`
`1111111111111111111111111111111111111111111111111111111111111111111111111111
`US 20080201158Al
`
`(19) United States
`c12) Patent Application Publication
`Johnson et al.
`
`(10) Pub. No.: US 2008/0201158 A1
`Aug. 21, 2008
`(43) Pub. Date:
`
`(54) SYSTEM AND METHOD FOR VISITATION
`MANAGEMENT IN A CONTROLLED-ACCESS
`ENVIRONMENT
`
`(76)
`
`Inventors:
`
`Mark D. Johnson, Altoona, PA
`(US); James P. Rokosky, Altoona,
`PA (US); Joshua Dom, Altoona, PA
`(US); John P. Dale, Duncansville,
`PA (US)
`
`Correspondence Address:
`WILEY REIN LLP
`1776 K. STREET N.W.
`WASHINGTON, DC 20006
`
`(21) Appl. No.:
`
`11/819,834
`
`(22) Filed:
`
`Jun.29,2007
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/901,342, filed on Feb.
`15, 2007.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2006.01)
`G06Q 10100
`(52) U.S. Cl. ............................................................ 705/1
`
`(57)
`
`ABSTRACT
`
`A method of managing visitation includes accessing a visita(cid:173)
`tion control system including a visitation session scheduling
`interface, communications devices, a switching interface, and
`at least one authentication interface, defining rules governing
`visitation, requesting a visitation session using the scheduling
`interface, assessing whether the visitation session complies
`with the rules governing visitation, scheduling the visitation
`session if the visitation session complies with the rules, using
`the at least one authentication interface to authenticate a first
`party and a second party, establishing communication
`between the first party and the second party after authenticat(cid:173)
`ing both parties, and storing a record of the visitation session
`in a database. The record preferably includes at least infor(cid:173)
`mation regarding identities of the first party and the second
`party. The visitation session may also be monitored (e.g., in
`real time, near real time, or by recording).
`
`;
`
`I
`
`! Inmate is moved I
`! from ~o~ing Unrt
`Lto ViSitation Area j
`
`II-
`
`Visit
`proceeds untn
`time up ora
`party hangs
`up.
`
`I«~
`
`VISitor leaves
`Visitation area and
`Facility
`
`I Visitation Record 1
`I Database. J
`
`1
`
`writtento
`
`1
`1!>
`
`tnmate ls
`Returned to
`Housing Unit
`
`_ , ~---·~~--~--~
`
`Visitation
`"- Complete
`
`GTL 1007
`
`
`
`Patent Application Publication Aug. 21, 2008 Sheet 1 of 6
`
`US 2008/0201158 A1
`
`FIG. 1
`
`
`
`Patent Application Publication Aug. 21, 2008 Sheet 2 of 6
`
`US 2008/0201158 Al
`
`I
`Application
`I
`
`2
`
`
`
`Patent Application Publication Aug. 21, 2008 Sheet 3 of 6
`
`US 2008/0201158 Al
`
`User Data Storage
`
`Internal Data Storage
`
`Monitor
`
`3
`
`
`
`Patent Application Publication Aug. 21, 2008 Sheet 4 of 6
`
`US 2008/0201158 Al
`
`Network Attached Storage containing Audio/
`Video of Visitations
`
`4
`
`
`
`Patent Application Publication Aug. 21, 2008 Sheet 5 of 6
`
`US 2008/0201158 Al
`
`Officer Access
`Visitation
`
`Add Inmate to
`Visitor list
`
`Yes
`
`•
`
`Visitor Makes
`Request to be
`added to approved
`list
`
`Search for Inmate
`to visit
`
`Yes
`
`Available Time
`Blocks are shown
`for Day and
`Inmate
`
`Selects a time
`block to visit the
`·inmate.
`
`Visit is scheduled.
`Visitor receives
`confirmation.
`
`5
`
`
`
`Patent Application Publication
`
`Aug. 21, 2008 Sheet 6 of 6
`
`US 2008/0201158 Al
`
`Visitor Arrives at
`Visition Area At
`Predetermined
`time
`
`' •
`
`Visitor waits for
`name to be called
`
`Visitor presents
`identification
`credentials and
`receives one-time
`use access code
`I
`
`Visitor proceeds to
`Visitation Booth
`
`Visitor Lifts
`Handset and
`enters Access
`Code
`
`Inmate is moved
`from Housing Unit
`to Visitation Area
`
`Inmate lifts
`Handset and
`enters Telephone
`ID
`
`r
`
`Visit
`proceeds until
`time upora
`party hangs
`up.
`
`•
`
`Visitor Leaves
`Visitation area and
`Facility
`
`Visitation Record
`written to
`Database.
`
`Inmate Is
`Returned to
`Housing Unit
`
`Visitation
`Complete
`
`6
`
`
`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`1
`
`SYSTEM AND METHOD FOR VISITATION
`MANAGEMENT IN A CONTROLLED-ACCESS
`ENVIRONMENT
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`[0001] This application is related to U.S. provisional appli(cid:173)
`cation No. 60/901,342, filed Feb. 15, 2007 and U.S. applica(cid:173)
`tion Ser. No. 11/706,431, filed Feb. 15, 2007. The foregoing
`are hereby incorporated by reference as though fully set forth
`herein.
`
`BACKGROUND OF THE INVENTION
`
`[0002]
`a. Field of the Invention
`[0003] The instant invention relates to visitation sessions
`occurring in a controlled-access environment, such as a cor(cid:173)
`rectional institution. In particular, the instant invention relates
`to a system and method for managing and monitoring visita(cid:173)
`tion sessions.
`[0004] b. Background Art
`[0005]
`In the correctional industry, inmate visitation is an
`essential part of rehabilitation of an inmate. Numerous stud(cid:173)
`ies have shown that visitation by friends and family can help
`reduce recidivism as well as prepare an inmate for life after
`prison. Since the vast majority of inmates are eventually
`released into the public, any steps to minimize the problems
`the individual may have upon re-entering public life are wel(cid:173)
`comed.
`[0006] Typical visitation procedures in a jail setting are
`created to balance allowing the inmate to have a quality visit
`with reducing the likelihood of undesirable or inappropriate
`behavior by both inmates and their visitors. To this end,
`certain individuals, such as convicted felons, victims, jail
`employees, co-defendants, former inmates, and the like are
`normally either not permitted visitation rights, or are permit(cid:173)
`ted only restricted visitation rights. Additionally, individuals
`may be required to consent to background screening, personal
`body searches, and other intrusive measures in order to visit
`an inmate.
`[ 0007]
`In many institutions, inmates are permitted to have a
`list of approved visitors. This list may be periodically revised,
`or it may be permanent. The purpose of the list is not to punish
`or restrict the inmate to only certain visitors, but rather to
`reduce the workload of the institution staff tasked with
`researching and approving each visitor on the list. By provid(cid:173)
`ing an inmate with a list of approved visitors, those approved
`visitors can visit the inmate without having to be repeatedly
`"cleared" by corrections staff prior to each visit. Some insti(cid:173)
`tutions may further restrict these lists, for example by allow(cid:173)
`ing visitors to appear on only a certain number of inmates'
`lists at any given time. The presence of a pre-approved list of
`visitors also allows each visit to reduce security risks, as the
`individual has already been researched and approved.
`Accordingly, visits by visitors on the pre-approved list can be
`more efficient and can occur with more regularity.
`[0008] Visitations between inmates and the general popu(cid:173)
`lation can generally occur in one of several methods. The
`simplest method, but also the most risk prone, is a face to face
`contact visit. In this type of visit, inmates and visitors are
`generally located in a common area, supervised by Correc(cid:173)
`tions Officers. The inmates and visitors may sit at conference
`type tables, and may be permitted limited contact, such as
`hugging or handholding. Although this is the most desirable
`
`form of visit from both the visitor's and inmate's points of
`view, it is also the hardest to control. If inmates and visitors
`are not physically screened before and after visits, contra(cid:173)
`band, including drugs, money, and weapons could be intro(cid:173)
`duced into the secure prison environment through face to face
`contact visits. Additionally, it is difficult for corrections offic(cid:173)
`ers to enforce rules that allow only certain visitors to visit
`certain inmates when all inmates and visitors are in a common
`location.
`[0009] Another form of visitation involves placing a physi(cid:173)
`cal barrier between the inmate and the visitor. In this form of
`visitation, the individuals are face to face, but usually sepa(cid:173)
`rated by a transparent material, such as security glass or
`Plexiglass. Generally, the booths are semi-private, with par(cid:173)
`titions or walls between each visitor and inmate. Physical
`contact is not permitted between the inmate and the visitor.
`Communication can be made via normal acoustic transmis(cid:173)
`sion through holes in the glass. One common addition to this
`scenario is to place private telephone handsets on each of the
`visitor side and the inmate side. Once both parties have picked
`up the handset, they can communicate via the electronic
`amplification of the phone. Where communication is by tele(cid:173)
`phone handset, there often are no longer holes in the barrier
`between the inmate and visitor. Both of these forms of visi(cid:173)
`tation still present the difficulty of and risks associated with
`allowing the general public into the secured prison environ(cid:173)
`ment.
`[001 0] Another form of visitation, typically employed only
`by the largest of detention centers, is remote video visitation.
`In this form of visitation, inmates and visitors are in physi(cid:173)
`cally separate locations, but are electronically connected via
`technology analogous to closed circuit television and tele(cid:173)
`phone handsets or speaker phones. This type of visitation
`completely eliminates the potential for contraband to enter
`the facility, as the visitors never need be brought behind the
`secure gates of the prison.
`[0011] All of the visitation types described above have in
`common that certain paperwork and research must be com(cid:173)
`pleted by the facility before the visitation session can occur.
`In some facilities, software, such as an Offender Management
`System (OMS), has automated part of the record keeping
`process, storing inmate information along with visitor infor(cid:173)
`mation in the computer system. In more sophisticated OMS
`installations, the software can also perform basic enemy
`checking, employee checking, and past felony checking on
`visitors with the data already stored in the OMS database.
`[0012]
`In addition, each type of visitation described above
`can be viewed as addressing some of the shortcomings
`present in the other types of visitation. For example, in com(cid:173)
`parison to contact visitation, having an inmate and visitor
`physically separated by a barrier will reduce, but may not
`eliminate, the potential to pass contraband between the visitor
`and the inmate. By using remote video visitation however, the
`risk of passing contraband between the visitor and the inmate
`is totally eliminated. Further, the remote video visitation
`approach is less intrusive to the visitor, as the visitor no longer
`needs to be physically searched prior to entering a secure
`area.
`
`BRIEF SUMMARY OF THE INVENTION
`
`[0013] The present invention provides a method of manag(cid:173)
`ing visitation in a controlled-access environment. The
`method generally includes the steps of: accessing a visitation
`control system including a visitation session scheduling inter-
`
`
`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`2
`
`face, a plurality of communications devices, a switching
`interface, and at least one authentication interface; defining a
`set of rules governing visitation in the controlled-access envi(cid:173)
`ronment; requesting a visitation session using the visitation
`session scheduling interface of the visitation control system;
`assessing whether the visitation session complies with the set
`of rules governing visitation in the controlled-access environ(cid:173)
`ment; scheduling the visitation session if the visitation ses(cid:173)
`sion complies with the set of rules governing visitation in the
`controlled-access environment; using the at least one authen(cid:173)
`tication interface to authenticate a first party to the visitation
`session; using the at least one authentication interface to
`authenticate a second party to the visitation session; estab(cid:173)
`lishing communication between the first party to the visita(cid:173)
`tion and the second party to the visitation session after authen(cid:173)
`ticating both the first party and the second party to the
`visitation session; and storing a record of the visitation ses(cid:173)
`sion in a visitation session database, the record of the visita(cid:173)
`tion including at least information regarding identities of the
`first party and the second party. The set of rules governing
`visitation in the controlled-access environment may include
`one or more operational rules (e.g., rules of general applica(cid:173)
`bility or applicable to a particular class of individuals, rather
`than applicable to a specific individual). The step of assessing
`whether the visitation session complies with a set of rules
`governing visitation in the controlled-access environment
`may, for example, include verifying that neither the first party
`nor the second party is prohibited from participating in visi(cid:173)
`tation sessions.
`[0014] The method optionally includes storing a plurality
`of demographic information records in a demographic infor(cid:173)
`mation database, each of the plurality of demographic infor(cid:173)
`mation records including demographic information for a
`single user of the visitation control system. One or more
`visitation rules associated with a single user of the visitation
`control system may be defined, and these visitation rules may
`be associated with a demographic information record.
`[0015] Typically, the step of establishing communication
`between the first party to the visitation session and the second
`party to the visitation session will include establishing at least
`an audio connection between the first party and the second
`party through the visitation control system. This may be
`accomplished, for example, by connecting a first one of the
`plurality of communications devices to a second one of the
`plurality of communications devices via the switching inter(cid:173)
`face. Alternatively, both an audio connection and a video
`connection may be established between the first party and the
`second party through the visitation control system. The com(cid:173)
`munication between the first party and the second party may
`be terminated at the conclusion of a preset period of time.
`[0016]
`It is also desirable to determine whether the visita(cid:173)
`tion session is to be monitored and to monitor the visitation
`session in response to a determination that the visitation ses(cid:173)
`sion is to be monitored. Whether or not a visitation session is
`to be monitored may be determined by assessing whether the
`visitation session meets at least one defined visitation session
`monitoring criterion. While monitoring the visitation session,
`the present invention may detect a violation of one or more
`rules governing visitation in the controlled-access environ(cid:173)
`ment and thereafter terminate the communication between
`the first party and the second party. Alternatively, rather than
`terminating the communication, the present invention may
`
`notify a third party upon detecting the violation of one or
`more rules governing visitation in the controlled-access en vi(cid:173)
`ronment.
`[0017]
`In some embodiments, the method further includes
`assigning an identification code to at least one of the first party
`and the second party. The identification code may then be
`used to authenticate either or both of the first party to the
`visitation session and the second party to the visitation ses(cid:173)
`sion to the visitation system. Alternatively, or in addition, the
`method may include receiving a biometric input measure(cid:173)
`ment from at least one of the first party and the second party
`and associating the received biometric input measurement
`with the respective party. The biometric input measurement
`may then be used to authenticate either or both of the first
`party to the visitation session and the second party to the
`visitation session to the visitation system. The biometric input
`measurement may be a fingerprint, a voice print, or any other
`suitable biometric measurement.
`[0018] Also disclosed herein is a system for managing visi(cid:173)
`tation in a controlled-access environment, generally includ(cid:173)
`ing: a visitation controller including a switching interface and
`a central processing unit to run a plurality of software pro(cid:173)
`grams, the plurality of software programs including at least
`one software program controlling the switching interface, at
`least one software program to schedule a visitation session,
`and at least one software program monitoring compliance
`with a set of rules governing visitation in the controlled(cid:173)
`access environment; a first communications device coupled
`to the visitation controller; a second communications device
`coupled to the visitation controller; a first authentication
`interface coupled to the visitation controller to authenticate a
`first party to a visitation session; a second authentication
`interface coupled to the visitation controller to authenticate a
`second party to a visitation session; at least one monitoring
`device coupled to the visitation controller to enable monitor(cid:173)
`ing of the visitation session; and a database coupled to the
`visitation controller to store a record of the visitation session,
`the record including at least information regarding identities
`of the first party to the visitation session and the second party
`to the visitation session. The visitation controller typically
`establishes at least audio communication between the first
`communications device and the second communications
`device through the switching interface, and may establish
`both audio communication and video communication
`between the first communications device and the second com(cid:173)
`munications device through the switching interface.
`[0019] At least one of the first authentication interface and
`the second authentication interface may include a biometric
`interface, such as a fingerprint identification interface, a voice
`print identification interface, or another suitable biometric
`interface. Alternatively, or in addition, at least one of the first
`authentication interface and the second authentication inter(cid:173)
`face may include an identification code input interface.
`[0020] Preferably, the at least one software program to
`schedule a visitation session and the at least one software
`program monitoring compliance with a set of rules governing
`visitation in the controlled-access environment cooperate to
`prohibit scheduling of a visitation session that does not com(cid:173)
`ply with the set of rules governing visitation in the controlled(cid:173)
`access environment.
`[0021] The at least one monitoring devices typically
`enables at least near real-time monitoring of the visitation
`session. For example, the at least one monitoring device may
`include a recording device to record the visitation session.
`
`
`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`3
`
`In some embodiments of the invention, both the first
`[0022]
`communications device and the second communications
`device are internal to the controlled-access environment. In
`other embodiments of the invention, one of the first commu(cid:173)
`nications device and the second communications device is
`external to the controlled-access environment. The external
`communications device may be coupled to the visitation con(cid:173)
`troller via the Internet.
`[0023] The system optionally includes at least one visita(cid:173)
`tion scheduling client in communication with the visitation
`controller and configured to invoke the at least one software
`program to schedule a visitation session. It is contemplated
`that the at least one visitation scheduling client may be exter(cid:173)
`nal to the controlled-access environment, and may further
`communicate with the visitation controller via the Internet.
`[0024] The present invention advantageously reduces the
`paperwork burden on correctional facility staff to "clear"
`outside parties for visitation sessions.
`[0025] Another advantage of the present invention is that it
`improves compliance of visitation sessions with rules gov(cid:173)
`erning visitation in a controlled-environment.
`[0026] The foregoing and other aspects, features, details,
`utilities, and advantages of the present invention will be
`apparent from reading the following description and claims,
`and from reviewing the accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0027] FIG. 1 is a block diagram of a visitation control
`system according to an embodiment of the present invention.
`[0028] FIG. 2 is an exemplary block diagram of the visita(cid:173)
`tion control unit shown at the center of FIG. 1.
`[0029] FIG. 3 is a block diagram of an application server
`that may be incorporated into a visitation control unit accord(cid:173)
`ing to the present invention.
`[0030] FIG. 4 is an exemplary block diagram of the storage
`devices depicted in FIG. 1.
`[0031] FIG. 5 is a flowchart illustrating steps that may be
`carried out in scheduling a visitation session.
`[0032] FIG. 6 is a flowchart illustrating one embodiment of
`a process for conducting a visitation according to the present
`invention.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`[0033] While the visitation approaches described above
`address, to a certain extent, the problems of contraband and
`security within the prison, they can introduce issues with
`paperwork, research, and expense to the facility. Further,
`where the visitation session between the inmate and the visi(cid:173)
`tor is conducted electronically, there is the potential to gather
`valuable information from the communication between the
`inmate and the visitor. For any information gathered to be of
`value, however, the parties in the communication need to be
`positively identified. In existing visitation approaches, posi(cid:173)
`tive identification is often difficult; often, the best that can be
`done is an educated guess based on paper logs, reports, and
`correction officer observations.
`[0034] The visitation approaches described above also
`present the possibility of fraud (e.g., failures to follow estab(cid:173)
`lished rules for visitation sessions). One common effort to
`circumvent facility rules regarding visitation sessions is to
`involve more than one inmate and more than one visitor,
`performing a switch when the visit actually occurs. For
`example, suppose Visitor A is not permitted to visit inmate 1
`
`but is permitted to visit inmate 2. Conversely, suppose Visitor
`B is permitted to visit inmate 1 but not inmate 2. Visitors A
`and B communicate ahead of time and schedule visits at the
`same time: Visitor A schedules to see inmate 2, as permitted,
`and Visitor B schedules to see inmate 1, as permitted. After
`Visitors A and B are identified by the prison staff and are
`waiting to visit their respective inmates, however, they switch
`credentials or just simply switch seats to visit the inmates they
`are restricted from seeing. This type of visitation fraud is
`often occurs in large facilities where there are large numbers
`of visitors and inmates at any given time, making it difficult
`for corrections officers to individually recognize each of the
`inmates and visitors when monitoring the various visitation
`sessions occurring.
`[0035] Another somewhat less serious form of visitation
`fraud involves inmates and visitors not observing time limits
`placed on visitation sessions, which are typically in the range
`of about fifteen to about sixty minutes. Prison resources are
`limited in nature, and only so many visits can be handled
`concurrently. Rigorously enforcing time restrictions makes
`better use of these resources, allowing more inmates the
`opportunity to participate in the visiting process. Of course, in
`a large facility, it requires considerable coordination by the
`prison staff to ensure that the visits do not extend past their
`allotted time, making it difficult for corrections officers to
`monitor time restrictions for all visitation sessions.
`[0036] The visitation management system according to the
`present invention advantageously provides functionality
`beyond the functionality provided by many OMS software
`packages. The system may be installed and configured to
`function as a stand-alone system, where all inmates and visi(cid:173)
`tors are manually entered directly into the visitation manage(cid:173)
`ment system. Alternatively, the visitation system according to
`the present invention may be integrated with an OMS that
`provides inmate and/or visitor information. Of course, the
`system can also be integrated with an Inmate Telephone Sys(cid:173)
`tem, which may also provide inmate and/or visitor demo(cid:173)
`graphic information. It should further be understood that the
`present invention may be practiced in connection with any of
`the approaches to visitation described above, as well as any
`other type of visitation.
`In general, regardless of the visitation approach
`[0037]
`employed, a visitation management system according to the
`present invention includes a monitoring device that permits
`one or more third parties, such as corrections officers or court
`officials, to monitor a visitation session between an inmate
`and a visitor. The term "monitoring," as used herein, encom(cid:173)
`passes both live (e.g., real time or near real time) monitoring,
`for example as by actively listening in on an ongoing visita(cid:173)
`tion session, and recordation of visitation sessions for later
`review and/or processing. One suitable post-processing sys(cid:173)
`tem and methodology is disclosed in U.S. provisional appli(cid:173)
`cation No. 60/901,342, filed Feb. 15, 2007, which is hereby
`incorporated by reference as though fully set forth herein.
`In the case ofhandset and video visitation, the moni(cid:173)
`[0038]
`taring device may also be capable of playing back audio
`and/or video as appropriate. In face to face contact visitation
`settings, the monitoring device could be a microphone, speak(cid:173)
`erphone, video camera, or the like. Combinations of various
`monitoring devices (e.g., a microphone and a video recorder)
`could also be employed. Of course, the monitoring device or
`devices may be either visible to the parties to the visitation
`session or hidden from their view.
`
`
`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`4
`
`[0039] The v1s1tation management system
`typically
`includes one or more databases or data stores, which may
`include one or more of the following types of data and
`records, discussed in further detail below: demographic infor(cid:173)
`mation records, visitation schedule records, visitation log
`records, visitation recording and/or transcript records, con(cid:173)
`figuration information, and operational rules. Of course, the
`database may also include other types of information and/or
`records as desired or required by a particular implementation
`of the visitation management system. The term "database," as
`used herein includes relational databases in which a plurality
`of data sets are associated with each other and stored, prefer(cid:173)
`ably as one or more records; the database may be stored in a
`single medium or may be stored in multiple media intercon(cid:173)
`nected by a network.
`[0040] The demographic information typically includes a
`variety of data utilized to create records of a plurality of
`individuals in a variety of role categories. Role categories can
`include, without limitation, Inmates, Visitors, Employees,
`Official Visitors, Lawyers, and Clergy. The demographic
`information will also typically include at least identification
`information, such as names, addresses, telephone numbers,
`and the like for the individuals in the database.
`[0041] The demographic data record for an individual may
`also include or be associated with one or more visitation rules
`that govern visitation sessions involving that individual. Visi(cid:173)
`tation rules may include, for example, permitted to visit,
`permitted to be a visitor, blocked from visiting, must record,
`must not record, must be supervised, must be private, time
`limits, restrictions on visitation sessions by time and/or day,
`and the like.
`[0042] The database may also include visitation schedule
`records, for example a calendar that reflects open and filled
`visitation "slots." A scheduled visitation session (e. g., a filled
`visitation "slot") can consist of one or more inmates visiting
`with one or more individuals, and may be a one time event
`(e.g., Wednesday from 11:00 AM until 11:30 PM) or a reoc(cid:173)
`curring series of events (e.g., the first of every month from
`2:30PM until3:00 PM).
`[0043] Scheduling of a visitation session can be initiated by
`an inmate, by correctional staff, or by the general public (e.g.,
`a prospective visitor from outside the correctional institu(cid:173)
`tion). Scheduled visitation sessions may take into account
`factors such as the inmate's daily schedule, the inmate's
`allowed visitor list (e.g., by applying visitation rules stored or
`associated with the inmate's demographic data record), the
`facility's visitation schedule, and resource availability (e.g.,
`the availability of visitation booths or remote video visitation
`stations for use by the inmate and/or the visitor). Preferably,
`scheduled visitation sessions can be altered (e.g., moved to a
`different date or time) or deleted entirely through a visitation
`session scheduling interface, which may be either locally or
`remotely located. In some embodiments, the visitation ses(cid:173)
`sion scheduling interface may be accessed via a wide area
`network (WAN), such as the Internet. The present invention
`may also provide the ability to display or print a sunmJary
`visitation schedule for any arbitrary time period, such as
`hourly, daily, weekly, monthly, and the like. As will be
`described in further detail below, the visitation management
`system can accommodate both direct entry of scheduled visi(cid:173)
`tation sessions, as well as use in a master/slave configuration
`where the schedule can be driven by an external system. For
`example, in some embodiments of the invention, visitation
`sessions may be scheduled by the public via a publicly-ac-
`
`cessible web site or through an automated telephone system
`connected via the public switched telephone network
`(PSTN).
`[0044] The visitation management system according to the
`present invention also preferably stores a history of visitation
`sessions within the database (referred to herein as "visitation
`session logs," "visitation session records," or "visitation ses(cid:173)
`sion history"), including information about at least the
`inmates, visitors, and resources involved in each visitation
`session. A transcription and/or recording of the visitation
`session can also be stored or associated with the visitation
`session log. To facilitate storage and retrieval of the visitation
`session logs, each visitation session log may be assigned a
`unique identifier (e.g., a number or alphanumeric sequence).
`[0045] Preferably, the visitation session logs can be queried
`in a variety of ways and by employing a variety of different
`search criteria, such as day, inmate, resource, visitor informa(cid:173)
`tion, or any combination thereof, which makes visitation
`session log queries a desirable feature of the present inven(cid:173)
`tion. For example, different items are often considered con(cid:173)
`traband in different sections of a correctional facility. Inmates
`can be very resourceful in getting around facility rules to pass
`an item from an inmate living in a section where the item is
`not considered contraband to an inmate living in a section
`where the item is considered contraband. Upon discovering
`contraband with the second inmate, a corrections officer
`could use the visitation session logs to trace the origin of the
`contraband to the first inmate. For example, a corrections
`officer could view all visitation session records for a particu(cid:173)
`lar visitation resource (e.g., a given visitation booth) and
`determine which inmates were passing contraband between
`each other by scheduling visits right after each other (e.g.,
`Inmate A was in booth 1 from 4:00 to 4:15 and left a forbidden
`item hidden in the booth for Inmate B to get during the 4: 15 to
`4:30 visitation time). A visitation session history report can
`also be used to determine odd patterns in visitation, such as
`the same visitor visiting many inmates, or a correlation
`between specific inmates and visitors and other events in the
`facilities, such as drug finds, contraband de