`
`SECURUS EXHIBIT 1001
`
`
`
`US 7,256,816 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`>>>D>>>D>D>>D>D>D>
`
`5,719,928
`5,745,160
`5,821,984
`5,844,600
`5,848,132
`5,867,653
`5,872,841
`5,903,302
`5,978,463
`5,982,863
`6,088,429
`6,104,788
`6,211,902 B1*
`6,292,211
`6,343,313 B1
`6,356,294 B1
`6,466,252 B1
`6,674,459 B2*
`2001/0047264 A1
`2002/0066109 A1
`2003/0069752 A1
`2003/0091169 A1*
`2003/0174826 A1*
`
`2/1998
`4/1998
`10/1998
`12/1998
`12/1998
`2/1999
`2/1999
`5/1999
`11/1999
`11/1999
`7/2000
`8/2000
`4/2001
`9/2001
`1/2002
`3/2002
`10/2002
`1/2004
`11/2001
`5/2002
`4/2003
`5/2003
`9/2003
`
`Pinnell et al.
`Ishida et al.
`Ito et al.
`Kerr ................. . .
`Morley et al.
`Aras et al.
`King et al.
`Browning et al.
`Jurkevics et al.
`Smiley et al.
`Garcia
`Shaffer et al.
`Tanoi
`............... ..
`Pena ................ ..
`Salesky et al.
`Martin et al.
`Miyazaki
`Ben-Shachar et al.
`Roundtree
`Tam et al.
`LeDain et al.
`Cain
`Hesse ............... ..
`
`2004/0111752 A1
`2005/0027581 A1
`
`6/2004 Katz et al.
`2/2005 Kjesbu et al.
`
`FOREIGN PATENT DOCUMENTS
`
`348/14.12
`
`W0
`W0
`
`WO01/79626 A1
`WO03/053005 A1
`
`10/2001
`6/2003
`
`OTHER PUBLICATIONS
`
`Videoconference Rooms for Rent by the Hour http:wwW.mivnet.
`com/users.php and www.mivnet.com/users/prim_services.php, no
`date available.
`Technology Guide, H. 323 Technology, Copyright 1998-2004, Ixia,
`no date available.
`L. Lambrinos, P. Kirstein and V. hardn1an, “Distributed Recording
`of Mbone Sessions”, no date available.
`R. Cohen and G. Kaempfer, “A Unicast-based Approach for Stream-
`ing Multicast”, Department of Computer Science, Technion, Haifa
`32000, Israel, no date available.
`Networked Multimedia Communication, Telejustice and Security
`Solutions, WWW/vugate.com/index.html printed Feb. 10, 2005, no
`date available.
`
`* cited by examiner
`
`348/14.09
`348/14.08
`
`348/14.09
`
`379/114.2
`379/210.01
`
`Page 2 of 18
`
`Page 2 of 18
`
`
`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 1 of 6
`
`US 7,256,816 B2
`
`\’
`
`
`
`poiWM“.pom:
`
`
`
`mete:w_>$58<53zow_E
`
`m:,__on_ozw.:m_>:m_>M29:oz<$o_>$mEeagoomN_mo_.:.3<
`
`
`
`
`
`
`
`2E<o\E82SE28538:8’amu5_>_EUs$3.Il'|w
`HWIIII.5:3ozmm9M59$252HoHm"
`
`
`mZOIn_OmQ=>_DZ<mm._3QmIUw>n=._.Zmn=w.:w_>\<mm=2<O\>._.
`
`
`
`
`m3T“lntllllllflmEmsE:
`IIII“_.._<.G>55:mfizmzfidozéIJ$zs_z_Hzmmmao
`
`
`
`
`Eoz__>mmzo:<o:zmI5<Em:m¢E_m_>mEoAea55
`
`
`
`._.Zm_>_m_w<Z<_>_._._m_>m._m_w_._mmm._.<_>_Z_m_ZOIn_Omo_S_
`
`Page 3 of 18
`
`mzo_.Eoxo=>_\!Iwz_om_oomm.mzo_._n_o¢o__>_
`
`
`\<E_>_<o\E\\‘(In\>>m_>_<o\Z
`ow:I.umm<mE<m_9,2-zocfimEwm$>omS555SEA_//
` -com»2E-“Lm1%9:o:.n|u|l_..9:I‘In
`
`
`
`
`
`
`
`
`..H|:.'nI!In‘82zo:<jm_oz<o92
`
`.'muBaowzommw:m_>
`
`lruoNJM5818.m:<_\,_z_
`
`
`
`ihuo:H..IIAIIn00.555_._.:>>IIIII:eC$5.8m;as;<n_oz<
`
`m:m_>538:8
`2,:msazommHian:,ms_><n_
`
`mi
`
`was
`
`Page 3 of 18
`
`
`
`
`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 2 of 6
`
`US 7,256,816 B2
`
`EmwE>o
`
`Mm‘I9MWMVMVM
`
`
`SNozamoam:m_>
`gas.\az__>_<m_Em92
`
`
`
` mm._.m<_>_ozzaaxom/o—m
`
`
`
`$joEz8mm<mE<o
`
`Page 4 of 18
`
`Page 4 of 18
`
`
`
`
`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 3 of 6
`
`US 7,256,816 B2
`
`FIG. 3A
`
`300
`
`
`
`OPERATOR OR INTERACTIVE VOICE
`RESPONSE SYSTEM ANSWERS
`
`
`
`
`CALL TO 1-800 NUMBER AND
`REQUESTS ENTRY OF PRISONER
`
`IDENTIFICATION NUMBER IN
`LANGUAGE OF CHOICE
`
`
`LANGUAGE
`()H0|(;E
`
`
`
`
`
`
`
`
`
`
`
`OPERATOR OR IVR SYSTEM
`VALID
`COMMUNICATES THAT
`IDENTIFICATION
`IDENTIFICATION NUMBER
`NUMBER?
`
`ENTERED IS NOT VALID
`
`
`
`IDENTITY
`
`VERIFIED?
`
`
`
`
`
`
`
`
`
`OPERATOR OR IVR
`SYSTEM COMMUNICATES
`
`ALLOWED
`THAT PRISONER X IS
`VISITORS?
`
`
`NOT ALLOWED VISITORS
`UNTIL X DATE
`
`
`OPERATOR OR CALLER ENTERS
`THE IDENTIFICATION NUMBERS
`OF ALL VISITORS
`
`
`
`
`
`
`
`
`
`OPERATOR OR IVR
`SYSTEM COMMUNICATES
`
`APPROVED
`THAT CALLER REQUESTED
`VISITORS?
`
`
`VISITORS ARE NOT ON
`THE APPROVED LIST
`
`
`DIRECTORY DB OF ALL
`PRISONERS AND ALLOWED
`
`
`VISITORS - INCLUDES
`PRISONER IDENTIFICATION
`
`
`
`
`SESSION NUMBER
`
`NUMBER, NAME, LOCATION.
`VISIT STATUS. LIST OF
`
`ALLOWED VISITORS WITH
`
`
`THEIR IDENTIFICATION
` TO FIG. 38 TO FIG. 3B
`
`NUMBERS, PREFERRED
`
`
`LANGUAGE
`
`
`302
`
`
`
`Page 5 of 18
`
`Page 5 of 18
`
`
`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 4 of 6
`
`US 7,256,816 B2
`
`FROM
`FIG. 3A
`
`U
`
`FROM
`FIG. 3A
`
`0
`
`FIG. 33
`
`3°“
`,/
`
`324
`
`326
`
`330
`
`
`ADVISE HOW TO USE
`PAYMENT
`MONEY ORDER
`
`ON FILE?
`
`
`
`
`
`PREPAYMENT SYSTEM
`AND PREPAID VISIT PAKS
`
`332
`
`
`
`ARE THERE
`ADEQUATE
`FUNDS?
`
`
`YES
`
`MONEY ORDER
`PAYMENT SYSTEM
`
`ELECTRONIC TRANSFER
`NOTICES FROM MONEY
`ORDER VENDOR
`
`328
`
`334
`
`ENTER VISITOR ZIP
`CODE PRESENT
`CLOSEST LOCATIONS
`
`335
`
`SELECT LOCATION
`AND TIME
`
`338
`
`AVAILABLE?
`
`YES
`
`DEBIT PAYMENT
`RECORD
`
`UPDATE PAYMENT
`
`
`
`SCHEDULE VISIT
`
`340
`
`PRISONER
`
`
`SYSTEM
`
`
`
`CALL VISITORS
`TO RESCHEDULE
`
`345
`
`NO
`
`348
`
`CREATE REPORTS AND
`
`CONFIRMATION TO
`
`350
`
`AUTOSTART PROCESS
`
`VISITO, PRISONER
`
`352
`
`DAILY ELECTRONIC
`SCHEDULE TO
`EACH PRISON
`
`358
`
`REMINDER CALL LIST
`FOR RESERVATION
`OPERATORS
`
`OPERATORS PLACE
`REMINDER CALLS
`TO VISITORS
`
`355
`
`Page 6 of 18
`
`Page 6 of 18
`
`
`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 5 of 6
`
`US 7,256,816 B2
`
`401
`
`
` IDENTITY
`ERIFIED?
`V
`
`YES
`
`402
`
`FIG. 4
`
`4°”
`/
`
`RECORDING
`
`SYSTEM BEGINS VISIT AND
`RECORDING USING INFORMATION
`FROM THE SCHEDULER
`
`
`
`404
`
`
`EVERYONE
`NO
`PRESENT?
`
`
`
`VALID
`REASON F R
`RESCHEDULOING
`
`7
`
`
`
`was
`416
`PRESENT VISIT RULES AND BEGIN
`THE VISIT IN PREFERRED LANGUAGE
`
`
`
`412
`
`UPDATE VISIT
`RECORD
`
`TERMINATE VISIT
`
` OVERSEER
`ISSUES WARNING
`TO PARTICIPANTS
`
`
`
`ISSUE SESSION
`NUMBER KEY WHICH
`ALLOWS VISIT TO BE
`RESCHEDULED AT NO
`
`
`
`ADDITIONAL CHARGE
`
`
`
`
`
`
`SCREENS INCLUDE WINDOWS
`
`WITH RULES AND TIME
`
`REMAINING coNTINousI_V
`VISIBLE ON THE SCREEN
`
`
`
`
`
`UPDATE SCHEDULER
`RECORD
`
`OVERSEER RANDOMLY
`MONITORS VISIT
`
`420
`
`RULES
`VIOLATION?
`
`ygg
`
`422 N0
`
`
`
`
`
`
`TECHNICAL
`PROBLEM WITH
`
`VISIT?
`CONTINUED
`
`RULES
`432
`ISSUE SESSION
`VIOLATION
`NUMBER KEY WHICH
`7
`ALLOWS VISIT TO BE
`RESCHEDULED AT NO
`ADDITIONAL CHARGE
`
`
`
`
`VISIT COMPLETED
`SUCCESSFULLY
`
`
`
`
`
`
`
`RECORD
`
`UPDATE VISIT RECORD
`
`WITH DATE AND TIME OF
`VISIT TO THE SECOND
`
`
`
`YES
`
`UPDATE VISIT
`RECORD
`
`440
`
`438
`
`ARCHIVE VISIT RECORDING AND
`ASSOCIATED VISIT RECORD
`
`445
`
`Page 7 of 18
`
`Page 7 of 18
`
`
`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 6 of 6
`
`US 7,256,816 B2
`
`502
`
`504
`
`506
`
`
`
`AUTOSTART PROCESS
`BEGINS VISIT AND
`RECORDING
`
`
`
`
`USE PRISONER
`IDENTIFICATION NUMBER AND
`
`
`
`DATE/TIME TO STORE
`RECORDINGS IN RAW FORMAT
`
`
`STORE KEYS
`
`AND VIDEO/
`AUDIO DATA
`
`DIRECTORY OF
`
`
`
`REVfE‘dJEI'R‘3SR'§AEETR|X
`
`I
`OF ALLOWED RECORDS
`
`
`
`512
`
`516
`
`SELECT REQUESTED
`RECORDS, CONVERT
`TO PAYBACK FORMAT
`
`
`
`DOWNLOAD VIEWING
`APPLET AND DATA
`
`FIG. 5
`
`513
`
`508
`
`REQUEST FOR ACCESS
`TO RECORDED DATA
`
`
`
`
`Is REOuEsTER
`AUTHORIZED TO ACCESS
`
`INFORMATION?
`
`510
`
`ENTER PRISONER
`IDENTIFICATION AND
`DATE OF VISIT
`
`514
`
`Page 8 of 18
`
`Page 8 of 18
`
`
`
`US 7,256,816 B2
`
`1
`SYSTEMS AND PROCESSES FOR
`SCHEDULING AND CONDUCTING
`AUDIO/VIDEO COMMUNICATIONS
`
`TECHNICAL FIELD
`
`Disclosed embodiments herein relate generally to audio
`and video commumcations, and more particularly to sched-
`uling and conducting monitored or unmonitored video visits,
`as well as the computer architecture for providing such
`scheduling and conducting of video visits between any
`number of endpoints.
`
`BACKGROUND
`
`When two parties want to communicate in real-time over
`great distances, the telephone has been the traditional com-
`munications device of choice. Advancements in technolo-
`
`gies over the years have now permitted both audio and video
`communications between parties over great distances. This
`form of communications is commonly referred to as video
`conferencing, and depending on the complexity (and asso-
`ciated expense) of the equipment involved may provide
`nearly real-time communications among two or more par-
`ties.
`
`In traditional form, video conferencing includes some
`type of local equipment associated with each person seeking
`to participate in the conference. When the conference is to
`be started, the equipment at each location is employed to call
`in (e.g., “conference in”) to a call center. As each of these
`endpoints establishes a connection with the central location,
`the video and audio signals may then be accessed by all of
`the participants so that a conversation with both audio and
`video can take place. Among the various types of video
`conferencing equipment, one of the most common employs
`specialty dedicated equipment at each geographic location
`of the participants. This equipment typically employs an
`ISDN or similar data connection to transmit and receive
`
`audio/video communications data during the video confer-
`ence.
`
`Unfortunately, conventionally available video conferenc-
`ing equipment has a common characteristic: each system
`requires endpoint initiation (and termination) for each par-
`ticipant in the conference. Such a requirement has several
`disadvantages, including the high cost associated with such
`specialty equipment, and the freedom (or burden) to control
`the equipment at each corresponding endpoint. Regarding
`expense, many companies or individuals are financially
`prohibited from enjoying such video conferencing because
`they either cannot afford the special equipment, or perhaps
`carmot justify the expense for equipment not regularly used.
`Regarding endpoint control, the difficulty in operating such
`specialty equipment is a burden many people would like to
`be without. In addition, situations exist where initiation of
`the video conference and control of the video conferencing
`equipment by one or more of the participants is not desired.
`An example of a situation where endpoint control is not
`desirable is in the prison system. Many times, a prison
`inmate is housed in a location a great distance from his
`family or friends, which results in visitation of the inmate
`being inconvenient or even impossible due to travel time and
`expense. As such, a video conference with the inmate would
`seem a perfect answer; however, as mentioned above, the
`expense and complexity of the necessary equipment may be
`prohibitive. Perhaps more important is the potential security
`risk if endpoint control is permitted in a video conference
`with an inmate. Even in conventional face-to-face visits,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Page 9 of 18
`
`2
`conversations between inmates and their visitors are mom-
`
`tored to ensure that no greater security risk is created than
`already exists with an outsider’s presence in the prison.
`However, if endpoint control in such a visitation scenario
`were permitted, it would be difficult to effectively monitor
`the visit
`to ensure security. Potential security breaches
`include, but are not limited to, coded dialog between the
`inmate and a visitor, as well as hand and facial gestures used
`to communicate improper information.
`While traditional video conferencing equipment could
`potentially be used in the prison scenario, the above-men-
`tioned problems would still be present. More specifically,
`conventional video conferencing requires endpoint control
`to initiate and terminate the conversation. As a result, an
`overseer may not be capable of ending the visit if conduct
`violations occur during the visit. In addition, with endpoint
`control of the equipment, a prison inmate can easily damage
`the equipment if he has access to it, and may lack the
`technical knowledge to even operate the equipment at all.
`Although a security officer or technician may be given
`control of the equipment so that it is not accessible by the
`inmate, another disadvantage is created by requiring the
`services of an employee, whose time is probably better
`served elsewhere.
`
`Perhaps the most important reason why traditional video
`conferencing would not be workable for prison visitation
`and other similar situations is the lack of synchronicity
`between data connections during the conference. More spe-
`cifically, as each participant in the video conference con-
`nects to the conversation, a new data connection, or path, is
`created. In a prison situation, at least three data paths would
`be present: one for the inmate, one for the visitor, and one
`for the overseer monitoring the conversation. Unfortunately,
`an inherent latency exists between these multiple connec-
`tions that poses a significant security risk for the prison.
`Because of latency in the data path during data transmission,
`communication is not instantaneous; the delay is a function
`of all intermediate equipment and media along the data path.
`Because different routes may be taken along each data path,
`there may exist a difference in latency and the delay expe-
`rienced by each if each party is connected with a separate
`data path. Unfortunately, this difference in latency among
`multiple simultaneous data paths poses a significant security
`risk for a prison. As a result, the visitor or inmate may
`engage in an improper communication during the visit, but
`the difference in latency between connections prevents the
`overseer from learning of the improper conduct in time to
`prevent
`it or further improper conduct from occurring.
`Accordingly, what is needed is a video visitation system for
`permitting video visits between participants that
`is not
`endpoint controlled and that does not suffer from the defi-
`ciencies found in the prior art.
`
`BRIEF SUMMARY
`
`Disclosed herein are methods of scheduling and conduct-
`ing monitored or non-monitored video visits, as well as
`computer architecture for providing such scheduling and
`conducting of video visits, where the participants in the
`video visit are not required or able to interact with the
`audio/video equipment for the initial connection to start the
`video visit. In addition, in some embodiments participants
`are also not able to interact with the equipment during the
`actual visit. Whether they can interact with the equipment
`during the visit or not (e.g., voice-actuated volume control,
`etc.), the audio/video equipment employed during the video
`visit may be isolated from physical contact by the first
`
`Page 9 of 18
`
`
`
`US 7,256,816 B2
`
`3
`participant or second participant, and therefore may be
`located at fixed or mobile geographic locations where such
`equipment connections and operations may be maintained.
`In one embodiment of a method of scheduling such a
`video visit, the method includes assigning an individual ID
`code to a first participant and second participant in the video
`visit, for example, a caller and a receiver in a video visit. Of
`course, any number of participants may participate in the
`visit. In this example, to schedule a visit between these two
`participants, the first participant contacts a data center and
`enters the ID code of the second participant he is trying to
`visit with.
`In a more specific embodiment,
`the second
`participant is a prison inmate and the first participant is a
`family member of the inmate desiring a visit with the inmate
`using audio/video communications equipment, however,
`any types of participants may be present. When the ID code
`for the second participant is entered, the data center may
`then conduct a check to determine whether second partici-
`pant
`is permitted to receive video visits. Also,
`the first
`participant’s ID code may also be submitted to the data
`center and checked to determine if the first participant is
`permitted to be in contact with the second participant.
`In another embodiment, devices may be employed to
`verify the identity of the first participant, such as biometric
`devices. Such biometric technologies are defined as auto-
`mated devices/methods for identifying or authenticating the
`identity of a living person based on a physiological or
`behavioral characteristic. For example, fingerprint reading
`devices,
`retina
`scanning devices, voice identification
`devices,
`face mapping devices,
`signature comparison
`devices and the like may be employed to further ensure
`security during the video visit by authenticating the identity
`of the first participant. Moreover, if the participants are
`being charged for making the video visit, the data center may
`also determine if sufficient funds (or credit) for the visit have
`been paid. One advantage to the disclosed video visits is that
`the first participant may visit with the second participant
`over long distances that may otherwise prevent their com-
`munication. As such, in one embodiment, the data center
`may prompt the participant making the reservation for his
`geographic location(s), and then present several locations
`near the first participant’s location for conducting the visit.
`Once a suitable location is selected,
`the visit may be
`scheduled and then conducted at the appropriate time. In
`addition, other participants may also be given the option to
`select desirable geographic locations for them to participate
`in the video visit.
`
`In one embodiment of a method of conducting a video
`visit, the method includes connecting the first participant
`and second participant at the scheduled time using the data
`center and without any action taken by the first participant
`or second participant, or anyone associated with their geo-
`graphic locations, to initiate the visit. Once the video visit
`begins, in some embodiments, certain rules for the visit may
`be displayed for the participants to read. For example, if the
`visit is between a prison inmate and one or more of his
`family members, the rules may discuss how the visit is being
`monitored by appropriate personnel and that perhaps
`“secret” communications between the parties (e.g., hand
`signals, facial gestures, movements, etc.) are not permitted
`during the visit. In such an embodiment, the method also
`includes an overseer actively monitoring the visit between
`the parties.
`In a related embodiment, the overseer may be simulta-
`neously monitoring multiple such video visits, and may have
`the ability to select the audio communications of any par-
`ticular visit for closer monitoring and inspection, as well as
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`zoom in on one of the particular video feeds should the need
`arise. Examples of other potential violations may be hand-
`signs, gestures, or even expressly saying certain words or
`phrases. If the overseer determines a rules violation has or
`is occurring, he may intervene with a warning to one or both
`of the parties. Continued rules violations may lead to ter-
`mination of the visit, or the overseer, or perhaps automated
`equipment, may determine that the violation is of the sort
`that requires the visit
`to be terminated immediately.
`In
`addition, a notation of the incident(s) may be made in the
`video visit records associated with either or both of the first
`
`participant and second participant, which may in turn affect
`the permission required for the two to conduct another visit
`in the future. Conversely, if the visit is concluded without
`incident, the appropriate records may also be updated as
`such.
`
`In another aspect, a system for conducting a video visit is
`also disclosed. In one embodiment, the system includes a
`data center configured to initiate and terminate an audio/
`video communication between first and second participants.
`The system also includes a first terminal coupled to the data
`center for use by the first participant to visit with the second
`participant, and a second terminal coupled to the data center
`for use by the second participant to visit with the first
`participant. In a specific embodiment,
`the data center is
`coupled to the first and second terminals via a computer
`network, for example, a packet-based network such as the
`Internet. Each of the first and second terminals may also be
`coupled to the computer network via their own local area
`network.
`
`In a broad aspect, the system also includes a multiplexing
`means, which may be embodied in hardware, software, of a
`combination of both, that is configured to receive commu-
`nication data, encrypted or unencrypted, sent between the
`first and second participants during the audio/video com-
`munication, and to generate copied data based on the com-
`munication data. In addition, such a system would include
`an overseer coupled to the multiplexing means and config-
`ured to receive the copied data and to monitor the audio/
`video communication between the first and second partici-
`pants using the received copied data. In an exemplary
`embodiment,
`the multiplexing means is geographically
`proximate to the first terminal and configured to provide the
`communication data to the first terminal and the copied data
`to the overseer. In an alternative embodiment, the multi-
`plexing means may be geographically proximate to the data
`center and configured to provide the communication data to
`the first and second terminals and the copied data to the
`overseer. In yet other embodiments, recording equipment
`configured to receive the copied data for data storage and
`retrieval is also included in the system, perhaps via the same
`or a second multiplexing means.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding of this disclosure, and
`the advantages of the systems and methods herein, reference
`is now made to the following descriptions taken in conjunc-
`tion with the accompanying drawings, in which:
`FIG. 1 illustrates a conceptual view of one embodiment of
`a system for providing monitored video visits in accordance
`with the principles disclosed herein;
`FIG. 2 illustrates one embodiment of the architecture for
`
`a computer network for providing the monitored video visits
`discussed above;
`
`Page 10 of 18
`
`Page 10 of 18
`
`
`
`US 7,256,816 B2
`
`5
`FIGS. 3A & 3B illustrate a flow diagram that sets forth
`one embodiment of a process for scheduling a video visit
`between a visitor and a prison inmate;
`FIG. 4 illustrates a flow diagram that sets forth one
`embodiment of a process for conducting a video visit
`between a visitor and a prison inmate, such as the visit
`scheduled with reference to FIGS. 3A & 3B; and
`FIG. 5 illustrates a flow diagram that sets forth one
`embodiment of a process for recording and playing back a
`video visit conducted according to the disclosed principles.
`
`DETAILED DESCRIPTION OF PREFERRED
`EMBODIMENTS
`
`Referring initially to FIG. 1, illustrated is a conceptual
`View of one embodiment of a system 100 for providing
`monitored or unmonitored video visits in accordance with
`
`the principles disclosed herein. The system 100 includes a
`group of first participants 105, which in the illustrated
`embodiment is a group of visitors 105 seeking to have a
`video visit with inmates in a prison 110. While many
`embodiments described herein are discussed in terms of
`
`prison inmates and visitors of those inmates, nothing herein
`should be interpreted to limit the disclosed systems and
`methods to only the prison visitation scenario. Instead, the
`disclosed systems and methods are easily employable in any
`situation where two or more participants wish to conduct a
`video visit. For example, the disclosed systems and methods
`may be implanted not only for video prison visits, but also
`for such uses as real-time video visits among government
`officials or business personnel, for medical diagnostics and
`possibly assisting in performing procedures from afar (e.g.,
`“tele-medicine”), business video meetings, and even for
`educational purposes, such as transmitting a live session to
`a group of students connected to the same local network. In
`short, the disclosed principles are useful in any situation
`where two or more parties wish to communicate using video
`and audio equipment.
`The system 100 also includes a visit office 115 where a
`visitor may go to conduct his side of the video visit. Linked
`between the visit office 115 and the prison 110 is a data
`center 120, which provides the connection between the visit
`office 115 and the prison 110. In non-prison scenarios, the
`prison 110 may be another location where a second partici-
`pant may go to conduct his side of the video visit, for
`example, another visit office. In the illustrated embodiment,
`both the visit office 115 and the prison 110 contain visit
`terminals 125 for participating in a video visit conducted as
`disclosed herein. Specifically, the terminals 125 may each
`include a video display (e.g., TV, computer/video screen,
`computer terminal, etc.), and video camera for capturing the
`image of the participant, and a microphone for capturing
`audio from the participant at that location. In a more specific
`embodiment, these different components are housed in a
`single structure comprising the terminal 125. Of course, in
`other embodiments, these devices may be structurally sepa-
`rated from each other.
`
`Whether located in a single device or not, it should be
`especially noted that the terminals 125 do not include any
`type of interactive input device accessible by the participant
`at that location. As a result, the participants at these visit
`endpoints are not responsible, or even capable, of initiating
`the video visit. Instead,
`the video visit
`is initiated at a
`scheduled time by the data center, as discussed in further
`detail below. This elimination of endpoint interactive control
`makes the disclosed system especially useful in scenarios
`where the participants are ill-equipped to operate devices for
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`initiating a video visit, or where the participants are not
`trusted to operate such devices, either for the safety of the
`equipment or the security of the location of the participant.
`As such,
`the system 100 is especially useful
`in prison
`situations where inmate operation of video visit equipment
`is discouraged, either because they are ignorant of such
`equipment or for the protection of the equipment itself from
`damage or theft. Moreover, with scheduled video visits that
`are initiated by a central data center,
`there can be no
`argument about lost visit times caused by, for example,
`delays in connecting or problems with equipment operation.
`Looking again at FIG. 1, the data center 120 houses the
`equipment 130 used to schedule and conduct the video
`visits. More specifically, the data center 120 includes Direc-
`tory Services and User Authentication equipment 130a. This
`equipment 130a provides identification and authentication
`services for the participants in the video visit, such as
`through stored lists of available participants and identifica-
`tion (ID) codes associated with them.
`In addition,
`this
`equipment 130a can be configured to provide reminder calls
`to participants to remind them of an upcoming scheduled
`video visit, as well as to inform participants of changes in the
`availability of other scheduled participants, such as the
`revocation of visitation privileges of a prison inmate.
`The data center 120 also includes Scheduler and Visit
`
`Management equipment 13019, which coordinates the sched-
`uling of video visits between participants. In addition, this
`equipment 130b also provides participant (e.g.,
`inmate)
`identification, determines eligibility for video visits of cer-
`tain participants, generating and sending lists of scheduled
`visits (e.g., daily schedules for the visit centers established
`in a prison), and controls the initiation and terminal of the
`visit. The data center 120 also includes Recording equip-
`ment (130c), which is configured to record video visits for
`later use. Also, the data center 120 includes data storage
`equipment 130d for storing recordings of video visits, as
`well as any other useful
`information or lists for use in
`scheduling or conducting video visits. The data center 120
`still further includes Reservations and Payment equipment
`130e for performing accounting duties for video visits, such
`as interactive scheduling by participants, receiving pay-
`ments, providing payment and account information or status
`to other system 100 components, as well as participants in
`the visits. For example, both visitors 105 and inmates in a
`prison scenario may interact with this equipment 130e to
`schedule their video visit, make payments, and receive
`cancellation notices and information for rescheduling the
`cancelled visit. In fact, in all embodiments disclosed herein,
`scheduling, paying for, canceling or receiving notice of a
`cancellation, rescheduling, etc. may be done by any of the
`participants of a video visit.
`Also illustrated in FIG. 1 is external equipment 135 also
`configured to work with the Reservations and Payment
`equipment 130e. The external equipment 135 may be any
`type of equipment that assists participants with services or
`transactions related to the system 100, such as a particular
`method for making payment for a video visit. For example,
`the external equipment 135 may be accessed by potential
`participants of a visit for making payment via any available
`method, such as an electronic payment service (EPS). In
`such an embodiment, the participant would provide payment
`to a vendor (potentially the company’s equipment) with the
`EPS equipment 135 and the EPS equipment 135 would
`transfer information to the Reservations and Payment equip-
`ment 130e indicating the payment had been made and by
`and/or for whom. Of course, the external equipment 135 is
`not necessary for the operation of a system 100 like the one
`
`Page 11 of 18
`
`Page 11 of 18
`
`
`
`US 7,256,816 B2
`
`7
`illustrated in FIG. 1. It should also be noted that the term
`
`“equipment” as used above to discuss parts of the data center
`120 is not limited to simply hardware, but may also include
`software capable of providing the described functions.
`When conducting the video visits, the data center 120
`initiates, typically at a scheduled time, two high-speed data
`connections. In this embodiment, one connection is with a
`terminal 125 in the visit office 115 and the other connection
`
`is with a terminal in the prison 110. This allows communi-
`cation to occur between a participant at a terminal 125 in the
`visit office 115 and a participant at a terminal 125 in the
`prison 110 via the data center 120. In an advantageous
`embodiment, the high-speed connections are provided using
`conventionally available high-speed data connections, such
`as a TI connection. Of course, other types of data connec-
`tions are also possible. To greatly reduce, and in most cases
`eliminate, difference in latency in transmissions/streams
`used in conventional video conferencing, multiplexing
`means 140a, b are provided at strategic points proximate to
`endpoints of the communication path where two or more
`connections are needed or desired. For example,
`in the
`prison scenario an overseer may be assigned to monitor the
`video visit of an inmate participant for security purposes.
`Now, it should be noted that the reduction or elimination
`of latency in transmissions discussed herein is not an elimi-
`nation of latency in the transmission provided by a single
`data stream. Instead, this refers to a reduction or elimination
`of the difference in latency that typically exists between two
`or more parallel data streams. In traditional video confer-
`encing systems, the visitor, the inmate, and the overseer
`would connect into a Multi-point Control Unit (MCU) such
`that three distinct data connections are made with a central
`
`location. Unfortunately, for any number of reasons, such as
`the distance of each participant from the central location,
`differences in equipment among the participants, potential
`connection or transmission problems with one of more of the
`connections, latency between any two or more connections
`usually occurs. Thus, the time involved in transmitting from
`one endpoint to another endpoint may be exactly the same
`as with conventional video conferencing, but the difference
`in latency that exists between multiple streams in video
`conferencing is reduced or eliminated since only a single
`stream is present across the network 205.
`In contrast, in accordance with the disclosed principles,
`the multiplexing means 140a, b receives a single, unicast
`connection from the data center, and then generates a copied
`data signal based on the communication data (e.g., commu-
`nications data representing the video and audio signals, and
`which may be encrypted or unencrypted) in the unicast
`connection. As a result, the multiplexing means 140a asso-
`ciated with the prison 110 in this example will generate two
`identical data streams during the video visit with a terminal
`125 at the visit office 120, with one stream going to a
`terminal 125 in the prison (where the inmate can use it for
`the visit) and the other stream going to the overseer’s
`terminal 145. Thus, virtually no significant latencies exist
`between the signals, and therefore between what the inmate
`sees, hears, or does, and what the overseer receives on his
`terminal. Some inconsequential latencies that could occur
`would simply be caused, for example, by differences in
`lengths of cables/connections of the overseer’s terminal
`versus the inmate’s terminal, and other inconsequential
`delays. Such latencies are rarely more than a few millisec-
`onds, which is typically far too short a time for a security
`violation to occur. Thus, the overseer 145 can monitor the
`inmate (and the visitor) during the video visit in real-time,
`keeping a