throbber
Page 1 of 18
`
`SECURUS EXHIBIT 1001
`
`

`
`US 7,256,816 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`>>>D>>>D>D>>D>D>D>
`
`5,719,928
`5,745,160
`5,821,984
`5,844,600
`5,848,132
`5,867,653
`5,872,841
`5,903,302
`5,978,463
`5,982,863
`6,088,429
`6,104,788
`6,211,902 B1*
`6,292,211
`6,343,313 B1
`6,356,294 B1
`6,466,252 B1
`6,674,459 B2*
`2001/0047264 A1
`2002/0066109 A1
`2003/0069752 A1
`2003/0091169 A1*
`2003/0174826 A1*
`
`2/1998
`4/1998
`10/1998
`12/1998
`12/1998
`2/1999
`2/1999
`5/1999
`11/1999
`11/1999
`7/2000
`8/2000
`4/2001
`9/2001
`1/2002
`3/2002
`10/2002
`1/2004
`11/2001
`5/2002
`4/2003
`5/2003
`9/2003
`
`Pinnell et al.
`Ishida et al.
`Ito et al.
`Kerr ................. . .
`Morley et al.
`Aras et al.
`King et al.
`Browning et al.
`Jurkevics et al.
`Smiley et al.
`Garcia
`Shaffer et al.
`Tanoi
`............... ..
`Pena ................ ..
`Salesky et al.
`Martin et al.
`Miyazaki
`Ben-Shachar et al.
`Roundtree
`Tam et al.
`LeDain et al.
`Cain
`Hesse ............... ..
`
`2004/0111752 A1
`2005/0027581 A1
`
`6/2004 Katz et al.
`2/2005 Kjesbu et al.
`
`FOREIGN PATENT DOCUMENTS
`
`348/14.12
`
`W0
`W0
`
`WO01/79626 A1
`WO03/053005 A1
`
`10/2001
`6/2003
`
`OTHER PUBLICATIONS
`
`Videoconference Rooms for Rent by the Hour http:wwW.mivnet.
`com/users.php and www.mivnet.com/users/prim_services.php, no
`date available.
`Technology Guide, H. 323 Technology, Copyright 1998-2004, Ixia,
`no date available.
`L. Lambrinos, P. Kirstein and V. hardn1an, “Distributed Recording
`of Mbone Sessions”, no date available.
`R. Cohen and G. Kaempfer, “A Unicast-based Approach for Stream-
`ing Multicast”, Department of Computer Science, Technion, Haifa
`32000, Israel, no date available.
`Networked Multimedia Communication, Telejustice and Security
`Solutions, WWW/vugate.com/index.html printed Feb. 10, 2005, no
`date available.
`
`* cited by examiner
`
`348/14.09
`348/14.08
`
`348/14.09
`
`379/114.2
`379/210.01
`
`Page 2 of 18
`
`Page 2 of 18
`
`

`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 1 of 6
`
`US 7,256,816 B2
`
`\’
`
`
`
`poiWM“.pom:
`
`
`
`mete:w_>$58<53zow_E
`
`m:,__on_ozw.:m_>:m_>M29:oz<$o_>$mEeagoomN_mo_.:.3<
`
`
`
`
`
`
`
`2E<o\E82SE28538:8’amu5_>_EUs$3.Il'|w
`HWIIII.5:3ozmm9M59$252HoHm"
`
`
`mZOIn_OmQ=>_DZ<mm._3QmIUw>n=._.Zmn=w.:w_>\<mm=2<O\>._.
`
`
`
`
`m3T“lntllllllflmEmsE:
`IIII“_.._<.G>55:mfizmzfidozéIJ$zs_z_Hzmmmao
`
`
`
`
`Eoz__>mmzo:<o:zmI5<Em:m¢E_m_>mEoAea55
`
`
`
`._.Zm_>_m_w<Z<_>_._._m_>m._m_w_._mmm._.<_>_Z_m_ZOIn_Omo_S_
`
`Page 3 of 18
`
`mzo_.Eoxo=>_\!Iwz_om_oomm.mzo_._n_o¢o__>_
`
`
`\<E_>_<o\E\\‘(In\>>m_>_<o\Z
`ow:I.umm<mE<m_9,2-zocfimEwm$>omS555SEA_//
` -com»2E-“Lm1%9:o:.n|u|l_..9:I‘In
`
`
`
`
`
`
`
`
`..H|:.'nI!In‘82zo:<jm_oz<o92
`
`.'muBaowzommw:m_>
`
`lruoNJM5818.m:<_\,_z_
`
`
`
`ihuo:H..IIAIIn00.555_._.:>>IIIII:eC$5.8m;as;<n_oz<
`
`m:m_>538:8
`2,:msazommHian:,ms_><n_
`
`mi
`
`was
`
`Page 3 of 18
`
`
`
`

`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 2 of 6
`
`US 7,256,816 B2
`
`EmwE>o
`
`Mm‘I9MWMVMVM
`
`
`SNozamoam:m_>
`gas.\az__>_<m_Em92
`
`
`
` mm._.m<_>_ozzaaxom/o—m
`
`
`
`$joEz8mm<mE<o
`
`Page 4 of 18
`
`Page 4 of 18
`
`
`
`

`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 3 of 6
`
`US 7,256,816 B2
`
`FIG. 3A
`
`300
`
`
`
`OPERATOR OR INTERACTIVE VOICE
`RESPONSE SYSTEM ANSWERS
`
`
`
`
`CALL TO 1-800 NUMBER AND
`REQUESTS ENTRY OF PRISONER
`
`IDENTIFICATION NUMBER IN
`LANGUAGE OF CHOICE
`
`
`LANGUAGE
`()H0|(;E
`
`
`
`
`
`
`
`
`
`
`
`OPERATOR OR IVR SYSTEM
`VALID
`COMMUNICATES THAT
`IDENTIFICATION
`IDENTIFICATION NUMBER
`NUMBER?
`
`ENTERED IS NOT VALID
`
`
`
`IDENTITY
`
`VERIFIED?
`
`
`
`
`
`
`
`
`
`OPERATOR OR IVR
`SYSTEM COMMUNICATES
`
`ALLOWED
`THAT PRISONER X IS
`VISITORS?
`
`
`NOT ALLOWED VISITORS
`UNTIL X DATE
`
`
`OPERATOR OR CALLER ENTERS
`THE IDENTIFICATION NUMBERS
`OF ALL VISITORS
`
`
`
`
`
`
`
`
`
`OPERATOR OR IVR
`SYSTEM COMMUNICATES
`
`APPROVED
`THAT CALLER REQUESTED
`VISITORS?
`
`
`VISITORS ARE NOT ON
`THE APPROVED LIST
`
`
`DIRECTORY DB OF ALL
`PRISONERS AND ALLOWED
`
`
`VISITORS - INCLUDES
`PRISONER IDENTIFICATION
`
`
`
`
`SESSION NUMBER
`
`NUMBER, NAME, LOCATION.
`VISIT STATUS. LIST OF
`
`ALLOWED VISITORS WITH
`
`
`THEIR IDENTIFICATION
` TO FIG. 38 TO FIG. 3B
`
`NUMBERS, PREFERRED
`
`
`LANGUAGE
`
`
`302
`
`
`
`Page 5 of 18
`
`Page 5 of 18
`
`

`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 4 of 6
`
`US 7,256,816 B2
`
`FROM
`FIG. 3A
`
`U
`
`FROM
`FIG. 3A
`
`0
`
`FIG. 33
`
`3°“
`,/
`
`324
`
`326
`
`330
`
`
`ADVISE HOW TO USE
`PAYMENT
`MONEY ORDER
`
`ON FILE?
`
`
`
`
`
`PREPAYMENT SYSTEM
`AND PREPAID VISIT PAKS
`
`332
`
`
`
`ARE THERE
`ADEQUATE
`FUNDS?
`
`
`YES
`
`MONEY ORDER
`PAYMENT SYSTEM
`
`ELECTRONIC TRANSFER
`NOTICES FROM MONEY
`ORDER VENDOR
`
`328
`
`334
`
`ENTER VISITOR ZIP
`CODE PRESENT
`CLOSEST LOCATIONS
`
`335
`
`SELECT LOCATION
`AND TIME
`
`338
`
`AVAILABLE?
`
`YES
`
`DEBIT PAYMENT
`RECORD
`
`UPDATE PAYMENT
`
`
`
`SCHEDULE VISIT
`
`340
`
`PRISONER
`
`
`SYSTEM
`
`
`
`CALL VISITORS
`TO RESCHEDULE
`
`345
`
`NO
`
`348
`
`CREATE REPORTS AND
`
`CONFIRMATION TO
`
`350
`
`AUTOSTART PROCESS
`
`VISITO, PRISONER
`
`352
`
`DAILY ELECTRONIC
`SCHEDULE TO
`EACH PRISON
`
`358
`
`REMINDER CALL LIST
`FOR RESERVATION
`OPERATORS
`
`OPERATORS PLACE
`REMINDER CALLS
`TO VISITORS
`
`355
`
`Page 6 of 18
`
`Page 6 of 18
`
`

`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 5 of 6
`
`US 7,256,816 B2
`
`401
`
`
` IDENTITY
`ERIFIED?
`V
`
`YES
`
`402
`
`FIG. 4
`
`4°”
`/
`
`RECORDING
`
`SYSTEM BEGINS VISIT AND
`RECORDING USING INFORMATION
`FROM THE SCHEDULER
`
`
`
`404
`
`
`EVERYONE
`NO
`PRESENT?
`
`
`
`VALID
`REASON F R
`RESCHEDULOING
`
`7
`
`
`
`was
`416
`PRESENT VISIT RULES AND BEGIN
`THE VISIT IN PREFERRED LANGUAGE
`
`
`
`412
`
`UPDATE VISIT
`RECORD
`
`TERMINATE VISIT
`
` OVERSEER
`ISSUES WARNING
`TO PARTICIPANTS
`
`
`
`ISSUE SESSION
`NUMBER KEY WHICH
`ALLOWS VISIT TO BE
`RESCHEDULED AT NO
`
`
`
`ADDITIONAL CHARGE
`
`
`
`
`
`
`SCREENS INCLUDE WINDOWS
`
`WITH RULES AND TIME
`
`REMAINING coNTINousI_V
`VISIBLE ON THE SCREEN
`
`
`
`
`
`UPDATE SCHEDULER
`RECORD
`
`OVERSEER RANDOMLY
`MONITORS VISIT
`
`420
`
`RULES
`VIOLATION?
`
`ygg
`
`422 N0
`
`
`
`
`
`
`TECHNICAL
`PROBLEM WITH
`
`VISIT?
`CONTINUED
`
`RULES
`432
`ISSUE SESSION
`VIOLATION
`NUMBER KEY WHICH
`7
`ALLOWS VISIT TO BE
`RESCHEDULED AT NO
`ADDITIONAL CHARGE
`
`
`
`
`VISIT COMPLETED
`SUCCESSFULLY
`
`
`
`
`
`
`
`RECORD
`
`UPDATE VISIT RECORD
`
`WITH DATE AND TIME OF
`VISIT TO THE SECOND
`
`
`
`YES
`
`UPDATE VISIT
`RECORD
`
`440
`
`438
`
`ARCHIVE VISIT RECORDING AND
`ASSOCIATED VISIT RECORD
`
`445
`
`Page 7 of 18
`
`Page 7 of 18
`
`

`
`U.S. Patent
`
`Aug. 14, 2007
`
`Sheet 6 of 6
`
`US 7,256,816 B2
`
`502
`
`504
`
`506
`
`
`
`AUTOSTART PROCESS
`BEGINS VISIT AND
`RECORDING
`
`
`
`
`USE PRISONER
`IDENTIFICATION NUMBER AND
`
`
`
`DATE/TIME TO STORE
`RECORDINGS IN RAW FORMAT
`
`
`STORE KEYS
`
`AND VIDEO/
`AUDIO DATA
`
`DIRECTORY OF
`
`
`
`REVfE‘dJEI'R‘3SR'§AEETR|X
`
`I
`OF ALLOWED RECORDS
`
`
`
`512
`
`516
`
`SELECT REQUESTED
`RECORDS, CONVERT
`TO PAYBACK FORMAT
`
`
`
`DOWNLOAD VIEWING
`APPLET AND DATA
`
`FIG. 5
`
`513
`
`508
`
`REQUEST FOR ACCESS
`TO RECORDED DATA
`
`
`
`
`Is REOuEsTER
`AUTHORIZED TO ACCESS
`
`INFORMATION?
`
`510
`
`ENTER PRISONER
`IDENTIFICATION AND
`DATE OF VISIT
`
`514
`
`Page 8 of 18
`
`Page 8 of 18
`
`

`
`US 7,256,816 B2
`
`1
`SYSTEMS AND PROCESSES FOR
`SCHEDULING AND CONDUCTING
`AUDIO/VIDEO COMMUNICATIONS
`
`TECHNICAL FIELD
`
`Disclosed embodiments herein relate generally to audio
`and video commumcations, and more particularly to sched-
`uling and conducting monitored or unmonitored video visits,
`as well as the computer architecture for providing such
`scheduling and conducting of video visits between any
`number of endpoints.
`
`BACKGROUND
`
`When two parties want to communicate in real-time over
`great distances, the telephone has been the traditional com-
`munications device of choice. Advancements in technolo-
`
`gies over the years have now permitted both audio and video
`communications between parties over great distances. This
`form of communications is commonly referred to as video
`conferencing, and depending on the complexity (and asso-
`ciated expense) of the equipment involved may provide
`nearly real-time communications among two or more par-
`ties.
`
`In traditional form, video conferencing includes some
`type of local equipment associated with each person seeking
`to participate in the conference. When the conference is to
`be started, the equipment at each location is employed to call
`in (e.g., “conference in”) to a call center. As each of these
`endpoints establishes a connection with the central location,
`the video and audio signals may then be accessed by all of
`the participants so that a conversation with both audio and
`video can take place. Among the various types of video
`conferencing equipment, one of the most common employs
`specialty dedicated equipment at each geographic location
`of the participants. This equipment typically employs an
`ISDN or similar data connection to transmit and receive
`
`audio/video communications data during the video confer-
`ence.
`
`Unfortunately, conventionally available video conferenc-
`ing equipment has a common characteristic: each system
`requires endpoint initiation (and termination) for each par-
`ticipant in the conference. Such a requirement has several
`disadvantages, including the high cost associated with such
`specialty equipment, and the freedom (or burden) to control
`the equipment at each corresponding endpoint. Regarding
`expense, many companies or individuals are financially
`prohibited from enjoying such video conferencing because
`they either cannot afford the special equipment, or perhaps
`carmot justify the expense for equipment not regularly used.
`Regarding endpoint control, the difficulty in operating such
`specialty equipment is a burden many people would like to
`be without. In addition, situations exist where initiation of
`the video conference and control of the video conferencing
`equipment by one or more of the participants is not desired.
`An example of a situation where endpoint control is not
`desirable is in the prison system. Many times, a prison
`inmate is housed in a location a great distance from his
`family or friends, which results in visitation of the inmate
`being inconvenient or even impossible due to travel time and
`expense. As such, a video conference with the inmate would
`seem a perfect answer; however, as mentioned above, the
`expense and complexity of the necessary equipment may be
`prohibitive. Perhaps more important is the potential security
`risk if endpoint control is permitted in a video conference
`with an inmate. Even in conventional face-to-face visits,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Page 9 of 18
`
`2
`conversations between inmates and their visitors are mom-
`
`tored to ensure that no greater security risk is created than
`already exists with an outsider’s presence in the prison.
`However, if endpoint control in such a visitation scenario
`were permitted, it would be difficult to effectively monitor
`the visit
`to ensure security. Potential security breaches
`include, but are not limited to, coded dialog between the
`inmate and a visitor, as well as hand and facial gestures used
`to communicate improper information.
`While traditional video conferencing equipment could
`potentially be used in the prison scenario, the above-men-
`tioned problems would still be present. More specifically,
`conventional video conferencing requires endpoint control
`to initiate and terminate the conversation. As a result, an
`overseer may not be capable of ending the visit if conduct
`violations occur during the visit. In addition, with endpoint
`control of the equipment, a prison inmate can easily damage
`the equipment if he has access to it, and may lack the
`technical knowledge to even operate the equipment at all.
`Although a security officer or technician may be given
`control of the equipment so that it is not accessible by the
`inmate, another disadvantage is created by requiring the
`services of an employee, whose time is probably better
`served elsewhere.
`
`Perhaps the most important reason why traditional video
`conferencing would not be workable for prison visitation
`and other similar situations is the lack of synchronicity
`between data connections during the conference. More spe-
`cifically, as each participant in the video conference con-
`nects to the conversation, a new data connection, or path, is
`created. In a prison situation, at least three data paths would
`be present: one for the inmate, one for the visitor, and one
`for the overseer monitoring the conversation. Unfortunately,
`an inherent latency exists between these multiple connec-
`tions that poses a significant security risk for the prison.
`Because of latency in the data path during data transmission,
`communication is not instantaneous; the delay is a function
`of all intermediate equipment and media along the data path.
`Because different routes may be taken along each data path,
`there may exist a difference in latency and the delay expe-
`rienced by each if each party is connected with a separate
`data path. Unfortunately, this difference in latency among
`multiple simultaneous data paths poses a significant security
`risk for a prison. As a result, the visitor or inmate may
`engage in an improper communication during the visit, but
`the difference in latency between connections prevents the
`overseer from learning of the improper conduct in time to
`prevent
`it or further improper conduct from occurring.
`Accordingly, what is needed is a video visitation system for
`permitting video visits between participants that
`is not
`endpoint controlled and that does not suffer from the defi-
`ciencies found in the prior art.
`
`BRIEF SUMMARY
`
`Disclosed herein are methods of scheduling and conduct-
`ing monitored or non-monitored video visits, as well as
`computer architecture for providing such scheduling and
`conducting of video visits, where the participants in the
`video visit are not required or able to interact with the
`audio/video equipment for the initial connection to start the
`video visit. In addition, in some embodiments participants
`are also not able to interact with the equipment during the
`actual visit. Whether they can interact with the equipment
`during the visit or not (e.g., voice-actuated volume control,
`etc.), the audio/video equipment employed during the video
`visit may be isolated from physical contact by the first
`
`Page 9 of 18
`
`

`
`US 7,256,816 B2
`
`3
`participant or second participant, and therefore may be
`located at fixed or mobile geographic locations where such
`equipment connections and operations may be maintained.
`In one embodiment of a method of scheduling such a
`video visit, the method includes assigning an individual ID
`code to a first participant and second participant in the video
`visit, for example, a caller and a receiver in a video visit. Of
`course, any number of participants may participate in the
`visit. In this example, to schedule a visit between these two
`participants, the first participant contacts a data center and
`enters the ID code of the second participant he is trying to
`visit with.
`In a more specific embodiment,
`the second
`participant is a prison inmate and the first participant is a
`family member of the inmate desiring a visit with the inmate
`using audio/video communications equipment, however,
`any types of participants may be present. When the ID code
`for the second participant is entered, the data center may
`then conduct a check to determine whether second partici-
`pant
`is permitted to receive video visits. Also,
`the first
`participant’s ID code may also be submitted to the data
`center and checked to determine if the first participant is
`permitted to be in contact with the second participant.
`In another embodiment, devices may be employed to
`verify the identity of the first participant, such as biometric
`devices. Such biometric technologies are defined as auto-
`mated devices/methods for identifying or authenticating the
`identity of a living person based on a physiological or
`behavioral characteristic. For example, fingerprint reading
`devices,
`retina
`scanning devices, voice identification
`devices,
`face mapping devices,
`signature comparison
`devices and the like may be employed to further ensure
`security during the video visit by authenticating the identity
`of the first participant. Moreover, if the participants are
`being charged for making the video visit, the data center may
`also determine if sufficient funds (or credit) for the visit have
`been paid. One advantage to the disclosed video visits is that
`the first participant may visit with the second participant
`over long distances that may otherwise prevent their com-
`munication. As such, in one embodiment, the data center
`may prompt the participant making the reservation for his
`geographic location(s), and then present several locations
`near the first participant’s location for conducting the visit.
`Once a suitable location is selected,
`the visit may be
`scheduled and then conducted at the appropriate time. In
`addition, other participants may also be given the option to
`select desirable geographic locations for them to participate
`in the video visit.
`
`In one embodiment of a method of conducting a video
`visit, the method includes connecting the first participant
`and second participant at the scheduled time using the data
`center and without any action taken by the first participant
`or second participant, or anyone associated with their geo-
`graphic locations, to initiate the visit. Once the video visit
`begins, in some embodiments, certain rules for the visit may
`be displayed for the participants to read. For example, if the
`visit is between a prison inmate and one or more of his
`family members, the rules may discuss how the visit is being
`monitored by appropriate personnel and that perhaps
`“secret” communications between the parties (e.g., hand
`signals, facial gestures, movements, etc.) are not permitted
`during the visit. In such an embodiment, the method also
`includes an overseer actively monitoring the visit between
`the parties.
`In a related embodiment, the overseer may be simulta-
`neously monitoring multiple such video visits, and may have
`the ability to select the audio communications of any par-
`ticular visit for closer monitoring and inspection, as well as
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`zoom in on one of the particular video feeds should the need
`arise. Examples of other potential violations may be hand-
`signs, gestures, or even expressly saying certain words or
`phrases. If the overseer determines a rules violation has or
`is occurring, he may intervene with a warning to one or both
`of the parties. Continued rules violations may lead to ter-
`mination of the visit, or the overseer, or perhaps automated
`equipment, may determine that the violation is of the sort
`that requires the visit
`to be terminated immediately.
`In
`addition, a notation of the incident(s) may be made in the
`video visit records associated with either or both of the first
`
`participant and second participant, which may in turn affect
`the permission required for the two to conduct another visit
`in the future. Conversely, if the visit is concluded without
`incident, the appropriate records may also be updated as
`such.
`
`In another aspect, a system for conducting a video visit is
`also disclosed. In one embodiment, the system includes a
`data center configured to initiate and terminate an audio/
`video communication between first and second participants.
`The system also includes a first terminal coupled to the data
`center for use by the first participant to visit with the second
`participant, and a second terminal coupled to the data center
`for use by the second participant to visit with the first
`participant. In a specific embodiment,
`the data center is
`coupled to the first and second terminals via a computer
`network, for example, a packet-based network such as the
`Internet. Each of the first and second terminals may also be
`coupled to the computer network via their own local area
`network.
`
`In a broad aspect, the system also includes a multiplexing
`means, which may be embodied in hardware, software, of a
`combination of both, that is configured to receive commu-
`nication data, encrypted or unencrypted, sent between the
`first and second participants during the audio/video com-
`munication, and to generate copied data based on the com-
`munication data. In addition, such a system would include
`an overseer coupled to the multiplexing means and config-
`ured to receive the copied data and to monitor the audio/
`video communication between the first and second partici-
`pants using the received copied data. In an exemplary
`embodiment,
`the multiplexing means is geographically
`proximate to the first terminal and configured to provide the
`communication data to the first terminal and the copied data
`to the overseer. In an alternative embodiment, the multi-
`plexing means may be geographically proximate to the data
`center and configured to provide the communication data to
`the first and second terminals and the copied data to the
`overseer. In yet other embodiments, recording equipment
`configured to receive the copied data for data storage and
`retrieval is also included in the system, perhaps via the same
`or a second multiplexing means.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding of this disclosure, and
`the advantages of the systems and methods herein, reference
`is now made to the following descriptions taken in conjunc-
`tion with the accompanying drawings, in which:
`FIG. 1 illustrates a conceptual view of one embodiment of
`a system for providing monitored video visits in accordance
`with the principles disclosed herein;
`FIG. 2 illustrates one embodiment of the architecture for
`
`a computer network for providing the monitored video visits
`discussed above;
`
`Page 10 of 18
`
`Page 10 of 18
`
`

`
`US 7,256,816 B2
`
`5
`FIGS. 3A & 3B illustrate a flow diagram that sets forth
`one embodiment of a process for scheduling a video visit
`between a visitor and a prison inmate;
`FIG. 4 illustrates a flow diagram that sets forth one
`embodiment of a process for conducting a video visit
`between a visitor and a prison inmate, such as the visit
`scheduled with reference to FIGS. 3A & 3B; and
`FIG. 5 illustrates a flow diagram that sets forth one
`embodiment of a process for recording and playing back a
`video visit conducted according to the disclosed principles.
`
`DETAILED DESCRIPTION OF PREFERRED
`EMBODIMENTS
`
`Referring initially to FIG. 1, illustrated is a conceptual
`View of one embodiment of a system 100 for providing
`monitored or unmonitored video visits in accordance with
`
`the principles disclosed herein. The system 100 includes a
`group of first participants 105, which in the illustrated
`embodiment is a group of visitors 105 seeking to have a
`video visit with inmates in a prison 110. While many
`embodiments described herein are discussed in terms of
`
`prison inmates and visitors of those inmates, nothing herein
`should be interpreted to limit the disclosed systems and
`methods to only the prison visitation scenario. Instead, the
`disclosed systems and methods are easily employable in any
`situation where two or more participants wish to conduct a
`video visit. For example, the disclosed systems and methods
`may be implanted not only for video prison visits, but also
`for such uses as real-time video visits among government
`officials or business personnel, for medical diagnostics and
`possibly assisting in performing procedures from afar (e.g.,
`“tele-medicine”), business video meetings, and even for
`educational purposes, such as transmitting a live session to
`a group of students connected to the same local network. In
`short, the disclosed principles are useful in any situation
`where two or more parties wish to communicate using video
`and audio equipment.
`The system 100 also includes a visit office 115 where a
`visitor may go to conduct his side of the video visit. Linked
`between the visit office 115 and the prison 110 is a data
`center 120, which provides the connection between the visit
`office 115 and the prison 110. In non-prison scenarios, the
`prison 110 may be another location where a second partici-
`pant may go to conduct his side of the video visit, for
`example, another visit office. In the illustrated embodiment,
`both the visit office 115 and the prison 110 contain visit
`terminals 125 for participating in a video visit conducted as
`disclosed herein. Specifically, the terminals 125 may each
`include a video display (e.g., TV, computer/video screen,
`computer terminal, etc.), and video camera for capturing the
`image of the participant, and a microphone for capturing
`audio from the participant at that location. In a more specific
`embodiment, these different components are housed in a
`single structure comprising the terminal 125. Of course, in
`other embodiments, these devices may be structurally sepa-
`rated from each other.
`
`Whether located in a single device or not, it should be
`especially noted that the terminals 125 do not include any
`type of interactive input device accessible by the participant
`at that location. As a result, the participants at these visit
`endpoints are not responsible, or even capable, of initiating
`the video visit. Instead,
`the video visit
`is initiated at a
`scheduled time by the data center, as discussed in further
`detail below. This elimination of endpoint interactive control
`makes the disclosed system especially useful in scenarios
`where the participants are ill-equipped to operate devices for
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`initiating a video visit, or where the participants are not
`trusted to operate such devices, either for the safety of the
`equipment or the security of the location of the participant.
`As such,
`the system 100 is especially useful
`in prison
`situations where inmate operation of video visit equipment
`is discouraged, either because they are ignorant of such
`equipment or for the protection of the equipment itself from
`damage or theft. Moreover, with scheduled video visits that
`are initiated by a central data center,
`there can be no
`argument about lost visit times caused by, for example,
`delays in connecting or problems with equipment operation.
`Looking again at FIG. 1, the data center 120 houses the
`equipment 130 used to schedule and conduct the video
`visits. More specifically, the data center 120 includes Direc-
`tory Services and User Authentication equipment 130a. This
`equipment 130a provides identification and authentication
`services for the participants in the video visit, such as
`through stored lists of available participants and identifica-
`tion (ID) codes associated with them.
`In addition,
`this
`equipment 130a can be configured to provide reminder calls
`to participants to remind them of an upcoming scheduled
`video visit, as well as to inform participants of changes in the
`availability of other scheduled participants, such as the
`revocation of visitation privileges of a prison inmate.
`The data center 120 also includes Scheduler and Visit
`
`Management equipment 13019, which coordinates the sched-
`uling of video visits between participants. In addition, this
`equipment 130b also provides participant (e.g.,
`inmate)
`identification, determines eligibility for video visits of cer-
`tain participants, generating and sending lists of scheduled
`visits (e.g., daily schedules for the visit centers established
`in a prison), and controls the initiation and terminal of the
`visit. The data center 120 also includes Recording equip-
`ment (130c), which is configured to record video visits for
`later use. Also, the data center 120 includes data storage
`equipment 130d for storing recordings of video visits, as
`well as any other useful
`information or lists for use in
`scheduling or conducting video visits. The data center 120
`still further includes Reservations and Payment equipment
`130e for performing accounting duties for video visits, such
`as interactive scheduling by participants, receiving pay-
`ments, providing payment and account information or status
`to other system 100 components, as well as participants in
`the visits. For example, both visitors 105 and inmates in a
`prison scenario may interact with this equipment 130e to
`schedule their video visit, make payments, and receive
`cancellation notices and information for rescheduling the
`cancelled visit. In fact, in all embodiments disclosed herein,
`scheduling, paying for, canceling or receiving notice of a
`cancellation, rescheduling, etc. may be done by any of the
`participants of a video visit.
`Also illustrated in FIG. 1 is external equipment 135 also
`configured to work with the Reservations and Payment
`equipment 130e. The external equipment 135 may be any
`type of equipment that assists participants with services or
`transactions related to the system 100, such as a particular
`method for making payment for a video visit. For example,
`the external equipment 135 may be accessed by potential
`participants of a visit for making payment via any available
`method, such as an electronic payment service (EPS). In
`such an embodiment, the participant would provide payment
`to a vendor (potentially the company’s equipment) with the
`EPS equipment 135 and the EPS equipment 135 would
`transfer information to the Reservations and Payment equip-
`ment 130e indicating the payment had been made and by
`and/or for whom. Of course, the external equipment 135 is
`not necessary for the operation of a system 100 like the one
`
`Page 11 of 18
`
`Page 11 of 18
`
`

`
`US 7,256,816 B2
`
`7
`illustrated in FIG. 1. It should also be noted that the term
`
`“equipment” as used above to discuss parts of the data center
`120 is not limited to simply hardware, but may also include
`software capable of providing the described functions.
`When conducting the video visits, the data center 120
`initiates, typically at a scheduled time, two high-speed data
`connections. In this embodiment, one connection is with a
`terminal 125 in the visit office 115 and the other connection
`
`is with a terminal in the prison 110. This allows communi-
`cation to occur between a participant at a terminal 125 in the
`visit office 115 and a participant at a terminal 125 in the
`prison 110 via the data center 120. In an advantageous
`embodiment, the high-speed connections are provided using
`conventionally available high-speed data connections, such
`as a TI connection. Of course, other types of data connec-
`tions are also possible. To greatly reduce, and in most cases
`eliminate, difference in latency in transmissions/streams
`used in conventional video conferencing, multiplexing
`means 140a, b are provided at strategic points proximate to
`endpoints of the communication path where two or more
`connections are needed or desired. For example,
`in the
`prison scenario an overseer may be assigned to monitor the
`video visit of an inmate participant for security purposes.
`Now, it should be noted that the reduction or elimination
`of latency in transmissions discussed herein is not an elimi-
`nation of latency in the transmission provided by a single
`data stream. Instead, this refers to a reduction or elimination
`of the difference in latency that typically exists between two
`or more parallel data streams. In traditional video confer-
`encing systems, the visitor, the inmate, and the overseer
`would connect into a Multi-point Control Unit (MCU) such
`that three distinct data connections are made with a central
`
`location. Unfortunately, for any number of reasons, such as
`the distance of each participant from the central location,
`differences in equipment among the participants, potential
`connection or transmission problems with one of more of the
`connections, latency between any two or more connections
`usually occurs. Thus, the time involved in transmitting from
`one endpoint to another endpoint may be exactly the same
`as with conventional video conferencing, but the difference
`in latency that exists between multiple streams in video
`conferencing is reduced or eliminated since only a single
`stream is present across the network 205.
`In contrast, in accordance with the disclosed principles,
`the multiplexing means 140a, b receives a single, unicast
`connection from the data center, and then generates a copied
`data signal based on the communication data (e.g., commu-
`nications data representing the video and audio signals, and
`which may be encrypted or unencrypted) in the unicast
`connection. As a result, the multiplexing means 140a asso-
`ciated with the prison 110 in this example will generate two
`identical data streams during the video visit with a terminal
`125 at the visit office 120, with one stream going to a
`terminal 125 in the prison (where the inmate can use it for
`the visit) and the other stream going to the overseer’s
`terminal 145. Thus, virtually no significant latencies exist
`between the signals, and therefore between what the inmate
`sees, hears, or does, and what the overseer receives on his
`terminal. Some inconsequential latencies that could occur
`would simply be caused, for example, by differences in
`lengths of cables/connections of the overseer’s terminal
`versus the inmate’s terminal, and other inconsequential
`delays. Such latencies are rarely more than a few millisec-
`onds, which is typically far too short a time for a security
`violation to occur. Thus, the overseer 145 can monitor the
`inmate (and the visitor) during the video visit in real-time,
`keeping a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket