System and method for visitation management in a controlled-access environment

Johnson; Mark D. ;   et al.

Patent Application Summary

U.S. patent application number 11/819834 was filed with the patent office on 2008-08-21 for system and method for visitation management in a controlled-access environment. Invention is credited to John P. Dale, Joshua Dom, Mark D. Johnson, James P. Rokosky.

Application Number20080201158 11/819834
Document ID /
Family ID39707413
Filed Date2008-08-21

United States Patent Application 20080201158
Kind Code A1
Johnson; Mark D. ;   et al. August 21, 2008

System and method for visitation management in a controlled-access environment

Abstract

A method of managing visitation includes accessing a visitation control system including a visitation session scheduling interface, communications devices, a switching interface, and at least one authentication interface, defining rules governing visitation, requesting a visitation session using the scheduling interface, assessing whether the visitation session complies with the rules governing visitation, scheduling the visitation session if the visitation session complies with the rules, using the at least one authentication interface to authenticate a first party and a second party, establishing communication between the first party and the second party after authenticating both parties, and storing a record of the visitation session in a database. The record preferably includes at least information regarding identities of the first party and the second party. The visitation session may also be monitored (e.g., in real time, near real time, or by recording).


Inventors: Johnson; Mark D.; (Altoona, PA) ; Rokosky; James P.; (Altoona, PA) ; Dom; Joshua; (Altoona, PA) ; Dale; John P.; (Duncansville, PA)
Correspondence Address:
    WILEY REIN LLP
    1776 K. STREET N.W.
    WASHINGTON
    DC
    20006
    US
Family ID: 39707413
Appl. No.: 11/819834
Filed: June 29, 2007

Related U.S. Patent Documents

Application Number Filing Date Patent Number
60901342 Feb 15, 2007

Current U.S. Class: 705/1.1
Current CPC Class: G06F 16/283 20190101; G06F 16/686 20190101; G10L 15/26 20130101; G06F 16/254 20190101; H04M 3/42221 20130101; H04M 2201/40 20130101; G06F 16/685 20190101; H04M 3/2281 20130101
Class at Publication: 705/1
International Class: G06Q 10/00 20060101 G06Q010/00

Claims



1. A method of managing visitation in a controlled-access environment, the method comprising: accessing a visitation control system, the visitation control system comprising: a visitation session scheduling interface; a plurality of communications devices; a switching interface; and at least one authentication interface; defining a set of rules governing visitation in the controlled-access environment; requesting a visitation session using the visitation session scheduling interface of the visitation control system; assessing whether the visitation session complies with the set of rules governing visitation in the controlled-access environment; scheduling the visitation session if the visitation session complies with the set of rules governing visitation in the controlled-access environment; using the at least one authentication interface to authenticate a first party to the visitation session; using the at least one authentication interface to authenticate a second party to the visitation session; establishing communication between the first party to the visitation session and the second party to the visitation session after authenticating both the first party and the second party to the visitation session; and storing a record of the visitation session in a visitation session database, the record of the visitation including at least information regarding identities of the first party and the second party.

2. The method according to claim 1, wherein the step of defining a set of rules governing visitation in the controlled-access environment comprises defining one or more operational rules.

3. The method according to claim 1, further comprising storing a plurality of demographic information records in a demographic information database, each of the plurality of demographic information records including demographic information for a single user of the visitation control system.

4. The method according to claim 3, wherein the step of defining a set of rules governing visitation in the controlled-access environment comprises defining one or more visitation rules, each of the one or more visitation rules being associated with a single user of the visitation control system.

5. The method according to claim 4, further comprising associating each of the one or more visitation rules with a demographic information record.

6. The method according to claim 1, wherein the step of establishing communication between the first party to the visitation session and the second party to the visitation session comprises establishing at least an audio connection between the first party and the second party through the visitation control system.

7. The method according to claim 6, wherein the step of establishing at least an audio connection between the first party and the second party through the visitation control system comprises connecting a first one of the plurality of communications devices to a second one of the plurality of communications devices via the switching interface.

8. The method according to claim 6, wherein the step of establishing at least an audio connection between the first party and the second party through the visitation control system comprises establishing both an audio connection and a video connection between the first party and the second party through the visitation control system.

9. The method according to claim 1, further comprising terminating the communication between the first party and the second party at the conclusion of a preset period of time.

10. The method according to claim 1, further comprising: determining whether the visitation session is to be monitored; and monitoring the visitation session in response to a determination that the visitation session is to be monitored.

11. The method according to claim 10, further comprising defining a plurality of visitation session monitoring criteria, wherein the step of determining whether the visitation session is to be monitored comprises assessing whether the visitation session meets at least one visitation session monitoring criterion.

12. The method according to claim 10, further comprising, during the step of monitoring the visitation session: detecting a violation of one or more rules governing visitation in the controlled-access environment; and terminating the communication between the first party and the second party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.

13. The method according to claim 10, further comprising, during the step of monitoring the visitation session: detecting a violation of one or more rules governing visitation in the controlled-access environment; and notifying a third party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.

14. The method according to claim 1, further comprising assigning an identification code to at least one of the first party and the second party, wherein at least one of the steps of using the at least one authentication interface to authenticate a first party to the visitation session and using the at least one authentication interface to authenticate a second party to the visitation session comprises using the identification code respectively assigned thereto to authenticate the respective party to the visitation system.

15. The method according to claim 1, further comprising: receiving a biometric input measurement from at least one of the first party and the second party; and associating the received biometric input measurement with the respective party, wherein at least one of the steps of using the at least one authentication interface to authenticate a first party to the visitation session and using the at least one authentication interface to authenticate a second party to the visitation session comprises using the biometric input measurement to identify the respective party to the visitation system.

16. The method according to claim 15, wherein the biometric input measurement is a fingerprint.

17. The method according to claim 15, wherein the biometric input measurement is a voice print.

18. The method according to claim 1, wherein the step of assessing whether the visitation session complies with a set of rules governing visitation in the controlled-access environment comprises verifying that neither the first party nor the second party is prohibited from participating in visitation sessions.

19. A system for managing visitation in a controlled-access environment, the system comprising: a visitation controller including a switching interface and a central processing unit to run a plurality of software programs, the plurality of software programs including: at least one software program controlling the switching interface; at least one software program to schedule a visitation session; and at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment; a first communications device coupled to the visitation controller; a second communications device coupled to the visitation controller; a first authentication interface coupled to the visitation controller to authenticate a first party to a visitation session; a second authentication interface coupled to the visitation controller to authenticate a second party to a visitation session; at least one monitoring device coupled to the visitation controller to enable monitoring of the visitation session; and a database coupled to the visitation controller to store a record of the visitation session, the record including at least information regarding identities of the first party to the visitation session and the second party to the visitation session.

20. The system according to claim 19, wherein the visitation controller establishes at least audio communication between the first communications device and the second communications device through the switching interface.

21. The system according to claim 20, wherein the visitation controller establishes both audio communication and video communication between the first communications device and the second communications device through the switching interface.

22. The system according to claim 19, wherein at least one of the first authentication interface and the second authentication interface comprises a biometric interface.

23. The system according to claim 22, wherein the biometric interface comprises a fingerprint identification interface.

24. The system according to claim 22, wherein the biometric interface comprises a voice print identification interface.

25. The system according to claim 19, wherein at least one of the first authentication interface and the second authentication interface comprises an identification code input interface.

26. The system according to claim 19, wherein the at least one software program to schedule a visitation session and the at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment cooperate to prohibit scheduling of a visitation session that does not comply with the set of rules governing visitation in the controlled-access environment.

27. The system according to claim 19, wherein the at least one monitoring devices enables at least near real-time monitoring of the visitation session.

28. The system according claim 19, wherein the at least one monitoring device comprises a recording device to record the visitation session.

29. The system according to claim 19, wherein both the first communications device and the second communications device are internal to the controlled-access environment.

30. The system according to claim 19, wherein one of the first communications device and the second communications device is external to the controlled-access environment.

31. The system according to claim 30, wherein the one of the first communications device and the second communications device external to the controlled-access environment is coupled to the visitation controller via the Internet.

32. The system according to claim 19, further comprising at least one visitation scheduling client in communication with the visitation controller and configured to invoke the at least one software program to schedule a visitation session.

33. The system according to claim 32, wherein the at least one visitation scheduling client is external to the controlled-access environment.

34. The system according to claim 33, wherein the at least one visitation scheduling client communicates with the visitation controller via the Internet.
Description



CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application is related to U.S. provisional application No. 60/901,342, filed Feb. 15, 2007 and U.S. application Ser. No. 11/706,431, filed Feb. 15, 2007. The foregoing are hereby incorporated by reference as though fully set forth herein.

BACKGROUND OF THE INVENTION

[0002] a. Field of the Invention

[0003] The instant invention relates to visitation sessions occurring in a controlled-access environment, such as a correctional institution. In particular, the instant invention relates to a system and method for managing and monitoring visitation sessions.

[0004] b. Background Art

[0005] In the correctional industry, inmate visitation is an essential part of rehabilitation of an inmate. Numerous studies have shown that visitation by friends and family can help reduce recidivism as well as prepare an inmate for life after prison. Since the vast majority of inmates are eventually released into the public, any steps to minimize the problems the individual may have upon re-entering public life are welcomed.

[0006] Typical visitation procedures in a jail setting are created to balance allowing the inmate to have a quality visit with reducing the likelihood of undesirable or inappropriate behavior by both inmates and their visitors. To this end, certain individuals, such as convicted felons, victims, jail employees, co-defendants, former inmates, and the like are normally either not permitted visitation rights, or are permitted only restricted visitation rights. Additionally, individuals may be required to consent to background screening, personal body searches, and other intrusive measures in order to visit an inmate.

[0007] In many institutions, inmates are permitted to have a list of approved visitors. This list may be periodically revised, or it may be permanent. The purpose of the list is not to punish or restrict the inmate to only certain visitors, but rather to reduce the workload of the institution staff tasked with researching and approving each visitor on the list. By providing an inmate with a list of approved visitors, those approved visitors can visit the inmate without having to be repeatedly "cleared" by corrections staff prior to each visit. Some institutions may further restrict these lists, for example by allowing visitors to appear on only a certain number of inmates' lists at any given time. The presence of a pre-approved list of visitors also allows each visit to reduce security risks, as the individual has already been researched and approved. Accordingly, visits by visitors on the pre-approved list can be more efficient and can occur with more regularity.

[0008] Visitations between inmates and the general population can generally occur in one of several methods. The simplest method, but also the most risk prone, is a face to face contact visit. In this type of visit, inmates and visitors are generally located in a common area, supervised by Corrections Officers. The inmates and visitors may sit at conference type tables, and may be permitted limited contact, such as hugging or handholding. Although this is the most desirable form of visit from both the visitor's and inmate's points of view, it is also the hardest to control. If inmates and visitors are not physically screened before and after visits, contraband, including drugs, money, and weapons could be introduced into the secure prison environment through face to face contact visits. Additionally, it is difficult for corrections officers to enforce rules that allow only certain visitors to visit certain inmates when all inmates and visitors are in a common location.

[0009] Another form of visitation involves placing a physical barrier between the inmate and the visitor. In this form of visitation, the individuals are face to face, but usually separated by a transparent material, such as security glass or Plexiglass. Generally, the booths are semi-private, with partitions or walls between each visitor and inmate. Physical contact is not permitted between the inmate and the visitor. Communication can be made via normal acoustic transmission through holes in the glass. One common addition to this scenario is to place private telephone handsets on each of the visitor side and the inmate side. Once both parties have picked up the handset, they can communicate via the electronic amplification of the phone. Where communication is by telephone handset, there often are no longer holes in the barrier between the inmate and visitor. Both of these forms of visitation still present the difficulty of and risks associated with allowing the general public into the secured prison environment.

[0010] Another form of visitation, typically employed only by the largest of detention centers, is remote video visitation. In this form of visitation, inmates and visitors are in physically separate locations, but are electronically connected via technology analogous to closed circuit television and telephone handsets or speaker phones. This type of visitation completely eliminates the potential for contraband to enter the facility, as the visitors never need be brought behind the secure gates of the prison.

[0011] All of the visitation types described above have in common that certain paperwork and research must be completed by the facility before the visitation session can occur. In some facilities, software, such as an Offender Management System (OMS), has automated part of the record keeping process, storing inmate information along with visitor information in the computer system. In more sophisticated OMS installations, the software can also perform basic enemy checking, employee checking, and past felony checking on visitors with the data already stored in the OMS database.

[0012] In addition, each type of visitation described above can be viewed as addressing some of the shortcomings present in the other types of visitation. For example, in comparison to contact visitation, having an inmate and visitor physically separated by a barrier will reduce, but may not eliminate, the potential to pass contraband between the visitor and the inmate. By using remote video visitation however, the risk of passing contraband between the visitor and the inmate is totally eliminated. Further, the remote video visitation approach is less intrusive to the visitor, as the visitor no longer needs to be physically searched prior to entering a secure area.

BRIEF SUMMARY OF THE INVENTION

[0013] The present invention provides a method of managing visitation in a controlled-access environment. The method generally includes the steps of: accessing a visitation control system including a visitation session scheduling interface, a plurality of communications devices, a switching interface, and at least one authentication interface; defining a set of rules governing visitation in the controlled-access environment; requesting a visitation session using the visitation session scheduling interface of the visitation control system; assessing whether the visitation session complies with the set of rules governing visitation in the controlled-access environment; scheduling the visitation session if the visitation session complies with the set of rules governing visitation in the controlled-access environment; using the at least one authentication interface to authenticate a first party to the visitation session; using the at least one authentication interface to authenticate a second party to the visitation session; establishing communication between the first party to the visitation and the second party to the visitation session after authenticating both the first party and the second party to the visitation session; and storing a record of the visitation session in a visitation session database, the record of the visitation including at least information regarding identities of the first party and the second party. The set of rules governing visitation in the controlled-access environment may include one or more operational rules (e.g., rules of general applicability or applicable to a particular class of individuals, rather than applicable to a specific individual). The step of assessing whether the visitation session complies with a set of rules governing visitation in the controlled-access environment may, for example, include verifying that neither the first party nor the second party is prohibited from participating in visitation sessions.

[0014] The method optionally includes storing a plurality of demographic information records in a demographic information database, each of the plurality of demographic information records including demographic information for a single user of the visitation control system. One or more visitation rules associated with a single user of the visitation control system may be defined, and these visitation rules may be associated with a demographic information record.

[0015] Typically, the step of establishing communication between the first party to the visitation session and the second party to the visitation session will include establishing at least an audio connection between the first party and the second party through the visitation control system. This may be accomplished, for example, by connecting a first one of the plurality of communications devices to a second one of the plurality of communications devices via the switching interface. Alternatively, both an audio connection and a video connection may be established between the first party and the second party through the visitation control system. The communication between the first party and the second party may be terminated at the conclusion of a preset period of time.

[0016] It is also desirable to determine whether the visitation session is to be monitored and to monitor the visitation session in response to a determination that the visitation session is to be monitored. Whether or not a visitation session is to be monitored may be determined by assessing whether the visitation session meets at least one defined visitation session monitoring criterion. While monitoring the visitation session, the present invention may detect a violation of one or more rules governing visitation in the controlled-access environment and thereafter terminate the communication between the first party and the second party. Alternatively, rather than terminating the communication, the present invention may notify a third party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.

[0017] In some embodiments, the method further includes assigning an identification code to at least one of the first party and the second party. The identification code may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system. Alternatively, or in addition, the method may include receiving a biometric input measurement from at least one of the first party and the second party and associating the received biometric input measurement with the respective party. The biometric input measurement may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system. The biometric input measurement may be a fingerprint, a voice print, or any other suitable biometric measurement.

[0018] Also disclosed herein is a system for managing visitation in a controlled-access environment, generally including: a visitation controller including a switching interface and a central processing unit to run a plurality of software programs, the plurality of software programs including at least one software program controlling the switching interface, at least one software program to schedule a visitation session, and at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment; a first communications device coupled to the visitation controller; a second communications device coupled to the visitation controller; a first authentication interface coupled to the visitation controller to authenticate a first party to a visitation session; a second authentication interface coupled to the visitation controller to authenticate a second party to a visitation session; at least one monitoring device coupled to the visitation controller to enable monitoring of the visitation session; and a database coupled to the visitation controller to store a record of the visitation session, the record including at least information regarding identities of the first party to the visitation session and the second party to the visitation session. The visitation controller typically establishes at least audio communication between the first communications device and the second communications device through the switching interface, and may establish both audio communication and video communication between the first communications device and the second communications device through the switching interface.

[0019] At least one of the first authentication interface and the second authentication interface may include a biometric interface, such as a fingerprint identification interface, a voice print identification interface, or another suitable biometric interface. Alternatively, or in addition, at least one of the first authentication interface and the second authentication interface may include an identification code input interface.

[0020] Preferably, the at least one software program to schedule a visitation session and the at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment cooperate to prohibit scheduling of a visitation session that does not comply with the set of rules governing visitation in the controlled-access environment.

[0021] The at least one monitoring devices typically enables at least near real-time monitoring of the visitation session. For example, the at least one monitoring device may include a recording device to record the visitation session.

[0022] In some embodiments of the invention, both the first communications device and the second communications device are internal to the controlled-access environment. In other embodiments of the invention, one of the first communications device and the second communications device is external to the controlled-access environment. The external communications device may be coupled to the visitation controller via the Internet.

[0023] The system optionally includes at least one visitation scheduling client in communication with the visitation controller and configured to invoke the at least one software program to schedule a visitation session. It is contemplated that the at least one visitation scheduling client may be external to the controlled-access environment, and may further communicate with the visitation controller via the Internet.

[0024] The present invention advantageously reduces the paperwork burden on correctional facility staff to "clear" outside parties for visitation sessions.

[0025] Another advantage of the present invention is that it improves compliance of visitation sessions with rules governing visitation in a controlled-environment.

[0026] The foregoing and other aspects, features, details, utilities, and advantages of the present invention will be apparent from reading the following description and claims, and from reviewing the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0027] FIG. 1 is a block diagram of a visitation control system according to an embodiment of the present invention.

[0028] FIG. 2 is an exemplary block diagram of the visitation control unit shown at the center of FIG. 1.

[0029] FIG. 3 is a block diagram of an application server that may be incorporated into a visitation control unit according to the present invention.

[0030] FIG. 4 is an exemplary block diagram of the storage devices depicted in FIG. 1.

[0031] FIG. 5 is a flowchart illustrating steps that may be carried out in scheduling a visitation session.

[0032] FIG. 6 is a flowchart illustrating one embodiment of a process for conducting a visitation according to the present invention.

DETAILED DESCRIPTION OF THE INVENTION

[0033] While the visitation approaches described above address, to a certain extent, the problems of contraband and security within the prison, they can introduce issues with paperwork, research, and expense to the facility. Further, where the visitation session between the inmate and the visitor is conducted electronically, there is the potential to gather valuable information from the communication between the inmate and the visitor. For any information gathered to be of value, however, the parties in the communication need to be positively identified. In existing visitation approaches, positive identification is often difficult; often, the best that can be done is an educated guess based on paper logs, reports, and correction officer observations.

[0034] The visitation approaches described above also present the possibility of fraud (e.g., failures to follow established rules for visitation sessions). One common effort to circumvent facility rules regarding visitation sessions is to involve more than one inmate and more than one visitor, performing a switch when the visit actually occurs. For example, suppose Visitor A is not permitted to visit inmate 1 but is permitted to visit inmate 2. Conversely, suppose Visitor B is permitted to visit inmate 1 but not inmate 2. Visitors A and B communicate ahead of time and schedule visits at the same time: Visitor A schedules to see inmate 2, as permitted, and Visitor B schedules to see inmate 1, as permitted. After Visitors A and B are identified by the prison staff and are waiting to visit their respective inmates, however, they switch credentials or just simply switch seats to visit the inmates they are restricted from seeing. This type of visitation fraud is often occurs in large facilities where there are large numbers of visitors and inmates at any given time, making it difficult for corrections officers to individually recognize each of the inmates and visitors when monitoring the various visitation sessions occurring.

[0035] Another somewhat less serious form of visitation fraud involves inmates and visitors not observing time limits placed on visitation sessions, which are typically in the range of about fifteen to about sixty minutes. Prison resources are limited in nature, and only so many visits can be handled concurrently. Rigorously enforcing time restrictions makes better use of these resources, allowing more inmates the opportunity to participate in the visiting process. Of course, in a large facility, it requires considerable coordination by the prison staff to ensure that the visits do not extend past their allotted time, making it difficult for corrections officers to monitor time restrictions for all visitation sessions.

[0036] The visitation management system according to the present invention advantageously provides functionality beyond the functionality provided by many OMS software packages. The system may be installed and configured to function as a stand-alone system, where all inmates and visitors are manually entered directly into the visitation management system. Alternatively, the visitation system according to the present invention may be integrated with an OMS that provides inmate and/or visitor information. Of course, the system can also be integrated with an Inmate Telephone System, which may also provide inmate and/or visitor demographic information. It should further be understood that the present invention may be practiced in connection with any of the approaches to visitation described above, as well as any other type of visitation.

[0037] In general, regardless of the visitation approach employed, a visitation management system according to the present invention includes a monitoring device that permits one or more third parties, such as corrections officers or court officials, to monitor a visitation session between an inmate and a visitor. The term "monitoring," as used herein, encompasses both live (e.g., real time or near real time) monitoring, for example as by actively listening in on an ongoing visitation session, and recordation of visitation sessions for later review and/or processing. One suitable post-processing system and methodology is disclosed in U.S. provisional application No. 60/901,342, filed Feb. 15, 2007, which is hereby incorporated by reference as though fully set forth herein.

[0038] In the case of handset and video visitation, the monitoring device may also be capable of playing back audio and/or video as appropriate. In face to face contact visitation settings, the monitoring device could be a microphone, speakerphone, video camera, or the like. Combinations of various monitoring devices (e.g., a microphone and a video recorder) could also be employed. Of course, the monitoring device or devices may be either visible to the parties to the visitation session or hidden from their view.

[0039] The visitation management system typically includes one or more databases or data stores, which may include one or more of the following types of data and records, discussed in further detail below: demographic information records, visitation schedule records, visitation log records, visitation recording and/or transcript records, configuration information, and operational rules. Of course, the database may also include other types of information and/or records as desired or required by a particular implementation of the visitation management system. The term "database," as used herein includes relational databases in which a plurality of data sets are associated with each other and stored, preferably as one or more records; the database may be stored in a single medium or may be stored in multiple media interconnected by a network.

[0040] The demographic information typically includes a variety of data utilized to create records of a plurality of individuals in a variety of role categories. Role categories can include, without limitation, Inmates, Visitors, Employees, Official Visitors, Lawyers, and Clergy. The demographic information will also typically include at least identification information, such as names, addresses, telephone numbers, and the like for the individuals in the database.

[0041] The demographic data record for an individual may also include or be associated with one or more visitation rules that govern visitation sessions involving that individual. Visitation rules may include, for example, permitted to visit, permitted to be a visitor, blocked from visiting, must record, must not record, must be supervised, must be private, time limits, restrictions on visitation sessions by time and/or day, and the like.

[0042] The database may also include visitation schedule records, for example a calendar that reflects open and filled visitation "slots." A scheduled visitation session (e.g., a filled visitation "slot") can consist of one or more inmates visiting with one or more individuals, and may be a one time event (e.g., Wednesday from 11:00 AM until 11:30 PM) or a reoccurring series of events (e.g., the first of every month from 2:30 PM until 3:00 PM).

[0043] Scheduling of a visitation session can be initiated by an inmate, by correctional staff, or by the general public (e.g., a prospective visitor from outside the correctional institution). Scheduled visitation sessions may take into account factors such as the inmate's daily schedule, the inmate's allowed visitor list (e.g., by applying visitation rules stored or associated with the inmate's demographic data record), the facility's visitation schedule, and resource availability (e.g., the availability of visitation booths or remote video visitation stations for use by the inmate and/or the visitor). Preferably, scheduled visitation sessions can be altered (e.g., moved to a different date or time) or deleted entirely through a visitation session scheduling interface, which may be either locally or remotely located. In some embodiments, the visitation session scheduling interface may be accessed via a wide area network (WAN), such as the Internet. The present invention may also provide the ability to display or print a summary visitation schedule for any arbitrary time period, such as hourly, daily, weekly, monthly, and the like. As will be described in further detail below, the visitation management system can accommodate both direct entry of scheduled visitation sessions, as well as use in a master/slave configuration where the schedule can be driven by an external system. For example, in some embodiments of the invention, visitation sessions may be scheduled by the public via a publicly-accessible web site or through an automated telephone system connected via the public switched telephone network (PSTN).

[0044] The visitation management system according to the present invention also preferably stores a history of visitation sessions within the database (referred to herein as "visitation session logs," "visitation session records," or "visitation session history"), including information about at least the inmates, visitors, and resources involved in each visitation session. A transcription and/or recording of the visitation session can also be stored or associated with the visitation session log. To facilitate storage and retrieval of the visitation session logs, each visitation session log may be assigned a unique identifier (e.g., a number or alphanumeric sequence).

[0045] Preferably, the visitation session logs can be queried in a variety of ways and by employing a variety of different search criteria, such as day, inmate, resource, visitor information, or any combination thereof, which makes visitation session log queries a desirable feature of the present invention. For example, different items are often considered contraband in different sections of a correctional facility. Inmates can be very resourceful in getting around facility rules to pass an item from an inmate living in a section where the item is not considered contraband to an inmate living in a section where the item is considered contraband. Upon discovering contraband with the second inmate, a corrections officer could use the visitation session logs to trace the origin of the contraband to the first inmate. For example, a corrections officer could view all visitation session records for a particular visitation resource (e.g., a given visitation booth) and determine which inmates were passing contraband between each other by scheduling visits right after each other (e.g., Inmate A was in booth 1 from 4:00 to 4:15 and left a forbidden item hidden in the booth for Inmate B to get during the 4:15 to 4:30 visitation time). A visitation session history report can also be used to determine odd patterns in visitation, such as the same visitor visiting many inmates, or a correlation between specific inmates and visitors and other events in the facilities, such as drug finds, contraband detection, or other misbehavior.

[0046] Configuration information may also be maintained within the visitation management system and stored within a database. Configuration information includes non-visitation related items, such as the number of phones connected to the visitation management system, where they are located, and a unique name or identifier assigned to each of them. It may also include configuration information about the telephony equipment used, such as board manufacturer, serial numbers, technical data, and the like.

[0047] Operational rules are still another type of data that may be stored in one or more databases included in a visitation management system according to the present invention. Operational rules typically dictate the conditions under which visitation sessions are permitted to occur. Operational rules are similar to the visitation rules that may be associated with individuals in the demographic database. Operational rules, however, apply across several individuals (e.g., to all individuals in the demographic database or to all individuals in a particular class/role), rather than only to a particular individual. Operational rules can include, but are not limited to, time limits for visitation sessions, visitation count limits, person restrictions, time of day, day of week, authentication required, recording required, monitoring allowed, notifications required, and others. For example, operational rules could exist to limit certain classes of inmates to visitation sessions only once a week for thirty minutes, while other classes of inmates are permitted visitation sessions twice a week for one hour.

[0048] The visitation management system preferably enforces operational rules and individual visitation rules both during scheduling of visitation sessions, thereby prohibiting the scheduling of visitation sessions in violation of the rules, as well as during visitation sessions. For example, the visitation management system may enforce a time limit operational rule by electronically cutting off the visitation session and/or notifying interested parties, such as staff and corrections officers, after a preset time limit for the visitation session has elapsed or if an unauthorized or impermissible party attempts to join the visitation session.

[0049] The primary difference between the various installation configurations (e.g., stand alone, OMS-integrated, Inmate Telephone System-integrated) of the visitation management system described above is in the performance of data entry. As described herein, the visitation management system is capable of taking direct input from a human operator, for example in a stand alone installation. Alternatively, the visitation management system can operate in a master/slave arrangement where another system, such as an OMS or an Inmate Telephone System, serves as master, with the visitation management system receiving data therefrom, which may save time and personnel resources that would otherwise be required for data entry to the visitation management system.

[0050] Thus, one of skill in the art will recognize that the systems and methods disclosed herein can be practiced to good advantage in any combination of visitation approaches and installation configurations without departing from the spirit and scope of the present invention.

[0051] One advantageous feature of the visitation management system according to the present invention is authentication of the parties to a visitation session. The disclosed visitation management system can authenticate the parties involved in the visitation session according to one or more of a plurality of authentication methods. For example, when using a handset-based approach to visitation (either remote or face to face with a barrier), when the inmate picks up the handset, the inmate may be prompted to enter a telephone ID number or visitation ID number, known only to the inmate. Similarly, when the visitor picks up the handset, the visitor will be prompted to enter in an ID number known only to the visitor. It is only after successful verification of these ID numbers that the visitation session may proceed. The visitation management system, to which the handsets are coupled, will only permit communication between the handsets after valid authentication of both parties to the visitation session. Therefore, communication cannot proceed until authorized. It is also at this point that monitoring of the visitation session can occur.

[0052] The generation of authentication identifiers for inmates and visitors can be performed in a variety of ways. In some embodiments of the invention, a unique one time identification code is generated for each visitor. This code may be produced by the system just prior to the visitation session taking place, immediately after identity verification of the visitor (e.g., a photo-ID check) has been performed. Typically, the identification code will be valid only for a preset time period (e.g., the identification code will expire after a certain amount of time). The identification code also preferably expires after it is used once for authentication, thereby reducing the likelihood that an authorized visitor can successfully pass an identification code to an unauthorized visitor.

[0053] Inmate validation can be performed in a similar fashion, or the inmate can use a Telephone ID (TID) number that is shared with the facility's inmate phone system. Inmates generally will not share their TIDs with each other, as it would allow other inmates to make fraudulent charges to the account associated with the TID, making it a suitable identifier to authenticate an inmate to a visitation session.

[0054] It is also contemplated that authentication may be performed by using biometric devices, such as finger print readers, iris scan readers, voice verification techniques, Radio Frequency ID, and other standard ways of ensuring positive identification. These biometric techniques can be used in place of, or in addition to, the identification number based authentication methodology described above. For example, either or both of the inmate and the visitor may be required to undergo two-factor identification, including input of an identification number and a fingerprint scan.

[0055] A visitation session typically begins when a corrections officer initiates a visit in the visitation management system. Visitation sessions may also begin automatically when an inmate and visitor both authenticate into a scheduled visitation session. A visitation session will generally continue until it is terminated by a corrections officer, by either of the parties to the visitation system, or by the visitation management system at the expiration of a preset visitation session time limit, which may be established according to one or more operational rules. The visitation session may also be terminated if the visitation management system detects a violation of an operational or individual visitation rule during the course of the visitation session. The system may also provide visual or auditory feedback to a corrections officer when a visitation session has expired or otherwise been terminated. The visitation management system will disconnect all audio or audio/video connections at the expiration of a visitation session.

[0056] The visitation management system may permit corrections staff at a facility to view and/or listen to visitation sessions currently in progress from a computer terminal or other suitable device. Preferably, a corrections officer can select one or more ongoing visitation sessions to monitor, and may be provided with a real time or near real time audio and/or video feed of each monitored visitation session, depending on the type of visitation session. Of course, if a visitation session is being conducted with an Official Visitor (e.g., an individual subject to a "do not monitor" operational or individual visitation rule, such as the inmate's lawyer), the corrections officer would not be able to monitor the conversation.

[0057] In addition to monitoring a visitation session in progress, the corrections officer may also participate in the visitation session by talking to one or both parties thereto. The corrections officer may also be able to terminate the visitation session at any time through the visitation management system, either with or without warning to the parties to the visitation session, for example upon detecting that a rules violation has occurred during the visitation session.

[0058] The visitation management system may also be configured to permit the corrections officer to transfer a live audio and/or video feed of the visit to any phone, computer terminal, video screen, or the like, be it inside the facility or outside the facility, for monitoring of the visitation session by one or more additional parties. For example, the visitation management system may be configured to transfer monitoring to cell phones of investigators, district attorneys, or others. Typically, the transfer of the monitoring would be undetectable by either the inmate or the visitor. Preferably, the transferee party will have the same ability as the corrections officer to join in or terminate the visitation session.

[0059] During a visitation session, the audio and/or video of the visit may be recorded, if desired (and permitted by the rules). The recorded data may be encoded into a computer-readable format, and may be stored either on a file system or within a database. As described above, the visitation session record for each visitation session may be assigned a unique identifier that may be used to correlate the participants in the visitation session, the date and time of the visitation session, the location of the visitation session, what corrections officers verified the identities of the participants to the visitation session, and other relevant details.

[0060] As described above, the recording of the visitation session and the data associated with the visitation session record can later be searched for and retrieved from within the visitation management system. Searching for visitation sessions can be completed based on one or more of a plurality of criteria including, without limitation, date and/or time of the visitation session, inmate name, inmate ID, visitor name, visitor ID, visitation booth, visitation area, and any combination thereof. Further, the recording of the visitation session can preferably be played back at any time and from any location that has access to a computer or phone system that can connect to the visitation management system. The corrections officer may be provided the ability during playback of the visitation session to annotate notes and transcriptions, which may be stored or associated with the visitation session record.

[0061] It is also contemplated that any recording of the visitation session can be downloaded to removable media, such as a CD or DVD, for playback on many standard devices. For example, in the case of a handset based approach to visitation, the audio file of a recorded visitation session can be written to a CD for playback in any standard CD player. This would permit, for example, the visitation session to be played back in court if necessary. Additionally, recordings of visitation sessions can be stored on removable media in binary format, advantageously allowing recordings of many visitation sessions to be stored on one disk for playback in a computer. Binary recordings also advantageously provide the ability to protect the recording with a security wrapper and/or watermarking process to alleviate tampering concerns.

[0062] In some embodiments of the invention, the audio of the visitation session can also be transcribed into text by a manual, human-driven process, by real time or near real time audio transcription software, or in a batch software process that can transcribe the audio after the visitation session has concluded.

[0063] The transcript of the visitation session can then advantageously be indexed and searched along with other database records. Typically, like the recording of a visitation session, the transcript of the visitation session will be stored or associated with the visitation session history, and can be accessed and printed from within the visitation management system. In some embodiments of the invention, rules can be configured in the visitation management system to flag certain keywords, phrases, or topics of conversations. These rules can be used to notify interested parties when a transcript meeting the rules is stored in the visitation management system (e.g., a rule that notifies a corrections officer whenever the terms "gang" and "cocaine" are both uttered in a visitation session).

[0064] FIG. 1 depicts a block diagram of a visitation management system 100 according to an embodiment of the invention, including the communications connections between the components thereof. The visitation control unit 102, which is depicted in further detail in FIG. 2, is connected to each of the other components of the visitation management system. The visitation control unit may communicate via a local area network (LAN) 104 for local resources, such as data storage 106 (shown in further detail in FIG. 4), control stations 108, video communication devices 110, and audio communication devices 112. The LAN may, but need not be, exclusively Ethernet technology, and thus may employ any type of communication medium and protocol, including analog, voltage based transmission.

[0065] Communication to remote visitation and audio devices is typically accomplished via the use of a LAN, commonly Ethernet or T1 digital framing, though other techniques are regarded as within the spirit and scope of the present invention. The wide area network (WAN) 114 provides a dedicated, private link between the visitation control unit and remote devices.

[0066] The Internet 116 can be utilized to provide access to remotely distributed control stations, scheduling clients 118, and home visitation devices 120. The speed requirement of the Internet link is dependent on the number of simultaneous connections supported.

[0067] Referring now to FIG. 2, the visitation control unit is the central processing center for the visitation management system 100. In some embodiments of the invention, the processing power for the visitation control unit comes from standard personal computer (PC) components, configured in a more robust and redundant server role. This generally means higher quality components, with redundant power supplies, hard drives, and other components, but a standard, off-the-shelf (e.g., consumer-grade) system could also be utilized.

[0068] The visitation management system is designed to work with a variety of hardware, such as Intel or AMD based processors, and Operating Systems, such as Microsoft Windows, Linux, Mac OS, and the like. The visitation management system itself is independent of the operating system in which it is operating. Each server depicted in FIG. 2 can be construed as either a physical hardware device or a virtual server. The number of physical hardware machines can be scaled to match the number of simultaneous user connections desired in the visitation management system. Additionally, if space and/or power consumption are considerations, the visitation management system can be scaled down to reduce these concerns.

[0069] The servers that collectively make up the visitation control unit are typically each connected to a central network bus 210, which will most commonly be an Ethernet connection. In addition, the entire visitation management system may be shielded from the rest of the network at an institution by a router or firewall, which can, of course, be either hardware or software based.

[0070] The video server 212, of which there may be one or more, connects to each of the video visitation devices and performs the necessary electrical connections and switching required to connect two or more visitation station units together for a visitation session. The video server can also send the audio and/or video feed to any other computer or device coupled to the visitation control unit for monitoring, recording, or other purposes. Additionally, in some embodiments of the invention, the video server is capable of performing real time translation of video protocols to allow for different video visitation hardware to be utilized in different locations. One of ordinary skill in the art will recognize how the video server establishes a video conference between parties to a visitation session, including, in some instances, a monitoring party.

[0071] The audio server 214, of which there may be one or several, is the audio analogue to the video server. The audio server connects audio devices, such as standard telephones, together and can send the output to any additional devices connected to the visitation control unit for monitoring, recording, or other reasons. The phone devices can be connected to the server via two wire copper connections, via twisted pair digital connections, wireless/cordless connections, or other techniques that will be familiar to one of ordinary skill. Preferably, the audio server has the capability to detect and respond to DTMF based events, flash hook events, and any other event that can be generated by a telephone device. The audio server may also be able to ring the telephone devices. The audio server may also be connected to outside telephone lines to route audio to an outside source, such as a land line or cellular phone.

[0072] The web server 216 is typically a standard device, which may run Apache, Microsoft Internet Information Server, or other web server software. The primary function of the web server is to route requests and other communications from visitation control stations, remote visitation scheduling clients, and home visitation devices into the appropriate destination within the visitation control unit. The web server can also serve as a maintenance point into the visitation control unit for servicing and configuring the system. Typically, the web server will be connected to both the public Internet and the internal network of an organization (e.g., a private intranet).

[0073] The application server 218 functions as the primary center of logic processing in the visitation management system. A block diagram of the application server is shown in FIG. 3. The application server may be a common PC based machine with one or more CPU's 310 connected via a bus 314 to other peripherals including, without limitation, a network card 316, analog modem 318, keyboard 320, mouse (not shown), and a monitor 322. Additionally, both system memory 322, consisting of RAM, and other data storage 324, e.g., magnetic, optical, or flash memory may be connected to the bus.

[0074] System memory 322 contains the runtime environment of the application server. While the preferred embodiment of the device contains an operating system 330 (e.g., Windows, Linux, or another operating system), and a Java virtual machine 332, the visitation management system could also be implemented in a variety of software configurations without changing the purpose or functionality of the device.

[0075] Internal non-volatile storage 324, preferably, but not necessarily, a hard drive, is used to store the operating system, application files, temporary files used during the operation of the system, and as a temporary storage space for recordings of visitation sessions. It is contemplated that recordings of visitation sessions will periodically be moved to another location, for example by an automated scheduled file transfer process, though recordings of visitation sessions may also be stored on the application server without departing from the spirit and scope of the present invention.

[0076] As shown in FIG. 4, in addition to the storage on the application server, there may also be one or more databases and associated Network Attached Storage (NAS) devices connected to the application server via the network. Although, as noted above, the term "database" is typically used herein to refer to a relational database, the term is also intended to encompass a relational database application or a remotely defined data store.

[0077] The remotely defined data store can be an external system, such as an Inmate Telephone System, an Offender Management System, or other information system application. In some embodiments of the invention, the data store is not a formal data store at all, but rather is a real time link to live data. In still other embodiments of the visitation management system, a variety of such data stores and databases are simultaneously employed in a heterogeneous environment.

[0078] As described above, the database will typically provide access to a variety of different types of data records. For example, data related to an inmate, including name, commitment information, address, and the like may be linked to the majority of the remaining data types. Such identification records may be entered directly into the visitation management system or, alternatively, loaded from an external system such as an OMS or Inmate Telephone System.

[0079] Scheduling data is typically generated only within the visitation management system and consists of visitation events that have not yet occurred (e.g., visitation schedule records) as well as historical visit information (e.g., visitation session records). A visitation schedule record may include links to all involved parties, including inmates, visitors, and correctional staff (if correctional staff are needed). It may also include links to other resources that will be used in the visitation session, such as inmate visitation booths, telephone reservations, data bandwidth guarantee reservations, as well as other metadata about the visitation session.

[0080] A separate logical data store can be used to store visitation session records, which may include a link to the original visitation session reservation (e.g., the visitation schedule record), any recordings or transcripts of the visitation session, and a list of the actual resources used, if they differed from the resources originally reserved for the visitation session. The data is preferably stored in such a way as to facilitate long term storage and easy data reporting capabilities.

[0081] A fourth type of database or data store may include configuration information for the visitation management system itself. As described above, this information may include the connection details of all the various hardware devices connected, such as the video and audio servers, web servers, application servers, and remote devices. The configuration data allows the system to be configured with a variety of different hardware types and manufacturers, enabling the application to run under a variety of different configurations depending on the needs and requirements of a given installation of the visitation management system.

[0082] Additionally, a fifth data store is the Network Attached Storage (NAS) device that may be used to store the actual audio and/or video recordings of visitation sessions. While the NAS may be configured as a relational database, it is preferably configured as a mass storage device, and a pointer or other reference to the location of data stored on the NAS may be stored as part of a record in another database. The NAS is preferably a very large storage device that can be expanded as the need arises to accommodate more live (e.g., on-line) storage of visitation session data. Various settings can be configured as to the lifespan of the data contained within the NAS. An infinite lifespan of data will, of course, require an infinite amount of storage, so such controls are necessary to limit or reduce the size of the NAS required. The capability could also be provided to export visitation session data off the live storage mechanism into permanent off-line storage, such as optical media for archival purposes or for presenting as evidence in court or aiding in the investigation of criminal activity.

[0083] Typically, standard analog inmate telephones are preferably used for audio communication during face to face and remote visitation sessions. They could also be used for video visitation sessions if the selected video communication device does not provide audio services. Unlike most existing visitation systems, the phones in the visitation management system according to the present invention are coupled to the audio server (e.g., the visitation control unit) rather than being directly connected to each other in pairs. In the case of standard analog phones, they will typically be connected to the server via a 66 block or other interface block. The phones, since they are not connected directly together, require the audio server to provide line power and logical switching services. In addition, because of the nature of this connection, the phones can easily be changed in real time to be connected to other devices. This advantageously increases the flexibility of the visitation management system, permitting such configurations as a many-to-many connection between telephones, while also providing a convenient controller (e.g., the visitation control unit).

[0084] Further, it is contemplated that "smart" phones may be used instead of, or in addition to, analog phones, similarly connected over a network to the audio server. The addition of smart phones could facilitate implementation of additional features in the visitation management system, such as authentication of parties to a visitation session as described above (e.g., via biometric identification devices or card readers), payment services (e.g., via credit card readers for `for-pay` visitations), or deposits into an inmate accounting system. Smart phones could also introduce additional interactive services, such as display readouts for elapsed and remaining times, or other information.

[0085] In the case of a typical installation of visitation booths, a pair of phones would be installed in a visitation booth, one on each side of the divider between the inmate and the visitor. Unlike prior art systems, the phones used in the visitation management system of the present invention preferably are not connected for communication until the controlling hardware (e.g., the visitation control unit) and the audio/telephony software makes the connection, preferably after both the inmate and the visitor have authenticated themselves to the visitation session, either using a smart phone as described above or a separate authentication interface. This allows for precise timing of visits, authentication, and the ability to interrupt the visit by a third party.

[0086] Video visitation devices may be connected in a similar manner as phone devices-that is, via a central video server incorporated into the visitation control unit, rather than directly together. One of ordinary skill in the art will recognize that the video devices function similarly to the audio devices. Of course, video conferencing stations can be located in the same building connected via a LAN, coupled across a relatively short distance (e.g., within the same town) via a WAN, or coupled across a much larger distance (e.g., across several states) via an extended WAN. Preferably, the video conferencing devices have the capability to split audio signals from video signals to transmit the two signals to two different devices. This capability is may be used, for example, when connecting from a dedicated video conference station that supports both audio and video to a remote web-cam for video transmission via the Internet and a standard telephone for audio transmission via telephone lines.

[0087] Connected to the application server is a theoretically unlimited number of local client computers. The computers are running a local web browser, such as Microsoft's Internet Explorer, or Mozilla's Firefox. The browsers interpret user interactions and inputs and transmit these interactions and inputs to the application servers, where the interactions and inputs are used to control the audio and video servers. Clients are also able to administer the system, such as setting up resources and viewing, inserting, and deleting inmates or visitation sessions.

[0088] Preferably, the web application also provides mechanisms to view the current state of the system. The "current state of the system" is all active visitation sessions happening within the visitation management system. The amount of data visible to the user may be limited by the user's role. For example, some corrections officers may be able to see only that an inmate is in a visitation session, while other corrections officers could see where the visit is occurring and what type of visitation session it is (e.g., telephonic, remote video, in person). Still other classes of users may be able to listen in on and/or view the visitation session, as well as terminate or extend the visitation session.

[0089] As described above, the visitation management system may be part of a larger application, such as an Offender Management System or Inmate Telephone System, or it may be a standalone application depending on client configuration and modules installed. While the visitation management system is, in some embodiments, a web-based system, it is also contemplated that the functionality of the system can be delivered via a variety of application platforms, including, but not limited to, client/server or rich client.

[0090] Optionally, a facility may provide access to the visitation management system via the Internet or other communication network. In this case, remote clients, typically also running web browsers such as Microsoft's Internet Explorer or Mozilla Firefox, will be able to access the visitation management system as though locally connected to the visitation management system. One potential user of a remote client might be an investigator, not located at the correctional facility, who is interested in all visitation sessions involving a particular inmate. This investigator could be notified automatically by the visitation management system when a visitation session is occurring, and the investigator can log on to the visitation management system from any Internet-connected remote location and device to view and/or listen to the visitation session in progress.

[0091] This remote accessibility provides an advantage over the prior art, where an investigator ordinarily must rely on an alert correctional officer to take note of a visitation session of interest occurring and then notify the investigator of the date, time, booth, inmate, visitor, etc. that was involved in the visitation session. Thereafter, in order to listen to the content of the visitation session, the investigator would be required to search for the recording or transcript--if any--of the visitation session after the fact based on the reported date, time, and location of the visitation session. This method is time consuming, imprecise, error prone, and reactive. On the other hand, the inventive method disclosed herein is fast, accurate, precise, and proactive, which is a considerable improvement over the prior art.

[0092] A special type of limited client access can also be provided to the general public in order to schedule and conduct visitation sessions via a home personal computer. In some embodiments of the invention, the visitor uses a web camera connected to the visitor's home PC, which is connected to the Internet. The individual logs on to the visitation management system via the world wide web to request and schedule visitation sessions, as well as to actually participate in a visitation session. Audio visitation sessions would work in a fashion similar to an inmate telephone call, though the visit is at a predetermined time and is mutually initiated. A video visitation session will use the web camera to transmit video, and the monitor will display video. Audio can be transmitted via a standard phone line or via computer speakers and microphone. These types of visitation sessions will also be able to be monitored, transcribed, and/or controlled from any other client connected to the visitation management system. The maximum number of simultaneous remote visitation sessions is controlled by available bandwidth coming from the facility, as well as the physical number of video or audio devices that exist. As an alternative to visitors utilizing their home PCs to connect to the visitation management system over the Internet, special dedicated terminals may be provided outside the correctional facility, but still within the correctional enterprise's network, to perform the same or similar functions.

[0093] A significant advantage of the visitation management system is its ability to integrate with a variety of other solutions for the corrections market. Services can be provided to integrate directly at the database level, where inmates and other data can be moved seamlessly from one system to another (e.g., between an OMS and the visitation management system). Services can also exist to integrate at a higher level, such as the visitation management system sending messages on events occurring to external systems. For example, a visitation session involving a particular inmate may trigger a message to an outside system, such as an investigator, District Attorney, or court system. Integration may also exist to connect visitation management systems at several correctional facilities to allow for facility to facility visitation sessions.

[0094] FIGS. 5 and 6 are flowcharts of a visitation process using the visitation management system. Scheduling of a visitation session is initiated by either an inmate or by the visitor. The visitation session can be scheduled far in advance, and is made according to the operational rules of the correctional facility. For example, a correctional facility may require that an inmate only has three visitation sessions per month or that only approved visitors may participate in visitation sessions. Regardless of how the visit schedule is created (e.g., whether initiate by the inmate or initiated by the visitor), the operational rules are preferably enforced by the visitation management system to ensure that only compliant visitation sessions are scheduled.

[0095] If desired by the correctional facility, a visitor may initiate the scheduling process. Often times, a visitor must be approved before a visitation session can be scheduled. A visitor can place himself or herself on a waiting list to be approved by the facility if the visitor is not already on the list. Individual combinations of visitors and inmates may be approved. Alternatively, certain visitors may be approved to visit any inmate.

[0096] Once a visitor has an inmate on the visitor's approved inmate list, the visitor can schedule a visitation session by browsing for available days and times. Available visitation sessions may be presented by taking into account the facility's visiting hours, the inmate's schedule, and other facility rules as reflected in the visitation schedule records. An option could also exist to auto-pick the first available time for a visitation session.

[0097] Once a visitation session is scheduled, a record of the visitation session is created in the appropriate database or data store detailing at least the participants in the visit (e.g., the name of the inmate and the name, address, and phone number of the visitor), and, in some embodiments of the invention, the resources that will be required to participate in the visit, such as visitation booths, video devices, or room reservations. The visitor is notified of the confirmed visitation session date and time and may be given a confirmation code that uniquely identifies the scheduled visitation session. Preferably, once created, the scheduled visitation session can be modified by the inmate, the visitor, or an administrative individual. Modifications can include changes in date and/or time, resource changes, or a complete cancellation of the visitation session. Upon any change to the reservation, the visitor must be notified of the change. This can be done via email, postal mail, or via telephone. Likewise, the record of the visitation session may also be updated.

[0098] Once the time arrives for the visitation session, both the inmate and the visitor must be located in the proper place for the visit. Often, the individuals involved in the visitation session, both inmate and visitor, must be positively identified by a corrections officer as well as authenticated to the visitation session as described herein. Generally, it is easy to positively identify an inmate, as inmates are required to have identification on them at all times. The inmate can further be positively identified by requiring a unique telephone or visitation session identification code to be entered into a phone or video device before the visitation session can proceed. Identifying individuals of the general public can be more problematic, but facility rules can be set up to require a state or federally issued identification card to be shown before the visitation session can commence. To further identify the individual, a unique one-time code can be generated that will only allow the visitor to participate in the visitation session the visitor was scheduled for. This helps prevent a common scenario where visitors try to circumvent facility rules to visit someone they are not permitted to visit. Additionally, identification and authentication can also be performed via biometric devices, such as fingerprint readers.

[0099] Once both parties to the visitation session have been positively identified by the system, the visitation session can be said to have started. At this point, the visitation management system will initiate a timer to calculate the elapsed and remaining time of the visitation session.

[0100] During the duration of the visitation session, any individual with the proper rights and privileges can view visitation sessions in progress, listen in on them, or speak to one or both parties to the visitation session. Appropriately credentialed users may also be able to terminate the visitation session or grant additional time to the parties. The visitation session may also be recorded so that individuals can review a recording and/or transcript of the visitation session at a later time.

[0101] Towards the end of the visitation session, participants may be notified of the time remaining in the visitation session. A prompt, such as "You have 3 minutes remaining for this visit" can be played over a telephone or other audio device or overlaid on the screen for a video visit.

[0102] At the conclusion of the visitation session, the visitation management system automatically terminates the logical device connections (e.g., the connection between telephone or video devices) to ensure that no further communication can take place between the inmate and the visitor. The visitation management system then creates a record of the completed visitation session as described herein. Of course, if desired, the system can start a transcription process to convert any recorded audio into searchable text.

[0103] The inmate is escorted back to his or her cell, and the visitor can leave the facility at this point. The visitation booths are now available for use for other visitation sessions.

[0104] After the visit has concluded, the visitation session record becomes available for retrieval at a later point by corrections officers, police officers, investigators, and others who may require access.

[0105] The visitation management system according to the present invention advantageously allows for searching of past visitation sessions via such criteria as inmate name, visitor name, visitation session locations, dates and times, content of the visitation sessions (e.g., topics discussed), and unique visit IDs. Once the visitation management system is provided with the proper search input parameters from a user, the application server queries the database for results matching the user's request. The results will be formatted and presented back to the user, typically via the web browser. The user can then export the details of one or more of the output visitation sessions, or the audio and/or video of the visitation session, if available, to external media, such as CD or DVD. The media can be presented in court, if needed, to serve as evidence.

[0106] Although several embodiments of this invention have been described above with a certain degree of particularity, those skilled in the art could make numerous alterations to the disclosed embodiments without departing from the spirit or scope of this invention. For example, though the present invention has been generally been described in the context of a one-to-one visitation session, one of ordinary skill in the art will appreciate that the principles disclosed herein may also be applied to a one-to-many, many-to-one, or many-to-many visitation session. As such, the term "party," as used herein, should not be construed to refer to only a single individual, but rather is intended to encompass one "side" of a visitation session (e.g., in a visitation session between an inmate and the inmate's family, the inmate is a party and the family is a party).

[0107] It is intended that all matter contained in the above description or shown in the accompanying drawings shall be interpreted as illustrative only and not limiting. Changes in detail or structure may be made without departing from the spirit of the invention as defined in the appended claims.

* * * * *


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed