摘要:
A system and method for providing telephone services to a secure facility from an external, centralized call platform. An embodiment of the system includes a call processing center that is external to the facility and includes a plurality of computer clusters, and is configured to route communications to and from a router located at the secure facility. Having a majority of the system located outside the facility reduces equipment requirements at each individual facility, improves security and uptime, and provides more efficient management and expansion of the call platform.
摘要:
A method for controlling a call in a first controlled facility includes connecting an inmate in the first controlled facility to the call when each party of the call is verified, testing incoming audio on the call to detect a controlled facility tone from a second controlled facility, and transmitting a notification of a violation by the inmate when the controlled facility tone is detected in the incoming audio.
摘要:
A system and method for preventing or facilitating communications between individuals who reside in detention environments (such as e.g., prisons or correctional facilities) and individuals who are not in such detention environments using an automated authentication or verification.
摘要:
An exemplary embodiment provides for a computer-implemented method for rating telephone calls originating from a secure facility. The method includes receiving a destination number, of a called party, for a telephone call from the secure facility and determining, based on the destination number, if the called party is pre-verified wherein pre-verified includes at least a billing address of the called party. Next, a rate for the telephone call is then determined based on the billing address of the called party, if the called party is pre-verified.
摘要:
The subject technology discloses configurations for receiving a request from a user to log into a communications server in which the request includes user credentials The user is authenticated based on the included user credentials in the request. The user is then permitted to log into the communications server if the user is successfully authenticated. An input selecting a person of interest is received. The subject technology retrieves information associated with the selected person of interest. A dossier of information including the retrieved information associated with the selected person of interest is generated. The subject technology transmits the generated dossier to the user or an indicated recipient.
摘要:
A method for financing a mobile device for an inmate involves receiving a plurality of mobile device rules comprising limitations on usage of the mobile device by the inmate within a controlled facility, receiving the mobile device, and installing, on the mobile device, a mobile application, wherein the mobile application conforms the mobile device to the plurality of mobile device rules. The method also involves receiving a payment for the mobile device, and executing, by the mobile device, the mobile application.
摘要:
An exemplary embodiment provides for a computer-implemented method that generates a time-based multivariable secure facility alarm. The method includes selecting a person for alert monitoring, alert monitor criteria pertaining to the person and alarm notification rules. When an occurrence that satisfies the alert monitor criteria are detected, an alarm notification, based upon the alarm notification rules, is generated. The method's alert monitor criteria include at least two events and a time period such that the alert monitor criteria is satisfied when the at least two events occur within the time period. Additionally, at least one event of the at least two events is a non-telephonic event.
摘要:
Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal, the request including a first authentication provided by the user, and verifying the first authentication provided by the user. The method also includes identifying the user based on the verified first authentication, determining, based on an actual location of the communications terminal, that the user is restricted from accessing the communications terminal, and requesting a second authentication from the user when the user is attempting to access the communications terminal from an unauthorized or undocumented location. The method further includes receiving the second authentication from the user, verifying the second authentication provided by the user, and providing access to the user to the communications terminal based on the verified second authentication. Systems, terminals, and machine-readable media are also provided.
摘要:
A system and method of visually representing relationships, such as transactions, communications, associations or other commonalities, between individuals in detention environments (such as prisons or detention facilities) with one or more individuals within or external to such detention environments.
摘要:
A system and method for preventing or facilitating communications between individuals who reside in detention environments (such as e.g., prisons or correctional facilities) and individuals who are not in such detention environments using an automated authentication or verification.