`
`WHATIS CLAIMEDIS:
`
`A method performed by a kiosk managementserver, comprising:
`
`receiving, from a client device and via a first communication channel, a login
`
`request to a presence based service, wherein the presence based service monitors an
`
`availability of a plurality of inmate agents and the login request includesa client
`
`identifier associated with an inmate agent anda client credential;
`
`authenticating the client device based on theclient identifier and the client
`
`credential;
`
`setting a presence status of the inmate agentto available;
`
`determining client information corresponding to the inmate agent based on the
`
`client identifier;
`
`transmitting the client information to a kiosk device located in a bookingfacility
`
`based on the presencestatus;
`
`receiving a selection of the inmate agent by a user of the kiosk device;
`
`initializing an out of band communication channel between a user device, the
`
`client device, and the kiosk device, the out of band communication channel being
`
`independentof the first communication channel of the presence based service and having
`
`an end to end encryption to protect communication via the out of band communication
`
`channel;
`
`based on an establishment of the out of band communication channel, transmitting
`
`an installation executable to the user device associated with the user of the kiosk device
`
`via the out of band communication channel, wherein the installation executable is
`
`associated with an application configured to monitor a location of the user via the user
`
`device;
`
`monitoring the location of theuser;
`
`modifying a boundary an inmate associated with the client device can travel based
`
`on the inmate agent indicating a preference as a condition for posting a bond; and
`
`sending a warning communication to the inmate agent based on the client device
`
`being outside the boundary by a predetermined distance.
`
`-36-
`
`
`
`Atty. Dkt. No. 3210.1810001
`
`The method of claim 1, furthercomprising generating a warning communication to the
`
`inmate agent based onthe client device being outside the boundary for a period of time
`
`longer than a predetermined amount.
`
`The methodof claim 1, further comprising notifying a law enforcement agency based on
`
`the client device being outside the boundary by the predetermineddistance.
`
`The methodofclaim 1, further comprising periodically further authenticating the client
`
`device by sending a possession requestto the client device.
`
`The method ofclaim 4, further comprising
`
`in responseto the possession request, receiving a possession response,
`
`wherein the possession response comprises: a facial recognition information,
`
`fingerprint identification information, palm print identification information, iris
`
`recognition information, retina recognition information, voice recognition information,
`
`cryptographic hashes, credentials, secrets, or passwords.
`
`The methodof claim 4, further comprising:
`
`in responseto the possession request, not receiving a possession response; and
`
`based on not receiving the possession response, notifying a law enforcement
`
`agency.
`
`The methodof claim 4, further comprising:
`
`in responseto the possession request, not receiving a possession response; and
`
`based on not receiving the possession response, notifying the inmate agent.
`
`A non-transitory computer-readable device having instructions stored thereon that, when
`
`executed by at least one computing device of a kiosk managementserver, causes the at
`
`least one computing device to perform operations comprising:
`
`-37-
`
`
`
`Atty. Dkt. No. 3210.1810001
`
`receiving, from a client device and via a first communication channel, a login
`
`request to a presence based service, wherein the presence based service monitors an
`
`availability of a plurality of inmate agents and the login request includesa client
`
`identifier associated with an inmate agent anda client credential;
`
`authenticating the client device based on theclient identifier and the client
`
`credential;
`
`setting a presence status of the inmate agentto available;
`
`determining client information corresponding to the inmate agent based on the
`
`client identifier;
`
`transmitting the client information to a kiosk device located in a bookingfacility
`
`based on the presencestatus;
`
`receiving a selection of the inmate agent by a user of the kiosk device;
`
`initializing an out of band communication channel between a user device, the
`
`client device, and the kiosk device, the out of band communication channel being
`
`independentof the first communication channel of the presence based service and having
`
`an end to end encryption to protect communication via the out of band communication
`
`channel;
`
`based on an establishment of the out of band communication channel, transmitting
`
`an installation executable to the user device associated with the user of the kiosk device
`
`via the out of band communication channel, wherein the installation executable is
`
`associated with an application configured to monitor a location of the user via the user
`
`device;
`
`monitoring the location of theuser;
`
`modifying a boundary an inmate associated with the client device can travel based
`
`on the inmate agent indicating a preference as a condition for posting a bond; and
`
`sending a warning communication to the inmate agent based on the client device
`
`being outside the boundary by a predetermined distance.
`
`The non-transitory computer readable medium ofclaim 8, wherein the operations further
`
`comprise generating a warning communication to the inmate agent based on the client
`
`- 38 -
`
`
`
`Atty. Dkt. No. 3210.1810001
`
`device being outside the boundary for a period of time longer than a predetermined
`
`amount.
`
`10.
`
`The non-transitory computer readable medium ofclaim 8, wherein the operations further
`
`comprise notifying a law enforcement agency based onthe client device being outside the
`
`boundary by the predetermined distance.
`
`11.
`
`The non-transitory computer readable medium of claim 8, wherein the operations further
`
`comprise periodically further authenticating the client device by sending a possession
`
`request to the client device.
`
`12.
`
`The non-transitory computer readable medium of claim 11, wherein the operations
`
`further comprise:
`
`in responseto the possession request, receiving a possession response,
`
`wherein the possession response comprises: a facial recognition information,
`
`fingerprint identification information, palm print identification information, iris
`
`recognition information, retina recognition information, voice recognition information,
`
`cryptographic hashes, credentials, secrets, or passwords.
`
`13.
`
`The non-transitory computer readable medium of claim 11, wherein the operations
`
`further comprise:
`
`in responseto the possession request, not receiving a possession response; and
`
`based on not receiving the possession response, notifying a law enforcement
`
`agency.
`
`14.
`
`The non-transitory computer readable medium of claim 11, wherein the operations
`
`further comprise:
`
`in responseto the possession request, not receiving a possession response; and
`
`based on not receiving the possession response, notifying the inmate agent.
`
`-39-
`
`
`
`15.
`
`An inmate assistance system comprising:
`
`a memory storing instructions; and
`
`Atty. Dkt. No. 3210.1810001
`
`one or more processors of a kiosk management server coupled to the memory and
`
`configured to process the stored instructionsto:
`
`receive, from a client device and via a first communication channel, a login
`
`request to a presence based service, wherein the presence based service monitors an
`
`availability of a plurality of inmate agents and the login request includesa client
`
`identifier associated with an inmate agent anda client credential;
`
`authenticate the client device based on the client identifier and the client
`
`credential;
`
`set a presencestatus of the inmate agentto available;
`
`determineclient information corresponding to the inmate agent based on
`
`the client identifier;
`
`transmit the client information to a kiosk device located in a booking
`
`facility based on the presencestatus;
`
`receive a selection of the inmate agent by a user of the kiosk device;
`
`initialize an out of band communication channel between a user device,
`
`the client device, and the kiosk device, the out of band communication channel being
`
`independentof the first communication channel of the presence based service and having
`
`an end to end encryption to protect communication via the out of band communication
`
`channel;
`
`based on an establishment of the out of band communication channel,
`
`transmit an installation executable to the user device associated with the user of the kiosk
`
`device via the out of band communication channel, wherein the installation executable is
`
`associated with an application configured to monitor a location of the user via the user
`
`device;
`
`monitor the location of theuser;
`
`modify a boundary an inmate associated with the client device can travel
`
`based on the inmate agent indicating a preference as a condition for posting a bond; and
`
`send a warning communication to the inmate agent based ontheclient
`
`device being outside the boundary by a predetermineddistance.
`- 40 -
`
`
`
`Atty. Dkt. No. 3210.1810001
`
`16.
`
`The inmate assistance system of claim 15, wherein the one or more processors are further
`
`configured to generate a warning communication to the inmate agent based onthe client
`
`device being outside the boundary for a period of time longer than a predetermined
`
`amount.
`
`17.
`
`The inmate assistance system of claim 15, wherein the one or more processors are further
`
`configured to notify a law enforcement agency based onthe client device being outside
`
`the boundary by the predetermined distance.
`
`18.
`
`The inmate assistance system of claim 15, wherein the one or more processors are further
`
`configured to periodically further authenticate the client device by sending a possession
`
`request to the client device.
`
`19.
`
`The inmate assistance system of claim 18, wherein the one or more processors are further
`
`configured to:
`
`in response to the possession request, receive a possession response,
`
`wherein the possession response comprises: a facial recognition information,
`
`fingerprint identification information, palm print identification information, iris
`
`recognition information, retina recognition information, voice recognition information,
`
`cryptographic hashes, credentials, secrets, or passwords.
`
`20.
`
`The inmate assistance system of claim 18, wherein the one or more processors are further
`
`configured to:
`
`in responseto the possession request, not receiving a possession response; and
`
`based on not receiving the possession response, notifying a law enforcement
`
`agency or the inmate agent.
`
`-4]-
`
`