Abstract:
Systems and methods for predicting an identity of a person are provided. In some aspects, a list of subject activities accessed by a subject person is received. For each of a plurality of stored persons, a stored list of activities accessed with by the stored person is accessed in one or more data repositories. An intersection is calculated between the list of subject activities and the stored list of activities for at least one stored person from the plurality of stored persons. That the subject person is likely to correspond to the at least one stored person from among the plurality of stored persons is predicted, based on the calculated intersection. An indication that the subject person is likely to correspond to the at least one stored person from among the plurality of stored persons is provided.
Abstract:
A system and method for identity verification in a detention environment and for tracking information between individuals in a detention environment with individuals who are not in the detention environment across disparate functional systems.
Abstract:
An exemplary embodiment provides for a computer-implemented method that generates a time-based multivariable secure facility alarm. The method includes selecting a person for alert monitoring, alert monitor criteria pertaining to the person and alarm notification rules. When an occurrence that satisfies the alert monitor criteria are detected, an alarm notification, based upon the alarm notification rules, is generated. The method's alert monitor criteria include at least two events and a time period such that the alert monitor criteria is satisfied when the at least two events occur within the time period. Additionally, at least one event of the at least two events is a non-telephonic event.
Abstract:
An inmate mobile device for communicating with an outsider mobile device is provided. An identity data item, of the device, includes an inmate identifier of an inmate user of the inmate mobile device, a verified data and a restrictions repository. Also included is a media capture module configured to obtain an initial verification data from the inmate user of the inmate mobile device, and an outsider client application configured to receive the initial verification data from the media capture module, determine that the inmate verification data and the inmate verified data match, generate a connection request targeting the outsider mobile device. The connection request includes the inmate identifier of the inmate user and an outsider identifier of an outsider user of the outsider mobile device. The inmate application is also further configured to send the connection request to a server system.
Abstract:
A system and method for identity verification in a detention environment and for tracking information between individuals in a detention environment with individuals who are not in the detention environment across disparate functional systems.
Abstract:
Systems and methods for determining whether a communication session is authorized are provided. In some aspects, a method includes initiating a communication session between a first user and a second user, and obtaining an identity attribute associated with a third user engaged in the communication session. The method also includes determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute. The method also includes determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user.
Abstract:
A system and method for providing telephone services to a secure facility from an external, centralized call platform. An embodiment of the system includes a call processing center that is external to the facility and includes a plurality of computer clusters, and is configured to route communications to and from a router located at the secure facility. Having a majority of the system located outside the facility reduces equipment requirements at each individual facility, improves security and uptime, and provides more efficient management and expansion of the call platform.
Abstract:
Systems and processes are provided for dynamically adjusting and routing signals and communications. According to one aspect, one or more codecs applied to the signals may be switched or changed to manage signal quality. According to another aspect, communications may be re-routed to an intended recipient entirely over the Internet. The systems and processes described herein are especially well suited for use in connection with detention environments.
Abstract:
An exemplary embodiment provides for a method for providing a mobile device-based community corrections supervision system. The method includes receiving an alert, from a remote server, via an enrollee's mobile device, to perform a check-in and receiving acknowledgement of the alert from the enrollee. Additionally, the method then requests the enrollee to recite displayed text and records the enrollee as the displayed text is recited.
Abstract:
An inmate mobile device for communicating with an outsider mobile device is provided. An identity data item, of the device, includes an inmate identifier of an inmate user of the inmate mobile device, a verified data and a restrictions repository. Also included is a media capture module configured to obtain an initial verification data from the inmate user of the inmate mobile device, and an outsider client application configured to receive the initial verification data from the media capture module, determine that the inmate verification data and the inmate verified data match, generate a connection request targeting the outsider mobile device. The connection request includes the inmate identifier of the inmate user and an outsider identifier of an outsider user of the outsider mobile device. The inmate application is also further configured to send the connection request to a server system.