;mHJDZMmm?m$402Mmm?mmADZwmm;
`
`n;a.»53$;Eeogfiom
`
`mm»may«wanna:
`
`E.E8323
`
`
`
`ozmm.»Sages
`
`“upat,Emma?”
`
`
`
`ME,ME,$83.8
`
`an.H;fimfigs
`
`at.myanammzw
`
`
`
`mu»WE,553m
`
`ma.
`
`.55again
`
`3%555£232.:
`
`EuIan
`
`gag«Judo513am
`
`.33
`
`again—mm8mm
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`F
`
`1
`
`00
`
`63a
`
`US 7,333,798 B2
`
`9,ceramic?
`
`m538.0%
`
`m5:38:03550m85
`
`goumgm3.55035m8309
`
`matomL\2HomCOHwoofim
`
`./Ewsfiam
`
`92%£20
`
`
`
`%m2Iv8:89:85Mgumwumgfi
`
`.H
`
`cm.UE
`
`030805
`
`mammcom
`
`8qu
`
`
`
`
`
`
`

`

`US 7,333,798 B2
`
`1
`TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the field of
`telephone communication systems in penal institutions or
`similar facilities. In particular, the present invention relates
`to a computer-based telecommunication system with the
`capacity to allow an institution to control, record, monitor,
`and report usage and access to a telephone network.
`
`BACKGROUND OF THE PRESENT
`INVENTION
`
`Generally, the need to monitor, control, record and pro-
`vide detailed records of the usage of a telephone system in
`a controlled institutional environment is well recognized. It
`is common to utilize a controlled telephone system capable
`of monitoring outgoing telephone connections in many
`types of institutional environments, such as, but not limited
`to, penal institutions, military institutions, hospitals, schools,
`businesses, or specific types of government institutions. The
`reasons for monitoring and controlling institutional tele-
`phone systems are evident. To prevent such institutions from
`incurring unaccountable telephone costs,
`the institutions
`must either restrict access to outbound telephone lines or
`employ a telephone monitoring system to charge the respon-
`sible party for making the outbound communication. Oth-
`erwise, unaccountable telephone costs would severally
`hinder the availability of the telephone systems in institu-
`tions.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Therefore, it is imperative for many institutions to utilize
`a communication system that provides an accurate identifi-
`cation means for administrators to determine the individual
`
`35
`
`responsible for each outbound telephone call. A communi-
`cation system must also provide a monitoring means for
`maintaining a useful record of the communication. Addi-
`tionally,
`the system may include a means for restricting
`access or a means for providing options to particular users.
`Considering the number of users in a large institution,
`different payment methods available, and the excessive call
`volume at many institutions, it is evident that an effective
`telephone management system is essential.
`Providing telephone systems in specific types of highly
`restricted institutions, such as in penal institutions, results in
`the consideration of numerous additional complicating fac-
`tors. Generally, outbound communication means in penal
`institutions are heavily regulated by the government. There-
`fore, communication systems implemented in penal institu-
`tions or similar facilities must meet greater security require-
`ments often mandated by regulatory bodies affiliated with
`the county, state, or federal institution. Thus, the communi-
`cation system used in a regulated institution must employ
`unique functions often unnecessary in other types of insti-
`tutions.
`
`In its most general form, a penal institution’s telephone
`system utilizes a call processor to approve and place a call,
`surveillance equipment or monitoring equipment, and a
`recording device for evidencing the conversation. Generally,
`these simple systems are not equipped to restrict an inmate
`from calling any individual. However, it is preferable for the
`call system devices now employed in such institutions to
`have the capability to thwart an inmate from calling certain
`specific individuals or types of individuals. Without the
`necessary constraints on an inmate’s use of the telephone
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`inmates have often harassed outside parties or
`system,
`individuals. For example, it is generally preferred that an
`inmate should not be able to place a telephone call to the
`prosecutor who prosecuted the inmate’s case or another
`attorney responsible for the sentencing of the inmate. In
`another example,
`it may be preferred that an inmate be
`prevented from contacting the victim of the inmate’s crime
`or witnesses from the inmate’s case.
`It has also been
`
`documented that inmates have used previous penal institu-
`tion call systems to perpetrate additional criminal activities
`such as fraudulent schemes or specific criminal conspiracies.
`Specifically, inmates have been known to arrange credit card
`fraud attempts, the smuggling of contraband into the facility,
`and have even been known to arrange escape attempts over
`the penal
`institution’s telephone system. Therefore,
`it
`is
`critical in an efficient penal institution to carefully monitor
`all outgoing telephone calls making a regulated penal insti-
`tution telephone system a necessity.
`Another concern in implementing an efficient institution
`telephone system is cost control. In order for a system to be
`cost effective the system must critically monitor and record
`the activities of each individual user to properly charge each
`individual caller for his or her outgoing calls. Typically,
`telephone communication systems in penal institutions pro-
`vide an inmate with a telephone account upon arrival. Each
`individual receives an account number. There are several
`
`options for an inmate to select with respect to payment on
`the account. For example, an inmate may place prior per-
`sonal earnings into the account. The cost of each call is then
`deducted from the total amount in the inmate’s account until
`
`no balance remains. The inmate may choose to utilize collect
`call means. In addition, or alternatively, an inmate may be
`assigned a commissary account, where funds are added to
`the account based on work performed by the inmate. As the
`funds increase, the inmate may apply these funds to the cost
`of placing telephone calls. The inmate debit account may be
`located onsite, at a central office facility, or at a third-party
`site.
`
`The inmate debit account may alternatively be controlled
`by the inmate’s family. For example, the inmate’s family
`may control the inmate’s access to the debit account either
`remotely (e.g., by using the Internet, accessing a toll-free/
`pay to dial telephone number, using a mail form, etc.) or by
`visiting the prison facility. The inmate’s family may add
`funds to the debit account and thereby control
`the call
`volume allowed to the inmate.
`
`Another requirement of a secure telephone management
`system in a penal institution is the accurate identification of
`the telephone call participants. Generally, it is common in a
`penal institution to assign each inmate a personal identifi-
`cation number (PIN). When an inmate attempts to place a
`telephone call, the inmate must supply a valid PIN to gain
`access to the telephone system. However, a primary problem
`with this identification method is the ease of obtaining
`another inmate’s PIN. For example, individuals who com-
`monly forget their PIN may write it down, increasing the
`possibility that an unauthorized individual will view the PIN
`and use it. In addition, if a PIN number is compromised and
`utilized by an unauthorized inmate, the unauthorized inmate
`may then be able to call certain individuals who are
`restricted to that inmate, since the unauthorized inmate is no
`longer using the proper PIN associated with that inmate. In
`known systems, the PIN identification method is incapable
`of verifying that the individual who supplies the PIN is the
`actual specified inmate. Some systems have attempted to
`improve security by requiring the use of a debit card in
`conjunction with a PIN. The use of the debit card will only
`
`

`

`US 7,333,798 B2
`
`3
`allow access to an inmate’s account if the correct associated
`
`PIN is supplied. This method, however, provides only mini-
`mal additional protection because a debit card and its
`associated PIN can often, with or without force, easily be
`taken from another inmate, or given to another inmate,
`especially in the violent atmosphere of a penal institution.
`For example, one inmate may threaten another inmate in
`order to obtain such information. Alternatively, one inmate
`may provide certain services in exchange for the use of
`another inmate’s telephone privileges. The possibility that
`two inmates will exchange accounts also exists,
`thereby
`allowing them to contact people that would normally be
`restricted to them.
`
`Further attempts to obviate security concerns include
`requiring personal information, in addition to a PIN, to be
`supplied by the inmate/user. For example, a user might be
`prompted to supply a PIN as well as certain information that
`may only be known to the user. A common example is a
`request by the call system to provide their mother’s maiden
`name. This provides an additional security measure, but
`again is minimally secure because such information can
`easily be obtained in a correctional facility. It would there-
`fore be desirable to develop a telephone management system
`that incorporates an improved method of identification and/
`or verification.
`
`Another required feature of a telephone management
`system for a penal institution or similar facility is a means
`for restricting calls placed by a user (e.g., an inmate). It is
`well documented that inmates often try to harass individuals
`related to their arrest or confinement, such as judges, pros-
`ecutors or witnesses, etc., through telephonic communica-
`tions. Penal institutions have attempted to prevent this by
`restricting the telephone numbers each inmate is able to
`access. For example, a system may utilize a PIN or other
`identification means to access a list of telephone numbers
`that the inmate may not call, or alternatively, the system may
`access a list of numbers that the inmate is authorized to
`
`the numbers
`the inmate can only call
`to (i.e.,
`connect
`appearing on the list). Telephone numbers placed on the
`restricted list can include any individual related to the
`conviction (e.g., the arresting police officer, the prosecuting
`attorney, etc.), while telephone numbers placed on the
`permitted list may be, for example, close family relatives.
`The system may also limit the amount of time each inmate/
`user is permitted to conduct each outbound telephone call
`through the system. Furthermore, restrictions may be regu-
`larly updated. For example, if an inmate misbehaves, the
`inmate’s telephone privileges may be further limited or
`revoked completely.
`Penal institutions are also concerned with monitoring the
`activities and communications of inmates. Monitoring tele-
`phone activities is necessary to restrict connections to illegal
`activities outside of the institution.
`
`Three existing types of call monitoring techniques are
`known in the art. The first technique is live monitoring. Live
`monitoring requires an operator or other individual to listen
`to each telephone call and alert the proper authorities if
`necessary.
`The second type of monitoring involves recording the
`telephone conversation via a common recording device. A
`common example of this is a recording device such as a
`magnetic tape drive. This type of monitoring may be con-
`tinuous or intermittent depending on the degree of security
`required for each inmate.
`The third type of monitoring is known as passive moni-
`toring. Passive monitoring may be activated when certain
`keywords are spoken. In addition, passive monitoring may
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`be activated if the telephone call at the termination end is
`transferred to a third party via certain known detection
`means such as “click and pop” detection, etc.
`Penal institutions currently record most inmate telephone
`calls, with the exception of lawyer-inmate communications
`which are generally prohibited by law. Typically in the art,
`monitoring may occur using any combination of the three
`methods (e.g., live monitoring, electronic recording moni-
`toring, or passive monitoring). However, it would be desir-
`able for a telephone management system to embody a means
`for determining which level of telephone monitoring should
`be employed for each telephone call. For example, it would
`be advantageous to flag certain individuals in an inmate’s
`profile as highly suspicious. If the inmate initiates commu-
`nication with the flagged individual, the system will alert a
`live operator to monitor the system. In such a system it is
`essential that the system correctly identify the called indi-
`vidual to avoid unnecessary expenditure of live operators.
`Alternatively, the inmate telephone call system may uti-
`lize a remote alert notification system wherein the system
`contacts an operator when a violation has occurred. The
`system may contact the operator utilizing telephone means,
`paging means, etc. This notification system may be set to
`call the operator a limited number of times or until the alert
`has been noted in the inmate telephone call system. The
`operator may then access information about
`the alert
`remotely using the telephone, Internet, or any other such
`remote access means.
`
`In order to alleviate some of the problems and concerns
`discussed herein, many penal institutions have implemented
`certain task-specific advanced systems. Generally,
`these
`“advanced” systems known in the art comprise several
`features.
`
`For example, it is known in current systems to employ
`permanent call blocking. Specifically, it is known in the art
`to block an inmate or group of inmates from dialing certain
`telephone numbers. Most systems also prevent inmates from
`talking directly to live operators. This prevents inmates from
`requesting that the operator forward a call or provide addi-
`tional telephone numbers allowing the inmates to harass or
`locate additional parties. Furthermore, current systems block
`“1-800,” “1-900” and other like telephone numbers includ-
`ing toll-free and pay-to-dial telephone numbers. In addition
`certain institutions may elect to block country codes, spe-
`cific area codes, or other third-party numbers.
`Current systems known in the art may also utilize a
`feature commonly referred to as “selective” call blocking.
`As discussed, “selective” call blocking may be employed to
`thwart
`inmates from establishing a connection with a
`selected group of individuals (i.e., with the home telephone
`of prison guards, wardens, indictment witnesses, trial wit-
`nesses, police officers, judges, etc.). It is also foreseeable
`that the telephone numbers of the family members of these
`specific individuals may also be blocked.
`Some current systems also limit
`the use of specific
`long-distance carriers. This feature proves useful in limiting
`unnecessary costs incurred by employing alternating carri-
`ers.
`
`systems utilize features commonly
`current
`Several
`referred to as “flash hook” prevention or “click” and “pop”
`prevention modes. These systems prevent
`inmates from
`extending the current outgoing telephone call and entering a
`new telephone call with a new number without fully termi-
`nating the original telephone call. For example, this prevents
`an inmate from utilizing common call forwarding features
`and the like.
`
`

`

`US 7,333,798 B2
`
`5
`In addition, some current institutional telephone systems
`electronically or manually disable the keypad after a tele-
`phone number is dialed and the telephone call is connected.
`This feature prevents inmates from interacting with tele-
`phone games and lotteries, and in certain older systems,
`prevents the inmate from achieving an unrestricted dial tone.
`Another common feature employed by institutional sys-
`tems is three-way call prevention. This feature prevents an
`inmate from instructing the called party to bridge the tele-
`phone call to another telephone number.
`Other known systems in the art may exhibit other regu-
`latory features. For example, generally, telephone commu-
`nication systems allow an institution to limit the duration of
`a telephone call and/or to limit the cost of the telephone call.
`These types of features further allow a facility to customize
`the telephone call systems thereby preventing unrecoverable
`expenditures.
`institution telephone
`Another control used by current
`systems is the use of certain aspects of biometric recognition
`for the identification of users or inmates (i.e., the calling
`party). However, systems known in the art have only used
`biometrics to a limited extent. It is highly beneficial for
`communication systems in penal institutions to incorporate
`biometrics as an additional security device. Biometric rec-
`ognition is commonly available in a number of fields. For
`example, biometrics recognition has found a number of
`security uses, including common usage, in credit card sys-
`tems and building security systems. Biometric information
`includes fingerprints, hand geometry, voiceprints, retinal
`patterns, iris scans, signatures, infrared facial patterns, and
`all other sources which constitute unique physiological
`characteristics and which can assist in establishing a per-
`son’s identity. Various devices exist which can scan one or
`more biometric characteristics and digitize the information.
`The features discussed herein are present in several prior
`art references. For example, Hird, et al. U.S. Pat. No.
`4,890,317 disc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket