throbber
US007403766B2
`
`(12) United States Patent
`Hodge
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,403,766 B2
`Jul. 22, 2008
`
`(54) TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING SYSTEM
`WITH VOICEPRINT VERIFICATION
`
`(75)
`
`Inventor: Stephen L. Hodge, Aubry, TX (US)
`
`(73) Assignee: Value-Added Communications, Inc.,
`Plano, TX (US)
`
`( " ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 110 days.
`
`(21) App]. No.: 10/393,575
`
`(22) Filed:
`
`Jul. 16, 2004
`
`(65)
`
`Prior Publication Data
`
`US 2005/0043014 A1
`
`Feb. 24, 2005
`
`Related US. Application Data
`
`(63) Continuation-in-part of application No. 10/215,367,
`filed on Aug. 8, 2002.
`
`(51)
`
`Int. Cl.
`(2006.01)
`H04M 1/66
`(2006.01)
`H04M 1/68
`(2006.01)
`H04M 3/16
`455/411;455/41.2;455/41.3;
`(52) U.S.Cl.
`455/405; 455/410; 455/418; 455/419; 455/420;
`455/569.1; 455/565; 379/114.2; 379/188;
`379/191; 379/194; 379/198
`(58) Field ofClasslficatlon Search
`455/41.2,
`455/41.3, 405, 410-411, 415, 418-420, 563,
`455/569], 565, 569; 379/114.2, 188, 191,
`379/194, 198, 114
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,706,275 A
`4,935,956 A
`4.993.068 A
`
`11/ 1987 Kamil
`6/ 1990 Hellwarth et al.
`21‘ 1991 Piosenka et al.
`
`5,170,426 A
`5,319,702 A
`5,353,335 A
`5,483,581 A
`5,485,507 A
`5,513,272 A
`5,539,812 A
`5,655,013 A
`5,696,880 A
`5,717,743 A "
`5,745,558 A
`5,768,355 A
`5,796,811 A
`5,805,685 A
`5,883,945 A
`
`12/1992 D’Alessioeta1.
`6/1994 Kitchinetal.
`10/1994 Dursoetal.
`1/1996 Hirdetal.
`1/1996 Brown etal.
`4/1996 Bogosian. Jr.
`7/1996 Kitchinetal.
`8/1997 Gainsboro
`12/1997 Gustafson
`2/1998 McMahaneta]. ......... .. 379/188
`4/1998 Ric11ardson,Jr.etal.
`6/1998 Salibricietal.
`8/1998 McFa.r1en
`9/1998 McFa.rlen
`3/1999 Ricl1ardson,Jr.eta.1.
`
`(Continued)
`
`Primary Examiner—Stephen M D’Agosta
`(74) Attorney, Agent, or Firm—Ward & Olivo
`
`(57)
`
`ABSTRACT
`
`Disclosed is a secure telephone call management system for
`authenticating users of a telephone system in an institutional
`facility. Authentication ofthe users is accomplished by using
`a personal identification number, preferably in conjunction
`with speaker independent voice recognition and speaker
`dependent voice identification. When a user first enters the
`system, the user speaks his or her name which is used as a
`sample voice print. During each subsequent use ofthe system,
`the user is required to speak his or her name. Voice identifi-
`cation software is used to verify that the provided speech
`matches the sample voice print. The secure system includes
`accounting sofiware to limit access based on funds in a user’s
`account or other related limitations. Management sofiware
`implements widespread or local changes to the system and
`can modify or set any number of user account parameters.
`
`6 Claims, 38 Drawing Sheets
`
`
`
`cm (WAN)
`
`..
`
`PAGE 1
`
`SECURUS EXHIBIT 1001
`
`PAGE 1
`
`SECURUS EXHIBIT 1001
`
`

`
`
`
`
`US 7,403,766 B2
`Page 2
`
`
`
`12/2000 Kanevsky etal.
`
`
`
`10/2001 Meyer et al.
`
`
`7/2004 Shinzaki
`.................. .. 340/5.52
`
`
`
`7/2004 Murveitetal.
`............ .. 704/243
`
`
`
`
`5/2005 Kotola etal.
`............. .. 455/41.2
`
`
`
`
`
`
`
`U.S. PATENT DOCUMENTS
`
`
`
`
`
`5,893,057 A
`
`
`5,926,533 A *
`
`
`6,058,173 A
`
`
`6,092,192 A
`
`
`6,122,354 A *
`
`
`
`
`
`
`
`4/ 1999 Fujimoto et a1,
`
`
`
`
`7/1999 Gainsboro
`
`
`5/2000 Penfield et 81,
`
`
`
`
`7/2000 Kanevsky et al.
`
`
`
`9/2000 Dowens .............. .. 379/114.2
`
`
`
`
`~~~~~~~~ ~~ 379/188
`
`
`
`
`
`
`6,161,090 A
`
`
`6,301,344 B1
`
`
`
`6,765,470 132*
`
`
`6,766,295 131*
`
`
`6,892,052 132*
`
`
`* cited by examiner
`
`
`
`
`
`PAGE 2
`
`PAGE 2
`
`

`
`U.
`
`
`
`=oue.$_._oBstem3%
`
`+.lEm224mH,
`
`.g.ae<Howuoomm
`
`
`...............--um........................................................................................--SZTVmofidv_d3u.H
`
`
`
`ru.confimvuoa.
`
`
`
`_a..EuUmW_.§2_§_am%M.8Bofimfim
`o_=e§_m
`
`2
`
`S.
`
`
`
`2:2:2: B.MESEwasaGE%m...................................................................................................................--Ln.n..:n.............IM,
`
`
`
`
`.1..........ivk................... UEHIVEmmmwfifioov\nomflom_ 05285WWM+saousezoaMW3._+W.mmu>%m_§>E2HM,
`
`
`PAGE 3
`
`
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 2 of 33
`
`US 7,403,766 B2
`
`.\....1.r.E[.iI.i..|....I
`
`eEEmoo
`
`Rmam
`
`N3
`
`«ADM
`
`mu
`
`2.anan
`
`HZOEM
`
`Mzflm
`
`Q:
`
`<N.0_u_
`
`PAGE 4
`
`
`
`

`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 3 of 38
`
`Us 7,403,766 B2
`
`
` New account request
`233
`
`.
`.
`Assign PIN to Inmate
`235
`
`Inmate records speech
`segment
`241
`
`
`
`Store PIN with inmate
`Speaker independent
`ID Information
`vocie recogntion
`
`243
`237
`
`
`
`Retrieve stored
`name from
`database
`239
`
`
`
`
`
`
`word? spake" by
`Inma e
`
`245
`
`
` Second attempt?
`
`251
`
`
`Store sample speech
`
`with speaker Into (PIN.
`257
`ID)
`
` Forward sample to site
`
`
`
`personnel
`255
`
`
`
`
`
`FIG. 2B
`
`PAGE 5
`
`PAGE 5
`
`

`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 4 of 38
`
`US 7,403,766 B2
`
`Inmate attempts a
`telephone call
`
`257 System prompts for
`
`
`PIN
`
`259
`
` Valid PIN
`261 Second attempt
`
`
`265
`
`
`
`
`
`
`System retrieves
`stored utterance of
`inmate's name
`263
`
`
`
`System prompts:
`‘State your name‘
`269
`
`
`
`
`Second attempt
`275
`
`Inmate is verified
`273
`
`Inmate is blocked
`267
`
`
`
`
`
`
`
`FIG. 2C
`
`PAGE 6
`
`PAGE 6
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 5 of 33
`
`US 7,403,766 B2
`
`Sm
`
`mm
`
`an
`
`M
`
`AOEZOU«N
`
`damn
`
`._..uD£m
`
`EH2
`
`Em
`
`PAGE 7
`
`
`
`
`

`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 5 of 33
`
`US 7,403,766 B2
`
`.UOu—.—
`
`among
`
`
`
`
`
`@259._||lIn|..............-_L
`
`M7.
`
`I
`
`2 3 !
`
`PAGE 8
`
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 7 of 33
`
`US 7,403,766 B2
`
`_UO_.—<Z4.3
`
`
`
`onOn.memos
`
`PAGE 9
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 3 of 33
`
`US 7,403,766 B2
`
`._.mc._.A<::
`
`.E<M:Hfl¢flm
`
`AGMBZDU
`
`mommmuomm
`
`w.
`Duh
`
`Sm
`
`4mSu._
`
`AOMHZOU
`
`mmnm
`
`PAGE 10
`
`
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 9 of 33
`
`US 7,403,766 B2
`
`500A1Ram
`
`PAGE 11
`
`

`
`U
`
`In.
`
`h
`
`US 7,403,766 B2
`
`t.wWtE|vma_PM
`
`S9M1_Nm3M1.mammanSE.
`8wWB_PMOEHE“o5.4:m_wW
`
`iwas
`
`HADAOZ
`
`W_M
`
`M
`
`'\
`
`PAGE 12
`
`
`

`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 11 M38
`
`US 7,403,766 B2
`
`_wmzmWaozhzcu_a4uaq
`
`I"'-
`I
`
`0G
`
`.535D.$..—.
`
`EH49
`
`PAGE 13
`
`
`
`

`
`
`PS.
`
`tH..w
`
`
`
`mJ
`
`
`
`
`
`8002
`
`
`
`ehS
`
`f021
`
`
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`n82
`
`U82
`
`a22
`
`~_o_
`
`52
`
`PAGE 14
`
`a:2
`
`M.»82
`
`82
`
`m::
`
`mfiofi
`
`3.UHm
`
`PAGE 14
`
`

`
`
`U.S. Patent
`
`
`
`
`
`;hfl.22,2008
`
`
`
`
`
`
`Sheet13of38
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`mo_~
`
`mo__
`
`
`
`
`
`W
`
`'1.=,.. ._
`
`
`
`h..u.a3.3.1.11.
`
`3.05
`
`
`
`PAGE 15
`
`PAGE 15
`
`

`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`Sheet 14 of 38
`
`
`
`
`
`
`
`
`
`Jul. 22, 2008
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Nudam
`
`|":\i‘
`
`387TL
`wasH.2...”._.._a
`
`
`
`n..s.].v...I..sI._.rI|..|r..r|.:!9nI..,.suI.r-|..l.rlI.rlP.I.LI!rnt...|l|-..llll2.ma!
`
`Saga
`
`an M:-“—-fP?‘OI fl".¢s‘_,'.p'(‘[aV_i
`
`.’-7?
`
`'
`
`aux?
`
`
`I.,:1v1...|.I
`
`..uI‘.IVrl..ls.|.....J.n..‘%%A,
`
`
`
`.3...”q.....<»..fi..»_.u,.....x.n.._...
`
`
`
`
`U.S. Patent
`
`
`
`
`
`
`
`PAGE 16
`
`PAGE 16
`
`

`
`U. S. Patent
`
`Jul. 22, 2008
`
`Sheet 15 of 33
`
`US 7,403,766 B2
`
`ea
`m_
`
`m
`c
`m.
`
`~_
`m.
`
`n_
`m_
`
`mamfi
`
`mamfl
`
`._....Essa
`
`2.05
`
`a_m_
`
`n_m_
`
`“Mm.
`
`
`
`u_.mn_E2u:a_Eu_uw.w__munm_.._I.0i|.II|.....IIl.1..I.!/
`
`¢om_
`
`PAGE 17
`
`

`
`
`U.S. Patent
`
`
`
`J
`
`
`
`
`
`
`
`003f061
`
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`2,33......T.....
`
`
`
`
`
`
`
`.«3.,_;.s.~-.Wake....n.a..¢::_._~..1....,2...P..«
`
`__v_m~v_
`
`3GE
`
`
`aov_...___.......
`
`
`§ne_W;m ,%% %;§.mw
`
`M....
`
`mowfimovfi_o¢_
`
`
`
`movfioo¢_
`
`..i;1....iLuci!....
`
`
`..a§§§mnv .I.i1....
`
`
`
`
`.ms_._:..u.fiEu..a...§_.;.£.._...m...e.._...._....._t..q._w._.m._..m.3.
`....._
`
`Nov.
`
`PAGE 18
`
`PAGE 18
`
`
`

`
`PAGE 19
`
`

`
`_.HS
`
`83_..I_0.8.1Al8P...
`
`US 7,403,766 B2
`
`3dub
`
`Ll.neta
`
`P....
`
`:;..mm:322:2as.8.2?
`
`8E:
`
`M32
`
`LE:
`
`S222
`
`2,2
`
`0
`
`m22
`
`82
`
`22
`
`PAGE 20
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 19 of 33
`
`US 7,403,766 B2
`
`
`
`_.mama»Esmuam
`
`
`
`E3:.9333
`
`
`
`3.3...2m=.5=m
`
`
`
`_.Emu»._:mm§.smmE?..=mu5::m
`
`nch_
`
`
`
`
`
`_.2.52..._._..fiu5_.5m
`
`
`
` hEm_..:.m.5_._:m_»23...EE5_._.ampup»meuzmzfiam
`
`¢.:...._n.fi3
`
`Egan
`
`iin.
`
`#53
`
`.:..__.n
`
`.1539
`
`3&5
`
`in
`
`..a_.n
`
`5.03
`
`non”
`
`PAGE 21
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 20 of 33
`
`US 7,403,766 B2
`
`
`
`_..Fm_E._..Em.ca:n
`
`
`
` .—Emu..Emanna_.EE.E§5:m».:$_.__.§_.=:am.am..2333P.E£.?E=5_.a
`
`
`
`._mm..2m5_.§
`
`
`
`_«E.....E5..n
`
`2dam
`
`PAGE 22
`
`

`
`
`U.S. Patent
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 21 of 38
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`
`..
`
`
`
`
`
`
`
`..,....R\n.t....?IE.:e.:ucs..r5....n....\..;...._rA
`
`3.05
`
`82
`
`32
`
`.....:..a...§._._n.~m3......=.._:.
`
`PAGE 23
`
`PAGE 23
`
`

`
`aaP3
`
`tHeLI.
`
`J
`
`1,2
`
`m..:3
`
`m
`
`83rl022teBhS
`
`Nas
`
`.8”
`
`US 7,403,766 B2
`
`anon
`
`m_oNmag»
`
`an.05
`
`mean
`
`PAGE 24
`
`

`
`tnnu+toaP«M
`
`0.u.,
`
`no
`
`..Hnu
`
`no3£10asa;teP»
`
`US 7,403,766 B2
`
`
`
`
`
`L=_uEoE...R._iEu...flan.uuw...__au_uu...m.n=§ooun__=..a_:mM«£uE.n_!.a_.onaa2.c3uo_.__u.3E.Sanu
`
`
`
`
`
`
`
`
`
`
`
`.fi...i.§._aB£_E..a..._.._._...B35.3%fan.
`
`mE
`
`
`22..-to.n_..na.m_”_
`
`3.95flux.._.
`23.5JHFED
`
`uhaagseux
`
`.u._.....
`
`beam
`
`mo_~
`
`H_~N
`
`mH_~
`
`m_H~
`
`PAGE 25
`
`

`
`US. Patent
`
`Jul. 22, 2008
`
`Sheet 24 of38
`
`US 7,403,766 B2
`
`man
`
`«own
`
`moma
`
`3.03
`
`Bz.am_§_.___._wusmmm"Ewand
`
`
`MB...m_m__§.&nfi=,
`
`
`
`,,w_=§,_%,g_§
`
`PAGE 26
`
`

`
`U.S. Patent
`
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 25 of 38
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`comm
`
`
`
`
`
`
`
`mm.UH~
`
`
`
`
`
`
`
`
`
`
`
`
`
`l4.31..|\J.JJ;2.
`m..,,,,,.._,._,
`
`_mmm
`
`
`
`
`
`
`
`m_mN
`
`~_mm
`
`PAGE 27
`
`PAGE 27
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`;hfl.22,2008
`
`Sheet260f38
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`_~vN
`
`~_¢~
`
`m_¢~
`
`_~v~
`
`mmvm
`
`mmvm
`
`pawn
`
`
`
`
`
`
`
`
`
`3.05
`
`
`
`
`
`oovm
`
`
`
`PAGE 28
`
`

`
`
`
`
`
`
`U.S. Patent
`
`Jul. 22,2008
`
`Sheet 27 of 38
`
`US 7,403,766 B2
`
`
`
`
`
`1I}|+..oI....!..I....l........»...............t.;r¢..,.
`
`
`
`
`
`_:...fi
`
`
`
`
`
`
`
`rrllslln1......|II.l.+.1..l.|v....lP.I....1I.|f»|.I....1.1.1..if.r.in...l.I.\|.!»II.I|Ll!l..!.v..InIII.IIKll..
`
`_N..Bdmmfi86:5
`
`
`..r.i.=.-....pErN§_..u§gamma,
`(5||.l.\:1I.l|.!.ul...¢J»ll¢5\U.1\TlIT.:...|l.rill
`
`
`Beak.
`
`
`
`
`
`........r,...I.|i.Il.:|I..X.n.:.Il..I.i..1!InE.i
`
`lit:E2.W85.3saw.»
`:2-.---.m..%i--.-.1-.......-..--,s.-E---.,-,-.........e.-.s:-
`
`..II-$..n.§.:.r:l.ll|.nl.....ll
`
`"N3435
`
`I...I..r..(e.|IlI\..IIirl|:|..l....uvI|lvnlvIv......|X..I...I..lIt..luI|......
`
`Llals.as..--i$-.....-.--!u---ixi.-.....-.........-|l.!:..:.---!!!
`
`SHNB.
`
`mm.:...&..Bag.0
`
`
`
`
`
`
`
`Il!I...|....ll...I.l.!tI.l....|......:.:..v..n.12...:ul.....lculI.|.\....ou.vI..o...~§r..c.1IIr1.
`
`
`
`82%.3...................::.:.c......IIl........:.!...ll.:¢arI.|..........v....un.....rL..o.-......
`
`B....._..~$
`
`
`
`......L.l.I..u.a..a..\..I....1.li...\loaIt.l
`
`SR
`
`82
`
`
`
`
`
`..........v..\:....).:.lu1:....:...I.§l.:.'.
`
`B.§.&saws
`
`
`
`
`
`maduh
`
`PAGE 29
`
`

`
`
`
`
`
`
`U.S. Patent
`
`Jul. 22,2008
`
`Sheet 28 of 38
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`_,,_.:_.
`
`dfl.Ema,
`
`.mE,m§.,.,
`.3..:lr._..»..u1.
`
`.7....;...:i24gan§$a
`sr--,.:.,1....ii
`
`Jgquhumc_o_
`cl..5......L.!...I_..lll»l.
`
`
`ago:.....1:..2u.i\:.\u........::.|....!:|.....$|
`
`:57.»-...|...l.:n
`
`aa.a
`
`game
`
`
`
`
`
`...5!.....ar:tL.:...f...:..r.......
`
`
`
`2,.__.n._,_
`
`~
`
`
`
`
`in!L:.r__.1...|lirl.l..tl.l..||..l..(
`,_.S§,_a
`H4:anm5a
`
`
`
`.11.....1fT{>.II.ra!..o.rIsI.s$J1!:.l.InIl
`
`
`
`.I..iinl.!.ulI.I...I.l}.I..I.
`
`M4#DhEEa
`
`
`
`
`
`
`
`
`
`nfloumfiom
`
`m_o~
`
`Hfiom
`
`howm
`
`Hoom
`
`meow
`
`PAGE 30
`
`

`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 29 of 33
`
`Us 7,403,766 B2
`
`F‘
`-—I
`l."'-
`61
`
`I.''‘'
`o—I
`t"-
`(‘N1
`
`Q‘;
`-—I
`l"'-l'Nl
`
`2?21
`
`FIG.27
`
`PAGE 31
`
`PAGE 31
`
`

`
`
`U S. Patent
`
`
`
`
`
`Jul. 22, 2008
`
`
`
`
`
`
`Sheet 30 of 38
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`«:5.r....
`
`W.0
`
`»€....r..:,.
`
`.3:
`
`4.
`4.7.-1.9
`
`an.wE
`
`om
`
`2%
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 32
`
`PAGE 32
`
`

`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 31 of38
`
`US 7,403,766 B2
`
`I1.
`
`E3
`
`3
`a~
`rd
`
`3
`Ch
`ru
`
`3
`Ch
`cq
`
`3
`aa
`cu
`
`E
`an
`re
`
`2929
`
`2901
`
`2900
`
`FIG.29
`
`2905
`
`2907
`
`2909
`
`2903
`
`291
`
`2919
`
`2923
`
`PAGE 33
`
`

`
`
`
`m
`
`
`
`2
`
`
`
`
`000mm
`
`
`
`023¢I.%
`
`
`
`
`%
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`1am~om
`
`Mm_mom
`
`oaboom
`
`mm__om
`
`f28
`
`mccm
`
`ooom
`
`m_om
`
`n_om
`
`cm.05
`
`mmoma_om
`
`may;.;.%
`
`
`4;_oomum.
`
`........m_._.mm...m.___....uA‘82
`
`4;moom
`
`PAGE34
`
`PAGE 34
`
`

`
`
`U S. Patent
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 33 of 38
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`..
`.._.‘..h.
`
`..
`
`..:..;.
`.:C
`
`-.fi...\R.z.
`
`.r..lA.:.
`
`.
`
`
`
`\Ea.._.
`
`mfi_m
`
`
`
`
`mo_m
`
`
`
`
`
`mofim
`
`Hoflm
`
`no_m
`
`
`
`PAGE 35
`
`PAGE 35
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U S Patent
`
`Jul. 22,2008
`
`Sheet 34 of 38
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`an»
`
`name
`
`Muom
`
`moaana
`
`8.05
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ut.
`
`nmnncozuumna
`-~omooo
`
`nuuuna
`aaaomoao
`
`.mnHguHmn
`Hoaommmo
`
`zngxnamh
`vvvomomo
`
`auouqana
`uoaommno
`
`gunman
`nmmoaomo
`
`gn<>oum
`eoaomnmo
`
`xooo
`noaommno
`
`moaonmao
`
`moaommmo.
`
`«5.4
`
`
`
`,w_~.w...u...:.......wH....n.._w..
`
`comm
`
`PAGE 36
`
`

`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 35 M38
`
`US 7,403,766 B2
`
`nduo
`
`anus
`
`oauo
`
`mane
`
`mans
`
`oauo
`
`mans
`
`aqua
`
`acne
`
`aaua
`
`aauo
`
`noun
`
`mnvwdvwuhmaua
`counqumn
`oaauxnaxuu
`oaaanmna
`
`pamnmannnm
`
`Panflnflflflhh
`
`p,ww.o.~,.
`
`vauoanmn
`aaawxnaaau
`nmgonuua
`
`mausvumn
`aauuxnoxau
`nmavnuaa
`
`ifpl...
`
`uanouuun
`oamuaaaxaa
`nuaenuaa
`
`¢e
`
`Faun
`
`noun
`
`«Hun
`
`aana
`
`auuu
`
`anno
`
`amua
`
`anus
`
`uunnmunumm
`
`nmmnwnmupu
`
`uoanuooupa
`
`uumnmauunm
`
`uqnuoamnpn
`
`uomnanmupm
`
`nmnnooounu
`
`uonnmamupn
`
`«aqua
`
`ummmoonupn
`
`uamnmamunm
`
`uamnmanunm
`
`uannmamubm
`
`umunmamuum
`
`oaanmnmpou
`
`aaapmnnpau
`
`ooonnnnpov
`
`omuoavavau
`
`uamnma
`
`uuuuaumo
`auuodumo
`aaouxoaxau
`aaouaouxqu
`aauaanwa.
`«aaomonau
`
`uonmaumo
`oaausoaxan
`aaaomnno
`
`mquuvumu
`aaauxnaxaa
`a4aamama
`
`wnuuauma
`.=unuaoqxaa
`.uuuamuna
`
`awuqnuaa
`oaauauaaqu
`uuuamuna_
`
`mmnuouoo
`oaousnaxqu
`uauoauna
`
`uquoaumn
`aoouxnaxqn
`uuuaaama
`
`nvuounma
`aoonxoaxaa
`nnaanunu
`
`pwuuunma
`ooauxaaxau
`nmnamoma
`
`mauneuna
`ooouxmqxun
`aoaannma
`
`mo"¢a”v4
`oonuanaxun
`Aoaammma
`
`Huuuauvq
`oaouxmaxua
`Aoaonmno
`
`uounqumu
`ooauxmaxmn
`uaaommqa
`
`mwunonua
`oaauxauxua
`uaaanmna
`
`aauuaumn
`aoouxuoxaa
`uoaommmo
`
`omumuhua
`aaauxmaxuu
`aoaammmo
`
`nomm
`
`memm
`
`_cmm
`
`awn
`
`PAGE 37
`
`

`
`
`U.S. Patent
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 36 of 38
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`'
`.’f
`.
`e.{-§'+
`"K‘mi0
`
`FIG.34
`
`N5
`‘'9.v-
`
`
`
`""c"BEMDTE;SP'1’_\léi§i_§h_-‘
`
`3400
`
`PAGE38
`
`PAGE 38
`
`

`
`US. Patent
`
`Jul. 22, 2003
`
`Sheet 37 of 33
`
`US 7,403,766 B2
`
`3.
`
`PAGE 39
`
`

`
`taPemU
`
`m
`
`US 7,403,766 B2
`
`mo>ummumo>£
`
`noufimvuobw
`
`t255220m2:
`
`234
`
`
`
`fl,:oufifl.HoBM.353Howuooom
`
`m§§§sBstem35
`
`suaofisfimmQ3385
`
`
`
`Eoufim3.550.Loowsm
`
`83005IVhsmmmfifioo_\minnow
`
`me
`
`.2:2:
`
`em.uE
`
`
`
`
`
`Bumfimqfih.....—.MBfiooomm..N—ofibuaommm
`
`
`
`
`
`PAGE 40
`
`
`
`

`
`2
`
`
`
`US 7,403,766 B2
`
`
`
`
`1
`TELECOMMUNICATION CALL
`
`
`MANAGEMENT AND MONITORING SYSTEM
`
`
`
`WITH VOICEPRINT VERIFICATION
`
`
`
`
`
`
`
`CROSS REFERENCE TO RELATED
`
`
`
`APPLICATIONS
`
`
`
`
`
`This application is a continuation-in-part of application
`
`
`
`
`
`
`Ser. No. 10/215,367, filed Aug. 8, 2002.
`
`
`
`
`
`
`
`FIELD OF THE INVENTION
`
`
`
`
`
`
`
`
`The present invention relates generally to the field of tele-
`
`
`
`
`
`
`
`
`
`phone communication systems in penal institutions or similar
`
`
`
`
`
`
`
`facilities. In particular, the present invention relates to a com-
`
`
`
`
`
`
`
`
`puter-based telecommunication system with the capacity to
`
`
`
`
`
`
`
`allow an institution to authorize, control, record, monitor, and
`
`
`
`
`
`
`
`
`
`report usage and access to a telephone network using speaker
`
`
`
`
`
`
`
`
`
`independent voice recognition and speaker dependent voice
`
`
`
`
`
`
`
`identification to ensure that access is restricted to authorized
`
`
`
`
`
`
`
`
`
`
`
`
`users only.
`
`
`BACKGROUND OF THE PRESENT INVENTION
`
`
`
`
`
`
`
`
`
`
`
`Generally, the need to monitor, control, record and provide
`
`
`
`
`
`
`
`
`
`detailed records of the usage of a telephone system in a
`
`
`
`
`
`
`
`
`
`
`controlled institutional environment is well recognized. It is
`
`
`
`
`
`
`
`common to utilize a controlled telephone system capable of
`
`
`
`
`
`
`
`
`monitoring outgoing telephone connections in many types of
`
`
`
`
`
`
`
`
`institutional environments, such as, but not limited to, penal
`
`
`
`
`
`
`
`
`
`institutions, military institutions, hospitals, schools, busi-
`
`
`
`
`
`nesses, or specific types of government institutions. The rea-
`
`
`
`
`
`
`
`
`sons for monitoring and controlling institutional telephone
`
`
`
`
`
`
`systems are evident. To prevent such institutions from incur-
`
`
`
`
`
`
`
`
`ring unaccountable telephone costs,
`the institutions must
`
`
`
`
`
`
`
`either restrict access to outbound telephone lines or employ a
`
`
`
`
`
`
`
`
`
`telephone monitoring system to charge the responsible party
`
`
`
`
`
`
`
`
`for making the outbound communication. Otherwise, unac-
`
`
`
`
`
`
`countable telephone costs would severally hinder the avail-
`
`
`
`
`
`
`
`ability of the telephone systems in institutions.
`
`
`
`
`
`
`
`Therefore, it is imperative for many institutions to utilize a
`
`
`
`
`
`
`
`
`
`communication system that provides an accurate identifica-
`
`
`
`
`
`
`tion means for administrators to determine the individual
`
`
`
`
`
`
`
`responsible for each outbound telephone call. A communica-
`
`
`
`
`
`
`
`tion system must also provide a monitoring means for main-
`
`
`
`
`
`
`
`
`taining a useful record of the communication. Additionally,
`
`
`
`
`
`
`
`
`the system may include a means for restricting access or a
`
`
`
`
`
`
`
`
`
`
`means for providing options to particular users. Considering
`
`
`
`
`
`
`
`
`the number of users in a large institution, different payment
`
`
`
`
`
`
`
`
`
`methods available, and the excessive call volume at many
`
`
`
`
`
`
`
`
`
`institutions, it is evident that an effective telephone manage-
`
`
`
`
`
`
`
`
`ment system is essential.
`
`
`
`
`Providing telephone systems in specific types of highly
`
`
`
`
`
`
`
`restricted institutions, such as in penal institutions, results in
`
`
`
`
`
`
`
`
`the consideration of numerous additional complicating fac-
`
`
`
`
`
`
`tors. Generally, outbound communication means in penal
`
`
`
`
`
`
`institutions are heavily regulated by the government. There-
`
`
`
`
`
`
`
`fore, communication systems implemented in penal institu-
`
`
`
`
`
`
`tions or similar facilities must meet greater security require-
`
`
`
`
`
`
`
`
`ments often mandated by regulatory bodies affiliated with the
`
`
`
`
`
`
`
`
`
`county, state, or federal institution. Thus, the communication
`
`
`
`
`
`
`
`
`system used in a regulated institution must employ unique
`
`
`
`
`
`
`
`
`functions.
`
`In its most general form, a penal institution’s telephone
`
`
`
`
`
`
`
`
`
`system utilizes a call processor to approve and place a call,
`
`
`
`
`
`
`
`
`
`
`surveillance equipment or monitoring equipment, and a
`
`
`
`
`
`
`
`recording device for evidencing the conversation. Generally,
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`25
`
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`PAGE 41
`
`
`these simple systems are not equipped to restrict an inmate
`
`
`
`
`
`
`
`
`
`
`from calling any individual or to verify the identification of a
`
`
`
`
`
`
`
`
`
`
`user utilizing advanced authentication techniques. However,
`
`
`
`
`
`
`it is preferable for the call system devices now employed in
`
`
`
`
`
`
`
`
`
`
`
`such institutions to have the capability to thwart an inmate
`
`
`
`
`
`
`
`
`
`
`from calling certain specific individuals or types of individu-
`
`
`
`
`
`
`
`
`als. Without the necessary constraints on an inmate’s use of
`
`
`
`
`
`
`
`
`
`
`the telephone system, inmates have often harassed outside
`
`
`
`
`
`
`
`
`parties or individuals. For example, it is generally preferred
`
`
`
`
`
`
`
`
`
`that an inmate should not be able to place a telephone call to
`
`
`
`
`
`
`
`
`
`
`
`
`the prosecutor who prosecuted the inmate’s case or another
`
`
`
`
`
`
`
`
`
`attorney responsible for the sentencing of the inmate. In
`
`
`
`
`
`
`
`
`
`another example, it may be preferred that an inmate be pre-
`
`
`
`
`
`
`
`
`
`
`vented from contacting the victim of the inmate’s crime or
`
`
`
`
`
`
`
`
`
`witnesses from the inmate’s case. It has also been docu-
`
`
`
`
`
`
`
`
`
`mented that inmates have used previous penal institution call
`
`
`
`
`
`
`
`
`
`systems to perpetrate additional criminal activities such as
`
`
`
`
`
`
`
`
`fraudulent schemes or specific criminal conspiracies. Specifi-
`
`
`
`
`
`
`cally, inmates have been known to arrange credit card fraud
`
`
`
`
`
`
`
`
`
`
`attempts, the smuggling of contraband into the facility, and
`
`
`
`
`
`
`
`
`
`have even been known to arrange escape attempts over the
`
`
`
`
`
`
`
`
`
`
`penal institution’s telephone system. Therefore, it is critical
`
`
`
`
`
`
`
`
`in an efficient penal institution to carefully monitor all out-
`
`
`
`
`
`
`
`
`
`going telephone calls making a regulated penal institution
`
`
`
`
`
`
`
`telephone system a necessity.
`
`
`
`Another concern in implementing an efficient institution
`
`
`
`
`
`
`
`telephone system is cost control. In order for a system to be
`
`
`
`
`
`
`
`
`
`
`
`cost effective the system must critically monitor and record
`
`
`
`
`
`
`
`
`
`the activities of each individual user to properly charge each
`
`
`
`
`
`
`
`
`
`
`individual caller for his or her outgoing calls. Typically, tele-
`
`
`
`
`
`
`
`
`
`phone communication systems in penal institutions provide
`
`
`
`
`
`
`an inmate with a telephone account upon arrival. Each indi-
`
`
`
`
`
`
`
`
`vidual receives an account number. There are several options
`
`
`
`
`
`
`
`
`
`for an inmate to select with respect to payment on the account.
`
`
`
`
`
`
`
`
`
`
`
`
`For example, an inmate may place prior personal earnings
`
`
`
`
`
`
`
`
`
`into the account. The cost of each call is then deducted from
`
`
`
`
`
`
`
`
`
`
`
`
`the total amount in the inmate’s account until no balance
`
`
`
`
`
`
`
`
`
`
`remains. The inmate may choose to utilize collect call means.
`
`
`
`
`
`
`
`
`
`
`In addition, or alternatively, an inmate may be assigned a
`
`
`
`
`
`
`
`
`
`
`commissary account, where funds are added to the account
`
`
`
`
`
`
`
`
`
`based on work performed by the inmate. As the funds
`
`
`
`
`
`
`
`
`
`
`increase, the inmate may apply these funds to the cost of
`
`
`
`
`
`
`
`
`
`
`
`placing telephone calls. The inmate debit account may be
`
`
`
`
`
`
`
`
`
`located onsite, at a central office facility, or at a third-party
`
`
`
`
`
`
`
`
`
`
`
`site.
`
`The inmate debit account may alternatively be controlled
`
`
`
`
`
`
`
`
`by the inmate’ s family. For example, the inmate’ s family may
`
`
`
`
`
`
`
`
`
`
`control
`the inmate’s access to the debit account either
`
`
`
`
`
`
`
`
`
`remotely (e.g., by using the Internet, accessing a toll-free/pay
`
`
`
`
`
`
`
`
`to dial telephone number, using a mail form, etc.) or by
`
`
`
`
`
`
`
`
`
`
`
`visiting the prison facility. The inmate’s family may add
`
`
`
`
`
`
`
`
`
`funds to the debit account and thereby control the call volume
`
`
`
`
`
`
`
`
`
`
`
`allowed to the inmate.
`
`
`
`
`Another requirement of a secure telephone management
`
`
`
`
`
`
`system in a penal institution is the accurate identification of
`
`
`
`
`
`
`
`
`
`the telephone call participants. Generally, it is common in a
`
`
`
`
`
`
`
`
`
`penal institution to assign each inmate a personal identifica-
`
`
`
`
`
`
`
`tion number (PIN). When an inmate attempts to place a tele-
`
`
`
`
`
`
`
`
`
`phone call, the inmate must supply a valid PIN to gain access
`
`
`
`
`
`
`
`
`
`
`
`to the telephone system. However, a primary problem with
`
`
`
`
`
`
`
`
`
`this identification method is the ease of obtaining another
`
`
`
`
`
`
`
`
`
`inmate’s PIN. For example, individuals who commonly for-
`
`
`
`
`
`
`
`get their PIN may write it down, increasing the possibility that
`
`
`
`
`
`
`
`
`
`an unauthorized individual will view the PIN and use it. In
`
`
`
`
`
`
`
`
`
`
`addition, if a PIN number is compromised and utilized by an
`
`
`
`
`
`
`
`
`
`unauthorized inmate, the unauthorized inmate may then be
`
`
`
`
`
`
`
`able to call certain individuals who are restricted to that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 41
`
`

`
`4
`
`
`
`US 7,403,766 B2
`
`
`
`
`3
`inmate, since the unauthorized inmate is no longer using the
`
`
`
`
`
`
`
`
`
`
`proper PIN associated with that inmate. In known systems,
`
`
`
`
`
`
`
`
`
`the PIN identification method is incapable of verifying that
`
`
`
`
`
`
`
`
`
`the individual who supplies the PIN is the actual specified
`
`
`
`
`
`
`
`
`
`
`inmate. Some systems have attempted to improve security by
`
`
`
`
`
`
`
`
`
`requiring the use of a debit card in conjunction with a PIN.
`
`
`
`
`
`
`
`
`
`
`The use ofthe debit card will only allow access to an inmate’ s
`
`
`
`
`
`
`
`
`
`
`
`
`
`account
`if the correct associated PIN is supplied. This
`
`
`
`
`
`
`
`
`
`method, however, provides only minimal additional protec-
`
`
`
`
`
`
`tion because a debit card and its associated PIN can often,
`
`
`
`
`
`
`
`
`
`
`
`with or without force, easily be taken from another inmate, or
`
`
`
`
`
`
`
`
`
`
`
`given to another inmate, especially in the violent atmosphere
`
`
`
`
`
`
`
`
`
`of a penal institution. For example, one inmate may threaten
`
`
`
`
`
`
`
`
`
`another inmate in order to obtain such information. Alterna-
`
`
`
`
`
`
`
`
`tively, one inmate may provide certain services in exchange
`
`
`
`
`
`
`
`
`
`for the use of another inmate’s telephone privileges. The
`
`
`
`
`
`
`
`
`
`possibility that two inmates will exchange accounts also
`
`
`
`
`
`
`
`
`exists, thereby allowing them to contact people that would
`
`
`
`
`
`
`
`
`
`normally be restricted to them.
`
`
`
`
`
`Further attempts to obviate security concerns include
`
`
`
`
`
`
`
`requiring personal information, in addition to a PIN, to be
`
`
`
`
`
`
`
`
`
`
`supplied by the inmate/user. For example, a user might be
`
`
`
`
`
`
`
`
`
`
`prompted to supply a PIN as well as certain information that
`
`
`
`
`
`
`
`
`
`
`may only be known to the user. A common example is a
`
`
`
`
`
`
`
`
`
`
`
`
`request by the call system to provide their mother’s maiden
`
`
`
`
`
`
`
`
`
`
`name. This provides an additional security measure, but again
`
`
`
`
`
`
`
`
`
`is minimally secure because such information can easily be
`
`
`
`
`
`
`
`
`
`obtained in a correctional facility. It would therefore be desir-
`
`
`
`
`
`
`
`
`able to develop a telephone management system that incor-
`
`
`
`
`
`
`
`
`porates an improved method of identification and/or verifica-
`
`
`
`
`
`
`
`tion.
`
`Another required feature of a telephone management sys-
`
`
`
`
`
`
`tem for a penal institution or similar facility is a means for
`
`
`
`
`
`
`
`
`
`
`
`
`restricting calls placed by a user (e.g., an inmate). It is well
`
`
`
`
`
`
`
`
`
`
`
`documented that
`inmates often try to harass individuals
`
`
`
`
`
`
`
`
`related to their arrest or confinement, such as judges, pros-
`
`
`
`
`
`
`
`
`
`ecutors or witnesses, etc., through telephonic communica-
`
`
`
`
`
`
`tions. Penal institutions have attempted to prevent this by
`
`
`
`
`
`
`
`
`
`restricting the telephone numbers each inmate is able to
`
`
`
`
`
`
`
`
`
`access. For example, a system may utilize a PIN or other
`
`
`
`
`
`
`
`
`
`
`
`identification means to access a list oftelephone numbers that
`
`
`
`
`
`
`
`
`
`the inmate may not call, or alternatively, the system may
`
`
`
`
`
`
`
`
`
`
`access a list of numbers that the inmate is authorized to
`
`
`
`
`
`
`
`
`
`
`
`connect to (i.e., the inmate can only call the numbers appear-
`
`
`
`
`
`
`
`
`
`
`ing on the list). Telephone numbers placed on the restricted
`
`
`
`
`
`
`
`
`
`
`list can include any individual related to the conviction (e.g.,
`
`
`
`
`
`
`
`
`
`
`the arresting police officer, the prosecuting attorney, etc.),
`
`
`
`
`
`
`
`
`while telephone numbers placed on the permitted list may be,
`
`
`
`
`
`
`
`
`
`
`for example, close family relatives. The system may also limit
`
`
`
`
`
`
`
`
`
`
`the amount of time each inmate/user is permitted to conduct
`
`
`
`
`
`
`
`
`
`
`each outbound telephone call through the system. Further-
`
`
`
`
`
`
`
`more, restrictions may be regularly updated. For example, if
`
`
`
`
`
`
`
`
`
`an inmate misbehaves, the inmate’s telephone privileges may
`
`
`
`
`
`
`
`
`be further limited or revoked completely.
`
`
`
`
`
`
`Penal institutions are also concerned with monitoring the
`
`
`
`
`
`
`
`activities and communications of inmates. Monitoring tele-
`
`
`
`
`
`
`phone activities is necessary to restrict connections to illegal
`
`
`
`
`
`
`
`
`activities outside of the institution.
`
`
`
`
`
`Three existing types of call monitoring techniques are
`
`
`
`
`
`
`
`
`known in the art. The first technique is live monitoring. Live
`
`
`
`
`
`
`
`
`
`
`
`monitoring requires an operator or other individual to listen to
`
`
`
`
`
`
`
`
`
`
`each telephone call and alert the proper authorities if neces-
`
`
`
`
`
`
`
`
`
`sary.
`
`The second type of monitoring involves recording the tele-
`
`
`
`
`
`
`
`
`phone conversation via a common recording device. A com-
`
`
`
`
`
`
`
`mon example of this is a recording device such as a magnetic
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`25
`
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`PAGE 42
`
`
`tape drive. This type of monitoring may be continuous or
`
`
`
`
`
`
`
`
`
`
`intermittent depending on the degree of security required for
`
`
`
`
`
`
`
`
`
`each inmate.
`
`
`The third type of monitoring is known as passive monitor-
`
`
`
`
`
`
`
`
`
`ing. Passive monitoring may be activated when certain key-
`
`
`
`
`
`
`
`
`words are spoken. In addition, passive monitoring may be
`
`
`
`
`
`
`
`
`activated if the telephone call at the termination end is trans-
`
`
`
`
`
`
`
`
`
`
`ferred to a third party via certain known detection means such
`
`
`
`
`
`
`
`
`
`as “click and pop” detection, etc.
`
`
`
`
`
`
`Penal institutions currently record most inmate telephone
`
`
`
`
`
`
`
`calls, with the exception of lawyer-inmate communications
`
`
`
`
`
`
`
`which are generally prohibited by law. Typically in the art,
`
`
`
`
`
`
`
`
`
`
`monitoring may occur using any combination of the three
`
`
`
`
`
`
`
`
`
`methods (e.g., live monitoring, electronic recording monitor-
`
`
`
`
`
`
`ing, or passive monitoring). However, it would be desirable
`
`
`
`
`
`
`
`
`
`for a telephone management system to embody a means for
`
`
`
`
`
`
`
`
`
`determining which level of telephone monitoring should be
`
`
`
`
`
`
`
`
`employed for each telephone call. For example, it would be
`
`
`
`
`
`
`
`
`
`
`advantageous to flag certain individuals in an inmate’s profile
`
`
`
`
`
`
`
`
`
`as highly suspicious. If the inmate initiates communication
`
`
`
`
`
`
`
`
`with the flagged individual, the system will alert a live opera-
`
`
`
`
`
`
`
`
`
`tor to monitor the system. In such a system it is essential that
`
`
`
`
`
`
`
`
`
`
`
`the system correctly identify the called individual to avoid
`
`
`
`
`
`
`
`
`unnecessary expenditure of live operators.
`
`
`
`
`
`Alternatively, the inmate telephone call system may utilize
`
`
`
`
`
`
`
`a remote alert notification system wherein the system con-
`
`
`
`
`
`
`
`
`tacts an operator when a violation has occurred. The system
`
`
`
`
`
`
`
`
`
`may contact the operator utilizing telephone means, paging
`
`
`
`
`
`
`
`
`means, etc. This notification system may be set to call the
`
`
`
`
`
`
`
`
`
`
`
`operator a limited number of times or until the alert has been
`
`
`
`
`
`
`
`
`
`
`
`noted in the inmate telephone call system. The operator may
`
`
`
`
`
`
`
`
`
`
`then access information about the alert remotely using the
`
`
`
`
`
`
`
`
`
`telephone, Internet, or any other such remote access means.
`
`
`
`
`
`
`
`
`
`In order to alleviate some of the problems and concerns
`
`
`
`
`
`
`
`
`
`discussed herein, many penal institutions have implemented
`
`
`
`
`
`
`these
`certain task-specific advanced systems. Generally,
`
`
`
`
`
`“advanced” systems known in the art comprise several fea-
`
`
`
`
`
`
`
`
`tures.
`
`For example, it is known in current systems to employ
`
`
`
`
`
`
`
`
`
`
`permanent call blocking. Specifically, it is known in the art to
`
`
`
`
`
`
`
`
`
`
`
`block an inmate or group of inmates from dialing certain
`
`
`
`
`
`
`
`
`
`
`telephone numbers. Most systems also prevent inmates from
`
`
`
`
`
`
`
`
`talking directly to live operators. This prevents inmates from
`
`
`
`
`
`
`
`
`
`requesting that the operator forward a call or provide addi-
`
`
`
`
`
`
`
`
`
`tional telephone numbers allowing the inmates to harass or
`
`
`
`
`
`
`
`
`
`locate additional parties. Furthermore, current systems block
`
`
`
`
`
`
`
`“ l -800,” “ l -900” and other like telephone numbers including
`
`
`
`
`
`
`
`
`toll-free and pay-to-dial telephone numbers. In addition cer-
`
`
`
`
`
`
`
`tain institutions may elect to block country codes, specific
`
`
`
`
`
`
`
`
`area codes, or other third-party numbers.
`
`
`
`
`
`
`Current systems known in the art may also utilize a feature
`
`
`
`
`
`
`
`
`
`
`commonly referred to as “selective” call blocking. As dis-
`
`
`
`
`
`
`
`
`cussed, “selective” call blocking may be employed to thwart
`
`
`
`
`
`
`
`
`
`inmates from establishing a connection with a selected group
`
`
`
`
`
`
`
`of indi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket