Abstract:
The subject technology discloses configurations for receiving a request from a user to log into a communications server in which the request includes user credentials. The user is authenticated based on the included user credentials in the request. The user is then permitted to log into the communications server if the user is successfully authenticated. An input selecting a person of interest is received. The subject technology retrieves information associated with the selected person of interest. A dossier of information including the retrieved information associated with the selected person of interest is generated. The subject technology transmits the generated dossier to the user or an indicated recipient.
Abstract:
Systems and methods for predicting an identity of a person are provided. In some aspects, a list of subject activities accessed by a subject person is received. For each of a plurality of stored persons, a stored list of activities accessed with by the stored person is accessed in one or more data repositories. An intersection is calculated between the list of subject activities and the stored list of activities for at least one stored person from the plurality of stored persons. That the subject person is likely to correspond to the at least one stored person from among the plurality of stored persons is predicted, based on the calculated intersection. An indication that the subject person is likely to correspond to the at least one stored person from among the plurality of stored persons is provided.
Abstract:
A system and computer-implemented method for determining a threat level for one or more individuals includes accessing a data structure to obtain aggregated data stored therein, wherein the aggregated data comprises at least one of communication history data or transaction history data for one or more individuals. One or more predetermined metrics are applied to the obtained aggregated data, to determine threat level information for the one or more individuals. The determined threat level information is provided for display.
Abstract:
Systems and methods for determining whether a communication session is authorized are provided. In some aspects, a method includes initiating a communication session between a first user and a second user, and obtaining an identity attribute associated with a third user engaged in the communication session. The method also includes determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute. The method also includes determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user.
Abstract:
An exemplary embodiment provides for a method for providing a mobile device-based community corrections supervision system. The method includes receiving an alert, from a remote server, via an enrollee's mobile device, to perform a check-in and receiving acknowledgement of the alert from the enrollee. Additionally, the method then requests the enrollee to recite displayed text and records the enrollee as the displayed text is recited.
Abstract:
Methods for providing a video communication with a detention environment are provided. In one aspect, a method includes receiving a request from a first user to initiate a video communication with a second user. The video communication uses a shared communications terminal located in a detention environment. The method further includes determining, based on a schedule of the second user, whether the second user is currently available for participating. The method also includes sending a notification to the second user to accept the request when the determination indicates the second user is currently available, and receiving a response to the notification to accept the request. The method further includes initiating the video communication when the response indicates the second user has accepted the request. Either of the users is detained in the detention environment. Systems and machine-readable media are also provided.