throbber
[52] US. Cl. .................. .. 340/573; 340/534; 340/825.36;
`379/38; 379/39
`340/573 539
`534, 37’9/38’
`3,9 106 1’
`’
`'
`
`’
`
`'
`
`’
`
`'
`
`’
`
`_
`_
`_
`_
`A system and method for communicating information con
`cerning the status of inmates to callers and automatically
`notify victims registered With the system at a registered
`electronic address When the status of a speci?ed inmate has
`changed. The noti?cations to the electronic address of the
`registered victim Will continue at spaced predetermined
`intervals until either the registered victim responds With a
`registered personal identi?cation number or a predetermined
`time period measured from the initial time noti?cation
`elaps“
`
`38 Claims, 13 Drawing Sheets
`
`Ulllted States Patent [19]
`Nguyen
`
`US005861810A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,861,810
`Jan. 19, 1999
`
`[54] SYSTEM AND METHOD FOR PROVIDING
`CRIME VICTIMS UPDATED INFORMATION
`AND EMERGENCY ALERT NOTICES
`
`.
`~
`-
`[76] Inventor‘ Eung T.1‘1NgI2ye:6§93900Wmter H111 Ct"
`01115“ e’
`y‘
`
`5,153,584 10/1992 Engira .............................. .. 340/870.18
`5,170,426 12/1992 D’Alessio et a1
`....... .. 340/573
`5,266,944 11/1993 Carroll et al. ..
`340/825.36
`
`5,307,053
`
`4/1994 Wills et a1. . . . . .
`
`. . . . . . . .. 340/573
`
`3/1995 Carroll et a1. ................... .. 340/825.36
`5,396,227
`3/1995 Hopper et a1. .......................... .. 379/38
`5,402,469
`5,461,390 10/1995 Hoshen ..... ..
`.. 342/419
`5,534,851
`7/1996 Russek .................................. .. 340/573
`
`[21] Appl. No.: 722,359
`
`[22]
`
`Filed:
`
`Sep. 27, 1996
`
`_
`_
`Primary Examzner—Jeffery A. Hofsass
`Assistant Examiner—John TWeel, Jr.
`
`[51]
`
`Int. Cl.6 ................................................... .. G08B 23/00
`
`[57]
`
`ABSTRACT
`
`[58] Field of Search
`
`[56]
`
`References Cited
`
`US. PATENT DOCUMENTS
`340/534
`3810 096 5/1974 Kabat et al
`340/82536
`4:455:548
`6/1984 Burnett ....... ..
`340/573
`4,980,671 12/1990 McCurdy .
`5,091,930
`2/1992 Shapiro ................................... .. 379/39
`
`/ 12
`
`5 52
`
`/0 \
`
`REMOTE
`
`HOST
`
`56,
`
`RESET
`
`9/’
`
`60
`
`54
`
`J
`/O
`
`63/
`
`262/»
`
`7
`
`CONTROL
`CENTER
`
`I4)
`
`~58
`
`04
`
`G
`
`VICTIM
`ADDRESS
`
`/' 59
`
`625/
`
`GTL 1009
`IPR of U.S. Pat. No. 7,529,357
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 1 0f 13
`
`5,861,810
`
`HOST
`COMPUTER
`
`REMOTE
`GATEWAY
`
`gr _______ “T
`{
`HOST AF“)
`: COMPUTER .
`|
`|
`I
`-
`g
`:
`V
`I
`|
`} I2
`REMOTE
`|
`1 GATEWAY /||
`|
`'
`:
`'
`
`l
`
`k
`
`I" ________ “i
`1
`HOST -/1|"/O
`: COMPUTER .
`l
`l
`l
`. . . . '
`:
`l
`l
`REMOTE X12
`1
`{ GATEWAY :
`I
`'
`:
`|
`
`CENTRAL CONTROL STATION
`
`-27
`
`m1... -.,__ ......
`
`WWW‘
`
`WORK
`STATION
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 2 0f 13
`
`5,861,810
`
`EEK-"
`
`I/ZLb
`
`GATEWAY
`PC
`
`A
`
`S/O
`
`HOST
`
`l
`l
`l
`l
`l
`l
`l
`!
`l
`l
`I
`l
`l
`l
`l
`
`____________C_
`
`PROCESSOR ‘
`
`VR
`
`

`
`U.S. Patent
`
`Jan. 19, 1999
`
`Sheet 3 0f 13
`
`5,861,810
`
`36>
`
`28
`/
`
`ExEcuTIvE
`OPERATING
`SYSTEM
`
`30
`.9
`
`DATABASE OF
`PERSONALITY
`FILES
`
`PERSONALITY
`FILE
`DNIS ; 4618
`
`PERSONALITY
`FILE
`DNIS 14762
`
`PERSONALITY
`FILE
`DNIS ; 4762
`
`4618 - FILE 1
`4762 - EILEk
`
`INSTRUCTION I
`INSTRUCTION 2
`
`INSTRUCTION 1
`INSTRUCTION 2
`
`INSTRUCTION 1
`INSTRUCTION 2
`
`4376 - FILE 3
`
`END OF CALL
`
`END OF CALL
`
`END OF CALL
`
`34
`
`32
`
`F/G. 2
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 4 0f 13
`
`5,861,810
`
`/ l2
`
`5 52
`
`IO \
`
`REMOTE
`
`HOST
`
`_
`
`56
`
`(00
`
`)
`54
`
`J
`/O
`
`63/
`
`262/
`
`‘
`'
`
`CONTROL
`CENTER
`
`M’
`
`~ 58
`,
`
`64
`
`[:3
`
`RESET
`
`<01 ’
`
`F 4
`
`VICTIM
`ADDRESS / 59
`
`615/
`
`36
`
`HOST / IO
`
`,2) /
`
`REMOTE
`
`/4
`/
`
`\ CONTROL
`
`CENTER
`
`PUBLICITY
`
`4
`
`"
`
`CALLER
`
`F/G3
`
`38/
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 5 0f 13
`
`5,861,810
`
`4(0
`3
`
`TYPICAL INMATE FILE
`
`INMATE ID
`INMATE LAST NAME
`INMATE FIRST NAME
`INMATE MIDDLE NAME
`INMATE LOCATION
`INMATE CUSTODY STATUS
`INMATE RACE
`INMATE SOC SEC NO
`INMATE RELEASE DATE
`INMATE REASON FOR RELEASE
`
`TYPICAL VICTIM FILE
`
`48
`
`VICTIM ID
`VICTIM LAST NAME
`VICTIM FIRST NAME
`VICTIM ADDRESS 1
`VICTIM ADDRESS 2
`VICTIM PHONE 1
`VICTIM PHONE 2
`VICTIM PIN CODE
`VICTIM INMATE ID
`
`I50
`
`TYPI LAUDIT FILE
`CA
`CALL DATE
`CALL TIME
`CALL LENGTH
`CALL NUMBER
`CALL RESULT
`
`F/G5
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 6 0f 13
`
`5,861,810
`
`STATUS
`CHANGE / 54’
`CALL
`
`VICTIM
`
`INMATE OR
`V|CT|M
`DATABASE
`CHANGE
`
`/ 7O
`
`INMATE
`
`I‘
`
`74
`8
`
`V
`
`UPDATE / 72
`
`UPDATE
`
`76,
`
`NOTIFICATION
`NEEDED?
`
`N
`
`7
`
`STOP
`
`/
`8O
`
`BEGIN
`
`78 /
`
`F/G. 6
`
`

`
`U.S. Patent
`
`Jan. 19, 1999
`
`Sheet 7 0f 13
`
`5,861,810
`
`INCOMING CALL
`FROM CALLER
`
`, 84
`
`V
`PLAY INTRODUCTION
`LANGUAGE
`CHOICES
`
`84,
`/
`
`INMATE
`NO.
`
`SEARCH TYPE
`REQUEST
`
`S88 INMATE
`
`NAME
`
`90
`
`SEARCH BY NO.
`(SEE FIG 8)
`
`592
`
`SEARCH BY NAME
`(SEE FIG 9A/9B)
`
`94
`GIvE DATA
`REGISTRATION REQ /
`(SEE FIG 10)
`
`'1
`
`96
`PLAY GOODBYE /
`
`F/G. 7
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 8 0f 13
`
`5,861,810
`
`SEARCH
`
`INMATE #
`
`Y
`
`98
`ENTER /
`INMATE #
`
`NO
`
`
`
`l f CORRECT
`
`NUMBER
`OF DIGITS
`
`YES
`
`I02
`2
`
`‘
`
`I06
`/
`
`\
`
`YES PLAY INVALID # NO
`TRY AGAIN
`
`NO
`
`sElfggH
`INMATE
`
`YES
`
`/04
`f
`
`v
`
`1/0
`S
`
`/08
`I
`
`PLAY
`NOT FOUND
`GOODBYE
`
`PLAY
`'MQQLEN'BOT
`GOODBYE
`
`RETURN
`TO
`MAIN
`
`F/G. 8
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 9 0f 13
`
`5,861,810
`
`SEARCH BY
`VICTIM
`NUMBER
`
`’ 90a
`
`7
`
`ENTER
`NUMBER
`
`/ H2
`
`N0
`
`'
`
`IS NUMBER
`CORRECT?
`
`4 f 1!
`YES
`
`/J1(a
`
`v
`PLAY
`YES INVALID NUMBER NO
`DO YOU WISH “?
`TO TRY ANOTHER
`GOODBYE
`/IT /
`
`I
`f ' 8
`
`N0
`
`SEARCH
`INMATE
`
`YES
`
`V
`
`PLAY
`INMATE NOT
`FOUND
`
`/ l20
`
`122
`V S
`
`RETURN
`TO
`MAIN
`
`F/G. 8A
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 10 0f 13
`
`5,861,810
`
`INMATE
`NAME
`SEARCH
`
`/' 92
`
`I24
`LAST NAME
`REQUEST /
`
`d
`Q
`
`)20
`ENTER /
`
`‘L
`
`/ 128
`
`INCORRECT CONFIRMATION CORRECT
`
`YES
`
`RE-ENTER
`REQUEST
`
`NO
`
`/3/
`| I
`
`GOODBYE
`
`NO
`
`SEARCH
`
`YES
`
`PLAY
`NOT IN CUSTODY
`"GOODBYE"
`
`I34 /
`
`1%
`F?ggu'g‘f /
`
`FROM
`
`138$
`
`ENTER
`
`TO FIG 9B
`
`F/G. 9A
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 11 0f 13
`
`5,861,810
`
`FROM 9A
`
`#10
`
`NO
`
`CONFIRMED?
`
`YES
`
`I42
`5
`RE-ENTER REQUESTED
`
`N
`0
`
`SEE YES
`
`J144
`
`GOODBYE
`
`YES
`
`//4(p
`1'
`MORETHAN ONE NO
`NAME?
`SEARCH
`
`I
`
`8150
`‘
`ENTRY
`
`I;
`
`FOUND
`I612
`
`PLAY
`NOT FOUND
`GOODBYE
`
`I52
`1
`CONFIRM
`
`INCORRECT
`
`CORRECT
`
`K04
`S
`RETURN
`TO
`MAIN
`
`95
`
`I54
`g
`1’
`RE-ENTER
`
`NO
`
`v
`PLAY
`NOT FOUND
`GOODBYE
`
`150 /
`
`I
`SEARCH
`5/57
`
`INMATE
`FOUND
`
`YES
`
`[58
`S‘
`RETURN
`TO
`MAIN
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 12 0f 13
`
`5,861,810
`
`GIVE INMATE
`DATA
`
`/ 94
`
`7
`
`M16
`REGISTERINQUIRY /
`
`YES
`
`v
`
`ENTRY
`
`I67
`/
`
`NO
`
`[69
`S
`y
`REPEAT STATUS
`INFORMATION GOODBYE
`
`V
`PLAY
`CAUTION STATEMENT
`
`I68
`/
`
`V
`
`TELEPHONENO. / no
`REQUEST
`
`7
`
`PIN REQUEST / I72
`ENTER
`
`y
`
`YES
`
`IS PIN 4 DIGITS
`
`174
`/
`N
`0
`
`REGISTRATION / I76
`COMPLETE "GOODBYE"
`
`I78
`S
`
`I
`'NVAL'D P'N
`
`F/G. /O
`
`

`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 13 0f 13
`
`5,861,810
`
`________________ _ _ 1
`
`+
`NOTIFICATION
`LETTER
`
`/961J
`
`T
`Rigglg’gggj
`/ TELEPHONE #
`l80
`
`I
`
`{/82
`
`PLAY NOTIFICATION
`AND PIN REQUEST
`
`Y
`
`ENTRY / I84
`
`I
`
`N0
`
`IS PIN
`4 DIGITS
`
`I86:
`1
`
`YES
`
`/88
`
`"
`
`S
`
`5 I90
`
`I,
`
`——
`
`INVALID PIN
`REPEAT PIN
`REQUEST
`
`NO
`
`céig'gm
`
`YES
`
`5192
`
`Q94
`PLAY NOTIFICATION
`COMPLETE
`GOODBYE
`
`63280515
`
`F/G.//
`
`

`
`1
`SYSTEM AND METHOD FOR PROVIDING
`CRIME VICTIMS UPDATED INFORMATION
`AND EMERGENCY ALERT NOTICES
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to a system and method for
`the alerting of victims of the change of status of a defendant
`in the criminal justice system.
`The rights of victims in the criminal justice system is
`receiving considerable attention today in the midst of a
`signi?cant violent crime rate and early release of many
`offenders due to the over croWding of prisons. Many states
`have passed legislation enacting the right of victims to be
`alerted to the early release or other changes in status of
`defendants and mandating that the state justice system
`timely notify the victims of such change in status. The
`system for noti?cation has been dif?cult to implement for
`various reasons. Victims are extremely mobile and dif?cult
`to locate, requiring considerable personal effort and conse
`quential outlay of expenses in a time of governmental
`budgetary limitations. Moreover, because such systems
`involve numerous status changes and the noti?cation effort
`of busy personnel, they are highly prone to error, miscom
`munications and complete oversight. Most “home groWn”
`systems have proven to be ineffective and the governmental
`agencies often involved make little or no effort to call
`victims. The failed approaches result in victims being forced
`to make repeated and, in many instances unsuccessful, calls
`to the appropriated agencies to receive status changes. The
`mental stress and trauma to victims caused by the failed
`systems can be signi?cant coupled With a high potential of
`injurious attacks perpetrated by certain vindicative defen
`dants.
`It is therefore a primary object of the present invention to
`provide for an effective and dependable system for the
`timely noti?cation of victims of a change of judicial status
`of defendants.
`It is still another object of the present invention to provide
`for a victim noti?cation system that veri?es that the recipient
`of a noti?cation is the victim.
`It is still a further object of the present invention to
`provide for a victim noti?cation system that is ?exible and
`expandable to satisfy a Wide variety of options, laWs and
`regulations of different localities.
`It is yet another object of the present invention to provide
`for a victim noti?cation system that is economically afford
`able and technological accessible to all communities, par
`ticularly to communities of small populations.
`
`SUMMARY OF THE INVENTION
`
`The present invention comprises a victim noti?cation
`system and method for notifying a victim of the change of
`status of an inmate associated With the victim. The system
`itself includes a central processor or control station for
`storing in a data base information pertaining to a plurality of
`prison inmates and a plurality of victims. Each of the victims
`in the central processor data base is identi?ed With a
`respective one of the inmates and has selected a personal
`identi?cation number, i.e., a “PIN”. Another component of
`the system is a remote data storage device that receives all
`information pertaining to changes of status of the inmates
`from a computer Where the information is originated. The
`remote data storage device communicates any inmate
`change of status to the central control station. Each of the
`victims registered in the system has a communication
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`5,861,810
`
`2
`receiving device such as telephone for receiving changes of
`relevant inmate status information from the central control
`station. When the control station receives a change of inmate
`status deemed relevant, it automatically calls and informs
`the victim of the change. The victim then provides the PIN
`to con?rm receipt of the noti?cation. If the PIN is not
`correctly entered into the system, the system Will continue to
`call back until the PIN is entered or a predetermined time
`period has elapsed.
`The remote devices constantly poll the host computers to
`determine if any change of inmate status has occurred. All
`such information is uploaded to the remote device and
`communicated to the central control station. In this manner
`the information on inmates is kept current at the central
`control station.
`To ensure that the remote data storage devices are in
`proper Working order, each of the devices calls the central
`control station at predetermined time intervals. Should one
`of the remote devices fail to call in by the end of the
`predetermined time interval, an alarm and/or pager is acti
`vated so that assigned Workers can immediately address the
`problem.
`BRIEF DESCRIPTION OF THE DRAWING
`FIG. 1 is a schematic of a typical con?guration and
`architecture of a system of victim noti?cation in accordance
`With one embodiment of the present invention;
`FIG. 1A is a block diagram of the major components of
`the central victim noti?cation control station and remote
`gateWay in accordance With one embodiment of the present
`invention;
`FIG. 2 is a block diagram of the executive operating
`system architecture;
`FIG. 3 is a block diagram illustrating the How of infor
`mation and signals When initially connecting the system
`With a remote gateWay at a neW location;
`FIG. 4 is block diagram illustrating the general How of
`information and signals betWeen the various parts of the
`system for updates on inmate status and monitoring of
`remote equipment;
`FIG. 5 is chart representing typical data base record for
`stored information pertaining to prisoners, victims and sys
`tem audit records;
`FIG. 6 is a How chart in block diagram form depicting the
`main operating program used With the present invention;
`FIG. 7 is a How chart depicting the general routine
`initiated by a caller for information either by inmate number
`or inmate name;
`FIG. 8 is a How chart depicting an operating program
`initiated by a caller When requesting a search by inmate
`number and the response thereto;
`FIG. 8A is a How chart of an alternate routine from that
`shoWn in FIG. 8 in Which the caller is required to have a
`speci?c unique number in order to gain information about
`the status of an inmate;
`FIGS. 9A and 9B collectively represent a single ?oW chart
`depicting an operating program initiated by a caller When
`requesting a search by inmate name and the response
`thereto;
`FIG. 10 is a How chart representing an operating program
`initiated by a caller When registering as a to-be noti?ed
`When-status-changes-caller (“victim”) into the noti?cation
`system With respect to a selected inmate; and
`FIG. 11 is a How chart representing an operating program
`initiated by system to notify a victim When the status of the
`selected inmate has changed.
`
`

`
`5,861,810
`
`3
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`In the following description, reference Will be made to
`Callers and Registered Victims in various situations. For a
`clearer understanding, “Caller” shall be de?ned as any
`person that calls the system for information about the status
`of an inmate. “Registered Victim” shall be any person Who
`has provided the system With his or her unique identifying
`communication address such as a telephone number or
`electronic address and selected a personal identifying
`number, i.e., a “PIN”.
`Reference is ?rst made to FIGS. 1 and 1A illustrating,
`respectively, a schematic of the victim information and
`noti?cation system (“System”) used to register and notify
`Registered Victims and a schematic of the major compo
`nents of the remote gateWay and central control station. The
`System is comprised of four major components: a plurality
`of host computers 10; a plurality of remote gateWays 12
`associated With each host computer 10; a central victim call
`control station 14; and a plurality of noti?cation receiving
`devices such as telephones 18 associated With each Caller or
`Registered Victim. The host computers 10 are physically
`located in the region or locality of the site shoWn by the
`dashed lines 11 in Which the inmates are incarcerated or
`placed. Such localities shall de?ne the term “Local Site” as
`used in this description. Computers 10 thus generally store
`inmate and case management information pertaining to
`inmates in the respective Local Site. Examples of host
`computers are mainframes such as IBM 3090, Unisys or HP
`mainframes although at some smaller facilities a PC based
`system may be employed. The controlling softWare compo
`nent used in a Local Site that tracks inmates through the
`local criminal justice system is ordinarily chosen by the
`agency in charge of managing the information (“Local
`Authorities”). Typically, the Local Authorities Will deter
`mine the precise Wording of information to be delivered to
`Callers and Registered Victims pertaining to inmates in the
`Local Site and the nature of the responses required of such
`Callers and Registered Users. As Will be discussed beloW,
`the host computers 10 of the Local Sites are coupled via a
`local area netWork 36 to associated remote gateWays 12
`typically located in the same Local Site. GateWays 12 are
`primarily used to extract and ?lter the necessary information
`from the host computers 10 to deliver to the central control
`station 14 in a manner to be described. Each remote gateWay
`12 comprises hardWare components such as a PC, a high
`speed modem and connection hardWare as illustrated in FIG.
`1A. The softWare component of the gateWay 12 is respon
`sive to provide the necessary information and calls needed
`by the central victim call control station 14.
`Control station 14 communicates With remote gateWay 12
`through long distance netWork 16 and houses the central
`processing softWare functioning to process the data for
`Warded by remote gateWays 12 from host computers 10. The
`primary functions of control station 14 are to process
`incoming calls 20 from telephones 18 and provide informa
`tion in response to such calls via the long distance netWork
`16 and to initiate Warning or noti?cation calls 22 to the
`numbers or electronic addresses of telephones 18 or other
`communication receiving devices of Registered Victims as
`signi?cant changes in inmate status information is received.
`As illustrated in FIG. 1A, each control station 14 typically
`comprises one or more central processors 14a, a high speed
`modem 14b, a voice recognition board 14c, and a telecom
`munication and voice processing board 14d. Examples of
`each are given in the Table 1 set forth beloW. As Will be
`
`4
`discussed beloW, the voice processing board 14d provides
`the System the ability to deliver predetermined spoken
`messages to registered victims While the voice recognition
`board provides the System the ability to process and to react
`to spoken commands and/or store spoken information Where
`the Local Authorities have requested this ability as a part of
`the service to the Local Site.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`The System of the present invention also contemplates the
`use of a noti?cation Work station 24 comprising a PC and
`softWare permitting operators of the System to directly use
`the control station 14 to generate various reports and letters.
`For example, letters 26 prepared, for example, by operators
`of PCs 27 netWorked With the central control station 14.
`Such letters are backup notices containing information With
`respect to the noti?cation attempts such as When and hoW
`many noti?cation calls Were made and the noti?cation
`message itself. The letters are then posted the Registered
`Victims Who Were not con?rmed as being reached.
`As illustrated generally in FIG. 2, the executive operating
`system 28 maintains Within control station 14 a comprehen
`sive database for each Local Site represented by a “DNIS”
`(de?ned beloW) as character numeral 30 and “personality”
`?les 32 for each site. The term “personality” is used to
`denote that each Local Site has an overall process or
`communication routine customiZed in accordance With the
`desires of the Local Authorities for communication With
`Callers and Registered Victims about victims incarcerated
`Within the Local Site. Thus, voice messages, prompts, PIN
`numbers, use of voice recognition and voice inputs, and the
`like vary among the various Local Sites in the System. The
`executive operating system 28 is responsible for the man
`agement of all calls, database management, collection of
`remote gate Way information, the personality and How of all
`incoming and outgoing telephone calls, and the recording of
`all audit ?les shoWing incoming and outgoing call activity.
`When an incoming call is received, the executive operating
`system 28 determines the Local Site to Which the incoming
`call pertains. All Local Sites, for example, may be assigned
`a speci?c 800number for Callers to use When requesting
`status information about an inmate associated With the Local
`Site. When a 800 number is dialed, the long distance carriers
`send a special code to the receiving party Which identi?es
`the speci?c 800 number being dialed. This service is called
`the Dialed Number Identi?cation Service or “DNIS”. Such
`a service provides receiving parties, Who have purchased the
`use of a plurality of 800 numbers, the ability to determine
`Which of the 800 numbers is being called. When the 800
`number assigned to a particular Local Site is called, the
`operating system 28, using the DNIS, is prompted to locate
`the appropriate personality ?le 32 for that call. System 28
`then begins executing the located personality ?le 32, Which
`de?nes all the messages that are played during the particular
`call. The personality ?le 32 also de?nes all of 10 the menu
`selections given the Caller and reads/Write the various data
`bases used for the call.
`
`60
`
`REMOTE GATEWAYS 12
`
`TABLE 1
`
`PC
`
`Modern
`
`65
`
`Pentium PC With 8 MB Ram
`available from Dell Computers
`Corp.
`28.8 KB HS internal modern
`available from US Robotics as
`Model Sportster
`
`

`
`5,861,810
`
`5
`
`TABLE l-continued
`
`CENTRAL CONTROL STATION 14
`
`Central Processor 14a
`
`High Speed Modem 14b
`
`Voice Recognition Board 14c
`
`Voice Processing Board 14d
`
`14 Slot Pentium industrial
`grade rack mount central
`processor available from Texas
`Micro
`28.8 KB HS internal modem
`available from US Robotics as
`Model Sportster
`Voice recognition board
`available from Dialogic Corp.
`Mfg. # VR/16O
`T1 telecommunications and
`voice processing board
`available from Dialogic Corp.
`as Mfg # D/24OSC-T1
`
`The inmate information that goes into the various data
`bases is initially collected from the host computer 10 by the
`remote gateway 12 which, in part, comprises a PC and a high
`speed modem. The block diagram of FIG. 3 illustrates that,
`as each new Local Site goes into the System of the present
`invention, the PC of the remote gateway 12 associated with
`the new Local Site is connected through a local area network
`36 to the associated host computer 10 and, as stated above,
`is able to communicate with the central control station 14
`through a long distance carrier. Once connected, the remote
`gateway 12 then collects a complete set of initial inmate and
`victim data from host computer 10 and transmits the data to
`the control station 14. It is at this point that Callers (here
`depicted by BLOCK 38) can dial a unique 800 number
`(shown by character numeral 40) assigned to each Local Site
`and search the data bases associated with that Local Site for
`information on inmate status. Additionally, the Caller, if not
`already registered, can register as a Registered Victim for
`automatic noti?cation in response to the registration request
`42 communicated to the caller following delivery of the
`inmate status information. Individuals are made aware of the
`800 number through public service announcements made in
`the media of the appropriate Local Site, brochures promul
`gated by the police of the Local Site, and other publicity as
`determined by the Local Authorities. This publicity trans
`action is depicted by publicity BLOCK 44. It should also be
`understood that registration of victims as Registered Victims
`is often done during or following the court proceedings of
`the inmates usually at the request of representatives of the
`Local Authorities. In many instances, the Local Authorities
`prefer to limit the availability of the System, both for search
`and registration operations, to those who are speci?cally
`sought out and registered by the local law enforcement
`personnel as opposed to allowing any person from the
`general public to use the System. In such case, the infor
`mation pertaining to the Registered Victims is entered into
`the host computer 10 by representatives of the Local
`Authorities and, via the associated remote gateway 12, is
`delivered and stored in the central control station 14.
`Changes to the Registered Victims database can be inputted
`by a keyboard directly into the host computer 10 by autho
`riZed representatives of the Local Authorities and/or Regis
`tered Victims or made by the Registered Victim through
`direct electronic communication with the central control
`station 14 using the Registered Victim’s telephone.
`It is clearly imperative that the inmate databases at the
`central control station 14 be maintained current with quick
`updates re?ecting any changes in inmate status. Reference is
`made to FIGS. 4 and 5 for the ensuing discussion, the latter
`Figure illustrating a typical inmate ?le 46, victim ?le 48, and
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`6
`audit ?le 50. To ensure the current state of the inmate ?les,
`remote gateway 12 makes a transaction ?le check 52 at
`predetermined intervals, e.g., every 10 minutes, with each
`host computer 10. As each inmate record is modi?ed and
`entered into the host computer 10, the host computer 10
`writes an audit record to a transaction ?le and uploads the
`transaction ?le depicted by line 54 to gateway 12. In turn,
`gateway 12 checks the transaction ?le for changes in inmate
`status. When a change is detected, gateway 12 sends the
`changed status depicted by line 56 to control station 14.
`Control station 14 then searches databases to determine if
`there are any Registered Victims (denoted by BLOCK 59)
`that need to be noti?ed of the changed status. In the event
`that such Registered Victims are identi?ed, the noti?cation
`call process (discussed below) will be automatically trig
`gered and a noti?cation call sequence 58 initiated.
`To ensure that all remote equipment is working properly
`and particularly that no communication lapses are occurring,
`each remote gateway 12 transmits a “handshake” signal 60
`at frequent intervals, e.g., every two minutes, to control
`station 14. Preferably, the signal 60 is a telephone call to a
`speci?c telephone number at control station 14 with the call
`carrying an automatic number identi?cation (ANI) signal
`passed between telephone rings. Such ANI signals enable
`the control station 14 to identify the precise remote gateway
`12 making the call without making a direct connection, i.e.,
`picking up the telephone or using separate communication
`channels. Some telephone carriers still do not have this
`capability, however. In such cases, the remote gateway 12 in
`the Local Site is assigned a 800 number unique for that
`Local Site to call and the control station 14, using the DNIS,
`can then identify the calling remote gateway 12 by the 800
`number thus being called. When the handshake signal is
`timely received, the control station 14 “knows” that the
`gateway 12 is operating properly and the timer for that
`remote gateway is reset as shown by reset BLOCK 61. When
`a gateway 12 fails to call in with the handshake signal 60,
`the control station may cause an alert signal 62 to trigger an
`alert window of a computer screen 63 at the site of the
`central control station 14 alerting a viewer of the possible
`communication malfunction. Additionally, the control sta
`tion 14 may also send out a pager signal 64 to a pager 65,
`alerting an assigned repair operator of the uncommunicative
`remote gateway who then determines the nature and
`addresses the problem.
`The function block diagram of FIG. 6 describes the
`“updating” of the various ?les upon receipt of an incoming
`status change call 56 from remote gateway 12. Initially,
`control station 14 handshakes with the calling remote gate
`way 12 and veri?es at VERIFY 66 that the data is coming
`from a legitimate source using a predetermined identifying
`protocol. This, of course, is needed to ensure that system is
`not compromised by entry of incorrect data from extraneous
`sources. Thus, if NO, the program routine stops at BLOCK
`68. If YES, the System determines at BLOCK 70 whether
`this is a change to the victim or inmate database. If it is a
`change to the victim database, the victim database is updated
`at BLOCK 72. If the change is to the inmate database, then
`the inmate database is updated at BLOCK 74 and a deter
`mination made at NOTIFICATION 76 whether a Registered
`Victim associated with the particular inmate should be
`noti?ed. If YES, then noti?cation calls 78 are begun. If NO,
`the program ends at BLOCK 80.
`The general routine executed when a Caller dials the 800
`number for a Local Site is shown in FIG. 7. The various
`subroutines, executed primarily in accordance with menu
`choices selected by the Caller, are illustrated in FIGS. 8 and
`
`

`
`5,861,810
`
`7
`9A and 9B. FIG. 10 is the subroutine automatically executed
`following delivery of the requested inmate status informa
`tion during Which the Caller is given the option of register
`ing as a Registered Victim.
`As stated above, When the Caller calls an 800 number
`assigned to a Local Site at BLOCK 84, the main routine is
`initiated at BLOCK 86 With the control station 14 through its
`voice processor ansWering the call, identifying the Local
`Site associated With the call via DNIS, and providing initial
`prompts in accordance With the personality ?le for that
`Local Site. In multilingual localities, the initial prompts may
`start by giving the Caller a choice betWeen tWo of more
`languages in Which further voice communications can pro
`ceed. For example, the language choices may be English,
`Spanish or Vietnamese, With the voice processor stating each
`choice in the respective language for that choice. The Caller
`Would press 1, 2, or 3 as prompted depending on the
`language choice. Once a language has been selected, the
`System Will continue to use that language When addressing
`the Caller, in both current and future noti?cation calls. The
`neXt prompt at BLOCK 88 made in the selected language
`Would be a request to press 1 if the Caller Wishes to use an
`“inmate number” to initiate the search or press 2 if the Caller
`Will use the inmate name for the search. Local Authorities
`typically assign each inmate a number, i.e., the “inmate
`number”, for use in the System. Then Caller then makes a
`choice selection depicted by BLOCK 90 for inmate number
`or BLOCK 92 for inmate name. The selection then initiates
`either the subroutines set forth in FIGS. 8 for inmate number
`or FIGS. 9A/9B for inmate name. Once those subroutines
`have been completed With the inmate information being
`vocally given, the Caller is returned to the main routine and
`Will be typically asked if he or she Wishes to be registered
`as a Registered Victim at BLOCK 94. If the Caller responds
`in the af?rmative to the registration inquiry prompt at
`BLOCK 94, then the subroutine of FIG. 10 is initiated and
`eXecuted. Upon completion of the registration menu
`selections, the program ends in the main routine With a
`“Goodbye” BLOCK 96 to the caller.
`When the Caller elects to search for inmate status infor
`mation by inmate number as illustrated in the subroutine
`?oW chart of FIG. 8, the caller is prompted at prompt
`BLOCK 98 by the voice processor to enter the inmate
`number or, in an alternate subroutine, a “victim number” on
`the touch dial phone. Since the inmate number is determined
`by the Local Authorities, the Caller obtains the inmate
`number through procedures established by the Local
`Authorities. For certain Local Sites, the Authorities may
`desire to further limit access to the information imparted by
`the System. Some Local Authorities prefer not to permit use
`of the inmate names to gain access and limit dissemination
`of the inmates number on a need-to-knoW basis. Some Local
`Authorities issue the inmate numbers only to Registered
`Victims. Thus, any Caller Wishing to access the System
`using the Local Site DNIS number Would have to either
`register as a Registered Victim With the Local Authorities to
`obtain the inmate number or go through some sort of
`prescribed administrative procedure. Moreover, the Local
`Authorities may require that each Registered Victim be
`provided a victim noti?cation card identi?cation number
`(Victim Number) that must be entered before any informa
`tion on inmates is communicated by the central control
`station. When the Local Site requires the use of a Victim
`Number, entry of a valid Victim Number Will automatically
`call up the database for the inmate associated With the
`Victim Number and Registered Victim.
`Once the inmate number is entered in subroutine of FIG.
`8 at BLOCK 98, as prompted, control station 14 determines
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`8
`if the number is valid or not at determination BLOCK 100.
`If NO, the Caller is informed that the i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket