Abstract:
A layered security suite is disclosed wherein multiple security barriers that prevent the unsanctioned use of a mobile device issued by a controlled-environment facility. The security barriers are implemented along multiple points within the communication path between the mobile device with outside networks, including on the mobile device, on wireless access points that serve data traffic for the mobile device, and a firewall device that monitors all data coming to and from the wireless access points. The barriers on the mobile device prevent the user from performing unsanctioned application and settings changes, including both software and hardware components, while the barrier on the wireless access point detects and prevents unauthorized connections between mobile devices and unsanctioned wireless access points. The firewall device discards packets with unsanctioned internet addresses. The layers work in concert to prevent all manner of tampering with the mobile device by members of the controlled- environment facility.
Abstract:
A system and method for multilingual authentication access to a communication system in a controlled environment is disclosed. The system includes a communication subsystem that connects a communication between a first communication device and a second communication device, wherein one of the first communication device or the second communication device is used by the inmate of the correctional system. The system also includes a profile subsystem configured to determine profile information of a party associated with the first communication device. The system further includes an authentication subsystem that provides one or more challenge questions to the first communication device based on the profile information, receives at least one response to the one or more challenge questions from the first communication device, and authorizes connection of the communication between the first communication device and the second communication device based on the at least one response.
Abstract:
The present disclosure provides details of a system for monitoring an offender during a correctional supervisory program. The system includes an offender communication device that transmit and receive communications via a communication and monitoring center. The offender communication device include a smart phone or tablet that obtains identity information including biometric information from an offender before a communication is transmitted or received. The offender communication device also stores data including metadata, metrics, or content of a communication and transmits the stored data to the communication and monitoring center. The communication and monitoring center transmits and receives communications from the offender communication device and another communication device. Further, the communication and monitoring center provides monitoring functionality to record a communication and determine that a location of an offender is in an authorized location based on rules and requirements of the correctional supervisory program.
Abstract:
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
Abstract:
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.
Abstract:
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.
Abstract:
A system and method for initiating a personalized virtual reality session via a virtual reality communication system in a controlled environment is disclosed. The system includes a profile subsystem configured to store an inmate profile of the inmate of the controlled environment. The system also includes a virtual reality subsystem that retrieves the inmate profile associated with the inmate from the profile subsystem, initiates the virtual reality session involving a first communication device used by the inmate of the controlled environment, and personalizes the virtual reality session based on the inmate profile. The system also includes a communication subsystem configured to transmit information related to the virtual reality session to a monitoring system.
Abstract:
An inmate communication system and method of using are described herein for obtaining a lowest session rate. The inmate communication system includes a session boarder controller (SBC) server that analyses data from multiple carriers, historical sessions, and additional factors such as quality of service to determine a lowest rate for the session. The SBC server then routes the session using the carrier that has the determined lowest rate for the session. Further, the SBC server is configured to include both local and location redundancies to avoid interruptions in session service.
Abstract:
An inmate communication system and method of using are described herein for obtaining a lowest session rate. The inmate communication system includes a session boarder controller (SBC) server that analyses data from multiple carriers, historical sessions, and additional factors such as quality of service to determine a lowest rate for the session. The SBC server then routes the session using the carrier that has the determined lowest rate for the session. Further, the SBC server is configured to include both local and location redundancies to avoid interruptions in session service.
Abstract:
A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.