`
`(12) United States Patent
`Hodge
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,403,766 B2
`Jul. 22, 2008
`
`(54) TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING SYSTEM
`WITH VOICEPRINT VERIFICATION
`
`(75)
`
`Inventor: Stephen L. Hodge, Aubry, TX (US)
`
`(73) Assignee: Value-Added Communications, Inc.,
`Plano, TX (US)
`
`( " ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 110 days.
`
`(21) App]. No.: 10/393,575
`
`(22) Filed:
`
`Jul. 16, 2004
`
`(65)
`
`Prior Publication Data
`
`US 2005/0043014 A1
`
`Feb. 24, 2005
`
`Related US. Application Data
`
`(63) Continuation-in-part of application No. 10/215,367,
`filed on Aug. 8, 2002.
`
`(51)
`
`Int. Cl.
`(2006.01)
`H04M 1/66
`(2006.01)
`H04M 1/68
`(2006.01)
`H04M 3/16
`455/411;455/41.2;455/41.3;
`(52) U.S.Cl.
`455/405; 455/410; 455/418; 455/419; 455/420;
`455/569.1; 455/565; 379/114.2; 379/188;
`379/191; 379/194; 379/198
`(58) Field ofClasslficatlon Search
`455/41.2,
`455/41.3, 405, 410-411, 415, 418-420, 563,
`455/569], 565, 569; 379/114.2, 188, 191,
`379/194, 198, 114
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,706,275 A
`4,935,956 A
`4.993.068 A
`
`11/ 1987 Kamil
`6/ 1990 Hellwarth et al.
`21‘ 1991 Piosenka et al.
`
`5,170,426 A
`5,319,702 A
`5,353,335 A
`5,483,581 A
`5,485,507 A
`5,513,272 A
`5,539,812 A
`5,655,013 A
`5,696,880 A
`5,717,743 A "
`5,745,558 A
`5,768,355 A
`5,796,811 A
`5,805,685 A
`5,883,945 A
`
`12/1992 D’Alessioeta1.
`6/1994 Kitchinetal.
`10/1994 Dursoetal.
`1/1996 Hirdetal.
`1/1996 Brown etal.
`4/1996 Bogosian. Jr.
`7/1996 Kitchinetal.
`8/1997 Gainsboro
`12/1997 Gustafson
`2/1998 McMahaneta]. ......... .. 379/188
`4/1998 Ric11ardson,Jr.etal.
`6/1998 Salibricietal.
`8/1998 McFa.r1en
`9/1998 McFa.rlen
`3/1999 Ricl1ardson,Jr.eta.1.
`
`(Continued)
`
`Primary Examiner—Stephen M D’Agosta
`(74) Attorney, Agent, or Firm—Ward & Olivo
`
`(57)
`
`ABSTRACT
`
`Disclosed is a secure telephone call management system for
`authenticating users of a telephone system in an institutional
`facility. Authentication ofthe users is accomplished by using
`a personal identification number, preferably in conjunction
`with speaker independent voice recognition and speaker
`dependent voice identification. When a user first enters the
`system, the user speaks his or her name which is used as a
`sample voice print. During each subsequent use ofthe system,
`the user is required to speak his or her name. Voice identifi-
`cation software is used to verify that the provided speech
`matches the sample voice print. The secure system includes
`accounting sofiware to limit access based on funds in a user’s
`account or other related limitations. Management sofiware
`implements widespread or local changes to the system and
`can modify or set any number of user account parameters.
`
`6 Claims, 38 Drawing Sheets
`
`
`
`cm (WAN)
`
`..
`
`PAGE 1
`
`SECURUS EXHIBIT 1001
`
`PAGE 1
`
`SECURUS EXHIBIT 1001
`
`
`
`
`
`
`US 7,403,766 B2
`Page 2
`
`
`
`12/2000 Kanevsky etal.
`
`
`
`10/2001 Meyer et al.
`
`
`7/2004 Shinzaki
`.................. .. 340/5.52
`
`
`
`7/2004 Murveitetal.
`............ .. 704/243
`
`
`
`
`5/2005 Kotola etal.
`............. .. 455/41.2
`
`
`
`
`
`
`
`U.S. PATENT DOCUMENTS
`
`
`
`
`
`5,893,057 A
`
`
`5,926,533 A *
`
`
`6,058,173 A
`
`
`6,092,192 A
`
`
`6,122,354 A *
`
`
`
`
`
`
`
`4/ 1999 Fujimoto et a1,
`
`
`
`
`7/1999 Gainsboro
`
`
`5/2000 Penfield et 81,
`
`
`
`
`7/2000 Kanevsky et al.
`
`
`
`9/2000 Dowens .............. .. 379/114.2
`
`
`
`
`~~~~~~~~ ~~ 379/188
`
`
`
`
`
`
`6,161,090 A
`
`
`6,301,344 B1
`
`
`
`6,765,470 132*
`
`
`6,766,295 131*
`
`
`6,892,052 132*
`
`
`* cited by examiner
`
`
`
`
`
`PAGE 2
`
`PAGE 2
`
`
`
`U.
`
`
`
`=oue.$_._oBstem3%
`
`+.lEm224mH,
`
`.g.ae<Howuoomm
`
`
`...............--um........................................................................................--SZTVmofidv_d3u.H
`
`
`
`ru.confimvuoa.
`
`
`
`_a..EuUmW_.§2_§_am%M.8Bofimfim
`o_=e§_m
`
`2
`
`S.
`
`
`
`2:2:2: B.MESEwasaGE%m...................................................................................................................--Ln.n..:n.............IM,
`
`
`
`
`.1..........ivk................... UEHIVEmmmwfifioov\nomflom_ 05285WWM+saousezoaMW3._+W.mmu>%m_§>E2HM,
`
`
`PAGE 3
`
`
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 2 of 33
`
`US 7,403,766 B2
`
`.\....1.r.E[.iI.i..|....I
`
`eEEmoo
`
`Rmam
`
`N3
`
`«ADM
`
`mu
`
`2.anan
`
`HZOEM
`
`Mzflm
`
`Q:
`
`<N.0_u_
`
`PAGE 4
`
`
`
`
`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 3 of 38
`
`Us 7,403,766 B2
`
`
` New account request
`233
`
`.
`.
`Assign PIN to Inmate
`235
`
`Inmate records speech
`segment
`241
`
`
`
`Store PIN with inmate
`Speaker independent
`ID Information
`vocie recogntion
`
`243
`237
`
`
`
`Retrieve stored
`name from
`database
`239
`
`
`
`
`
`
`word? spake" by
`Inma e
`
`245
`
`
` Second attempt?
`
`251
`
`
`Store sample speech
`
`with speaker Into (PIN.
`257
`ID)
`
` Forward sample to site
`
`
`
`personnel
`255
`
`
`
`
`
`FIG. 2B
`
`PAGE 5
`
`PAGE 5
`
`
`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 4 of 38
`
`US 7,403,766 B2
`
`Inmate attempts a
`telephone call
`
`257 System prompts for
`
`
`PIN
`
`259
`
` Valid PIN
`261 Second attempt
`
`
`265
`
`
`
`
`
`
`System retrieves
`stored utterance of
`inmate's name
`263
`
`
`
`System prompts:
`‘State your name‘
`269
`
`
`
`
`Second attempt
`275
`
`Inmate is verified
`273
`
`Inmate is blocked
`267
`
`
`
`
`
`
`
`FIG. 2C
`
`PAGE 6
`
`PAGE 6
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 5 of 33
`
`US 7,403,766 B2
`
`Sm
`
`mm
`
`an
`
`M
`
`AOEZOU«N
`
`damn
`
`._..uD£m
`
`EH2
`
`Em
`
`PAGE 7
`
`
`
`
`
`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 5 of 33
`
`US 7,403,766 B2
`
`.UOu—.—
`
`among
`
`
`
`
`
`@259._||lIn|..............-_L
`
`M7.
`
`I
`
`2 3 !
`
`PAGE 8
`
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 7 of 33
`
`US 7,403,766 B2
`
`_UO_.—<Z4.3
`
`
`
`onOn.memos
`
`PAGE 9
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 3 of 33
`
`US 7,403,766 B2
`
`._.mc._.A<::
`
`.E<M:Hfl¢flm
`
`AGMBZDU
`
`mommmuomm
`
`w.
`Duh
`
`Sm
`
`4mSu._
`
`AOMHZOU
`
`mmnm
`
`PAGE 10
`
`
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 9 of 33
`
`US 7,403,766 B2
`
`500A1Ram
`
`PAGE 11
`
`
`
`U
`
`In.
`
`h
`
`US 7,403,766 B2
`
`t.wWtE|vma_PM
`
`S9M1_Nm3M1.mammanSE.
`8wWB_PMOEHE“o5.4:m_wW
`
`iwas
`
`HADAOZ
`
`W_M
`
`M
`
`'\
`
`PAGE 12
`
`
`
`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 11 M38
`
`US 7,403,766 B2
`
`_wmzmWaozhzcu_a4uaq
`
`I"'-
`I
`
`0G
`
`.535D.$..—.
`
`EH49
`
`PAGE 13
`
`
`
`
`
`
`PS.
`
`tH..w
`
`
`
`mJ
`
`
`
`
`
`8002
`
`
`
`ehS
`
`f021
`
`
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`n82
`
`U82
`
`a22
`
`~_o_
`
`52
`
`PAGE 14
`
`a:2
`
`M.»82
`
`82
`
`m::
`
`mfiofi
`
`3.UHm
`
`PAGE 14
`
`
`
`
`U.S. Patent
`
`
`
`
`
`;hfl.22,2008
`
`
`
`
`
`
`Sheet13of38
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`mo_~
`
`mo__
`
`
`
`
`
`W
`
`'1.=,.. ._
`
`
`
`h..u.a3.3.1.11.
`
`3.05
`
`
`
`PAGE 15
`
`PAGE 15
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`Sheet 14 of 38
`
`
`
`
`
`
`
`
`
`Jul. 22, 2008
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Nudam
`
`|":\i‘
`
`387TL
`wasH.2...”._.._a
`
`
`
`n..s.].v...I..sI._.rI|..|r..r|.:!9nI..,.suI.r-|..l.rlI.rlP.I.LI!rnt...|l|-..llll2.ma!
`
`Saga
`
`an M:-“—-fP?‘OI fl".¢s‘_,'.p'(‘[aV_i
`
`.’-7?
`
`'
`
`aux?
`
`
`I.,:1v1...|.I
`
`..uI‘.IVrl..ls.|.....J.n..‘%%A,
`
`
`
`.3...”q.....<»..fi..»_.u,.....x.n.._...
`
`
`
`
`U.S. Patent
`
`
`
`
`
`
`
`PAGE 16
`
`PAGE 16
`
`
`
`U. S. Patent
`
`Jul. 22, 2008
`
`Sheet 15 of 33
`
`US 7,403,766 B2
`
`ea
`m_
`
`m
`c
`m.
`
`~_
`m.
`
`n_
`m_
`
`mamfi
`
`mamfl
`
`._....Essa
`
`2.05
`
`a_m_
`
`n_m_
`
`“Mm.
`
`
`
`u_.mn_E2u:a_Eu_uw.w__munm_.._I.0i|.II|.....IIl.1..I.!/
`
`¢om_
`
`PAGE 17
`
`
`
`
`U.S. Patent
`
`
`
`J
`
`
`
`
`
`
`
`003f061
`
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`2,33......T.....
`
`
`
`
`
`
`
`.«3.,_;.s.~-.Wake....n.a..¢::_._~..1....,2...P..«
`
`__v_m~v_
`
`3GE
`
`
`aov_...___.......
`
`
`§ne_W;m ,%% %;§.mw
`
`M....
`
`mowfimovfi_o¢_
`
`
`
`movfioo¢_
`
`..i;1....iLuci!....
`
`
`..a§§§mnv .I.i1....
`
`
`
`
`.ms_._:..u.fiEu..a...§_.;.£.._...m...e.._...._....._t..q._w._.m._..m.3.
`....._
`
`Nov.
`
`PAGE 18
`
`PAGE 18
`
`
`
`
`PAGE 19
`
`
`
`_.HS
`
`83_..I_0.8.1Al8P...
`
`US 7,403,766 B2
`
`3dub
`
`Ll.neta
`
`P....
`
`:;..mm:322:2as.8.2?
`
`8E:
`
`M32
`
`LE:
`
`S222
`
`2,2
`
`0
`
`m22
`
`82
`
`22
`
`PAGE 20
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 19 of 33
`
`US 7,403,766 B2
`
`
`
`_.mama»Esmuam
`
`
`
`E3:.9333
`
`
`
`3.3...2m=.5=m
`
`
`
`_.Emu»._:mm§.smmE?..=mu5::m
`
`nch_
`
`
`
`
`
`_.2.52..._._..fiu5_.5m
`
`
`
` hEm_..:.m.5_._:m_»23...EE5_._.ampup»meuzmzfiam
`
`¢.:...._n.fi3
`
`Egan
`
`iin.
`
`#53
`
`.:..__.n
`
`.1539
`
`3&5
`
`in
`
`..a_.n
`
`5.03
`
`non”
`
`PAGE 21
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 20 of 33
`
`US 7,403,766 B2
`
`
`
`_..Fm_E._..Em.ca:n
`
`
`
` .—Emu..Emanna_.EE.E§5:m».:$_.__.§_.=:am.am..2333P.E£.?E=5_.a
`
`
`
`._mm..2m5_.§
`
`
`
`_«E.....E5..n
`
`2dam
`
`PAGE 22
`
`
`
`
`U.S. Patent
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 21 of 38
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`
`
`..
`
`
`
`
`
`
`
`..,....R\n.t....?IE.:e.:ucs..r5....n....\..;...._rA
`
`3.05
`
`82
`
`32
`
`.....:..a...§._._n.~m3......=.._:.
`
`PAGE 23
`
`PAGE 23
`
`
`
`aaP3
`
`tHeLI.
`
`J
`
`1,2
`
`m..:3
`
`m
`
`83rl022teBhS
`
`Nas
`
`.8”
`
`US 7,403,766 B2
`
`anon
`
`m_oNmag»
`
`an.05
`
`mean
`
`PAGE 24
`
`
`
`tnnu+toaP«M
`
`0.u.,
`
`no
`
`..Hnu
`
`no3£10asa;teP»
`
`US 7,403,766 B2
`
`
`
`
`
`L=_uEoE...R._iEu...flan.uuw...__au_uu...m.n=§ooun__=..a_:mM«£uE.n_!.a_.onaa2.c3uo_.__u.3E.Sanu
`
`
`
`
`
`
`
`
`
`
`
`.fi...i.§._aB£_E..a..._.._._...B35.3%fan.
`
`mE
`
`
`22..-to.n_..na.m_”_
`
`3.95flux.._.
`23.5JHFED
`
`uhaagseux
`
`.u._.....
`
`beam
`
`mo_~
`
`H_~N
`
`mH_~
`
`m_H~
`
`PAGE 25
`
`
`
`US. Patent
`
`Jul. 22, 2008
`
`Sheet 24 of38
`
`US 7,403,766 B2
`
`man
`
`«own
`
`moma
`
`3.03
`
`Bz.am_§_.___._wusmmm"Ewand
`
`
`MB...m_m__§.&nfi=,
`
`
`
`,,w_=§,_%,g_§
`
`PAGE 26
`
`
`
`U.S. Patent
`
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 25 of 38
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`comm
`
`
`
`
`
`
`
`mm.UH~
`
`
`
`
`
`
`
`
`
`
`
`
`
`l4.31..|\J.JJ;2.
`m..,,,,,.._,._,
`
`_mmm
`
`
`
`
`
`
`
`m_mN
`
`~_mm
`
`PAGE 27
`
`PAGE 27
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`;hfl.22,2008
`
`Sheet260f38
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`_~vN
`
`~_¢~
`
`m_¢~
`
`_~v~
`
`mmvm
`
`mmvm
`
`pawn
`
`
`
`
`
`
`
`
`
`3.05
`
`
`
`
`
`oovm
`
`
`
`PAGE 28
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Jul. 22,2008
`
`Sheet 27 of 38
`
`US 7,403,766 B2
`
`
`
`
`
`1I}|+..oI....!..I....l........»...............t.;r¢..,.
`
`
`
`
`
`_:...fi
`
`
`
`
`
`
`
`rrllslln1......|II.l.+.1..l.|v....lP.I....1I.|f»|.I....1.1.1..if.r.in...l.I.\|.!»II.I|Ll!l..!.v..InIII.IIKll..
`
`_N..Bdmmfi86:5
`
`
`..r.i.=.-....pErN§_..u§gamma,
`(5||.l.\:1I.l|.!.ul...¢J»ll¢5\U.1\TlIT.:...|l.rill
`
`
`Beak.
`
`
`
`
`
`........r,...I.|i.Il.:|I..X.n.:.Il..I.i..1!InE.i
`
`lit:E2.W85.3saw.»
`:2-.---.m..%i--.-.1-.......-..--,s.-E---.,-,-.........e.-.s:-
`
`..II-$..n.§.:.r:l.ll|.nl.....ll
`
`"N3435
`
`I...I..r..(e.|IlI\..IIirl|:|..l....uvI|lvnlvIv......|X..I...I..lIt..luI|......
`
`Llals.as..--i$-.....-.--!u---ixi.-.....-.........-|l.!:..:.---!!!
`
`SHNB.
`
`mm.:...&..Bag.0
`
`
`
`
`
`
`
`Il!I...|....ll...I.l.!tI.l....|......:.:..v..n.12...:ul.....lculI.|.\....ou.vI..o...~§r..c.1IIr1.
`
`
`
`82%.3...................::.:.c......IIl........:.!...ll.:¢arI.|..........v....un.....rL..o.-......
`
`B....._..~$
`
`
`
`......L.l.I..u.a..a..\..I....1.li...\loaIt.l
`
`SR
`
`82
`
`
`
`
`
`..........v..\:....).:.lu1:....:...I.§l.:.'.
`
`B.§.&saws
`
`
`
`
`
`maduh
`
`PAGE 29
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Jul. 22,2008
`
`Sheet 28 of 38
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`_,,_.:_.
`
`dfl.Ema,
`
`.mE,m§.,.,
`.3..:lr._..»..u1.
`
`.7....;...:i24gan§$a
`sr--,.:.,1....ii
`
`Jgquhumc_o_
`cl..5......L.!...I_..lll»l.
`
`
`ago:.....1:..2u.i\:.\u........::.|....!:|.....$|
`
`:57.»-...|...l.:n
`
`aa.a
`
`game
`
`
`
`
`
`...5!.....ar:tL.:...f...:..r.......
`
`
`
`2,.__.n._,_
`
`~
`
`
`
`
`in!L:.r__.1...|lirl.l..tl.l..||..l..(
`,_.S§,_a
`H4:anm5a
`
`
`
`.11.....1fT{>.II.ra!..o.rIsI.s$J1!:.l.InIl
`
`
`
`.I..iinl.!.ulI.I...I.l}.I..I.
`
`M4#DhEEa
`
`
`
`
`
`
`
`
`
`nfloumfiom
`
`m_o~
`
`Hfiom
`
`howm
`
`Hoom
`
`meow
`
`PAGE 30
`
`
`
`U.S. Patent
`
`Jul. 22, 2003
`
`Sheet 29 of 33
`
`Us 7,403,766 B2
`
`F‘
`-—I
`l."'-
`61
`
`I.''‘'
`o—I
`t"-
`(‘N1
`
`Q‘;
`-—I
`l"'-l'Nl
`
`2?21
`
`FIG.27
`
`PAGE 31
`
`PAGE 31
`
`
`
`
`U S. Patent
`
`
`
`
`
`Jul. 22, 2008
`
`
`
`
`
`
`Sheet 30 of 38
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`«:5.r....
`
`W.0
`
`»€....r..:,.
`
`.3:
`
`4.
`4.7.-1.9
`
`an.wE
`
`om
`
`2%
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 32
`
`PAGE 32
`
`
`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 31 of38
`
`US 7,403,766 B2
`
`I1.
`
`E3
`
`3
`a~
`rd
`
`3
`Ch
`ru
`
`3
`Ch
`cq
`
`3
`aa
`cu
`
`E
`an
`re
`
`2929
`
`2901
`
`2900
`
`FIG.29
`
`2905
`
`2907
`
`2909
`
`2903
`
`291
`
`2919
`
`2923
`
`PAGE 33
`
`
`
`
`
`m
`
`
`
`2
`
`
`
`
`000mm
`
`
`
`023¢I.%
`
`
`
`
`%
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`1am~om
`
`Mm_mom
`
`oaboom
`
`mm__om
`
`f28
`
`mccm
`
`ooom
`
`m_om
`
`n_om
`
`cm.05
`
`mmoma_om
`
`may;.;.%
`
`
`4;_oomum.
`
`........m_._.mm...m.___....uA‘82
`
`4;moom
`
`PAGE34
`
`PAGE 34
`
`
`
`
`U S. Patent
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 33 of 38
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`..
`.._.‘..h.
`
`..
`
`..:..;.
`.:C
`
`-.fi...\R.z.
`
`.r..lA.:.
`
`.
`
`
`
`\Ea.._.
`
`mfi_m
`
`
`
`
`mo_m
`
`
`
`
`
`mofim
`
`Hoflm
`
`no_m
`
`
`
`PAGE 35
`
`PAGE 35
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U S Patent
`
`Jul. 22,2008
`
`Sheet 34 of 38
`
`US 7,403,766 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`an»
`
`name
`
`Muom
`
`moaana
`
`8.05
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ut.
`
`nmnncozuumna
`-~omooo
`
`nuuuna
`aaaomoao
`
`.mnHguHmn
`Hoaommmo
`
`zngxnamh
`vvvomomo
`
`auouqana
`uoaommno
`
`gunman
`nmmoaomo
`
`gn<>oum
`eoaomnmo
`
`xooo
`noaommno
`
`moaonmao
`
`moaommmo.
`
`«5.4
`
`
`
`,w_~.w...u...:.......wH....n.._w..
`
`comm
`
`PAGE 36
`
`
`
`U.S. Patent
`
`Jul. 22, 2008
`
`Sheet 35 M38
`
`US 7,403,766 B2
`
`nduo
`
`anus
`
`oauo
`
`mane
`
`mans
`
`oauo
`
`mans
`
`aqua
`
`acne
`
`aaua
`
`aauo
`
`noun
`
`mnvwdvwuhmaua
`counqumn
`oaauxnaxuu
`oaaanmna
`
`pamnmannnm
`
`Panflnflflflhh
`
`p,ww.o.~,.
`
`vauoanmn
`aaawxnaaau
`nmgonuua
`
`mausvumn
`aauuxnoxau
`nmavnuaa
`
`ifpl...
`
`uanouuun
`oamuaaaxaa
`nuaenuaa
`
`¢e
`
`Faun
`
`noun
`
`«Hun
`
`aana
`
`auuu
`
`anno
`
`amua
`
`anus
`
`uunnmunumm
`
`nmmnwnmupu
`
`uoanuooupa
`
`uumnmauunm
`
`uqnuoamnpn
`
`uomnanmupm
`
`nmnnooounu
`
`uonnmamupn
`
`«aqua
`
`ummmoonupn
`
`uamnmamunm
`
`uamnmanunm
`
`uannmamubm
`
`umunmamuum
`
`oaanmnmpou
`
`aaapmnnpau
`
`ooonnnnpov
`
`omuoavavau
`
`uamnma
`
`uuuuaumo
`auuodumo
`aaouxoaxau
`aaouaouxqu
`aauaanwa.
`«aaomonau
`
`uonmaumo
`oaausoaxan
`aaaomnno
`
`mquuvumu
`aaauxnaxaa
`a4aamama
`
`wnuuauma
`.=unuaoqxaa
`.uuuamuna
`
`awuqnuaa
`oaauauaaqu
`uuuamuna_
`
`mmnuouoo
`oaousnaxqu
`uauoauna
`
`uquoaumn
`aoouxnaxqn
`uuuaaama
`
`nvuounma
`aoonxoaxaa
`nnaanunu
`
`pwuuunma
`ooauxaaxau
`nmnamoma
`
`mauneuna
`ooouxmqxun
`aoaannma
`
`mo"¢a”v4
`oonuanaxun
`Aoaammma
`
`Huuuauvq
`oaouxmaxua
`Aoaonmno
`
`uounqumu
`ooauxmaxmn
`uaaommqa
`
`mwunonua
`oaauxauxua
`uaaanmna
`
`aauuaumn
`aoouxuoxaa
`uoaommmo
`
`omumuhua
`aaauxmaxuu
`aoaammmo
`
`nomm
`
`memm
`
`_cmm
`
`awn
`
`PAGE 37
`
`
`
`
`U.S. Patent
`
`
`
`Jul. 22,2008
`
`
`
`
`
`Sheet 36 of 38
`
`
`
`
`
`
`
`
`US 7,403,766 B2
`
`
`
`'
`.’f
`.
`e.{-§'+
`"K‘mi0
`
`FIG.34
`
`N5
`‘'9.v-
`
`
`
`""c"BEMDTE;SP'1’_\léi§i_§h_-‘
`
`3400
`
`PAGE38
`
`PAGE 38
`
`
`
`US. Patent
`
`Jul. 22, 2003
`
`Sheet 37 of 33
`
`US 7,403,766 B2
`
`3.
`
`PAGE 39
`
`
`
`taPemU
`
`m
`
`US 7,403,766 B2
`
`mo>ummumo>£
`
`noufimvuobw
`
`t255220m2:
`
`234
`
`
`
`fl,:oufifl.HoBM.353Howuooom
`
`m§§§sBstem35
`
`suaofisfimmQ3385
`
`
`
`Eoufim3.550.Loowsm
`
`83005IVhsmmmfifioo_\minnow
`
`me
`
`.2:2:
`
`em.uE
`
`
`
`
`
`Bumfimqfih.....—.MBfiooomm..N—ofibuaommm
`
`
`
`
`
`PAGE 40
`
`
`
`
`
`2
`
`
`
`US 7,403,766 B2
`
`
`
`
`1
`TELECOMMUNICATION CALL
`
`
`MANAGEMENT AND MONITORING SYSTEM
`
`
`
`WITH VOICEPRINT VERIFICATION
`
`
`
`
`
`
`
`CROSS REFERENCE TO RELATED
`
`
`
`APPLICATIONS
`
`
`
`
`
`This application is a continuation-in-part of application
`
`
`
`
`
`
`Ser. No. 10/215,367, filed Aug. 8, 2002.
`
`
`
`
`
`
`
`FIELD OF THE INVENTION
`
`
`
`
`
`
`
`
`The present invention relates generally to the field of tele-
`
`
`
`
`
`
`
`
`
`phone communication systems in penal institutions or similar
`
`
`
`
`
`
`
`facilities. In particular, the present invention relates to a com-
`
`
`
`
`
`
`
`
`puter-based telecommunication system with the capacity to
`
`
`
`
`
`
`
`allow an institution to authorize, control, record, monitor, and
`
`
`
`
`
`
`
`
`
`report usage and access to a telephone network using speaker
`
`
`
`
`
`
`
`
`
`independent voice recognition and speaker dependent voice
`
`
`
`
`
`
`
`identification to ensure that access is restricted to authorized
`
`
`
`
`
`
`
`
`
`
`
`
`users only.
`
`
`BACKGROUND OF THE PRESENT INVENTION
`
`
`
`
`
`
`
`
`
`
`
`Generally, the need to monitor, control, record and provide
`
`
`
`
`
`
`
`
`
`detailed records of the usage of a telephone system in a
`
`
`
`
`
`
`
`
`
`
`controlled institutional environment is well recognized. It is
`
`
`
`
`
`
`
`common to utilize a controlled telephone system capable of
`
`
`
`
`
`
`
`
`monitoring outgoing telephone connections in many types of
`
`
`
`
`
`
`
`
`institutional environments, such as, but not limited to, penal
`
`
`
`
`
`
`
`
`
`institutions, military institutions, hospitals, schools, busi-
`
`
`
`
`
`nesses, or specific types of government institutions. The rea-
`
`
`
`
`
`
`
`
`sons for monitoring and controlling institutional telephone
`
`
`
`
`
`
`systems are evident. To prevent such institutions from incur-
`
`
`
`
`
`
`
`
`ring unaccountable telephone costs,
`the institutions must
`
`
`
`
`
`
`
`either restrict access to outbound telephone lines or employ a
`
`
`
`
`
`
`
`
`
`telephone monitoring system to charge the responsible party
`
`
`
`
`
`
`
`
`for making the outbound communication. Otherwise, unac-
`
`
`
`
`
`
`countable telephone costs would severally hinder the avail-
`
`
`
`
`
`
`
`ability of the telephone systems in institutions.
`
`
`
`
`
`
`
`Therefore, it is imperative for many institutions to utilize a
`
`
`
`
`
`
`
`
`
`communication system that provides an accurate identifica-
`
`
`
`
`
`
`tion means for administrators to determine the individual
`
`
`
`
`
`
`
`responsible for each outbound telephone call. A communica-
`
`
`
`
`
`
`
`tion system must also provide a monitoring means for main-
`
`
`
`
`
`
`
`
`taining a useful record of the communication. Additionally,
`
`
`
`
`
`
`
`
`the system may include a means for restricting access or a
`
`
`
`
`
`
`
`
`
`
`means for providing options to particular users. Considering
`
`
`
`
`
`
`
`
`the number of users in a large institution, different payment
`
`
`
`
`
`
`
`
`
`methods available, and the excessive call volume at many
`
`
`
`
`
`
`
`
`
`institutions, it is evident that an effective telephone manage-
`
`
`
`
`
`
`
`
`ment system is essential.
`
`
`
`
`Providing telephone systems in specific types of highly
`
`
`
`
`
`
`
`restricted institutions, such as in penal institutions, results in
`
`
`
`
`
`
`
`
`the consideration of numerous additional complicating fac-
`
`
`
`
`
`
`tors. Generally, outbound communication means in penal
`
`
`
`
`
`
`institutions are heavily regulated by the government. There-
`
`
`
`
`
`
`
`fore, communication systems implemented in penal institu-
`
`
`
`
`
`
`tions or similar facilities must meet greater security require-
`
`
`
`
`
`
`
`
`ments often mandated by regulatory bodies affiliated with the
`
`
`
`
`
`
`
`
`
`county, state, or federal institution. Thus, the communication
`
`
`
`
`
`
`
`
`system used in a regulated institution must employ unique
`
`
`
`
`
`
`
`
`functions.
`
`In its most general form, a penal institution’s telephone
`
`
`
`
`
`
`
`
`
`system utilizes a call processor to approve and place a call,
`
`
`
`
`
`
`
`
`
`
`surveillance equipment or monitoring equipment, and a
`
`
`
`
`
`
`
`recording device for evidencing the conversation. Generally,
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`25
`
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`PAGE 41
`
`
`these simple systems are not equipped to restrict an inmate
`
`
`
`
`
`
`
`
`
`
`from calling any individual or to verify the identification of a
`
`
`
`
`
`
`
`
`
`
`user utilizing advanced authentication techniques. However,
`
`
`
`
`
`
`it is preferable for the call system devices now employed in
`
`
`
`
`
`
`
`
`
`
`
`such institutions to have the capability to thwart an inmate
`
`
`
`
`
`
`
`
`
`
`from calling certain specific individuals or types of individu-
`
`
`
`
`
`
`
`
`als. Without the necessary constraints on an inmate’s use of
`
`
`
`
`
`
`
`
`
`
`the telephone system, inmates have often harassed outside
`
`
`
`
`
`
`
`
`parties or individuals. For example, it is generally preferred
`
`
`
`
`
`
`
`
`
`that an inmate should not be able to place a telephone call to
`
`
`
`
`
`
`
`
`
`
`
`
`the prosecutor who prosecuted the inmate’s case or another
`
`
`
`
`
`
`
`
`
`attorney responsible for the sentencing of the inmate. In
`
`
`
`
`
`
`
`
`
`another example, it may be preferred that an inmate be pre-
`
`
`
`
`
`
`
`
`
`
`vented from contacting the victim of the inmate’s crime or
`
`
`
`
`
`
`
`
`
`witnesses from the inmate’s case. It has also been docu-
`
`
`
`
`
`
`
`
`
`mented that inmates have used previous penal institution call
`
`
`
`
`
`
`
`
`
`systems to perpetrate additional criminal activities such as
`
`
`
`
`
`
`
`
`fraudulent schemes or specific criminal conspiracies. Specifi-
`
`
`
`
`
`
`cally, inmates have been known to arrange credit card fraud
`
`
`
`
`
`
`
`
`
`
`attempts, the smuggling of contraband into the facility, and
`
`
`
`
`
`
`
`
`
`have even been known to arrange escape attempts over the
`
`
`
`
`
`
`
`
`
`
`penal institution’s telephone system. Therefore, it is critical
`
`
`
`
`
`
`
`
`in an efficient penal institution to carefully monitor all out-
`
`
`
`
`
`
`
`
`
`going telephone calls making a regulated penal institution
`
`
`
`
`
`
`
`telephone system a necessity.
`
`
`
`Another concern in implementing an efficient institution
`
`
`
`
`
`
`
`telephone system is cost control. In order for a system to be
`
`
`
`
`
`
`
`
`
`
`
`cost effective the system must critically monitor and record
`
`
`
`
`
`
`
`
`
`the activities of each individual user to properly charge each
`
`
`
`
`
`
`
`
`
`
`individual caller for his or her outgoing calls. Typically, tele-
`
`
`
`
`
`
`
`
`
`phone communication systems in penal institutions provide
`
`
`
`
`
`
`an inmate with a telephone account upon arrival. Each indi-
`
`
`
`
`
`
`
`
`vidual receives an account number. There are several options
`
`
`
`
`
`
`
`
`
`for an inmate to select with respect to payment on the account.
`
`
`
`
`
`
`
`
`
`
`
`
`For example, an inmate may place prior personal earnings
`
`
`
`
`
`
`
`
`
`into the account. The cost of each call is then deducted from
`
`
`
`
`
`
`
`
`
`
`
`
`the total amount in the inmate’s account until no balance
`
`
`
`
`
`
`
`
`
`
`remains. The inmate may choose to utilize collect call means.
`
`
`
`
`
`
`
`
`
`
`In addition, or alternatively, an inmate may be assigned a
`
`
`
`
`
`
`
`
`
`
`commissary account, where funds are added to the account
`
`
`
`
`
`
`
`
`
`based on work performed by the inmate. As the funds
`
`
`
`
`
`
`
`
`
`
`increase, the inmate may apply these funds to the cost of
`
`
`
`
`
`
`
`
`
`
`
`placing telephone calls. The inmate debit account may be
`
`
`
`
`
`
`
`
`
`located onsite, at a central office facility, or at a third-party
`
`
`
`
`
`
`
`
`
`
`
`site.
`
`The inmate debit account may alternatively be controlled
`
`
`
`
`
`
`
`
`by the inmate’ s family. For example, the inmate’ s family may
`
`
`
`
`
`
`
`
`
`
`control
`the inmate’s access to the debit account either
`
`
`
`
`
`
`
`
`
`remotely (e.g., by using the Internet, accessing a toll-free/pay
`
`
`
`
`
`
`
`
`to dial telephone number, using a mail form, etc.) or by
`
`
`
`
`
`
`
`
`
`
`
`visiting the prison facility. The inmate’s family may add
`
`
`
`
`
`
`
`
`
`funds to the debit account and thereby control the call volume
`
`
`
`
`
`
`
`
`
`
`
`allowed to the inmate.
`
`
`
`
`Another requirement of a secure telephone management
`
`
`
`
`
`
`system in a penal institution is the accurate identification of
`
`
`
`
`
`
`
`
`
`the telephone call participants. Generally, it is common in a
`
`
`
`
`
`
`
`
`
`penal institution to assign each inmate a personal identifica-
`
`
`
`
`
`
`
`tion number (PIN). When an inmate attempts to place a tele-
`
`
`
`
`
`
`
`
`
`phone call, the inmate must supply a valid PIN to gain access
`
`
`
`
`
`
`
`
`
`
`
`to the telephone system. However, a primary problem with
`
`
`
`
`
`
`
`
`
`this identification method is the ease of obtaining another
`
`
`
`
`
`
`
`
`
`inmate’s PIN. For example, individuals who commonly for-
`
`
`
`
`
`
`
`get their PIN may write it down, increasing the possibility that
`
`
`
`
`
`
`
`
`
`an unauthorized individual will view the PIN and use it. In
`
`
`
`
`
`
`
`
`
`
`addition, if a PIN number is compromised and utilized by an
`
`
`
`
`
`
`
`
`
`unauthorized inmate, the unauthorized inmate may then be
`
`
`
`
`
`
`
`able to call certain individuals who are restricted to that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 41
`
`
`
`4
`
`
`
`US 7,403,766 B2
`
`
`
`
`3
`inmate, since the unauthorized inmate is no longer using the
`
`
`
`
`
`
`
`
`
`
`proper PIN associated with that inmate. In known systems,
`
`
`
`
`
`
`
`
`
`the PIN identification method is incapable of verifying that
`
`
`
`
`
`
`
`
`
`the individual who supplies the PIN is the actual specified
`
`
`
`
`
`
`
`
`
`
`inmate. Some systems have attempted to improve security by
`
`
`
`
`
`
`
`
`
`requiring the use of a debit card in conjunction with a PIN.
`
`
`
`
`
`
`
`
`
`
`The use ofthe debit card will only allow access to an inmate’ s
`
`
`
`
`
`
`
`
`
`
`
`
`
`account
`if the correct associated PIN is supplied. This
`
`
`
`
`
`
`
`
`
`method, however, provides only minimal additional protec-
`
`
`
`
`
`
`tion because a debit card and its associated PIN can often,
`
`
`
`
`
`
`
`
`
`
`
`with or without force, easily be taken from another inmate, or
`
`
`
`
`
`
`
`
`
`
`
`given to another inmate, especially in the violent atmosphere
`
`
`
`
`
`
`
`
`
`of a penal institution. For example, one inmate may threaten
`
`
`
`
`
`
`
`
`
`another inmate in order to obtain such information. Alterna-
`
`
`
`
`
`
`
`
`tively, one inmate may provide certain services in exchange
`
`
`
`
`
`
`
`
`
`for the use of another inmate’s telephone privileges. The
`
`
`
`
`
`
`
`
`
`possibility that two inmates will exchange accounts also
`
`
`
`
`
`
`
`
`exists, thereby allowing them to contact people that would
`
`
`
`
`
`
`
`
`
`normally be restricted to them.
`
`
`
`
`
`Further attempts to obviate security concerns include
`
`
`
`
`
`
`
`requiring personal information, in addition to a PIN, to be
`
`
`
`
`
`
`
`
`
`
`supplied by the inmate/user. For example, a user might be
`
`
`
`
`
`
`
`
`
`
`prompted to supply a PIN as well as certain information that
`
`
`
`
`
`
`
`
`
`
`may only be known to the user. A common example is a
`
`
`
`
`
`
`
`
`
`
`
`
`request by the call system to provide their mother’s maiden
`
`
`
`
`
`
`
`
`
`
`name. This provides an additional security measure, but again
`
`
`
`
`
`
`
`
`
`is minimally secure because such information can easily be
`
`
`
`
`
`
`
`
`
`obtained in a correctional facility. It would therefore be desir-
`
`
`
`
`
`
`
`
`able to develop a telephone management system that incor-
`
`
`
`
`
`
`
`
`porates an improved method of identification and/or verifica-
`
`
`
`
`
`
`
`tion.
`
`Another required feature of a telephone management sys-
`
`
`
`
`
`
`tem for a penal institution or similar facility is a means for
`
`
`
`
`
`
`
`
`
`
`
`
`restricting calls placed by a user (e.g., an inmate). It is well
`
`
`
`
`
`
`
`
`
`
`
`documented that
`inmates often try to harass individuals
`
`
`
`
`
`
`
`
`related to their arrest or confinement, such as judges, pros-
`
`
`
`
`
`
`
`
`
`ecutors or witnesses, etc., through telephonic communica-
`
`
`
`
`
`
`tions. Penal institutions have attempted to prevent this by
`
`
`
`
`
`
`
`
`
`restricting the telephone numbers each inmate is able to
`
`
`
`
`
`
`
`
`
`access. For example, a system may utilize a PIN or other
`
`
`
`
`
`
`
`
`
`
`
`identification means to access a list oftelephone numbers that
`
`
`
`
`
`
`
`
`
`the inmate may not call, or alternatively, the system may
`
`
`
`
`
`
`
`
`
`
`access a list of numbers that the inmate is authorized to
`
`
`
`
`
`
`
`
`
`
`
`connect to (i.e., the inmate can only call the numbers appear-
`
`
`
`
`
`
`
`
`
`
`ing on the list). Telephone numbers placed on the restricted
`
`
`
`
`
`
`
`
`
`
`list can include any individual related to the conviction (e.g.,
`
`
`
`
`
`
`
`
`
`
`the arresting police officer, the prosecuting attorney, etc.),
`
`
`
`
`
`
`
`
`while telephone numbers placed on the permitted list may be,
`
`
`
`
`
`
`
`
`
`
`for example, close family relatives. The system may also limit
`
`
`
`
`
`
`
`
`
`
`the amount of time each inmate/user is permitted to conduct
`
`
`
`
`
`
`
`
`
`
`each outbound telephone call through the system. Further-
`
`
`
`
`
`
`
`more, restrictions may be regularly updated. For example, if
`
`
`
`
`
`
`
`
`
`an inmate misbehaves, the inmate’s telephone privileges may
`
`
`
`
`
`
`
`
`be further limited or revoked completely.
`
`
`
`
`
`
`Penal institutions are also concerned with monitoring the
`
`
`
`
`
`
`
`activities and communications of inmates. Monitoring tele-
`
`
`
`
`
`
`phone activities is necessary to restrict connections to illegal
`
`
`
`
`
`
`
`
`activities outside of the institution.
`
`
`
`
`
`Three existing types of call monitoring techniques are
`
`
`
`
`
`
`
`
`known in the art. The first technique is live monitoring. Live
`
`
`
`
`
`
`
`
`
`
`
`monitoring requires an operator or other individual to listen to
`
`
`
`
`
`
`
`
`
`
`each telephone call and alert the proper authorities if neces-
`
`
`
`
`
`
`
`
`
`sary.
`
`The second type of monitoring involves recording the tele-
`
`
`
`
`
`
`
`
`phone conversation via a common recording device. A com-
`
`
`
`
`
`
`
`mon example of this is a recording device such as a magnetic
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`25
`
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`PAGE 42
`
`
`tape drive. This type of monitoring may be continuous or
`
`
`
`
`
`
`
`
`
`
`intermittent depending on the degree of security required for
`
`
`
`
`
`
`
`
`
`each inmate.
`
`
`The third type of monitoring is known as passive monitor-
`
`
`
`
`
`
`
`
`
`ing. Passive monitoring may be activated when certain key-
`
`
`
`
`
`
`
`
`words are spoken. In addition, passive monitoring may be
`
`
`
`
`
`
`
`
`activated if the telephone call at the termination end is trans-
`
`
`
`
`
`
`
`
`
`
`ferred to a third party via certain known detection means such
`
`
`
`
`
`
`
`
`
`as “click and pop” detection, etc.
`
`
`
`
`
`
`Penal institutions currently record most inmate telephone
`
`
`
`
`
`
`
`calls, with the exception of lawyer-inmate communications
`
`
`
`
`
`
`
`which are generally prohibited by law. Typically in the art,
`
`
`
`
`
`
`
`
`
`
`monitoring may occur using any combination of the three
`
`
`
`
`
`
`
`
`
`methods (e.g., live monitoring, electronic recording monitor-
`
`
`
`
`
`
`ing, or passive monitoring). However, it would be desirable
`
`
`
`
`
`
`
`
`
`for a telephone management system to embody a means for
`
`
`
`
`
`
`
`
`
`determining which level of telephone monitoring should be
`
`
`
`
`
`
`
`
`employed for each telephone call. For example, it would be
`
`
`
`
`
`
`
`
`
`
`advantageous to flag certain individuals in an inmate’s profile
`
`
`
`
`
`
`
`
`
`as highly suspicious. If the inmate initiates communication
`
`
`
`
`
`
`
`
`with the flagged individual, the system will alert a live opera-
`
`
`
`
`
`
`
`
`
`tor to monitor the system. In such a system it is essential that
`
`
`
`
`
`
`
`
`
`
`
`the system correctly identify the called individual to avoid
`
`
`
`
`
`
`
`
`unnecessary expenditure of live operators.
`
`
`
`
`
`Alternatively, the inmate telephone call system may utilize
`
`
`
`
`
`
`
`a remote alert notification system wherein the system con-
`
`
`
`
`
`
`
`
`tacts an operator when a violation has occurred. The system
`
`
`
`
`
`
`
`
`
`may contact the operator utilizing telephone means, paging
`
`
`
`
`
`
`
`
`means, etc. This notification system may be set to call the
`
`
`
`
`
`
`
`
`
`
`
`operator a limited number of times or until the alert has been
`
`
`
`
`
`
`
`
`
`
`
`noted in the inmate telephone call system. The operator may
`
`
`
`
`
`
`
`
`
`
`then access information about the alert remotely using the
`
`
`
`
`
`
`
`
`
`telephone, Internet, or any other such remote access means.
`
`
`
`
`
`
`
`
`
`In order to alleviate some of the problems and concerns
`
`
`
`
`
`
`
`
`
`discussed herein, many penal institutions have implemented
`
`
`
`
`
`
`these
`certain task-specific advanced systems. Generally,
`
`
`
`
`
`“advanced” systems known in the art comprise several fea-
`
`
`
`
`
`
`
`
`tures.
`
`For example, it is known in current systems to employ
`
`
`
`
`
`
`
`
`
`
`permanent call blocking. Specifically, it is known in the art to
`
`
`
`
`
`
`
`
`
`
`
`block an inmate or group of inmates from dialing certain
`
`
`
`
`
`
`
`
`
`
`telephone numbers. Most systems also prevent inmates from
`
`
`
`
`
`
`
`
`talking directly to live operators. This prevents inmates from
`
`
`
`
`
`
`
`
`
`requesting that the operator forward a call or provide addi-
`
`
`
`
`
`
`
`
`
`tional telephone numbers allowing the inmates to harass or
`
`
`
`
`
`
`
`
`
`locate additional parties. Furthermore, current systems block
`
`
`
`
`
`
`
`“ l -800,” “ l -900” and other like telephone numbers including
`
`
`
`
`
`
`
`
`toll-free and pay-to-dial telephone numbers. In addition cer-
`
`
`
`
`
`
`
`tain institutions may elect to block country codes, specific
`
`
`
`
`
`
`
`
`area codes, or other third-party numbers.
`
`
`
`
`
`
`Current systems known in the art may also utilize a feature
`
`
`
`
`
`
`
`
`
`
`commonly referred to as “selective” call blocking. As dis-
`
`
`
`
`
`
`
`
`cussed, “selective” call blocking may be employed to thwart
`
`
`
`
`
`
`
`
`
`inmates from establishing a connection with a selected group
`
`
`
`
`
`
`
`of indi