`379/38; 379/39
`340/573 539
`534, 37’9/38’
`3,9 106 1’
`’
`'
`
`’
`
`'
`
`’
`
`'
`
`’
`
`_
`_
`_
`_
`A system and method for communicating information con
`cerning the status of inmates to callers and automatically
`notify victims registered With the system at a registered
`electronic address When the status of a speci?ed inmate has
`changed. The noti?cations to the electronic address of the
`registered victim Will continue at spaced predetermined
`intervals until either the registered victim responds With a
`registered personal identi?cation number or a predetermined
`time period measured from the initial time noti?cation
`elaps“
`
`38 Claims, 13 Drawing Sheets
`
`Ulllted States Patent [19]
`Nguyen
`
`US005861810A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,861,810
`Jan. 19, 1999
`
`[54] SYSTEM AND METHOD FOR PROVIDING
`CRIME VICTIMS UPDATED INFORMATION
`AND EMERGENCY ALERT NOTICES
`
`.
`~
`-
`[76] Inventor‘ Eung T.1‘1NgI2ye:6§93900Wmter H111 Ct"
`01115“ e’
`y‘
`
`5,153,584 10/1992 Engira .............................. .. 340/870.18
`5,170,426 12/1992 D’Alessio et a1
`....... .. 340/573
`5,266,944 11/1993 Carroll et al. ..
`340/825.36
`
`5,307,053
`
`4/1994 Wills et a1. . . . . .
`
`. . . . . . . .. 340/573
`
`3/1995 Carroll et a1. ................... .. 340/825.36
`5,396,227
`3/1995 Hopper et a1. .......................... .. 379/38
`5,402,469
`5,461,390 10/1995 Hoshen ..... ..
`.. 342/419
`5,534,851
`7/1996 Russek .................................. .. 340/573
`
`[21] Appl. No.: 722,359
`
`[22]
`
`Filed:
`
`Sep. 27, 1996
`
`_
`_
`Primary Examzner—Jeffery A. Hofsass
`Assistant Examiner—John TWeel, Jr.
`
`[51]
`
`Int. Cl.6 ................................................... .. G08B 23/00
`
`[57]
`
`ABSTRACT
`
`[58] Field of Search
`
`[56]
`
`References Cited
`
`US. PATENT DOCUMENTS
`340/534
`3810 096 5/1974 Kabat et al
`340/82536
`4:455:548
`6/1984 Burnett ....... ..
`340/573
`4,980,671 12/1990 McCurdy .
`5,091,930
`2/1992 Shapiro ................................... .. 379/39
`
`/ 12
`
`5 52
`
`/0 \
`
`REMOTE
`
`HOST
`
`56,
`
`RESET
`
`9/’
`
`60
`
`54
`
`J
`/O
`
`63/
`
`262/»
`
`7
`
`CONTROL
`CENTER
`
`I4)
`
`~58
`
`04
`
`G
`
`VICTIM
`ADDRESS
`
`/' 59
`
`625/
`
`GTL 1009
`IPR of U.S. Pat. No. 7,529,357
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 1 0f 13
`
`5,861,810
`
`HOST
`COMPUTER
`
`REMOTE
`GATEWAY
`
`gr _______ “T
`{
`HOST AF“)
`: COMPUTER .
`|
`|
`I
`-
`g
`:
`V
`I
`|
`} I2
`REMOTE
`|
`1 GATEWAY /||
`|
`'
`:
`'
`
`l
`
`k
`
`I" ________ “i
`1
`HOST -/1|"/O
`: COMPUTER .
`l
`l
`l
`. . . . '
`:
`l
`l
`REMOTE X12
`1
`{ GATEWAY :
`I
`'
`:
`|
`
`CENTRAL CONTROL STATION
`
`-27
`
`m1... -.,__ ......
`
`WWW‘
`
`WORK
`STATION
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 2 0f 13
`
`5,861,810
`
`EEK-"
`
`I/ZLb
`
`GATEWAY
`PC
`
`A
`
`S/O
`
`HOST
`
`l
`l
`l
`l
`l
`l
`l
`!
`l
`l
`I
`l
`l
`l
`l
`
`____________C_
`
`PROCESSOR ‘
`
`VR
`
`
`
`U.S. Patent
`
`Jan. 19, 1999
`
`Sheet 3 0f 13
`
`5,861,810
`
`36>
`
`28
`/
`
`ExEcuTIvE
`OPERATING
`SYSTEM
`
`30
`.9
`
`DATABASE OF
`PERSONALITY
`FILES
`
`PERSONALITY
`FILE
`DNIS ; 4618
`
`PERSONALITY
`FILE
`DNIS 14762
`
`PERSONALITY
`FILE
`DNIS ; 4762
`
`4618 - FILE 1
`4762 - EILEk
`
`INSTRUCTION I
`INSTRUCTION 2
`
`INSTRUCTION 1
`INSTRUCTION 2
`
`INSTRUCTION 1
`INSTRUCTION 2
`
`4376 - FILE 3
`
`END OF CALL
`
`END OF CALL
`
`END OF CALL
`
`34
`
`32
`
`F/G. 2
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 4 0f 13
`
`5,861,810
`
`/ l2
`
`5 52
`
`IO \
`
`REMOTE
`
`HOST
`
`_
`
`56
`
`(00
`
`)
`54
`
`J
`/O
`
`63/
`
`262/
`
`‘
`'
`
`CONTROL
`CENTER
`
`M’
`
`~ 58
`,
`
`64
`
`[:3
`
`RESET
`
`<01 ’
`
`F 4
`
`VICTIM
`ADDRESS / 59
`
`615/
`
`36
`
`HOST / IO
`
`,2) /
`
`REMOTE
`
`/4
`/
`
`\ CONTROL
`
`CENTER
`
`PUBLICITY
`
`4
`
`"
`
`CALLER
`
`F/G3
`
`38/
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 5 0f 13
`
`5,861,810
`
`4(0
`3
`
`TYPICAL INMATE FILE
`
`INMATE ID
`INMATE LAST NAME
`INMATE FIRST NAME
`INMATE MIDDLE NAME
`INMATE LOCATION
`INMATE CUSTODY STATUS
`INMATE RACE
`INMATE SOC SEC NO
`INMATE RELEASE DATE
`INMATE REASON FOR RELEASE
`
`TYPICAL VICTIM FILE
`
`48
`
`VICTIM ID
`VICTIM LAST NAME
`VICTIM FIRST NAME
`VICTIM ADDRESS 1
`VICTIM ADDRESS 2
`VICTIM PHONE 1
`VICTIM PHONE 2
`VICTIM PIN CODE
`VICTIM INMATE ID
`
`I50
`
`TYPI LAUDIT FILE
`CA
`CALL DATE
`CALL TIME
`CALL LENGTH
`CALL NUMBER
`CALL RESULT
`
`F/G5
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 6 0f 13
`
`5,861,810
`
`STATUS
`CHANGE / 54’
`CALL
`
`VICTIM
`
`INMATE OR
`V|CT|M
`DATABASE
`CHANGE
`
`/ 7O
`
`INMATE
`
`I‘
`
`74
`8
`
`V
`
`UPDATE / 72
`
`UPDATE
`
`76,
`
`NOTIFICATION
`NEEDED?
`
`N
`
`7
`
`STOP
`
`/
`8O
`
`BEGIN
`
`78 /
`
`F/G. 6
`
`
`
`U.S. Patent
`
`Jan. 19, 1999
`
`Sheet 7 0f 13
`
`5,861,810
`
`INCOMING CALL
`FROM CALLER
`
`, 84
`
`V
`PLAY INTRODUCTION
`LANGUAGE
`CHOICES
`
`84,
`/
`
`INMATE
`NO.
`
`SEARCH TYPE
`REQUEST
`
`S88 INMATE
`
`NAME
`
`90
`
`SEARCH BY NO.
`(SEE FIG 8)
`
`592
`
`SEARCH BY NAME
`(SEE FIG 9A/9B)
`
`94
`GIvE DATA
`REGISTRATION REQ /
`(SEE FIG 10)
`
`'1
`
`96
`PLAY GOODBYE /
`
`F/G. 7
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 8 0f 13
`
`5,861,810
`
`SEARCH
`
`INMATE #
`
`Y
`
`98
`ENTER /
`INMATE #
`
`NO
`
`
`
`l f CORRECT
`
`NUMBER
`OF DIGITS
`
`YES
`
`I02
`2
`
`‘
`
`I06
`/
`
`\
`
`YES PLAY INVALID # NO
`TRY AGAIN
`
`NO
`
`sElfggH
`INMATE
`
`YES
`
`/04
`f
`
`v
`
`1/0
`S
`
`/08
`I
`
`PLAY
`NOT FOUND
`GOODBYE
`
`PLAY
`'MQQLEN'BOT
`GOODBYE
`
`RETURN
`TO
`MAIN
`
`F/G. 8
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 9 0f 13
`
`5,861,810
`
`SEARCH BY
`VICTIM
`NUMBER
`
`’ 90a
`
`7
`
`ENTER
`NUMBER
`
`/ H2
`
`N0
`
`'
`
`IS NUMBER
`CORRECT?
`
`4 f 1!
`YES
`
`/J1(a
`
`v
`PLAY
`YES INVALID NUMBER NO
`DO YOU WISH “?
`TO TRY ANOTHER
`GOODBYE
`/IT /
`
`I
`f ' 8
`
`N0
`
`SEARCH
`INMATE
`
`YES
`
`V
`
`PLAY
`INMATE NOT
`FOUND
`
`/ l20
`
`122
`V S
`
`RETURN
`TO
`MAIN
`
`F/G. 8A
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 10 0f 13
`
`5,861,810
`
`INMATE
`NAME
`SEARCH
`
`/' 92
`
`I24
`LAST NAME
`REQUEST /
`
`d
`Q
`
`)20
`ENTER /
`
`‘L
`
`/ 128
`
`INCORRECT CONFIRMATION CORRECT
`
`YES
`
`RE-ENTER
`REQUEST
`
`NO
`
`/3/
`| I
`
`GOODBYE
`
`NO
`
`SEARCH
`
`YES
`
`PLAY
`NOT IN CUSTODY
`"GOODBYE"
`
`I34 /
`
`1%
`F?ggu'g‘f /
`
`FROM
`
`138$
`
`ENTER
`
`TO FIG 9B
`
`F/G. 9A
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 11 0f 13
`
`5,861,810
`
`FROM 9A
`
`#10
`
`NO
`
`CONFIRMED?
`
`YES
`
`I42
`5
`RE-ENTER REQUESTED
`
`N
`0
`
`SEE YES
`
`J144
`
`GOODBYE
`
`YES
`
`//4(p
`1'
`MORETHAN ONE NO
`NAME?
`SEARCH
`
`I
`
`8150
`‘
`ENTRY
`
`I;
`
`FOUND
`I612
`
`PLAY
`NOT FOUND
`GOODBYE
`
`I52
`1
`CONFIRM
`
`INCORRECT
`
`CORRECT
`
`K04
`S
`RETURN
`TO
`MAIN
`
`95
`
`I54
`g
`1’
`RE-ENTER
`
`NO
`
`v
`PLAY
`NOT FOUND
`GOODBYE
`
`150 /
`
`I
`SEARCH
`5/57
`
`INMATE
`FOUND
`
`YES
`
`[58
`S‘
`RETURN
`TO
`MAIN
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 12 0f 13
`
`5,861,810
`
`GIVE INMATE
`DATA
`
`/ 94
`
`7
`
`M16
`REGISTERINQUIRY /
`
`YES
`
`v
`
`ENTRY
`
`I67
`/
`
`NO
`
`[69
`S
`y
`REPEAT STATUS
`INFORMATION GOODBYE
`
`V
`PLAY
`CAUTION STATEMENT
`
`I68
`/
`
`V
`
`TELEPHONENO. / no
`REQUEST
`
`7
`
`PIN REQUEST / I72
`ENTER
`
`y
`
`YES
`
`IS PIN 4 DIGITS
`
`174
`/
`N
`0
`
`REGISTRATION / I76
`COMPLETE "GOODBYE"
`
`I78
`S
`
`I
`'NVAL'D P'N
`
`F/G. /O
`
`
`
`U.S. Patent
`
`Jan. 19,1999
`
`Sheet 13 0f 13
`
`5,861,810
`
`________________ _ _ 1
`
`+
`NOTIFICATION
`LETTER
`
`/961J
`
`T
`Rigglg’gggj
`/ TELEPHONE #
`l80
`
`I
`
`{/82
`
`PLAY NOTIFICATION
`AND PIN REQUEST
`
`Y
`
`ENTRY / I84
`
`I
`
`N0
`
`IS PIN
`4 DIGITS
`
`I86:
`1
`
`YES
`
`/88
`
`"
`
`S
`
`5 I90
`
`I,
`
`——
`
`INVALID PIN
`REPEAT PIN
`REQUEST
`
`NO
`
`céig'gm
`
`YES
`
`5192
`
`Q94
`PLAY NOTIFICATION
`COMPLETE
`GOODBYE
`
`63280515
`
`F/G.//
`
`
`
`1
`SYSTEM AND METHOD FOR PROVIDING
`CRIME VICTIMS UPDATED INFORMATION
`AND EMERGENCY ALERT NOTICES
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to a system and method for
`the alerting of victims of the change of status of a defendant
`in the criminal justice system.
`The rights of victims in the criminal justice system is
`receiving considerable attention today in the midst of a
`signi?cant violent crime rate and early release of many
`offenders due to the over croWding of prisons. Many states
`have passed legislation enacting the right of victims to be
`alerted to the early release or other changes in status of
`defendants and mandating that the state justice system
`timely notify the victims of such change in status. The
`system for noti?cation has been dif?cult to implement for
`various reasons. Victims are extremely mobile and dif?cult
`to locate, requiring considerable personal effort and conse
`quential outlay of expenses in a time of governmental
`budgetary limitations. Moreover, because such systems
`involve numerous status changes and the noti?cation effort
`of busy personnel, they are highly prone to error, miscom
`munications and complete oversight. Most “home groWn”
`systems have proven to be ineffective and the governmental
`agencies often involved make little or no effort to call
`victims. The failed approaches result in victims being forced
`to make repeated and, in many instances unsuccessful, calls
`to the appropriated agencies to receive status changes. The
`mental stress and trauma to victims caused by the failed
`systems can be signi?cant coupled With a high potential of
`injurious attacks perpetrated by certain vindicative defen
`dants.
`It is therefore a primary object of the present invention to
`provide for an effective and dependable system for the
`timely noti?cation of victims of a change of judicial status
`of defendants.
`It is still another object of the present invention to provide
`for a victim noti?cation system that veri?es that the recipient
`of a noti?cation is the victim.
`It is still a further object of the present invention to
`provide for a victim noti?cation system that is ?exible and
`expandable to satisfy a Wide variety of options, laWs and
`regulations of different localities.
`It is yet another object of the present invention to provide
`for a victim noti?cation system that is economically afford
`able and technological accessible to all communities, par
`ticularly to communities of small populations.
`
`SUMMARY OF THE INVENTION
`
`The present invention comprises a victim noti?cation
`system and method for notifying a victim of the change of
`status of an inmate associated With the victim. The system
`itself includes a central processor or control station for
`storing in a data base information pertaining to a plurality of
`prison inmates and a plurality of victims. Each of the victims
`in the central processor data base is identi?ed With a
`respective one of the inmates and has selected a personal
`identi?cation number, i.e., a “PIN”. Another component of
`the system is a remote data storage device that receives all
`information pertaining to changes of status of the inmates
`from a computer Where the information is originated. The
`remote data storage device communicates any inmate
`change of status to the central control station. Each of the
`victims registered in the system has a communication
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`5,861,810
`
`2
`receiving device such as telephone for receiving changes of
`relevant inmate status information from the central control
`station. When the control station receives a change of inmate
`status deemed relevant, it automatically calls and informs
`the victim of the change. The victim then provides the PIN
`to con?rm receipt of the noti?cation. If the PIN is not
`correctly entered into the system, the system Will continue to
`call back until the PIN is entered or a predetermined time
`period has elapsed.
`The remote devices constantly poll the host computers to
`determine if any change of inmate status has occurred. All
`such information is uploaded to the remote device and
`communicated to the central control station. In this manner
`the information on inmates is kept current at the central
`control station.
`To ensure that the remote data storage devices are in
`proper Working order, each of the devices calls the central
`control station at predetermined time intervals. Should one
`of the remote devices fail to call in by the end of the
`predetermined time interval, an alarm and/or pager is acti
`vated so that assigned Workers can immediately address the
`problem.
`BRIEF DESCRIPTION OF THE DRAWING
`FIG. 1 is a schematic of a typical con?guration and
`architecture of a system of victim noti?cation in accordance
`With one embodiment of the present invention;
`FIG. 1A is a block diagram of the major components of
`the central victim noti?cation control station and remote
`gateWay in accordance With one embodiment of the present
`invention;
`FIG. 2 is a block diagram of the executive operating
`system architecture;
`FIG. 3 is a block diagram illustrating the How of infor
`mation and signals When initially connecting the system
`With a remote gateWay at a neW location;
`FIG. 4 is block diagram illustrating the general How of
`information and signals betWeen the various parts of the
`system for updates on inmate status and monitoring of
`remote equipment;
`FIG. 5 is chart representing typical data base record for
`stored information pertaining to prisoners, victims and sys
`tem audit records;
`FIG. 6 is a How chart in block diagram form depicting the
`main operating program used With the present invention;
`FIG. 7 is a How chart depicting the general routine
`initiated by a caller for information either by inmate number
`or inmate name;
`FIG. 8 is a How chart depicting an operating program
`initiated by a caller When requesting a search by inmate
`number and the response thereto;
`FIG. 8A is a How chart of an alternate routine from that
`shoWn in FIG. 8 in Which the caller is required to have a
`speci?c unique number in order to gain information about
`the status of an inmate;
`FIGS. 9A and 9B collectively represent a single ?oW chart
`depicting an operating program initiated by a caller When
`requesting a search by inmate name and the response
`thereto;
`FIG. 10 is a How chart representing an operating program
`initiated by a caller When registering as a to-be noti?ed
`When-status-changes-caller (“victim”) into the noti?cation
`system With respect to a selected inmate; and
`FIG. 11 is a How chart representing an operating program
`initiated by system to notify a victim When the status of the
`selected inmate has changed.
`
`
`
`5,861,810
`
`3
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`In the following description, reference Will be made to
`Callers and Registered Victims in various situations. For a
`clearer understanding, “Caller” shall be de?ned as any
`person that calls the system for information about the status
`of an inmate. “Registered Victim” shall be any person Who
`has provided the system With his or her unique identifying
`communication address such as a telephone number or
`electronic address and selected a personal identifying
`number, i.e., a “PIN”.
`Reference is ?rst made to FIGS. 1 and 1A illustrating,
`respectively, a schematic of the victim information and
`noti?cation system (“System”) used to register and notify
`Registered Victims and a schematic of the major compo
`nents of the remote gateWay and central control station. The
`System is comprised of four major components: a plurality
`of host computers 10; a plurality of remote gateWays 12
`associated With each host computer 10; a central victim call
`control station 14; and a plurality of noti?cation receiving
`devices such as telephones 18 associated With each Caller or
`Registered Victim. The host computers 10 are physically
`located in the region or locality of the site shoWn by the
`dashed lines 11 in Which the inmates are incarcerated or
`placed. Such localities shall de?ne the term “Local Site” as
`used in this description. Computers 10 thus generally store
`inmate and case management information pertaining to
`inmates in the respective Local Site. Examples of host
`computers are mainframes such as IBM 3090, Unisys or HP
`mainframes although at some smaller facilities a PC based
`system may be employed. The controlling softWare compo
`nent used in a Local Site that tracks inmates through the
`local criminal justice system is ordinarily chosen by the
`agency in charge of managing the information (“Local
`Authorities”). Typically, the Local Authorities Will deter
`mine the precise Wording of information to be delivered to
`Callers and Registered Victims pertaining to inmates in the
`Local Site and the nature of the responses required of such
`Callers and Registered Users. As Will be discussed beloW,
`the host computers 10 of the Local Sites are coupled via a
`local area netWork 36 to associated remote gateWays 12
`typically located in the same Local Site. GateWays 12 are
`primarily used to extract and ?lter the necessary information
`from the host computers 10 to deliver to the central control
`station 14 in a manner to be described. Each remote gateWay
`12 comprises hardWare components such as a PC, a high
`speed modem and connection hardWare as illustrated in FIG.
`1A. The softWare component of the gateWay 12 is respon
`sive to provide the necessary information and calls needed
`by the central victim call control station 14.
`Control station 14 communicates With remote gateWay 12
`through long distance netWork 16 and houses the central
`processing softWare functioning to process the data for
`Warded by remote gateWays 12 from host computers 10. The
`primary functions of control station 14 are to process
`incoming calls 20 from telephones 18 and provide informa
`tion in response to such calls via the long distance netWork
`16 and to initiate Warning or noti?cation calls 22 to the
`numbers or electronic addresses of telephones 18 or other
`communication receiving devices of Registered Victims as
`signi?cant changes in inmate status information is received.
`As illustrated in FIG. 1A, each control station 14 typically
`comprises one or more central processors 14a, a high speed
`modem 14b, a voice recognition board 14c, and a telecom
`munication and voice processing board 14d. Examples of
`each are given in the Table 1 set forth beloW. As Will be
`
`4
`discussed beloW, the voice processing board 14d provides
`the System the ability to deliver predetermined spoken
`messages to registered victims While the voice recognition
`board provides the System the ability to process and to react
`to spoken commands and/or store spoken information Where
`the Local Authorities have requested this ability as a part of
`the service to the Local Site.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`The System of the present invention also contemplates the
`use of a noti?cation Work station 24 comprising a PC and
`softWare permitting operators of the System to directly use
`the control station 14 to generate various reports and letters.
`For example, letters 26 prepared, for example, by operators
`of PCs 27 netWorked With the central control station 14.
`Such letters are backup notices containing information With
`respect to the noti?cation attempts such as When and hoW
`many noti?cation calls Were made and the noti?cation
`message itself. The letters are then posted the Registered
`Victims Who Were not con?rmed as being reached.
`As illustrated generally in FIG. 2, the executive operating
`system 28 maintains Within control station 14 a comprehen
`sive database for each Local Site represented by a “DNIS”
`(de?ned beloW) as character numeral 30 and “personality”
`?les 32 for each site. The term “personality” is used to
`denote that each Local Site has an overall process or
`communication routine customiZed in accordance With the
`desires of the Local Authorities for communication With
`Callers and Registered Victims about victims incarcerated
`Within the Local Site. Thus, voice messages, prompts, PIN
`numbers, use of voice recognition and voice inputs, and the
`like vary among the various Local Sites in the System. The
`executive operating system 28 is responsible for the man
`agement of all calls, database management, collection of
`remote gate Way information, the personality and How of all
`incoming and outgoing telephone calls, and the recording of
`all audit ?les shoWing incoming and outgoing call activity.
`When an incoming call is received, the executive operating
`system 28 determines the Local Site to Which the incoming
`call pertains. All Local Sites, for example, may be assigned
`a speci?c 800number for Callers to use When requesting
`status information about an inmate associated With the Local
`Site. When a 800 number is dialed, the long distance carriers
`send a special code to the receiving party Which identi?es
`the speci?c 800 number being dialed. This service is called
`the Dialed Number Identi?cation Service or “DNIS”. Such
`a service provides receiving parties, Who have purchased the
`use of a plurality of 800 numbers, the ability to determine
`Which of the 800 numbers is being called. When the 800
`number assigned to a particular Local Site is called, the
`operating system 28, using the DNIS, is prompted to locate
`the appropriate personality ?le 32 for that call. System 28
`then begins executing the located personality ?le 32, Which
`de?nes all the messages that are played during the particular
`call. The personality ?le 32 also de?nes all of 10 the menu
`selections given the Caller and reads/Write the various data
`bases used for the call.
`
`60
`
`REMOTE GATEWAYS 12
`
`TABLE 1
`
`PC
`
`Modern
`
`65
`
`Pentium PC With 8 MB Ram
`available from Dell Computers
`Corp.
`28.8 KB HS internal modern
`available from US Robotics as
`Model Sportster
`
`
`
`5,861,810
`
`5
`
`TABLE l-continued
`
`CENTRAL CONTROL STATION 14
`
`Central Processor 14a
`
`High Speed Modem 14b
`
`Voice Recognition Board 14c
`
`Voice Processing Board 14d
`
`14 Slot Pentium industrial
`grade rack mount central
`processor available from Texas
`Micro
`28.8 KB HS internal modem
`available from US Robotics as
`Model Sportster
`Voice recognition board
`available from Dialogic Corp.
`Mfg. # VR/16O
`T1 telecommunications and
`voice processing board
`available from Dialogic Corp.
`as Mfg # D/24OSC-T1
`
`The inmate information that goes into the various data
`bases is initially collected from the host computer 10 by the
`remote gateway 12 which, in part, comprises a PC and a high
`speed modem. The block diagram of FIG. 3 illustrates that,
`as each new Local Site goes into the System of the present
`invention, the PC of the remote gateway 12 associated with
`the new Local Site is connected through a local area network
`36 to the associated host computer 10 and, as stated above,
`is able to communicate with the central control station 14
`through a long distance carrier. Once connected, the remote
`gateway 12 then collects a complete set of initial inmate and
`victim data from host computer 10 and transmits the data to
`the control station 14. It is at this point that Callers (here
`depicted by BLOCK 38) can dial a unique 800 number
`(shown by character numeral 40) assigned to each Local Site
`and search the data bases associated with that Local Site for
`information on inmate status. Additionally, the Caller, if not
`already registered, can register as a Registered Victim for
`automatic noti?cation in response to the registration request
`42 communicated to the caller following delivery of the
`inmate status information. Individuals are made aware of the
`800 number through public service announcements made in
`the media of the appropriate Local Site, brochures promul
`gated by the police of the Local Site, and other publicity as
`determined by the Local Authorities. This publicity trans
`action is depicted by publicity BLOCK 44. It should also be
`understood that registration of victims as Registered Victims
`is often done during or following the court proceedings of
`the inmates usually at the request of representatives of the
`Local Authorities. In many instances, the Local Authorities
`prefer to limit the availability of the System, both for search
`and registration operations, to those who are speci?cally
`sought out and registered by the local law enforcement
`personnel as opposed to allowing any person from the
`general public to use the System. In such case, the infor
`mation pertaining to the Registered Victims is entered into
`the host computer 10 by representatives of the Local
`Authorities and, via the associated remote gateway 12, is
`delivered and stored in the central control station 14.
`Changes to the Registered Victims database can be inputted
`by a keyboard directly into the host computer 10 by autho
`riZed representatives of the Local Authorities and/or Regis
`tered Victims or made by the Registered Victim through
`direct electronic communication with the central control
`station 14 using the Registered Victim’s telephone.
`It is clearly imperative that the inmate databases at the
`central control station 14 be maintained current with quick
`updates re?ecting any changes in inmate status. Reference is
`made to FIGS. 4 and 5 for the ensuing discussion, the latter
`Figure illustrating a typical inmate ?le 46, victim ?le 48, and
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`6
`audit ?le 50. To ensure the current state of the inmate ?les,
`remote gateway 12 makes a transaction ?le check 52 at
`predetermined intervals, e.g., every 10 minutes, with each
`host computer 10. As each inmate record is modi?ed and
`entered into the host computer 10, the host computer 10
`writes an audit record to a transaction ?le and uploads the
`transaction ?le depicted by line 54 to gateway 12. In turn,
`gateway 12 checks the transaction ?le for changes in inmate
`status. When a change is detected, gateway 12 sends the
`changed status depicted by line 56 to control station 14.
`Control station 14 then searches databases to determine if
`there are any Registered Victims (denoted by BLOCK 59)
`that need to be noti?ed of the changed status. In the event
`that such Registered Victims are identi?ed, the noti?cation
`call process (discussed below) will be automatically trig
`gered and a noti?cation call sequence 58 initiated.
`To ensure that all remote equipment is working properly
`and particularly that no communication lapses are occurring,
`each remote gateway 12 transmits a “handshake” signal 60
`at frequent intervals, e.g., every two minutes, to control
`station 14. Preferably, the signal 60 is a telephone call to a
`speci?c telephone number at control station 14 with the call
`carrying an automatic number identi?cation (ANI) signal
`passed between telephone rings. Such ANI signals enable
`the control station 14 to identify the precise remote gateway
`12 making the call without making a direct connection, i.e.,
`picking up the telephone or using separate communication
`channels. Some telephone carriers still do not have this
`capability, however. In such cases, the remote gateway 12 in
`the Local Site is assigned a 800 number unique for that
`Local Site to call and the control station 14, using the DNIS,
`can then identify the calling remote gateway 12 by the 800
`number thus being called. When the handshake signal is
`timely received, the control station 14 “knows” that the
`gateway 12 is operating properly and the timer for that
`remote gateway is reset as shown by reset BLOCK 61. When
`a gateway 12 fails to call in with the handshake signal 60,
`the control station may cause an alert signal 62 to trigger an
`alert window of a computer screen 63 at the site of the
`central control station 14 alerting a viewer of the possible
`communication malfunction. Additionally, the control sta
`tion 14 may also send out a pager signal 64 to a pager 65,
`alerting an assigned repair operator of the uncommunicative
`remote gateway who then determines the nature and
`addresses the problem.
`The function block diagram of FIG. 6 describes the
`“updating” of the various ?les upon receipt of an incoming
`status change call 56 from remote gateway 12. Initially,
`control station 14 handshakes with the calling remote gate
`way 12 and veri?es at VERIFY 66 that the data is coming
`from a legitimate source using a predetermined identifying
`protocol. This, of course, is needed to ensure that system is
`not compromised by entry of incorrect data from extraneous
`sources. Thus, if NO, the program routine stops at BLOCK
`68. If YES, the System determines at BLOCK 70 whether
`this is a change to the victim or inmate database. If it is a
`change to the victim database, the victim database is updated
`at BLOCK 72. If the change is to the inmate database, then
`the inmate database is updated at BLOCK 74 and a deter
`mination made at NOTIFICATION 76 whether a Registered
`Victim associated with the particular inmate should be
`noti?ed. If YES, then noti?cation calls 78 are begun. If NO,
`the program ends at BLOCK 80.
`The general routine executed when a Caller dials the 800
`number for a Local Site is shown in FIG. 7. The various
`subroutines, executed primarily in accordance with menu
`choices selected by the Caller, are illustrated in FIGS. 8 and
`
`
`
`5,861,810
`
`7
`9A and 9B. FIG. 10 is the subroutine automatically executed
`following delivery of the requested inmate status informa
`tion during Which the Caller is given the option of register
`ing as a Registered Victim.
`As stated above, When the Caller calls an 800 number
`assigned to a Local Site at BLOCK 84, the main routine is
`initiated at BLOCK 86 With the control station 14 through its
`voice processor ansWering the call, identifying the Local
`Site associated With the call via DNIS, and providing initial
`prompts in accordance With the personality ?le for that
`Local Site. In multilingual localities, the initial prompts may
`start by giving the Caller a choice betWeen tWo of more
`languages in Which further voice communications can pro
`ceed. For example, the language choices may be English,
`Spanish or Vietnamese, With the voice processor stating each
`choice in the respective language for that choice. The Caller
`Would press 1, 2, or 3 as prompted depending on the
`language choice. Once a language has been selected, the
`System Will continue to use that language When addressing
`the Caller, in both current and future noti?cation calls. The
`neXt prompt at BLOCK 88 made in the selected language
`Would be a request to press 1 if the Caller Wishes to use an
`“inmate number” to initiate the search or press 2 if the Caller
`Will use the inmate name for the search. Local Authorities
`typically assign each inmate a number, i.e., the “inmate
`number”, for use in the System. Then Caller then makes a
`choice selection depicted by BLOCK 90 for inmate number
`or BLOCK 92 for inmate name. The selection then initiates
`either the subroutines set forth in FIGS. 8 for inmate number
`or FIGS. 9A/9B for inmate name. Once those subroutines
`have been completed With the inmate information being
`vocally given, the Caller is returned to the main routine and
`Will be typically asked if he or she Wishes to be registered
`as a Registered Victim at BLOCK 94. If the Caller responds
`in the af?rmative to the registration inquiry prompt at
`BLOCK 94, then the subroutine of FIG. 10 is initiated and
`eXecuted. Upon completion of the registration menu
`selections, the program ends in the main routine With a
`“Goodbye” BLOCK 96 to the caller.
`When the Caller elects to search for inmate status infor
`mation by inmate number as illustrated in the subroutine
`?oW chart of FIG. 8, the caller is prompted at prompt
`BLOCK 98 by the voice processor to enter the inmate
`number or, in an alternate subroutine, a “victim number” on
`the touch dial phone. Since the inmate number is determined
`by the Local Authorities, the Caller obtains the inmate
`number through procedures established by the Local
`Authorities. For certain Local Sites, the Authorities may
`desire to further limit access to the information imparted by
`the System. Some Local Authorities prefer not to permit use
`of the inmate names to gain access and limit dissemination
`of the inmates number on a need-to-knoW basis. Some Local
`Authorities issue the inmate numbers only to Registered
`Victims. Thus, any Caller Wishing to access the System
`using the Local Site DNIS number Would have to either
`register as a Registered Victim With the Local Authorities to
`obtain the inmate number or go through some sort of
`prescribed administrative procedure. Moreover, the Local
`Authorities may require that each Registered Victim be
`provided a victim noti?cation card identi?cation number
`(Victim Number) that must be entered before any informa
`tion on inmates is communicated by the central control
`station. When the Local Site requires the use of a Victim
`Number, entry of a valid Victim Number Will automatically
`call up the database for the inmate associated With the
`Victim Number and Registered Victim.
`Once the inmate number is entered in subroutine of FIG.
`8 at BLOCK 98, as prompted, control station 14 determines
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`8
`if the number is valid or not at determination BLOCK 100.
`If NO, the Caller is informed that the i