Abstract:
A system for a video sharing service for inmates in correctional facilities is disclosed. The system includes an inmate device of an inmate, a database storing inmate profiles, and a video sharing server configured to receive a registration request from the inmate device for registration of an inmate for the video sharing service, the registration request including user credentials of the inmate, retrieve an inmate profile of the inmate from the database, authenticate the inmate based on the user credentials and the inmate profile, create an account for the inmate for the video sharing service in response to authentication of the inmate, receive an upload request to upload a video from the inmate device, analyze the video for restricted content, and assign a rating to the video based on the analysis.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Abstract:
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.
Abstract:
The present disclosure provides details on an intermediary service bureau (ISB) system which includes an ISB center that acts as an intermediary communication center between communication devices used by correctional facilities and contract providers. The ISB records communications, stores security data, and provides front end processing to facilitate an inmate to communicate with an outside party by way of a contract provider. Further, the ISB provides accounting services for inmates and friends and family that use services provided the contract provider. The contract provider provides security and routing services for the ISB by obtaining data from the ISB and updating data at the ISB according to the communications.
Abstract:
A system for a video sharing service for inmates in correctional facilities is disclosed. The system includes an inmate device of an inmate, a database storing inmate profiles, and a video sharing server configured to receive a registration request from the inmate device for registration of an inmate for the video sharing service, the registration request including user credentials of the inmate, retrieve an inmate profile of the inmate from the database, authenticate the inmate based on the user credentials and the inmate profile, create an account for the inmate for the video sharing service in response to authentication of the inmate, receive an upload request to upload a video from the inmate device, analyze the video for restricted content, and assign a rating to the video based on the analysis.
Abstract:
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
Abstract:
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
Abstract:
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
Abstract:
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.