`(12) Patent Application Publication (10) Pub. No.: US 2012/0204029 A1
`Trabucco
`(43) Pub. Date:
`Aug. 9, 2012
`
`US 20120204029A1
`
`(54) METHOD AND SYSTEM FOR CONDUCTING
`ANATTORNEY CLIENT PRIVLEGED
`CONFERENCE WITH THE LAWYER AT AN
`INDEPENDENT LOCATION
`
`(76) Inventor:
`
`Slade Culli Trabucco, Wilmington,
`NC (US)
`
`(21) Appl. No.:
`
`13/020,919
`
`(22) Filed:
`
`Feb. 4, 2011
`
`Publication Classification
`
`(51) Int. Cl
`(2006.01)
`Goris/16
`(2006.01)
`H04L 9/32
`(52) U.S. Cl. ......................................... 713/168; 709/227
`(57)
`ABSTRACT
`The present invention relates to a secure system for video
`conference between an attorney and their incarcerated inmate
`client. Client is positioned at a video conference terminal and
`attorney at their computer and the conference scheduled,
`confirmed and completed over the internet in a secure man
`.
`
`37
`
`37
`
`VIDEO
`CONFERENCETERMINAL
`
`VIDEO
`CONFERENCETERMINAL
`
`
`
`36
`
`39
`
`
`
`INMATE
`
`
`
`
`
`
`
`VERIFICATION
`SERVICE
`
`SERVER CONFERENCE
`SECUREENCRYPTED
`
`SCHEDULING
`SERVICE
`
`
`
`COMPUTER
`TERMINAL
`\38
`
`
`
`34
`
`COMPUTER
`TERMINALN
`ATORNEY
`38
`34
`
`TurnSignl - Exhibit 1018
`Page 1 of 14
`
`
`
`Patent Application Publication
`
`Aug. 9, 2012 Sheet 1 of 7
`
`US 2012/0204029 A1
`
`
`
`SERVERESTABLISHED
`TO CREATESECURELINK
`BETWEENJAIL ANDATORNEY'S COMPUTER
`
`VERIFY AT TORNEY ANDATTORNEY'SCLIENTS
`
`ASSIGNSECURITY CODETOATTORNEY FOR
`ACCESS TO SERVERSERVICES
`
`ASSIGNORMOREJAL PERSONEL
`TO BRING INMATE TO WIDEO CONFRENCE
`TERMINAL
`
`ATTORNEY SIGNS INTO SERVER AND
`INMATEIS BROUGHT TO CONFERENCE
`TERMINALATSELECTEDTIME
`
`SERVERESTABLISHEDLINK BETWEEN INMATE
`ANDATTORNEY
`
`ATTORNEY AND CLIENT HAVE SECURE
`WIDEO CONFERENCE
`
`3
`
`4
`
`5
`
`6
`
`7
`
`FIG.
`
`TurnSignl - Exhibit 1018
`Page 2 of 14
`
`
`
`Patent Application Publication
`
`Aug. 9, 2012 Sheet 2 of 7
`
`US 2012/0204029 A1
`
`2
`
`22
`
`23
`
`24
`
`25
`
`26
`
`VERIFIEDATORNEY
`SIGNS INTO SECURE
`SERVER
`
`SELECTSUAIL
`WHERE DESIRED
`INMATEIS LOCATED
`
`SELECTS INMATE
`
`SELECTS MEETING
`SCHEDULER
`
`SELECTS DATE AND
`TIMEFOR CONFERENCE
`
`JAILNOTIFIED BY SERVER
`OFINMATE AND CONFERENCE
`DATE ANDTIME
`
`
`
`27
`
`PARTIES CONDUCT
`VIDEO CONFERENCE
`OVERSECURESERVER
`ATSELECTED DATE ANDTIME
`
`FIG2
`
`TurnSignl - Exhibit 1018
`Page 3 of 14
`
`
`
`Patent Application Publication
`
`Aug. 9, 2012 Sheet 3 of 7
`
`US 2012/0204029 A1
`
`/8/8
`
`
`
`98 | HWNI
`
`98
`
`NOLIWDIHIHM
`
`HOIMHS
`
`68
`
`TurnSignl - Exhibit 1018
`Page 4 of 14
`
`
`
`Patent Application Publication
`
`Aug. 9, 2012 Sheet 4 of 7
`
`US 2012/0204029 A1
`
`67
`
`s
`
`
`
`TurnSignl - Exhibit 1018
`Page 5 of 14
`
`
`
`Patent Application Publication
`
`Aug. 9, 2012 Sheet 5 of 7
`
`US 2012/0204029 A1
`
`
`
`DATABASE
`OF VERIFIED
`LAWYERS/CLIENT
`INMATES
`
`COMMUNICATION
`LINK
`LAWYERSAILS
`
`ENCRYPTION TELE
`CONFERENCEMODULE
`
`DATABASE
`OF JAILS/INMATES
`
`CONFERENCE
`SCHEDULER
`
`TERMINAL TIME
`SYNCHRONIZATION
`
`TurnSignl - Exhibit 1018
`Page 6 of 14
`
`
`
`Patent Application Publication
`
`Aug. 9, 2012 Sheet 6 of 7
`
`US 2012/0204029 A1
`
`
`
`
`
`
`
`HSW8|WIWONOIIVOIHINHÀ
`
`SHIWWNITIVTHDIMHSISIT INHIT) -
`
`
`
`0HNI ?|W|{|-
`
`TurnSignl - Exhibit 1018
`Page 7 of 14
`
`
`
`Patent Application Publication
`
`Aug. 9, 2012 Sheet 7 of 7
`
`US 2012/0204029 A1
`
`
`
`TurnSignl - Exhibit 1018
`Page 8 of 14
`
`
`
`US 2012/0204029 A1
`
`Aug. 9, 2012
`
`METHOD AND SYSTEM FOR CONDUCTING
`ANATTORNEY CLIENT PRIVLEGED
`CONFERENCE WITH THE LAWYER AT AN
`INDEPENDENT LOCATION
`
`COPYRIGHT NOTICE
`
`0001. A portion of the disclosure of this patent contains
`material that is subject to copyright protection. The copyright
`owner has no objection to the reproduction by anyone of the
`patent document or the patent disclosure as it appears in the
`Patent and Trademark Office patent files or records, but oth
`erwise reserves all copyright rights whatsoever.
`
`BACKGROUND OF THE INVENTION
`
`0002 1. Field of the Invention
`0003. The present invention relates to a video conference
`method and system involving inmates and their attorney's. In
`particular, the present invention relates to a video conference
`system that allows secure video conferencing when the attor
`ney is not in the courtroom yet still preserves attorney-client
`privilege.
`0004 2. Description of Related Art
`0005. The concept of video conferencing is not new and
`there are many systems developed for Such conferences. The
`increased speed of computers and the availability of the inter
`net has allowed for video conferencing that is fast and easy.
`Companies like Skype provide this kind of service which is
`now available at little or no cost to most people. However,
`Such video conferencing is not secure from hacking, and like
`a phone, anyone with access to the computer can make a call.
`0006. It has been the case that the conveniences offered by
`video conferencing as well as the safety involved has facili
`tated their use in communication between courthouses and
`jails. Video conferencing has been increasingly relied on for
`Such things as arraignment proceedings or other active court
`proceedings. An arraignment or other court proceeding, for
`example, typically involves the judge, a clerk, the inmate, the
`lawyers, and the like, and the inmate can be viewed or talked
`to during this period. The security of attorney client privilege
`is assured by providing private viewing and by the appearance
`of the lawyer in front of the Judge with the court controlling
`access of the lawyer to the video conferencing.
`0007. Several video conferencing systems for use in the
`courtroom have been developed and many patented. In U.S.
`Pat. No. 7.061,521 there is a video conferencing system that
`connects a courtroom with the jail. The system enables the
`private communication between the attorney and his inmate
`client in confidence. It essentially works by establishing a
`point-to-point link between a courtroom and a jail. The par
`ties must be available at both locations. While this is usually
`not a problem for the incarcerated client, the attorney is lim
`ited to the courtroom location.
`0008 Prior to and in-between court proceedings it is nec
`essary for the attorney to have conversations with the client.
`Those must be confidential and only the attorney or firm
`representing the inmate should be allowed access to the
`inmate. While video conferencing works well when the attor
`ney is in the presence of the court, there is a need for a secure
`and verifiable method for dealing with video conferencing
`with an incarcerated inmate when the attorney is in his office
`
`or other location outside the jail that is secure and allows for
`an attorney-client privileged conversation and exchange of
`information.
`
`BRIEF SUMMARY OF THE INVENTION
`0009. The present invention relates to a system and
`method which addresses the problems of the prior art in a
`novel and useful way. More specifically, the present invention
`relates to a system and method for securely having conversa
`tions between an incarcerated inmate and a lawyer at any
`other location over a secure channel wherein the attorney is
`Verified, the video conference is secure, and the jail can con
`trol the conversation time and location for the inmate.
`0010. In one embodiment the present invention relates to a
`method for conducting a confidential privileged video con
`ference at a selected time between an incarcerated inmate at a
`specific video conference terminal at the incarceration loca
`tion and the inmate's attorney located at a computer at an
`independent location comprising:
`0.011
`a) establishing a server to securely link the con
`ference terminal and the computer over a communica
`tion network;
`0012 b) verifying the lawyer's status and identity;
`0013 c) verifying the inmate is the attorney's client;
`0.014
`d) assigning an identity code for the attorney to
`sign into the server using the computer over the commu
`nication network;
`0.015
`e) establishing one or more people responsible to
`bring the inmate to the conference terminal at the
`selected time;
`0016 f) the attorney signing into the server while the
`inmate is brought to the terminal by the one or more
`people at the selected time;
`0017 g) the server establishing an encrypted link
`between the terminal and the computer at the selected
`time; and
`0.018
`h) the attorney and inmate conducting a confiden
`tial video conference.
`0019. In yet another embodiment the present invention
`relates to a system for conducting a confidential privileged
`Video conference between an inmate incarcerated at a specific
`incarceration location and a verified attorney at a computer
`positioned at an independent location comprising:
`0020 a) a video conference terminal at the specific
`incarceration location;
`0021 b) a first server connected to a communications
`network designed to provide encrypted communication
`between the video conference terminal and the com
`puter;
`0022 c) a verification service on a second server for
`communicating with the attorney on the computer, Veri
`fying the attorney and connecting the computer to the
`video conference terminal via the first server;
`0023 d) a scheduling service on a third server compris
`ing a database of available conference times, a network
`interface for selecting a date and time for the video
`conference and a timer for starting the teleconference;
`and
`0024 e) a system for notifying at least one selected
`person at the incarceration location of the date and time
`of the conference for the purpose of bringing the inmate
`to the video conference terminal to participate in the
`conference.
`
`TurnSignl - Exhibit 1018
`Page 9 of 14
`
`
`
`US 2012/0204029 A1
`
`Aug. 9, 2012
`
`0025 Instill another embodiment of the present invention
`there is a method for verifying an attorney for participating in
`a confidential privileged video conference between an incar
`cerated inmate at a video conference terminal at an incarcera
`tion location and the attorney at a computer located at an
`independent location comprising:
`0026 a) assembling an encrypted video conference sys
`tem between the terminal and the computer;
`0027 b) assigning an attendant to manage the attorney
`verification;
`0028 c) the attorney providing proof of attorney status,
`proof of identity and proof that the inmate is the attor
`ney's client to the attendant; and
`0029 d) the attendant issuing an access code to the
`attorney for accessing the encrypted video conference
`system.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0030 FIG. 1 is a flow chart of the invention detailing the
`process of having a video conference.
`0031
`FIG. 2 is a flow chart of the process of setting up and
`having a conference.
`0032 FIG. 3 is a relationship chart of the system of the
`present invention for multiple attorneys, jails, and inmates.
`0033 FIG. 4 is the relationship and function of the server
`of the present invention.
`0034 FIG. 5 is a detailed view of the server function.
`0035 FIG. 6 is a relationship chart of the process of veri
`fying the attorney.
`0036 FIG. 7 is a block diagram of multiple servers.
`
`DETAILED DESCRIPTION OF THE INVENTION
`0037. While this invention is susceptible to embodiment in
`many different forms, there is shown in the drawings and will
`herein be described in detail specific embodiments, with the
`understanding that the present disclosure of Such embodi
`ments is to be considered as an example of the principles and
`not intended to limit the invention to the specific embodi
`ments shown and described. In the description below, like
`reference numerals are used to describe the same, similar or
`corresponding parts in the several views of the drawings. This
`detailed description defines the meaning of the terms used
`herein and specifically describes embodiments in order for
`those skilled in the art to practice the invention.
`0038. The terms “a” or “an', as used herein, are defined as
`one or as more than one. The term “plurality”, as used herein,
`is defined as two or as more than two. The term “another, as
`used herein, is defined as at least a second or more. The terms
`“including and/or “having, as used herein, are defined as
`comprising (i.e., open language). The term “coupled, as used
`herein, is defined as connected, although not necessarily
`directly, and not necessarily mechanically.
`0039 Reference throughout this document to “one
`embodiment', 'certain embodiments', and “an embodiment’
`or similar terms means that a particular feature, structure, or
`characteristic described in connection with the embodiment
`is included in at least one embodiment of the present inven
`tion. Thus, the appearances of Such phrases or in various
`places throughout this specification are not necessarily all
`referring to the same embodiment. Furthermore, the particu
`lar features, structures, or characteristics may be combined in
`any suitable manner in one or more embodiments without
`limitation.
`
`0040. The term 'or' as used herein is to be interpreted as
`an inclusive or meaning any one or any combination. There
`fore, A, B or C' means any of the following: “A; B, C: A and
`B: A and C: B and C: A, B and C. An exception to this
`definition will occur only when a combination of elements,
`functions, steps or acts are in some way inherently mutually
`exclusive.
`0041. The drawings featured in the figures are for the
`purpose of illustrating certain convenient embodiments of the
`present invention, and are not to be considered as limitation
`thereto. Term “means' preceding a present participle of an
`operation indicates a desired function for which there is one
`or more embodiments, i.e., one or more methods, devices, or
`apparatuses for achieving the desired function and that one
`skilled in the art could select from these or their equivalent in
`view of the disclosure herein and use of the term “means' is
`not intended to be limiting.
`0042. As used herein the phrase “confidential privileged
`video conference” refers to a video conference that is between
`an attorney and their client and is conducted in a manner to
`preserve the attorney/client privilege. The video conference,
`as detailed in the specification and claimed herein, relates to
`conducting a video conference over a communication net
`work, for example, over the internet or any similar network in
`a secured manner.
`0043. A conference can be scheduled by logging into a
`server over the web connection of the system. The times
`available for the conference are selected from available dates
`and times that the jail has. This process engages the process of
`notifying the incarcerating location (e.g. jail) for transporting
`the inmate to the conference terminal.
`0044 As used herein “selected time” refers to a time
`wherein the participants in the video conference have selected
`to meet for the video conference. In the present system, the
`selected time available is determined by the incarceration
`location. This corresponds to when the incarceration location
`will make the inmate available for meetings of any kind, or
`specifically, for conferences with their attorney. Normally,
`the video conference will be for a specific length of time in
`order to be able to schedule other video conferencing at the
`same conference terminal. However, an uncertain ending
`time could be utilized or a no later than ending time could be
`utilized. In order to coordinate the time within the incarcera
`tion location, the start time must be agreed upon and that is
`accomplished herein by the method operator gathering the
`available times from the incarceration location and putting
`the times on the server so that when the attorney signs into the
`method system, the attorney can selecta start time by entering
`an available time or selecting from a list of available times or
`the like and in several embodiments select a stop time or agree
`to a limited time or the like.
`0045. As used herein “incarcerated inmate” is the client of
`an attorney who is in jail or other like facility called the
`incarceration location. The incarcerated inmate's attorney is
`located at a computer anywhere for accessing the communi
`cation network which is located at a location independent of
`the conference terminal.
`0046. An “independent location” refers to any location
`away from the conference terminal and having communica
`tion network access. Examples of such locations would be the
`attorney's law firm location, the attorney's home, or any pri
`vate location where absent the present system, the identity of
`the attorney would be difficult or impossible to confirm.
`
`TurnSignl - Exhibit 1018
`Page 10 of 14
`
`
`
`US 2012/0204029 A1
`
`Aug. 9, 2012
`
`0047. A conference can be initiated automatically or can
`be enabled by the attorney. In one embodiment the attorney
`logs into the system which upon entry of identity code, is
`connected to the conference. In other embodiments the con
`ference starts and/or ends automatically or the like.
`0.048. As used herein “conference terminal' is a secure
`location within the incarceration location or under the control
`of the incarceration location where there is a terminal (com
`puter and monitor) for accessing the communication network
`utilizing a video camera, Such as a webcam, microphone, or
`speaker, and engaging in a video conference. This location
`can be a computer with an internet hook-up and a web cam, or
`similar set up. In order to insure privileged secure communi
`cation, the location will be secure and unmonitored to the
`extent that conversations cannot be overheard or otherwise
`observed at the incarceration location. This can be accom
`plished with an isolated room with windows for observing the
`inmate without listening, an isolated area, or the like. Another
`method is to utilize a kiosk. Sound proofing or the like can be
`used to further security. The computer can be a standard
`computer but in one embodiment, it is set up to only be able
`to engage in the video conference and set up to be incapable
`of recording the video conference or any other function so
`that other conferences cannot be had, nor someone acciden
`tally or on purpose record a video conference improperly,
`thus breaching attorney/client privilege. In addition, in one
`embodiment, the conference can only be initiated from the
`attorney's computer and not the conference terminal. While
`these kinds of restrictions would be placed on the inmate
`terminal no such retractions would be placed on the attorney's
`computer and location, thus the attorney would be respon
`sible for recordings and isolating the attorney's end of the
`conference as desired.
`0049. In the present invention, a “server' is one or more
`computers having an application and connected to the com
`municating network. A server is utilized as the go-between
`for the attorney and inmate in setting up a video conference
`with the server operating over the internet. A server, or the
`equivalent computer, is in a link over a communication net
`work, Such as the internet. It is set up such that the conference
`referee or link between the attorney and client is the server.
`Both the attorney and client have computers/terminals which
`give them access to the network, and thus the server and the
`entire video conference occurs through this server which acts
`to control the confidentiality of the parties as well as the
`identity of the parties. One first server can be used for the
`Verification/registration/payment process and another second
`server for the video conference software. Yet another server
`can be used to sign in for the video conference. In one
`embodiment all functions are on a single server.
`0050. The server can have the video conference software
`as well as identifying codes of the parties to the conference.
`Further identifying software, such as thumbprint identifica
`tion software, facial recognition, or the like, can be utilized to
`make Sure the correct parties to the confidential video con
`ference are attending the conference at each end. In addition,
`face recognition Software could be utilized to make Sure no
`unauthorized personal are within the view of the video cam
`era on each side of the conference. The server also acts as the
`link to sign up and schedule video conferences, and to notify
`the jail or other inmate incarceration location to the time of
`the conference and a list of their inmates. Further, the sever
`can be used not only to verify identity, it can be used to linkan
`attorney to one or more clients at the incarceration location.
`
`0051. In one embodiment, one or more people at the incar
`ceration location are established as the person responsible for
`bringing the inmate to the conference terminal at a selected
`time and/or to approve selected dates and times for a confer
`ence. Therefore, after the server links to a schedule and sched
`ules a conference, the jail is notified and places on their
`schedule when to bring one or more inmates to the video
`conference terminal at the incarceration location for the video
`conference at the selected time.
`0.052
`Bypassing the video conference through a server, an
`encrypted link to the conference can be established. Confi
`dential links are in the skill of the art and combined with the
`party ID on both sides and the conference set up, establishes
`the unique conferencing system of the present invention. As
`an example of a conferencing software Windows Live Meet
`ing can be utilized with a present system.
`0053) Once the attorney and inmate are at their respective
`terminals/computers, the attorney begins by signing into the
`server via a GUI that accepts an identity code (a number,
`thumb print, face recognition, etc.). At the same time the
`incarceration location brings the inmate to the conference
`terminal and is responsible for the identity of the person at
`that end. In one embodiment, the inmate is given a code to
`sign in with or is otherwise identified by fingerprint, face
`recognition, or the like, thus verifying not only the attorney at
`the beginning of the conference but the system verifies the
`inmate as well. It is another embodiment of the present inven
`tion that the incarceration location is responsible for the iden
`tification of the inmate.
`0054 The server, once programmed with the time for the
`conference, can be programmed Such that the conference can
`only begin at a particular time or starts automatically at a
`particular time, thus insuring control over the schedule for all
`inmates using the system. Likewise, where a precise end time
`to the conference is desired, the conference can be pro
`grammed to stop the conference automatically at a particular
`time. Normally, in a manual situation in one embodiment,
`only the attorney can end the conference because the confer
`ence terminal has no means for the inmate to operate the
`terminal, i.e. the inmate cannot operate the computer at the
`terminal in anyway.
`0055 One safety feature that is an embodiment of the
`present invention is where the conference terminal is only
`designed, programmed, or outfit with Software such that
`while it is capable of connecting to the network Such as the
`internet, it can only serve to be used as the video conference
`terminal, thus preventing unwanted internet connections by
`an inmate. Another safety feature is the system can be con
`figured such that it excludes from operation any other device
`in the system that is not approved other than the attorney's
`computer and the conference terminal. Once again, recording
`could be limited to just the attorney’s computer for further
`confidentiality under the system of the present invention.
`0056. In the process of verifying the attorney for partici
`pation in a confidential privileged video conference between
`an incarcerated inmate at their video conference terminal at
`the incarceration location and the attorney at a computer
`terminal located at an independent location, at least one per
`Son of the system is assigned to the process of attorney Veri
`fication. The system must not only verify the identity of the
`person who is representing the client, i.e. the attorney by
`photo ID or the like, the system also needs to verify that the
`person is an attorney in good standing with the local or other
`appropriate bar for the particular inmate. The attorney pro
`
`TurnSignl - Exhibit 1018
`Page 11 of 14
`
`
`
`US 2012/0204029 A1
`
`Aug. 9, 2012
`
`vides proof of attorney status, Such as a state bar attorney
`registration card, a letter of good standing from a local bar, or
`the like. The attorney also provides attorney verification that
`they are indeed the attorney who is in good standing. It is also
`important that the attorney prove that there is an attorney
`client relationship, such as a non confidential agreement,
`between the parties, a verified letter or acknowledgement
`from the attorney or similar proof. The one or more attendant
`managing the process can then approve the attorney and issue
`the appropriate access code to the attorney for accessing the
`Video conference system of the present invention. The access
`code can be one code for the attorney used for all conferences
`and all inmates. It can also be a code issued for each confer
`ence or one code for each of the attorney's clients as desired.
`The more levels of confidentiality, the less likely an error
`would occur if at all.
`0057. Now referring to the drawings. FIG. 1 is a flow chart
`of an embodiment of the process of having a video confer
`ence. It should be noted that all flow charts are exemplary and
`individual process steps can be in any order that achieves the
`proper goal of a video conference. In this embodiment, the
`server is established to create a secure link (such as an
`encrypted link) between a jail (at a conference terminal) and
`an attorney's computer 1 (located at an independent location).
`The attorney and attorney's client is verified 2 such that the
`system knows that the right parties are participating and the
`attorney is properly licensed. The attorney is assigned one or
`more security codes to access the server and its services over
`the network 3 (internet). Next one or more jail personnel at
`each jail location is assigned to make Sure the inmate is
`brought to the conference terminal at the appropriate date and
`time 4. At the same time as the inmate is sitting at the con
`ference terminal, the attorney signs into the server 5. Next, the
`server establishes a link between the inmate and the attorney
`6 and the attorney and the attorney's client have a secure video
`conference 7.
`0058. In FIG. 2 there is disclosed a flow chart of the
`method wherein a video conference is set up by the present
`invention. The verified attorney signs into the server 21 using
`a code assigned to either the attorney, the particular confer
`ence, or for the inmate. Then, the attorney, from a GUI on the
`internet connected to the server, selects the jail where the
`desired inmate is located 22 that the attorney wishes to have a
`video conference with. The attorney selects the inmate 23.
`Next, the attorney selects a meeting scheduler 24 which gives
`the attorney available days and times available for a video
`conference 25 and selects an appropriate conference sched
`ule. Once the attorney has selected the date and time 25, the
`jail is notified by the server or other means of the date and time
`of the conference 26 so that the jail can put the transfer of the
`inmate on its schedule. Lastly, once scheduled, the parties
`(attorney and inmate) can have a video conference as taught
`herein 27.
`0059. In FIG.3 there is shown an example of the system of
`the invention with multiple jails, inmates, and attorneys
`depicted. In this view an encrypted secure server 31 is posi
`tioned to provide service over the internet 39. The server
`comprises of conference service, a verification service 32,
`and a scheduling service 33. While the server 31 could consist
`ofessentially only these functions, in another embodiment it
`comprises other functions. The attorneys 34 can access the
`server 31 via their computer terminals 38 which are posi
`tioned at an independent location. The server 31 is connected
`to the jail 35 and the video conference terminal 37 via an
`
`internet 39 connection to the server 31. This connection is
`utilized for the video conferencing, for notifying the jail of
`which inmate is conferencing, and what date and time the
`conference going on so that inmates 36 will be brought to the
`conference terminal at the appropriate date and time and
`some inmates left in their cells.
`0060. In FIG. 4 a depiction of the system for connecting
`the attorney and the inmate is depicted. The server 40 is
`depicted in this view with some of its functions noted during
`the video conference. The server comprises a time synchro
`nization function 42 such that the layer terminal 43 and con
`ference terminal 44 can be connected via the server 40 con
`nection over the internet via an encrypted conference. The
`server connects 41 the two terminals together during the
`conference. The time synchronization and server 42 also noti
`fies the jail 45 such that the inmate 44 is brought to the
`conference terminal for the video conference 49. A recoding
`blocking function 46 is also on the conference terminal 44.
`The recording blocking 46 function prevents both the server
`40 or the conference terminal from recording the conference
`49 and leaves only the lawyer 43 if desired to be recording the
`conference.
`0061. In FIG. 5 there is an example of a server 50 of the
`present invention with a number of functions on the server 50.
`In one function, a database of verified lawyers and client/
`inmates 51 is contained on the server 50. The database 51 is
`collected by Verifying the attorneys and determining who
`their clients are and that they are inmates at particular insti
`tutions or locations. The database 51 can be automatically or
`manually entered on the database and is used to help with
`Verification and making Sure only authorized people are uti
`lizing the server's 50 video conferencing services. The server
`50 also comprises a communication link between the lawyers
`and jails 52. The communication link insures that appropriate
`communications (e.g. e-mails) between all the parties are
`made. This can be utilized when the jail needs to be notified of
`a schedule conference or perhaps notification of a lawyer
`when the conference needs to be cancelled or rescheduled.
`Within that communication module 52 or as a separate mod
`ule is an encryption teleconference module 53. The module
`53 establishes a video conference in an encrypted manner so
`that only the two parties can participate or view the confer
`CCC.
`0062 FIG. 5 also shows an embodiment wherein there is a
`database of jails and of inmates 53. Once the jail or inmates
`are in the system, the database 53 can keep track of the jails
`and inmate names available to the system. The server 50 can
`then match jails inmates and lawyers in a manner necessary
`for a video conference. This is especially important when the
`conference scheduler 54 is operated. The conference sched
`uler 54 keeps track of the available times and dates for a
`conference and accesses the databases 51 and 53 to match
`their personnel and locations and attorneys with a date and
`time for a video conference. Because there is a need for the
`attorney computer, the jail, and the conference terminal at the
`jail to be operating at the same time to prevent multiple
`conference problems the server can also have a terminal time
`synchronization function 55. This function attempts to make
`Sure that the parties to the conference and the jail each are
`operating on the same time (e.g. both attorney and inmate
`arrive at 10:00am for the conference). This can be done by
`adjusting the clocks on all the terminals or sending messages
`with the server's time or the like such that all parties know
`what time the server operates on.
`
`TurnSignl - Exhibit 1018
`Page 12 of 14
`
`
`
`US 2012/0204029 A1
`
`Aug. 9, 2012
`
`0063. In FIG. 6there is a diagram of the relationship of the
`verification service that allows only the inmate's attorney to
`participate in the video conference. While the system will
`accommodate multiple attorneys, jails, and clients, for sim
`plicity, one lawyer and jail is depicted. The verification ser
`Vice is designed to make Sure that an attorney accessing the
`system of the present invention is licensed and Supposed to be
`representing a specific given inmate or not. The attorney 61
`provides proof that the attorney is licensed. Such as bar info,
`ID's, and the like, including letters of good Standing and also
`provides a list of one or more clients that