`
`(12)
`
`United States Patent
`Hodge
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,333,798 B2
`Feb. 19, 2008
`
`(54) TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`75
`(
`)
`
`_
`Inventor‘ Stephen Lee Hodge’ Aubrey’ TX (Us)
`
`7/1999 Baker et a1. ......... .. 379/26502
`5,923,746 A *
`8/1999 Richardson et a1.
`379/88.26
`5,943,403 A *
`7/2000 Kennedy e161. .......... .. 380/247
`6,084,967 A *
`8/2000 Baumann
`455/410
`6,104,922 A *
`6,182,221 B1* 1/2001 Hsu et a1.
`713/186
`6,213,391 B1 *
`4/2001 Lewis
`235/380
`
`.
`.
`.
`(73) Asslgnee: Value Added commumcatlons’ Inc"
`Plano’ TX (Us)
`
`6,219,439 B1* 4/2001 B
`6,282,566 Bl* 8/2001 Leggstral. ....... ..
`6,377,699 Bl* 4/2002 Musgrave e161.
`
`382/115
`709/217
`382/117
`
`*
`
`_
`) Nome?
`
`(
`
`_
`_
`_
`_
`SubJect to any (1150121111169 the term Ofthls
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 442 days.
`
`(21) Appl. NO.Z 10/215,367
`
`(22) Filed;
`
`Aug 8, 2002
`
`(65)
`
`Prior Publication Data
`
`US 2004/0029564 A1
`
`Feb. 12, 2004
`
`(51) Int. Cl.
`(2006.01)
`H04Q 7/20
`(52) us. Cl. ................. .. 455/411;455/410;379/93.02;
`379/14205
`(58) Field of Classi?cation Search .............. .. 455/410,
`455/411, 563, 405, 406, 555, 560, 414.1,
`455/445, 55; 379/ 88.19, 8802, 114-03, 265-01,
`379/ 142.1, 142.2, 142.05, 142.06, 93.02;
`726/5; 713/169, 202; 380/247; 235/379
`See application ?le for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`i i
`
`’
`’
`5,485,507 A *
`5,502,759 A *
`
`greePd
`arm ge’
`1/1996 Brown et a1.
`3/1996 Cheng e161.
`
`"""""" " 37495/
`"
`
`.. 379/8808
`.. 379/8802
`
`5,655,013 A *
`
`8/1997 Gainsboro . . . . . .
`
`. . . .. 379/188
`
`5,717,743 A *
`
`2/1998 McMahan et a1. ........ .. 379/188
`
`6,389,397 B1 *
`5/2002 Otto ...................... .. 704/270
`6,668,045 Bl* 12/2003 Mow ....... ..
`379/8819
`6,687,733 B2 *
`2/2004 Manukyan .
`..... .. 709/200
`6,819,219 Bl* 11/2004 Bolle e161. .............. .. 340/552
`6,836,556 B1* 12/2004 Bromba et a1. ........... .. 382/124
`6,950,508 B1* 9/2005 Grii?ths ......... ..
`.. 379/201.01
`2002/0042879 A1* 4/2002 Gould et a1.
`.... .. 713/176
`2002/0177433 Al* 11/2002 Bravo e161. .............. .. 455/411
`
`FOREIGN PATENT DOCUMENTS
`2 148 569 A * 5/1985
`
`GB
`
`* cited by examiner
`.
`.
`.
`Przmar Exammerilean Gelm
`.
`y
`_
`(74)’4’wmey’Agw” "r Flrmiward‘g‘ Ohvo
`(57)
`ABSTRACT
`
`A secure telephone call management system is provided for
`authenticating users of a telephone system in an institutional
`facility. Authentication of the users of the telephone call
`management system is accomplished by using a personal
`identi?cation number, biometric means, and/or radio fre
`quency means. The secure telephone call management sys
`tem includes accounting software capable of limiting access
`to the system based on funds in a user’s account or other
`related limitations. The system includes management soft
`Ware capable of implementing Widespread or local changes
`to the system and is further capable of modifying or setting
`b
`f
`t
`t
`any Hum er 0 user accoun Parame ers'
`
`5 Claims, 36 Drawing Sheets
`
`Trunk Lines
`
`<—111
`
`“)5
`Electronic
`\ Switchboard
`Device
`
`Audio
`“7* Recorder
`
`I
`“Sgseml
`/
`Serial
`
`Central
`Site Server
`T
`
`i
`l
`Y
`Biometric @Lf?ill RF Transmitter
`
`113
`
`109
`
`107
`
`108
`
`101 /'
`
`Admin.
`
`4120
`
`Workstation
`
`Shadow
`Workstation
`
`+123
`
`.
`.
`Investigatwe <_
`Workstation
`‘25
`
`CMS (WAN)
`
`GTL 1005
`IPR of U.S. Pat. No. 7,529,357
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheetlrof36
`
`US 7,333,798 B2
`
`“Sammie?
`
`coumumviogstow8mm
`
`
`_.mmfilvgofimnfim—flH—=ooEEommN
`
`
`
`u.u>§wumo>£.m
`cosmpmfiogWofilvM
`
`dag
`
`:TvmafiaMESH
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 2 0f 36
`
`US 7,333,798 B2
`
`
`
`DMU Alllmmw
`
`
`
`V/QN TFUA
`
`k F 3‘ EN M8
`
`020 0%! Eu; 5 mUQ
`
`mHQ /
`UHF TEN ‘A _
`>\:~ ) ea /
`
`mmU :N
`
`
`
`62-09 0.6 “Era Iuwu
`
`2a SN Ely. u: Em
`
`_ mom
`2: %
`
`+ >\
`
`zzé 1'
`56E n2 Ema
`
`
`
`
`
` mam P RN Almom
`
`_ 5m \ 88>
`
`@325
`
`mi Ma
`
`N .U?m
`
`:_ _
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 3 of 36
`
`US 7,333,798 B2
`
`
`
`lelv
`
`nmm
`
`l
`
`UmUSN05
`
`
`
`mmm.fimm
`
`m:
`
`QZm
`
`3i3mc2m:
`
`.095gm
`
`6x
`
`$3..
`
`AOZEZOUwN
`
`.UOMA
`
`.MQQ<
`
`HQOUHQ
`
`:m
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 4 0f 36
`
`US 7,333,798 B2
`
`.UOME
`
`HZOH
`
`HQOUEQ
`
`2cm
`
`25¢
`
`mow k @omb
`
`Fmw
`
`ZTMQZTP
`
`mmw
`
`‘I 5
`
`wow wow
`
`
`
`.2200 I4 @785
`
`All h;
`
`
`
`pi; mow
`
`0%
`U
`
`
`
`U.S. Patent
`
`Feb.19,2008
`
`Sheet5 0f36
`
`US 7,333,798 B2
`
`Omaha—22m
`
`mHZZAaw
`
`”you—<72vuUhOhmHMOL Sm
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 6 0f 36
`
`US 7,333,798 B2
`
`0mm |' Min
`
`F ME
`
`w .Uwm
`
`Em
`
`m8 $53
`
`35200
`
`" wmam m
`
`
`@ @ wmDm
`.oizou ‘ - $2.122:
`
`53722 2.2 @EEw
`
`new
`
`hwi
`
`m2
`
`M5350”;
`qomhzou as
`
`Sm
`
`\
`
`wwam
`
`mow
`
`\ VEQBEZ
`HV F
`ZHmm
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 7 0f 36
`
`US 7,333,798 B2
`
`mow \ll'
`
`
`
`HMOm 03H.
`
`Min +
`
`mow
`
`.
`
`N
`
`
`
`E502 MES
`
`$5502
`
`5“ - Sou 12mm
`
`
`which
`
`DOG
`
`.06”:
`
`SEE
`
`20%
`
`in
`
`P95 3
`
`II_
`
`In
`
`:00
`
`tn
`
`
`
`W55» Sou
`
`we“
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet8 0f36
`
`US 7,333,798 B2
`
`_Ev.UOMm
`
`HU~O>
`
`5956
`
`an“:
`
`><-m<
`
`vwmm
`
`FaggomuAImom
`
`”Hm—”EDM—Onflm2w
`
`mom
`
`
`
`093w
`
`F5252
`
`cm:
`
`Eém
`
`<H<Q
`
`w.UE
`
`
`
`lm;
`
`
`
`Joann/HODA<UOA
`
`mmDm
`
`3%
`
`......................................................................................................................................................................................................................................................................................................................................................................................................................................
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 9 0f 36
`
`US 7,333,798 B2
`
`Rom 1|‘ PMAwD
`
`_ 2552
`/
`@oo
`
`20
`
`wmxuiram
`
`
`
`MAD HEHH
`
`, 03H
`
`E15 Q Eon
`
`So I"
`
`
`
`Sou ‘Zn-mm
`
`which
`
`NJUM
`
`:0
`
`so.
`
`00w
`
`m5
`
`PMOMEOU
`
`OED
`
`mom
`
`605
`
`2E2
`
`2oz
`
`E3
`|_
`
`1:63
`
`155200
`
`wmam
`
`@ .UE
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 10 0f 36
`
`US 7,333,798 B2
`
`S2 1/
`
`coo“
`
`H 2:
`
`moi
`
`moi
`
`:2
`
`m2:
`
`
`
`U.S. Patent
`U.S. Patent
`
`be
`Feb. 19, 2008
`w
`
`F5:
`
`5:
`
`mo:
`
`.xx»:
`
`
`
`.M43,m‘n.,..‘1,4,2”;
`
`co:
`
`63f011t
`Sheet 11 0f 36
`hS
`
`w8:
`
`we:
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`3.3%a.
`
`pmI
`
`:dam
`
`m8:9.mt.
` ;.LkL.IImime-J?3.3.3...5—,.”4
`
`.Eywhw..gm...xii;:fin$3.3“.
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 12 of 36
`
`US 7,333,798 B2
`
`[\
`
`8
`
`mos,.mV.n...,.,.1......l;§ii-¥rhr»£-i
`
`
` iE.§r{ilv{f
`
`,1._,...mg.............:ilii--lai.LVi,iylbfimm_%E-i
`
`
`
`
`
`.1111}!S'll,l.§1|7)l..in.r|..Ti;E1|!.~..lu.|Ifrilllfrllllllllll‘illl.all-1|.-II‘D
`wag..nu.mg.—“gainW38
`.A.1.3$13!.(Iii:1:41;.,.a.|l|il.l‘5lr(i!(|l1lxdIIIIIJIP2.31)..Ewas.“3Eng
`
`
`
`
`
`NM.Ufim
`
`TA2..“
`
`mymag
`
`sii‘?tllll
`
`
`
`
`......:.iLrIrllll.‘..l.lc1“vqlusrf5c.slnriiulrx|l§lrlfl.[illiil{riff-la:mumg:m53mfimEmaa
`
`
`
`.i.+.;.i.....:.r§r.e:21.55.3391.5591.119.1=e.:e,.§,..¢<..5.é!.b,r,512::6:4E,””in.“
`.:.¢|i.....l3..rllvltull..r.o¢.._Di..l..l,_i.tl.£lvull.l3.“.Em”a?iwflwfili
`,2:.:1mill...
`
`
`
`gamma”.mgfiwsfiafi
`$5.5mflwmEB_
`
`I!V.Z.,J.|il.|.|i~l..|‘ml|l€lr\1
`
`_..3:11.1141:2.:.§.,..,..,K.i.§r33.1...
`
` . 'rg‘vg—firzrm,,3".
`.
`,
`
`3‘-F
`,» 522-}?.21“?
`
`
`
`.féwfiazaamw::fiyw?imfixfiawmfl_
`
`wafizmfimvxSEES.”wan—£133».u.,
`
`
`
`
`
`
`
`
`
`SEom“oomfi
`
`momfi1/
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 13 0f 36
`
`US 7,333,798 B2
`
`Q02
`
`22
`
`2 .UHH
`
`:2
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 14 0f 36
`
`US 7,333,798 B2
`
`w T1 m2;
`
`hymn-“331.05 uni
`
`
`
`
`
`(Lani-r 15!: ii;
`
`No:
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 15 0f 36
`
`US 7,333,798 B2
`
`.n
`
`Mn.» .
`
`£2 a“ 3 w
`
`.w}. ‘M
`
`.
`
`
`
`m‘ , . Q2 .
`
`q .
`
`.
`
`:2 in .w 7 u. 1
`
`$2 ,. 3
`
`$2 .
`
`_ 3
`
`q.
`
`
`
`3. pr X _
`
`.
`
`_. , , M F 3 w
`
`w s. . .. 3
`
`22 .3 . i ???m
`
`
`
`, _ E. s .3
`
`
`
` . .G q 33.. 3...
`
`
`
`
`
`
`
`. all 11:012. ii
`
`.gmg?
`
`
`
`. Ur ml‘ ,mtlialllla vvlfai‘lvnlill
`
`
`
`
`
`22 Q: :2
`
`mo:
`
`mo:
`
`002
`
`
`
`In; .UFH
`
`a2
`
`om:
`
`m8 @315
`
`mo:
`
`52
`
`\ m5
`
`/ 82
`
`/ mm:
`
`5.2
`
`mm:
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet16 0f36
`
`US 7,333,798 B2
`
`
`
`
`.1ll.75154111111!trlri15...:-
`.1111511
`
`”my«2,«my.-moJ.oz”.
`
`33%
`
`“or
`
`«.3.
`
`an}
`
`um}
`
`
`.311MHW.HM.H#..11.2.1hm}.
`mm}want
`3%mm?oz
`no}.no}02
`
`”war“
`
`
`
`1mg,Amman.
`
`3}an}02
`
`an}no}.02.
`
`
`
`mvfi,mvmwm
`
`83
`
`:3
`
`82
`
`002
`
`
`
`
`
`.33%.:Em.occsum_mh.u_m_=31
`
`+82
`
`111Flt-11.1.5
`£23:m111
`
`am}NSmmummnm
`
`
`
`.l...|.l|..lililll|zlitlkt
`
`3}mommmowmnm
`
`
`1”}.quSmmmomwnmtf.
`may“;mNN_.5mmB111.
`.1011’1‘1111111!II:1,
`
`infllis
`
`3;,Hm,r530.3
`all8}.mNPBmmmmm
`
`8}WmEmmmmmnm
`
`we,38538
`
`”myREES
`
`mew:
`
`22
`
`:2
`
`SS
`
`22
`
`mmww
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`29,1b.eF
`Feb. 19, 2008
`
`Sheet 17 0f 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`0a,1
`
`
`
` .m22.3%W.23%MWW26mm”.U98%w.wEggmayEggm.$33w3.8%w.egg.
`
`«2933 E}.Is\l4.ll§§irlifil
`
`Wm
`
`Nmmmfimr
`
`w£$fi£mmfigm
`
`5555
`
`=3.me
`
`S.Umm
`
` ma.
`
`ritiifisafiflnxlilslill‘llii.u...3...(Xr}
`
`
`.xizlvit;).3.le.if:!flllz...liarutniii
`
`no:
`
`
`
`2: :: mo: no: mo: mo: 5: /
`
`mo:mo:5:/
`
`co:
`
`3w 5: i E
`
`3233icmin.U3....3.
`
`1.!
`
`
`
`ti
`(Lt-1‘
`
`am3.3
`@gg Hg
`
`
`
`magma.ammwfignm
`
`ommwfimw
`
`.wmqmuumr
`
`wmfifimw
`
`“m“wtm.
`
`$5me
`
`3meme
`
`mmwfimr
`
`
`
`
`
`.mrwmmhfimmU...hmmmpfimmwfianmpmtmmm
`
`
`
`
`
`U.3.”me.prhmmwfimm
`
`h.“£mea.53533p:53.fifimfifism
`
`
`
`Emma.fififlusm
`
`mwfimpfi
`
`w x $4
`
`m3Q
`
`N.
`
`mu5E.2BEES
`
`£35:
`
`Egg
`
`Manama
`
`33
`
`Es
`
`$35
`
`35
`
`$03
`
`mg1
`
`nu.
`
`an.
`
`anmEu.
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 18 0f 36
`
`US 7,333,798 B2
`
`w 2, 5m»
`
`n
`
`Ewgmzm N:
`
`2 .UFH
`
`
`
`2M: 5: :M: :2 32: SE 8M: % 2: 52
`
`
`
`
`
`8M:
`
`girl-Iii:
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 19 0f 36
`Sheet19 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`moi
`mama
`
`002
`oomfi
`
`S9
`Mama
`
`w
`
`
`
`v3.2.5.) 1!!
`
`a.03
`a .UE
`
`LE: ED.
`
`
`
`
`
`“haiku—H.mfi.m..:=—u:mm*flfin:fl1In
`
`
`
`U.S. Patent
`
`Feb.19,2008
`
`Sheet20 0f36
`
`US 7,333,798 B2
`
`
`
`xlrtrxlif
`
`“gnaw—3a.¥—3_mu..n>vmwI«.
`
`cm.UE—
`
`mmommmow
`
`28:238
`
`moon
`
`
`
`
`U.S. Patent
`
`9a1
`
`12teehS
`
`US 7,333,798 B2
`
`
`
`
`
`b.cBEoELga—tou3233.0.333253.9clamR33.3.:23:39aogfiL9E380gfinumamm333.5
`
`
`
`
`
`
`
`89339mm0€333»NLa...333399$..
`
`rm...L
`
`
`
`Eafifiifiud.%3:33...."aaflmES3:.cfiEnu.”3333:8£3me
`
`3.23.33anms32:3322:3Emnsmfi
`
`
`
`
`
`mm;asxufin23:33.2:39%323:5...€99onmagnum,.
`
`35.3.2%3333333.30$.23:38_
`
`
`
`
`
`335mcaEunas.33:0:BEaG..
`
`cfiEoELmano39«33“gm332mman:
`
`
`
`23:ENDED“.5.
`
`
`
`mIMWD1530mm
`
`
`
`,£033.3mfinuwe:m5.£.££Enu3.3333clam.
`
`
`
`
`
`
`
`EEE.._.,1ENE;
`8a8:v/.
`
`
`
`.303.2.a».3
`
`
`
`003.
`
`
`
`
`
`
`
`.3§¥$Em££§ufllumb«33331.39.£155.:NIKE»?!1..£112....«Itiva’Iim51?up???.r.fcéc.fiufrw.ltp9......
`
`
`
`
`
`
`
`SHN
`
`new
`
`003
`
`:5
`
`mZN
`
`95
`
`HN.Umm
`
`
`
`
`U.S. Patent
`
`mF
`
`US 7,333,798 B2
`
`m3%m83
`
`M8%
`
`
`
`
`
`wUEEMnE,.
`
`NN.Umm
`
`nghagE23@255
`
`3mm
`
`
`
`U.S. Patent
`
`Feb.19,2008
`
`Sheet23 0f36
`
`US 7,333,798 B2
`
`
`
`wig$3mi.fix»...
`
`Tn.
`
`12.1.1.._.%.......,.....13.1.1.wtnfifimma.
`
`
`
`
`
`
`
`.1.151:1...g§g1.zv??ig“5....in:J‘»...«.49..1......12.:
`
`i5...»...uhvkl.1d1.1.9..
`
`
`.mamrvaaxww:,JAMW.,s...41t.I....(:1...
`.1$113.11!
`
`
`
`00mm
`
`Hmmm
`
`memm
`
`Memmmfimmnfimm
`
`3.Umm
`
`nemm
`
`QOMNkmfimm
`
`
`
`
`
`U.S. Patent
`
`Feb.19,2008
`
`Sheet24 0f36
`
`US 7,333,798 B2
`
`#Nwm
`
`mmvm
`
`mmwm
`
`nmvm
`
`
`
` r.,‘.rfilwsflg.u
`
`vm.UHm
`
`
`
`éflm‘wflw..
`
`33.3%flag.3
`
`oovm
`
`mmwm
`
`mfivm
`
`Hmfim
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 25 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`mafia.”mam.1mm$.93.an
`
`
`
`
`
`
`
`
`.“Ngislt$r$Exit...Ti...l;.....ila§.§.5§>5......»I...r....13.}...25.....6...........3...!.1...
`
`
`
`
`
`
`..‘...I.ll|ll.l.ittill).iilrilv.).(15.1.!.1.l..Ii..§Ili.l.\.€lr.1|.1.l.-ilv.l.ll.u33131.1.x\L...gamma“..
`
`..Hmm-Earn._1.1.1..a..a....zI..1.
`_..Nmm#83?
`
`
`.11....11:.LL..|..$1.1...ILlill.l...l.|{.LLKIIEE.Eybxerbtlili...ilk-l
`MNBdmmnw.
`311$}.Il.4ll.(.{f...(.lt...5..!.$.ix?-\e)..isia..\.§....l.vltlt§llnlrL1..
`
`
`.11I;...5511.ling»!!!1......I..|r.I..916.i.
`
`
`
`III-ELEIIII.1.....SL11-aix9.275-5.1r.1.¥:.ili.x.§lt.s.}lra<bL;{51.5.....i...M..Emma”.
`
`
`
`........~».n.p:.41...».....
`
`mm.Umm
`
`.Bdme
`
`....
`
`
`
`
`
`
`
`.irriiirll‘iiléifblltt.lilriiz.‘.3.six‘avilIalio.g...32.2.!Stilt.1.\.01.5.3!ital........izsrilf...‘.....i.21l..lwlta5.
`
`
`,amm.3...»
`
`
`
`.i..l;.l_lvl...1.5.2.1)...2-3.3.1.}...533......5.331.!!!.II..321....(...
`
`
`
`2..i..fataabgirilxnhixfiai.1.)}.1-T...
`
`
`
`
`
`
`
`..1..............................a.1.1..«311.4...E3.3.31.2...
`
`.mmawmha.
`.$ENE
`
`:12.--£45..
`mmfimk...
`..If...)5....)1:34.111...momma
`
`
`
`.31...u....fv...11:A
`Bmmfi
`Eda”...
`
`8..figwwmfi
`
`8mm
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 26 of 36
`
`US 7,333,798 B2
`
`:3!!!)
`
`
`3{1.113.}...flyk.z..i§l.l%Tul‘fll
`[33Emma,Qua”
`
`.23BEE
`
`.23has?8.33
`
`
`
`.35Emma“.3.3mm
`
`$3BE?88a:1...x$:!rr1¥..l+!;.;:!1..I!k5!);
`
`
`
`8 .m..33E5983ml“;
`
`w.
`«$14,454:. w
`
`.wm;
`
`'
`
`..
`
`x3
`
`n1.«-.‘.x“~‘r-.M,u.
`
`
`
`303598.x.4...:v..2:.lll.|)l.-|.I:nvi.\llv£l.l.vul.l{I33.
`42..4.....
`
`
`
`II‘l‘lallultit-aaénbt
`
`
`.mmamthmmmfiw.
`.3
`
`Com2mmgcom
`mcm:8$8883888
`
`
`
`
`U.S. Patent
`
`Feb.19,2008
`
`Sheet27 0f36
`
`US 7,333,798 B2
`
`,m...._,
`'7 ‘6'“ \m.
`
`__
`r
`,
`3 ‘ saxwflufiiu.
`
`n
`
`mmdw
`5N.Umm
`
`
`.‘t
`
`
`' «firm 5 ilk-‘35:»WA».EW‘WHF.53?“
`
`50.8monmSum
`
`
`
`
`U.S. Patent
`
`eF
`
`on1
`
`nv1‘
`
`nv
`
`oo
`
`teeh“5
`
`asf0
`
`cu
`
`US 7,333,798 B2
`
`mmmmwm
`km#Nwm
`{KEVJ.av,,..,_hmfimm memm
`
`
`.smwxmw...V
`
`
`é
`
`E
`
`8 f
`
`i
`
`wN.UHm
`
`mmwm
`
`comm
`
`b_wm
`
`oflwm
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 29 of 36
`
`US 7,333,798 B2
`
`2929
`
`FIG.29
`
`2900
`
`2921
`
`2915
`
`2913
`
`2911
`
`2901
`
`
`
`U.S. Patent
`
`01,,
`
`00m
`
`hS
`
`f003t
`
`US 7,333,798 B2
`
`mmmmom
`
`cm.Umm
`
`b.33
`9‘poem
`“wmfiom
`%fifiOm
`
`
`
`
`«mafia—emuIAll!ooom
`
`Hoom
`
`moom
`
`moom
`
`meow
`
`mfiom
`
`hfiom
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 31 of 36
`
`US 7,333,798 B2
`
`,«4.x.
`
`‘.memmmmmra
`
`.w,
`
`_H_m 2.3amine.»
`
`
`
`w.
`
`_qflw§§nfifififi
`.,4m,
`
`in...»
`
`Hm.UHm
`
`“5::
`
`5.92..#5.
`
`oofim
`
`4/8:
`
`Hofim
`
`mofim
`
`mofim
`
`hc_m
`
`
`
`U.S. Patent
`
`Feb
`
`.19,2008
`
`Sheet32 0f36
`
`9US7
`
`333,798 B2
`
`mzfimumfixmhwfl comm
`
`
`
`
`
`050a.«mannammmomomo
`
`
`
`Guamanaghvvvomomo
`
`
`
`hmmstuZHhmM—aNNNomomo
`
`
`
`
`
`mamammHAquflHoaommmo
`
`
`
`moqdbdMoonnadommmo
`
`
`
`MubmaoquHBHoaommmo
`
`
`
`933memoaommmo
`
`mm.0:—
`
`moaommmo
`
`wadommma
`
`.xl;
`
`
`
`
`U.S. Patent
`
`US 7,333,798 B2
`
`JmIA9340AnneuwIA9340DonemmwNHvNNFmAHovcubvuwdooouxma\NHoaaommmoomummumdooowxmd\udmoaommmoomwoovmvdm
`
`
`
`
`
`
`
`
`
`
`
`
`
`13IAA240oouoDDDhmmMDDwmmuhvumd000N\0N\NdNadommma
`1%IdnfldummnaNmmmmomuhmmmnwoumoDooN\m4\4dNNNomomo
`
`
`
`
`CuInAfiduDonaNwmmmomwhmmonwmuvaOODNXmaanHOHOmmmo
`
`
`
`
`
`
`
`
`131HnfldumonoooormmmbovmaumHuMHHDDN\NO\HONadommmo
`
`
`
`
`mulanflduoouoNmmmmomwbmomuwmumoGoowxmdxaaNNNomomo
`00I4AEdUnbouDNmmmmommnm.n¢uDNumoooo~xoaxaammmomomo%I4REDmmnoNmmmmOmNnmmduodnmoOODNxmdxdaNNNomomo
`
`
`
`
`
`
`
`
`
`
`
`
`
`mmIAAflfiucomaNmmmmomunmmwnuvumoooouxnaxadHaaomomo
`
`
`
`
`LuIAAEQUmonoNmmmmomwnmHNummanODDN\M4\NHHoqommmo
`
`
`
`
`kmIdundoAVHHmammmommemmnhmnwoooo~xoaxaaNNNOmomo
`AwIAnadumonooomrmmmrovvonmvumflDoowxmd\wdNoaommmn
`
`
`
`
`.4:.l..£klz::.Ila-3.3.2.115:3:51..1.3.1.... 2mm00mm50mmmemmmomm5mm
`
`
`MIAundo00.0bommmomwbmN4.mm.Haooowxodxaamm¢vm~aa
`
`
`
`
`IdAENUmamaNmmmmowubmnwuumnmoooowxoaxdammmomomo
`
`
`
`
`
`IdAfiduammohommmomthmauvvumaaaa~xmaxaammvwmwaa
`
`
`
`
`I4AfiduDonabommwomthvmummumfloaow\moxaaMvamuaa
`
`
`
`
`
`IAAmduoouoNmmmmomwnmmqnbvnma000N\maxmddoaommmo
`
`
`
`
`undohauoNmmmwomwnmNonmmnmoooow\ndxaaAddomomo
`
`
`
`
`EubauuNmmmmammhmNNHNHumo000N\04\4H«Haemomo
`
`
`
`35......ll:noamnwmommpm$3....anumowxnwx:iaowomd.......:..
`
`
`
`
`
`
`DonaNmmmmommemNanHmDDDDN\04\4HAddomomo
`
`cemm
`
`mm.UHH
`
`
`
`U.S. Patent
`
`Feb.19,2008
`
`Sheet34 0f36
`
`US 7,333,798 B2
`
`
`
`HovM
`
`um.UHm
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 35 of 36
`
`US 7,333,798 B2
`
`“mofiwwam
`
`u:52.3:333_Q:_E.2232:
`
`momm
`
`:mm
`
`3mm
`
`
`
`1/5mm
`
`:HQMNHg
`
`0385.5.8saga-MAImomm
`
`
`
`
`
`3mm
`
`mm.Umm
`
`OBQQRa2535Na
`
`083.53”
`
`oSQflaggflflflfi
`
`9832:.”ACanada.—
`
`095829
`
`8033“.“
`
`SQQERH
`
`
`
`2.fich..923.52823?...BLunch:
`
`mBAOZH
`
`mEAOZM02mEAUZHmm;mflqozwmm;mmfiuzmmm».mHAUZHmu?mmSDZHmm;mHJDZMmm?m$402Mmm?mmADZwmm;
`
`n;a.»53$;Eeogfiom
`
`mm»may«wanna:
`
`E.E8323
`
`
`
`ozmm.»Sages
`
`“upat,Emma?”
`
`
`
`ME,ME,$83.8
`
`an.H;fimfigs
`
`at.myanammzw
`
`
`
`mu»WE,553m
`
`ma.
`
`.55again
`
`3%555£232.:
`
`EuIan
`
`gag«Judo513am
`
`.33
`
`again—mm8mm
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`F
`
`1
`
`00
`
`63a
`
`US 7,333,798 B2
`
`9,ceramic?
`
`m538.0%
`
`m5:38:03550m85
`
`goumgm3.55035m8309
`
`matomL\2HomCOHwoofim
`
`./Ewsfiam
`
`92%£20
`
`
`
`%m2Iv8:89:85Mgumwumgfi
`
`.H
`
`cm.UE
`
`030805
`
`mammcom
`
`8qu
`
`
`
`
`
`
`
`
`US 7,333,798 B2
`
`1
`TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the field of
`telephone communication systems in penal institutions or
`similar facilities. In particular, the present invention relates
`to a computer-based telecommunication system with the
`capacity to allow an institution to control, record, monitor,
`and report usage and access to a telephone network.
`
`BACKGROUND OF THE PRESENT
`INVENTION
`
`Generally, the need to monitor, control, record and pro-
`vide detailed records of the usage of a telephone system in
`a controlled institutional environment is well recognized. It
`is common to utilize a controlled telephone system capable
`of monitoring outgoing telephone connections in many
`types of institutional environments, such as, but not limited
`to, penal institutions, military institutions, hospitals, schools,
`businesses, or specific types of government institutions. The
`reasons for monitoring and controlling institutional tele-
`phone systems are evident. To prevent such institutions from
`incurring unaccountable telephone costs,
`the institutions
`must either restrict access to outbound telephone lines or
`employ a telephone monitoring system to charge the respon-
`sible party for making the outbound communication. Oth-
`erwise, unaccountable telephone costs would severally
`hinder the availability of the telephone systems in institu-
`tions.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Therefore, it is imperative for many institutions to utilize
`a communication system that provides an accurate identifi-
`cation means for administrators to determine the individual
`
`35
`
`responsible for each outbound telephone call. A communi-
`cation system must also provide a monitoring means for
`maintaining a useful record of the communication. Addi-
`tionally,
`the system may include a means for restricting
`access or a means for providing options to particular users.
`Considering the number of users in a large institution,
`different payment methods available, and the excessive call
`volume at many institutions, it is evident that an effective
`telephone management system is essential.
`Providing telephone systems in specific types of highly
`restricted institutions, such as in penal institutions, results in
`the consideration of numerous additional complicating fac-
`tors. Generally, outbound communication means in penal
`institutions are heavily regulated by the government. There-
`fore, communication systems implemented in penal institu-
`tions or similar facilities must meet greater security require-
`ments often mandated by regulatory bodies affiliated with
`the county, state, or federal institution. Thus, the communi-
`cation system used in a regulated institution must employ
`unique functions often unnecessary in other types of insti-
`tutions.
`
`In its most general form, a penal institution’s telephone
`system utilizes a call processor to approve and place a call,
`surveillance equipment or monitoring equipment, and a
`recording device for evidencing the conversation. Generally,
`these simple systems are not equipped to restrict an inmate
`from calling any individual. However, it is preferable for the
`call system devices now employed in such institutions to
`have the capability to thwart an inmate from calling certain
`specific individuals or types of individuals. Without the
`necessary constraints on an inmate’s use of the telephone
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`inmates have often harassed outside parties or
`system,
`individuals. For example, it is generally preferred that an
`inmate should not be able to place a telephone call to the
`prosecutor who prosecuted the inmate’s case or another
`attorney responsible for the sentencing of the inmate. In
`another example,
`it may be preferred that an inmate be
`prevented from contacting the victim of the inmate’s crime
`or witnesses from the inmate’s case.
`It has also been
`
`documented that inmates have used previous penal institu-
`tion call systems to perpetrate additional criminal activities
`such as fraudulent schemes or specific criminal conspiracies.
`Specifically, inmates have been known to arrange credit card
`fraud attempts, the smuggling of contraband into the facility,
`and have even been known to arrange escape attempts over
`the penal
`institution’s telephone system. Therefore,
`it
`is
`critical in an efficient penal institution to carefully monitor
`all outgoing telephone calls making a regulated penal insti-
`tution telephone system a necessity.
`Another concern in implementing an efficient institution
`telephone system is cost control. In order for a system to be
`cost effective the system must critically monitor and record
`the activities of each individual user to properly charge each
`individual caller for his or her outgoing calls. Typically,
`telephone communication systems in penal institutions pro-
`vide an inmate with a telephone account upon arrival. Each
`individual receives an account number. There are several
`
`options for an inmate to select with respect to payment on
`the account. For example, an inmate may place prior per-
`sonal earnings into the account. The cost of each call is then
`deducted from the total amount in the inmate’s account until
`
`no balance remains. The inmate may choose to utilize collect
`call means. In addition, or alternatively, an inmate may be
`assigned a commissary account, where funds are added to
`the account based on work performed by the inmate. As the
`funds increase, the inmate may apply these funds to the cost
`of placing telephone calls. The inmate debit account may be
`located onsite, at a central office facility, or at a third-party
`site.
`
`The inmate debit account may alternatively be controlled
`by the inmate’s family. For example, the inmate’s family
`may control the inmate’s access to the debit account either
`remotely (e.g., by using the Internet, accessing a toll-free/
`pay to dial telephone number, using a mail form, etc.) or by
`visiting the prison facility. The inmate’s family may add
`funds to the debit account and thereby control
`the call
`volume allowed to the inmate.
`
`Another requirement of a secure telephone management
`system in a penal institution is the accurate identification of
`the telephone call participants. Generally, it is common in a
`penal institution to assign each inmate a personal identifi-
`cation number (PIN). When an inmate attempts to place a
`telephone call, the inmate must supply a valid PIN to gain
`access to the telephone system. However, a primary problem
`with this identification method is the ease of obtaining
`another inmate’s PIN. For example, individuals who com-
`monly forget their PIN may write it down, increasing the
`possibility that an unauthorized individual will view the PIN
`and use it. In addition, if a PIN number is compromised and
`utilized by an unauthorized inmate, the unauthorized inmate
`may then be able to call certain individuals who are
`restricted to that inmate, since the unauthorized inmate is no
`longer using the proper PIN associated with that inmate. In
`known systems, the PIN identification method is incapable
`of verifying that the individual who supplies the PIN is the
`actual specified inmate. Some systems have attempted to
`improve security by requiring the use of a debit card in
`conjunction with a PIN. The use of the debit card will only
`
`
`
`US 7,333,798 B2
`
`3
`allow access to an inmate’s account if the correct associated
`
`PIN is supplied. This method, however, provides only mini-
`mal additional protection because a debit card and its
`associated PIN can often, with or without force, easily be
`taken from another inmate, or given to another inmate,
`especially in the violent atmosphere of a penal institution.
`For example, one inmate may threaten another inmate in
`order to obtain such information. Alternatively, one inmate
`may provide certain services in exchange for the use of
`another inmate’s telephone privileges. The possibility that
`two inmates will exchange accounts also exists,
`thereby
`allowing them to contact people that would normally be
`restricted to them.
`
`Further attempts to obviate security concerns include
`requiring personal information, in addition to a PIN, to be
`supplied by the inmate/user. For example, a user might be
`prompted to supply a PIN as well as certain information that
`may only be known to the user. A common example is a
`request by the call system to provide their mother’s maiden
`name. This provides an additional security measure, but
`again is minimally secure because such information can
`easily be obtained in a correctional facility. It would there-
`fore be desirable to develop a telephone management system
`that incorporates an improved method of identification and/
`or verification.
`
`Another required feature of a telephone management
`system for a penal institution or similar facility is a means
`for restricting calls placed by a user (e.g., an inmate). It is
`well documented that inmates often try to harass individuals
`related to their arrest or confinement, such as judges, pros-
`ecutors or witnesses, etc., through telephonic communica-
`tions. Penal institutions have attempted to prevent this by
`restricting the telephone numbers each inmate is able to
`access. For example, a system may utilize a PIN or other
`identification means to access a list of telephone numbers
`that the inmate may not call, or alternatively, the system may
`access a list of numbers that the inmate is authorized to
`
`the numbers
`the inmate can only call
`to (i.e.,
`connect
`appearing on the list). Telephone numbers placed on the
`restricted list can include any individual related to the
`conviction (e.g., the arresting police officer, the prosecuting
`attorney, etc.), while telephone numbers placed on the
`permitted list may be, for example, close family relatives.
`The system may also limit the amount of time each inmate/
`user is permitted to conduct each outbound telephone call
`through the system. Furthermore, restrictions may be regu-
`larly updated. For example, if an inmate misbehaves, the
`inmate’s telephone privileges may be further limited or
`revoked completely.
`Penal institutions are also concerned with monitoring the
`activities and communications of inmates. Monitoring tele-
`phone activities is necessary to restrict connections to illegal
`activities outside of the institution.
`
`Three existing types of call monitoring techniques are
`known in the art. The first technique is live monitoring. Live
`monitoring requires an operator or other individual to listen
`to each telephone call and alert the proper authorities if
`necessary.
`The second type of monitoring involves recording the
`telephone conversation via a common recording device. A
`common example of this is a recording device such as a
`magnetic tape drive. This type of monitoring may be con-
`tinuous or intermittent depending on the degree of security
`required for each inmate.
`The third type of monitoring is known as passive moni-
`toring. Passive monitoring may be activated when certain
`keywords are spoken. In addition, passive monitoring may
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`be activated if the telephone call at the termination end is
`transferred to a third party via certain known detection
`means such as “click and pop” detection, etc.
`Penal institutions currently record most inmate telephone
`calls, with the exception of lawyer-inmate communications
`which are generally prohibited by law. Typically in the art,
`monitoring may occur using any combination of the three
`methods (e.g., live monitoring, electronic recording moni-
`toring, or passive monitoring). However, it would be desir-
`able for a telephone management system to embody a means
`for determining which level of telephone monitoring should
`be employed for each telephone call. For example, it would
`be advantageous to flag certain individuals in an inmate’s
`profile as highly suspicious. If the inmate initiates commu-
`nication with the flagged individual, the system will alert a
`live operator to monitor the system. In such a system it is
`essential that the system correctly identify the called indi-
`vidual to avoid unnecessary expenditure of live operators.
`Alternatively, the inmate telephone call system may uti-
`lize a remote alert notification system wherein the system
`contacts an operator when a violation has occurred. The
`system may contact the operator utilizing telephone means,
`paging means, etc. This notification system may be set to
`call the operator a limited number of times or until the alert
`has been noted in the inmate telephone call system. The
`operator may then access information about
`the alert
`remotely using the telephone, Internet, or any other such
`remote access means.
`
`In order to alleviate some of the problems and concerns
`discussed herein, many penal institutions have implemented
`certain task-specific advanced systems. Generally,
`these
`“advanced” systems known in the art comprise several
`features.
`
`For example, it is known in current systems to employ
`permanent call blocking. Specifically, it is known in the art
`to block an inmate or group of inmates from dialing certain
`telephone numbers. Most systems also prevent inmates from
`talking directly to live operators. This prevents inmates from
`requesting that the operator forward a call or provide addi-
`tional telephone numbers allowing the inmates to harass or
`locate additional parties. Furthermore, current systems block
`“1-800,” “1-900” and other like telephone numbers includ-
`ing toll-free and pay-to-dial telephone numbers. In addition
`certain institutions may elect to block country codes, spe-
`cific area codes, or other third-party numbers.
`Current systems known in the art may also utilize a
`feature commonly referred to as “selective” call blocking.
`As discussed, “selective” call blocking may be employed to
`thwart
`inmates from establishing a connection with a
`selected group of individuals (i.e., with the home telephone
`of prison guards, wardens, indictment witnesses, trial wit-
`nesses, police officers, judges, etc.). It is also foreseeable
`that the telephone numbers of the family members of these
`specific individuals may also be blocked.
`Some current systems also limit
`the use of specific
`long-distance carriers. This feature proves useful in limiting
`unnecessary costs incurred by employing alternating carri-
`ers.
`
`systems utilize features commonly
`current
`Several
`referred to as “flash hook” prevention or “click” and “pop”
`prevention modes. These systems prevent
`inmates from
`extending the current outgoing telephone call and entering a
`new telephone call with a new number without fully termi-
`nating the original telephone call. For example, this prevents
`an inmate from utilizing common call forwarding features
`and the like.
`
`
`
`US 7,333,798 B2
`
`5
`In addition, some current institutional telephone systems
`electronically or manually disable the keypad after a tele-
`phone number is dialed and the telephone call is connected.
`This feature prevents inmates from interacting with tele-
`phone games and lotteries, and in certain older systems,
`prevents the inmate from achieving an unrestricted dial tone.
`Another common feature employed by institutional sys-
`tems is three-way call prevention. This feature prevents an
`inmate from instructing the called party to bridge the tele-
`phone call to another telephone number.
`Other known systems in the art may exhibit other regu-
`latory features. For example, generally, telephone commu-
`nication systems allow an institution to limit the duration of
`a telephone call and/or to limit the cost of the telephone call.
`These types of features further allow a facility to customize
`the telephone call systems thereby preventing unrecoverable
`expenditures.
`institution telephone
`Another control used by current
`systems is the use of certain aspects of biometric recognition
`for the identification of users or inmates (i.e., the calling
`party). However, systems known in the art have only used
`biometrics to a limited extent. It is highly beneficial for
`communication systems in penal institutions to incorporate
`biometrics as an additional security device. Biometric rec-
`ognition is commonly available in a number of fields. For
`example, biometrics recognition has found a number of
`security uses, including common usage, in credit card sys-
`tems and building security systems. Biometric information
`includes fingerprints, hand geometry, voiceprints, retinal
`patterns, iris scans, signatures, infrared facial patterns, and
`all other sources which constitute unique physiological
`characteristics and which can assist in establishing a per-
`son’s identity. Various devices exist which can scan one or
`more biometric characteristics and digitize the information.
`The features discussed herein are present in several prior
`art references. For example, Hird, et al. U.S. Pat. No.
`4,890,317 disc