throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111111111111111111
`US 20080201158Al
`
`(19) United States
`c12) Patent Application Publication
`Johnson et al.
`
`(10) Pub. No.: US 2008/0201158 A1
`Aug. 21, 2008
`(43) Pub. Date:
`
`(54) SYSTEM AND METHOD FOR VISITATION
`MANAGEMENT IN A CONTROLLED-ACCESS
`ENVIRONMENT
`
`(76)
`
`Inventors:
`
`Mark D. Johnson, Altoona, PA
`(US); James P. Rokosky, Altoona,
`PA (US); Joshua Dom, Altoona, PA
`(US); John P. Dale, Duncansville,
`PA (US)
`
`Correspondence Address:
`WILEY REIN LLP
`1776 K. STREET N.W.
`WASHINGTON, DC 20006
`
`(21) Appl. No.:
`
`11/819,834
`
`(22) Filed:
`
`Jun.29,2007
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/901,342, filed on Feb.
`15, 2007.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2006.01)
`G06Q 10100
`(52) U.S. Cl. ............................................................ 705/1
`
`(57)
`
`ABSTRACT
`
`A method of managing visitation includes accessing a visita(cid:173)
`tion control system including a visitation session scheduling
`interface, communications devices, a switching interface, and
`at least one authentication interface, defining rules governing
`visitation, requesting a visitation session using the scheduling
`interface, assessing whether the visitation session complies
`with the rules governing visitation, scheduling the visitation
`session if the visitation session complies with the rules, using
`the at least one authentication interface to authenticate a first
`party and a second party, establishing communication
`between the first party and the second party after authenticat(cid:173)
`ing both parties, and storing a record of the visitation session
`in a database. The record preferably includes at least infor(cid:173)
`mation regarding identities of the first party and the second
`party. The visitation session may also be monitored (e.g., in
`real time, near real time, or by recording).
`
`;
`
`I
`
`! Inmate is moved I
`! from ~o~ing Unrt
`Lto ViSitation Area j
`
`II-
`
`Visit
`proceeds untn
`time up ora
`party hangs
`up.
`
`I«~
`
`VISitor leaves
`Visitation area and
`Facility
`
`I Visitation Record 1
`I Database. J
`
`1
`
`writtento
`
`1
`1!>
`
`tnmate ls
`Returned to
`Housing Unit
`
`_ , ~---·~~--~--~
`
`Visitation
`"- Complete
`
`GTL 1007
`
`

`
`Patent Application Publication Aug. 21, 2008 Sheet 1 of 6
`
`US 2008/0201158 A1
`
`FIG. 1
`
`

`
`Patent Application Publication Aug. 21, 2008 Sheet 2 of 6
`
`US 2008/0201158 Al
`
`I
`Application
`I
`
`2
`
`

`
`Patent Application Publication Aug. 21, 2008 Sheet 3 of 6
`
`US 2008/0201158 Al
`
`User Data Storage
`
`Internal Data Storage
`
`Monitor
`
`3
`
`

`
`Patent Application Publication Aug. 21, 2008 Sheet 4 of 6
`
`US 2008/0201158 Al
`
`Network Attached Storage containing Audio/
`Video of Visitations
`
`4
`
`

`
`Patent Application Publication Aug. 21, 2008 Sheet 5 of 6
`
`US 2008/0201158 Al
`
`Officer Access
`Visitation
`
`Add Inmate to
`Visitor list
`
`Yes
`
`•
`
`Visitor Makes
`Request to be
`added to approved
`list
`
`Search for Inmate
`to visit
`
`Yes
`
`Available Time
`Blocks are shown
`for Day and
`Inmate
`
`Selects a time
`block to visit the
`·inmate.
`
`Visit is scheduled.
`Visitor receives
`confirmation.
`
`5
`
`

`
`Patent Application Publication
`
`Aug. 21, 2008 Sheet 6 of 6
`
`US 2008/0201158 Al
`
`Visitor Arrives at
`Visition Area At
`Predetermined
`time
`
`' •
`
`Visitor waits for
`name to be called
`
`Visitor presents
`identification
`credentials and
`receives one-time
`use access code
`I
`
`Visitor proceeds to
`Visitation Booth
`
`Visitor Lifts
`Handset and
`enters Access
`Code
`
`Inmate is moved
`from Housing Unit
`to Visitation Area
`
`Inmate lifts
`Handset and
`enters Telephone
`ID
`
`r
`
`Visit
`proceeds until
`time upora
`party hangs
`up.
`
`•
`
`Visitor Leaves
`Visitation area and
`Facility
`
`Visitation Record
`written to
`Database.
`
`Inmate Is
`Returned to
`Housing Unit
`
`Visitation
`Complete
`
`6
`
`

`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`1
`
`SYSTEM AND METHOD FOR VISITATION
`MANAGEMENT IN A CONTROLLED-ACCESS
`ENVIRONMENT
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`[0001] This application is related to U.S. provisional appli(cid:173)
`cation No. 60/901,342, filed Feb. 15, 2007 and U.S. applica(cid:173)
`tion Ser. No. 11/706,431, filed Feb. 15, 2007. The foregoing
`are hereby incorporated by reference as though fully set forth
`herein.
`
`BACKGROUND OF THE INVENTION
`
`[0002]
`a. Field of the Invention
`[0003] The instant invention relates to visitation sessions
`occurring in a controlled-access environment, such as a cor(cid:173)
`rectional institution. In particular, the instant invention relates
`to a system and method for managing and monitoring visita(cid:173)
`tion sessions.
`[0004] b. Background Art
`[0005]
`In the correctional industry, inmate visitation is an
`essential part of rehabilitation of an inmate. Numerous stud(cid:173)
`ies have shown that visitation by friends and family can help
`reduce recidivism as well as prepare an inmate for life after
`prison. Since the vast majority of inmates are eventually
`released into the public, any steps to minimize the problems
`the individual may have upon re-entering public life are wel(cid:173)
`comed.
`[0006] Typical visitation procedures in a jail setting are
`created to balance allowing the inmate to have a quality visit
`with reducing the likelihood of undesirable or inappropriate
`behavior by both inmates and their visitors. To this end,
`certain individuals, such as convicted felons, victims, jail
`employees, co-defendants, former inmates, and the like are
`normally either not permitted visitation rights, or are permit(cid:173)
`ted only restricted visitation rights. Additionally, individuals
`may be required to consent to background screening, personal
`body searches, and other intrusive measures in order to visit
`an inmate.
`[ 0007]
`In many institutions, inmates are permitted to have a
`list of approved visitors. This list may be periodically revised,
`or it may be permanent. The purpose of the list is not to punish
`or restrict the inmate to only certain visitors, but rather to
`reduce the workload of the institution staff tasked with
`researching and approving each visitor on the list. By provid(cid:173)
`ing an inmate with a list of approved visitors, those approved
`visitors can visit the inmate without having to be repeatedly
`"cleared" by corrections staff prior to each visit. Some insti(cid:173)
`tutions may further restrict these lists, for example by allow(cid:173)
`ing visitors to appear on only a certain number of inmates'
`lists at any given time. The presence of a pre-approved list of
`visitors also allows each visit to reduce security risks, as the
`individual has already been researched and approved.
`Accordingly, visits by visitors on the pre-approved list can be
`more efficient and can occur with more regularity.
`[0008] Visitations between inmates and the general popu(cid:173)
`lation can generally occur in one of several methods. The
`simplest method, but also the most risk prone, is a face to face
`contact visit. In this type of visit, inmates and visitors are
`generally located in a common area, supervised by Correc(cid:173)
`tions Officers. The inmates and visitors may sit at conference
`type tables, and may be permitted limited contact, such as
`hugging or handholding. Although this is the most desirable
`
`form of visit from both the visitor's and inmate's points of
`view, it is also the hardest to control. If inmates and visitors
`are not physically screened before and after visits, contra(cid:173)
`band, including drugs, money, and weapons could be intro(cid:173)
`duced into the secure prison environment through face to face
`contact visits. Additionally, it is difficult for corrections offic(cid:173)
`ers to enforce rules that allow only certain visitors to visit
`certain inmates when all inmates and visitors are in a common
`location.
`[0009] Another form of visitation involves placing a physi(cid:173)
`cal barrier between the inmate and the visitor. In this form of
`visitation, the individuals are face to face, but usually sepa(cid:173)
`rated by a transparent material, such as security glass or
`Plexiglass. Generally, the booths are semi-private, with par(cid:173)
`titions or walls between each visitor and inmate. Physical
`contact is not permitted between the inmate and the visitor.
`Communication can be made via normal acoustic transmis(cid:173)
`sion through holes in the glass. One common addition to this
`scenario is to place private telephone handsets on each of the
`visitor side and the inmate side. Once both parties have picked
`up the handset, they can communicate via the electronic
`amplification of the phone. Where communication is by tele(cid:173)
`phone handset, there often are no longer holes in the barrier
`between the inmate and visitor. Both of these forms of visi(cid:173)
`tation still present the difficulty of and risks associated with
`allowing the general public into the secured prison environ(cid:173)
`ment.
`[001 0] Another form of visitation, typically employed only
`by the largest of detention centers, is remote video visitation.
`In this form of visitation, inmates and visitors are in physi(cid:173)
`cally separate locations, but are electronically connected via
`technology analogous to closed circuit television and tele(cid:173)
`phone handsets or speaker phones. This type of visitation
`completely eliminates the potential for contraband to enter
`the facility, as the visitors never need be brought behind the
`secure gates of the prison.
`[0011] All of the visitation types described above have in
`common that certain paperwork and research must be com(cid:173)
`pleted by the facility before the visitation session can occur.
`In some facilities, software, such as an Offender Management
`System (OMS), has automated part of the record keeping
`process, storing inmate information along with visitor infor(cid:173)
`mation in the computer system. In more sophisticated OMS
`installations, the software can also perform basic enemy
`checking, employee checking, and past felony checking on
`visitors with the data already stored in the OMS database.
`[0012]
`In addition, each type of visitation described above
`can be viewed as addressing some of the shortcomings
`present in the other types of visitation. For example, in com(cid:173)
`parison to contact visitation, having an inmate and visitor
`physically separated by a barrier will reduce, but may not
`eliminate, the potential to pass contraband between the visitor
`and the inmate. By using remote video visitation however, the
`risk of passing contraband between the visitor and the inmate
`is totally eliminated. Further, the remote video visitation
`approach is less intrusive to the visitor, as the visitor no longer
`needs to be physically searched prior to entering a secure
`area.
`
`BRIEF SUMMARY OF THE INVENTION
`
`[0013] The present invention provides a method of manag(cid:173)
`ing visitation in a controlled-access environment. The
`method generally includes the steps of: accessing a visitation
`control system including a visitation session scheduling inter-
`
`

`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`2
`
`face, a plurality of communications devices, a switching
`interface, and at least one authentication interface; defining a
`set of rules governing visitation in the controlled-access envi(cid:173)
`ronment; requesting a visitation session using the visitation
`session scheduling interface of the visitation control system;
`assessing whether the visitation session complies with the set
`of rules governing visitation in the controlled-access environ(cid:173)
`ment; scheduling the visitation session if the visitation ses(cid:173)
`sion complies with the set of rules governing visitation in the
`controlled-access environment; using the at least one authen(cid:173)
`tication interface to authenticate a first party to the visitation
`session; using the at least one authentication interface to
`authenticate a second party to the visitation session; estab(cid:173)
`lishing communication between the first party to the visita(cid:173)
`tion and the second party to the visitation session after authen(cid:173)
`ticating both the first party and the second party to the
`visitation session; and storing a record of the visitation ses(cid:173)
`sion in a visitation session database, the record of the visita(cid:173)
`tion including at least information regarding identities of the
`first party and the second party. The set of rules governing
`visitation in the controlled-access environment may include
`one or more operational rules (e.g., rules of general applica(cid:173)
`bility or applicable to a particular class of individuals, rather
`than applicable to a specific individual). The step of assessing
`whether the visitation session complies with a set of rules
`governing visitation in the controlled-access environment
`may, for example, include verifying that neither the first party
`nor the second party is prohibited from participating in visi(cid:173)
`tation sessions.
`[0014] The method optionally includes storing a plurality
`of demographic information records in a demographic infor(cid:173)
`mation database, each of the plurality of demographic infor(cid:173)
`mation records including demographic information for a
`single user of the visitation control system. One or more
`visitation rules associated with a single user of the visitation
`control system may be defined, and these visitation rules may
`be associated with a demographic information record.
`[0015] Typically, the step of establishing communication
`between the first party to the visitation session and the second
`party to the visitation session will include establishing at least
`an audio connection between the first party and the second
`party through the visitation control system. This may be
`accomplished, for example, by connecting a first one of the
`plurality of communications devices to a second one of the
`plurality of communications devices via the switching inter(cid:173)
`face. Alternatively, both an audio connection and a video
`connection may be established between the first party and the
`second party through the visitation control system. The com(cid:173)
`munication between the first party and the second party may
`be terminated at the conclusion of a preset period of time.
`[0016]
`It is also desirable to determine whether the visita(cid:173)
`tion session is to be monitored and to monitor the visitation
`session in response to a determination that the visitation ses(cid:173)
`sion is to be monitored. Whether or not a visitation session is
`to be monitored may be determined by assessing whether the
`visitation session meets at least one defined visitation session
`monitoring criterion. While monitoring the visitation session,
`the present invention may detect a violation of one or more
`rules governing visitation in the controlled-access environ(cid:173)
`ment and thereafter terminate the communication between
`the first party and the second party. Alternatively, rather than
`terminating the communication, the present invention may
`
`notify a third party upon detecting the violation of one or
`more rules governing visitation in the controlled-access en vi(cid:173)
`ronment.
`[0017]
`In some embodiments, the method further includes
`assigning an identification code to at least one of the first party
`and the second party. The identification code may then be
`used to authenticate either or both of the first party to the
`visitation session and the second party to the visitation ses(cid:173)
`sion to the visitation system. Alternatively, or in addition, the
`method may include receiving a biometric input measure(cid:173)
`ment from at least one of the first party and the second party
`and associating the received biometric input measurement
`with the respective party. The biometric input measurement
`may then be used to authenticate either or both of the first
`party to the visitation session and the second party to the
`visitation session to the visitation system. The biometric input
`measurement may be a fingerprint, a voice print, or any other
`suitable biometric measurement.
`[0018] Also disclosed herein is a system for managing visi(cid:173)
`tation in a controlled-access environment, generally includ(cid:173)
`ing: a visitation controller including a switching interface and
`a central processing unit to run a plurality of software pro(cid:173)
`grams, the plurality of software programs including at least
`one software program controlling the switching interface, at
`least one software program to schedule a visitation session,
`and at least one software program monitoring compliance
`with a set of rules governing visitation in the controlled(cid:173)
`access environment; a first communications device coupled
`to the visitation controller; a second communications device
`coupled to the visitation controller; a first authentication
`interface coupled to the visitation controller to authenticate a
`first party to a visitation session; a second authentication
`interface coupled to the visitation controller to authenticate a
`second party to a visitation session; at least one monitoring
`device coupled to the visitation controller to enable monitor(cid:173)
`ing of the visitation session; and a database coupled to the
`visitation controller to store a record of the visitation session,
`the record including at least information regarding identities
`of the first party to the visitation session and the second party
`to the visitation session. The visitation controller typically
`establishes at least audio communication between the first
`communications device and the second communications
`device through the switching interface, and may establish
`both audio communication and video communication
`between the first communications device and the second com(cid:173)
`munications device through the switching interface.
`[0019] At least one of the first authentication interface and
`the second authentication interface may include a biometric
`interface, such as a fingerprint identification interface, a voice
`print identification interface, or another suitable biometric
`interface. Alternatively, or in addition, at least one of the first
`authentication interface and the second authentication inter(cid:173)
`face may include an identification code input interface.
`[0020] Preferably, the at least one software program to
`schedule a visitation session and the at least one software
`program monitoring compliance with a set of rules governing
`visitation in the controlled-access environment cooperate to
`prohibit scheduling of a visitation session that does not com(cid:173)
`ply with the set of rules governing visitation in the controlled(cid:173)
`access environment.
`[0021] The at least one monitoring devices typically
`enables at least near real-time monitoring of the visitation
`session. For example, the at least one monitoring device may
`include a recording device to record the visitation session.
`
`

`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`3
`
`In some embodiments of the invention, both the first
`[0022]
`communications device and the second communications
`device are internal to the controlled-access environment. In
`other embodiments of the invention, one of the first commu(cid:173)
`nications device and the second communications device is
`external to the controlled-access environment. The external
`communications device may be coupled to the visitation con(cid:173)
`troller via the Internet.
`[0023] The system optionally includes at least one visita(cid:173)
`tion scheduling client in communication with the visitation
`controller and configured to invoke the at least one software
`program to schedule a visitation session. It is contemplated
`that the at least one visitation scheduling client may be exter(cid:173)
`nal to the controlled-access environment, and may further
`communicate with the visitation controller via the Internet.
`[0024] The present invention advantageously reduces the
`paperwork burden on correctional facility staff to "clear"
`outside parties for visitation sessions.
`[0025] Another advantage of the present invention is that it
`improves compliance of visitation sessions with rules gov(cid:173)
`erning visitation in a controlled-environment.
`[0026] The foregoing and other aspects, features, details,
`utilities, and advantages of the present invention will be
`apparent from reading the following description and claims,
`and from reviewing the accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0027] FIG. 1 is a block diagram of a visitation control
`system according to an embodiment of the present invention.
`[0028] FIG. 2 is an exemplary block diagram of the visita(cid:173)
`tion control unit shown at the center of FIG. 1.
`[0029] FIG. 3 is a block diagram of an application server
`that may be incorporated into a visitation control unit accord(cid:173)
`ing to the present invention.
`[0030] FIG. 4 is an exemplary block diagram of the storage
`devices depicted in FIG. 1.
`[0031] FIG. 5 is a flowchart illustrating steps that may be
`carried out in scheduling a visitation session.
`[0032] FIG. 6 is a flowchart illustrating one embodiment of
`a process for conducting a visitation according to the present
`invention.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`[0033] While the visitation approaches described above
`address, to a certain extent, the problems of contraband and
`security within the prison, they can introduce issues with
`paperwork, research, and expense to the facility. Further,
`where the visitation session between the inmate and the visi(cid:173)
`tor is conducted electronically, there is the potential to gather
`valuable information from the communication between the
`inmate and the visitor. For any information gathered to be of
`value, however, the parties in the communication need to be
`positively identified. In existing visitation approaches, posi(cid:173)
`tive identification is often difficult; often, the best that can be
`done is an educated guess based on paper logs, reports, and
`correction officer observations.
`[0034] The visitation approaches described above also
`present the possibility of fraud (e.g., failures to follow estab(cid:173)
`lished rules for visitation sessions). One common effort to
`circumvent facility rules regarding visitation sessions is to
`involve more than one inmate and more than one visitor,
`performing a switch when the visit actually occurs. For
`example, suppose Visitor A is not permitted to visit inmate 1
`
`but is permitted to visit inmate 2. Conversely, suppose Visitor
`B is permitted to visit inmate 1 but not inmate 2. Visitors A
`and B communicate ahead of time and schedule visits at the
`same time: Visitor A schedules to see inmate 2, as permitted,
`and Visitor B schedules to see inmate 1, as permitted. After
`Visitors A and B are identified by the prison staff and are
`waiting to visit their respective inmates, however, they switch
`credentials or just simply switch seats to visit the inmates they
`are restricted from seeing. This type of visitation fraud is
`often occurs in large facilities where there are large numbers
`of visitors and inmates at any given time, making it difficult
`for corrections officers to individually recognize each of the
`inmates and visitors when monitoring the various visitation
`sessions occurring.
`[0035] Another somewhat less serious form of visitation
`fraud involves inmates and visitors not observing time limits
`placed on visitation sessions, which are typically in the range
`of about fifteen to about sixty minutes. Prison resources are
`limited in nature, and only so many visits can be handled
`concurrently. Rigorously enforcing time restrictions makes
`better use of these resources, allowing more inmates the
`opportunity to participate in the visiting process. Of course, in
`a large facility, it requires considerable coordination by the
`prison staff to ensure that the visits do not extend past their
`allotted time, making it difficult for corrections officers to
`monitor time restrictions for all visitation sessions.
`[0036] The visitation management system according to the
`present invention advantageously provides functionality
`beyond the functionality provided by many OMS software
`packages. The system may be installed and configured to
`function as a stand-alone system, where all inmates and visi(cid:173)
`tors are manually entered directly into the visitation manage(cid:173)
`ment system. Alternatively, the visitation system according to
`the present invention may be integrated with an OMS that
`provides inmate and/or visitor information. Of course, the
`system can also be integrated with an Inmate Telephone Sys(cid:173)
`tem, which may also provide inmate and/or visitor demo(cid:173)
`graphic information. It should further be understood that the
`present invention may be practiced in connection with any of
`the approaches to visitation described above, as well as any
`other type of visitation.
`In general, regardless of the visitation approach
`[0037]
`employed, a visitation management system according to the
`present invention includes a monitoring device that permits
`one or more third parties, such as corrections officers or court
`officials, to monitor a visitation session between an inmate
`and a visitor. The term "monitoring," as used herein, encom(cid:173)
`passes both live (e.g., real time or near real time) monitoring,
`for example as by actively listening in on an ongoing visita(cid:173)
`tion session, and recordation of visitation sessions for later
`review and/or processing. One suitable post-processing sys(cid:173)
`tem and methodology is disclosed in U.S. provisional appli(cid:173)
`cation No. 60/901,342, filed Feb. 15, 2007, which is hereby
`incorporated by reference as though fully set forth herein.
`In the case ofhandset and video visitation, the moni(cid:173)
`[0038]
`taring device may also be capable of playing back audio
`and/or video as appropriate. In face to face contact visitation
`settings, the monitoring device could be a microphone, speak(cid:173)
`erphone, video camera, or the like. Combinations of various
`monitoring devices (e.g., a microphone and a video recorder)
`could also be employed. Of course, the monitoring device or
`devices may be either visible to the parties to the visitation
`session or hidden from their view.
`
`

`
`US 2008/0201158 AI
`
`Aug. 21, 2008
`
`4
`
`[0039] The v1s1tation management system
`typically
`includes one or more databases or data stores, which may
`include one or more of the following types of data and
`records, discussed in further detail below: demographic infor(cid:173)
`mation records, visitation schedule records, visitation log
`records, visitation recording and/or transcript records, con(cid:173)
`figuration information, and operational rules. Of course, the
`database may also include other types of information and/or
`records as desired or required by a particular implementation
`of the visitation management system. The term "database," as
`used herein includes relational databases in which a plurality
`of data sets are associated with each other and stored, prefer(cid:173)
`ably as one or more records; the database may be stored in a
`single medium or may be stored in multiple media intercon(cid:173)
`nected by a network.
`[0040] The demographic information typically includes a
`variety of data utilized to create records of a plurality of
`individuals in a variety of role categories. Role categories can
`include, without limitation, Inmates, Visitors, Employees,
`Official Visitors, Lawyers, and Clergy. The demographic
`information will also typically include at least identification
`information, such as names, addresses, telephone numbers,
`and the like for the individuals in the database.
`[0041] The demographic data record for an individual may
`also include or be associated with one or more visitation rules
`that govern visitation sessions involving that individual. Visi(cid:173)
`tation rules may include, for example, permitted to visit,
`permitted to be a visitor, blocked from visiting, must record,
`must not record, must be supervised, must be private, time
`limits, restrictions on visitation sessions by time and/or day,
`and the like.
`[0042] The database may also include visitation schedule
`records, for example a calendar that reflects open and filled
`visitation "slots." A scheduled visitation session (e. g., a filled
`visitation "slot") can consist of one or more inmates visiting
`with one or more individuals, and may be a one time event
`(e.g., Wednesday from 11:00 AM until 11:30 PM) or a reoc(cid:173)
`curring series of events (e.g., the first of every month from
`2:30PM until3:00 PM).
`[0043] Scheduling of a visitation session can be initiated by
`an inmate, by correctional staff, or by the general public (e.g.,
`a prospective visitor from outside the correctional institu(cid:173)
`tion). Scheduled visitation sessions may take into account
`factors such as the inmate's daily schedule, the inmate's
`allowed visitor list (e.g., by applying visitation rules stored or
`associated with the inmate's demographic data record), the
`facility's visitation schedule, and resource availability (e.g.,
`the availability of visitation booths or remote video visitation
`stations for use by the inmate and/or the visitor). Preferably,
`scheduled visitation sessions can be altered (e.g., moved to a
`different date or time) or deleted entirely through a visitation
`session scheduling interface, which may be either locally or
`remotely located. In some embodiments, the visitation ses(cid:173)
`sion scheduling interface may be accessed via a wide area
`network (WAN), such as the Internet. The present invention
`may also provide the ability to display or print a sunmJary
`visitation schedule for any arbitrary time period, such as
`hourly, daily, weekly, monthly, and the like. As will be
`described in further detail below, the visitation management
`system can accommodate both direct entry of scheduled visi(cid:173)
`tation sessions, as well as use in a master/slave configuration
`where the schedule can be driven by an external system. For
`example, in some embodiments of the invention, visitation
`sessions may be scheduled by the public via a publicly-ac-
`
`cessible web site or through an automated telephone system
`connected via the public switched telephone network
`(PSTN).
`[0044] The visitation management system according to the
`present invention also preferably stores a history of visitation
`sessions within the database (referred to herein as "visitation
`session logs," "visitation session records," or "visitation ses(cid:173)
`sion history"), including information about at least the
`inmates, visitors, and resources involved in each visitation
`session. A transcription and/or recording of the visitation
`session can also be stored or associated with the visitation
`session log. To facilitate storage and retrieval of the visitation
`session logs, each visitation session log may be assigned a
`unique identifier (e.g., a number or alphanumeric sequence).
`[0045] Preferably, the visitation session logs can be queried
`in a variety of ways and by employing a variety of different
`search criteria, such as day, inmate, resource, visitor informa(cid:173)
`tion, or any combination thereof, which makes visitation
`session log queries a desirable feature of the present inven(cid:173)
`tion. For example, different items are often considered con(cid:173)
`traband in different sections of a correctional facility. Inmates
`can be very resourceful in getting around facility rules to pass
`an item from an inmate living in a section where the item is
`not considered contraband to an inmate living in a section
`where the item is considered contraband. Upon discovering
`contraband with the second inmate, a corrections officer
`could use the visitation session logs to trace the origin of the
`contraband to the first inmate. For example, a corrections
`officer could view all visitation session records for a particu(cid:173)
`lar visitation resource (e.g., a given visitation booth) and
`determine which inmates were passing contraband between
`each other by scheduling visits right after each other (e.g.,
`Inmate A was in booth 1 from 4:00 to 4:15 and left a forbidden
`item hidden in the booth for Inmate B to get during the 4: 15 to
`4:30 visitation time). A visitation session history report can
`also be used to determine odd patterns in visitation, such as
`the same visitor visiting many inmates, or a correlation
`between specific inmates and visitors and other events in the
`facilities, such as drug finds, contraband de

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket