Abstract:
Providing video visitation with cognitive and/or dexterity impaired individuals may call for limiting functionality of a personal cognitive and/or dexterity impaired individual communication and/or media device, such as by an operating system of the personal device. The personal device may play audio and video, accept video communications in response to touching of a screen of the personal device, and establish a video communication in response to such touching of the screen. Providing the video visitation may also include receiving a request to initiate a video communication over the personal device with a cognitive and/or dexterity impaired individual, such as may be requested via a visitor communication and/or media device. Whereupon, an audible message may be played by the personal device, indicating the request, and the video communication between the personal device and the visitor device may be established in response to touching of the screen of the personal device.
Abstract:
The present embodiments describe methods and systems for intercepting unauthorized communications in a controlled-environment facility. Unauthorized communications may originate from contraband cell phones, for example. In an embodiment, attempted communications from the contraband communication device are intercepted by the facility communication systems. The attempted communication may or may not be connected or completed, depending upon facility rules, policies, and regulations.
Abstract:
Embodiments of intelligent facility devices for use in controlled facility environments are described. In various embodiments, the intelligent facility devices provide limited or controlled access to data networks for inmates of a controlled facility. An embodiment of a method may include receiving a request for access to a network from a user interface device. The method may also include determining an authorized duration of network access for the user interface device. Additionally, the method may include establishing a temporary network access session between the user interface device and the network for the authorized duration of network access.
Abstract:
Systems and methods for providing remote visitation and other services to non-residents of controlled-environment facilities via display devices. In some embodiments, a method may include performing, by one or more computer systems, receiving a command to initiate a remote visitation session between a resident and a non-resident of a controlled-environment facility, and enabling the non-resident's participation in the remote visitation session, wherein the non-resident participates in the remote visitation session using a display device selected from the group consisting of: a display device set, a projector, and a monitor.
Abstract:
Providing video mail to and from residents of controlled-environment facilities may include presenting a resident or non-resident a user interface and receiving a selection to send video mail. Whereupon, the user may be offered a selection to either upload a video or image or to capture a video or image. A selection by the user is accepted and in response to a selection to upload a video or image file, the user may be presented a file selection interface to enter a video or image filename and/or browse for a video or image file. In response to a selection to capture a video or image, the user may be presented a video or image capture interface for capturing the video or image, such as by using a camera of the host device. The selected or recorded video or image may then be uploaded and presented to the recipient for viewing.
Abstract:
Systems and methods for virtual communication device interfaces are disclosed. In some embodiments, a method may include receiving identification from a resident (e.g., an inmate or prisoner) of a controlled-environment facility (e.g., a jail or prison) and authenticating the resident based upon the identification. The method may also include retrieving, from one or more of a plurality of electronic information sources over a computer network, information associated with the resident. The method may further include subjecting the information to a security protocol, the security protocol configured to identify a first portion of the information that is suitable for disclosure to the resident and a second portion of the information that is unsuitable for disclosure to the resident. The method may then include withholding the second portion of the information from the resident and providing the first portion of the information to the resident.
Abstract:
Systems and methods insert a modulated signal into audio of a controlled-environment facility resident's side of a call, such as by a controlled-environment communication apparatus, or the like. The same or a different controlled-environment communication apparatus, or the like, may detect the same and/or another modulated signal inserted into the audio of the same and/or another controlled-environment facility resident's side of the call in the audio of an other party's side of the call. The same or a different controlled-environment communication apparatus, or the like, may determine if more than one modulated signal is present in the other call party's side of the call and alert an authority that more than one controlled-environment facility resident is taking part in the call.
Abstract:
During a voice call between a resident of a controlled-environment facility and another party, an indication by the resident or the other call party to convert the voice call to a video communication between the resident and the other party may be made. Whereupon, a controlled-environment communications processing system may confirm that both parties agree to convert the voice call to a video communication, and may query a controlled-environment facility administration and management system to confirm that the resident may take part in a video communication. Thereafter, such as in response to confirmation both parties agree to convert the voice call to a video communication and/or that the resident may take part in a video communication, a video communication link may be established between a communication device in use by the resident and a communication device in use by the other party.
Abstract:
Systems and methods for proactively establishing a third-party payment account for services rendered to a resident of a controlled-environment facility (“CEF”). A campaign-triggering event is detected, which triggers contact of prospective third-party (“3rd-party”) payers for a resident of a CEF in order to encourage such prospective 3rd-party payers to establish 3rd-party payment accounts for the resident. In this manner, the prospective 3rd-party payers are proactively contacted prior to an expected future demand for service by the resident. A method thus comprises identifying at least one prospective third-party payer for a resident of a controlled-environment facility, and proactively contacting the identified at least one prospective third-party payer prior to demand for service by the resident to encourage the identified at least one prospective third-party payer to establish a third-party payment account for payment for future service expected for the resident.
Abstract:
Methods and systems for video blurring in a secure environment are described. In one embodiment, the method includes receiving video at a video visitation device in a secure environment, adjusting a depth of field parameter for the video, such that an image of a first object at a first distance from the video visitation device is in focus and an image of a second object at a second distance from the video visitation device is blurred, and providing the video to a viewing device located outside of the secure environment.