Abstract:
Some embodiments include an electronic device of a first agency configured to establish communications with a second agency via an interoperability communications network. The electronic device can include a processor configured to create an isomorphic structure including a first and a second node element in a hierarchy. The processor can instantiate an interactive visual chart (IVC) for the isomorphic structure that is activated, where the first and second node elements correspond to a first and second communications group identifiers (IDs). The processor can transmit a first invitation including the instantiated IVC for the activated isomorphic structure, and in response to the first invitation being accepted, instantiate a first communications group corresponding to the first communications group ID and a second communications group corresponding to the second communications group ID, where the first member and the second member are peers corresponding to the first node element of the activated isomorphic structure.
Abstract:
The present disclosure provides details of a system and method for a communication device for guards in a controlled environment. The communication device is established based on a wireless infrastructure in the controlled environment, receiving wireless positioning signals to calculate and determine the real-time location of personnel carrying the device. The indoor wireless positioning can be combined with other available positioning methods to provide highly accurate positioning information of the personnel. The communication device detects and records activities of the personnel during a period of time, and is controlled by the control center. The status of personnel is monitored by control center. Meanwhile, the communication device has AR functions that allow physical objects and augmented reality element to be displayed to the personnel at the same time. The personnel can thus have improved awareness of the surrounding environment and can respond to various potential dangers more effectively.
Abstract:
A system and method for initiating a personalized augmented reality session via a augmented reality communication system in a controlled environment is disclosed. The system includes a profile subsystem configured to store an inmate profile of the inmate of the controlled environment. The system also includes a augmented reality subsystem that is configured to receive, from an augmented reality device, data related to a physical environment and retrieves the inmate profile from the profile subsystem. The augmented reality subsystem is further configured to generate an augmented reality element and providing the augmented reality element to the augmented reality device to be displayed within the augmented reality session.
Abstract:
A layered security suite is disclosed wherein multiple security barriers that prevent the unsanctioned use of a mobile device issued by a controlled-environment facility. The security barriers are implemented along multiple points within the communication path between the mobile device with outside networks, including on the mobile device, on wireless access points that serve data traffic for the mobile device, and a firewall device that monitors all data coming to and from the wireless access points. The barriers on the mobile device prevent the user from performing unsanctioned application and settings changes, including both software and hardware components, while the barrier on the wireless access point detects and prevents unauthorized connections between mobile devices and unsanctioned wireless access points. The firewall device discards packets with unsanctioned internet addresses. The layers work in concert to prevent all manner of tampering with the mobile device by members of the controlled- environment facility.
Abstract:
A system and method for multilingual authentication access to a communication system in a controlled environment is disclosed. The system includes a communication subsystem that connects a communication between a first communication device and a second communication device, wherein one of the first communication device or the second communication device is used by the inmate of the correctional system. The system also includes a profile subsystem configured to determine profile information of a party associated with the first communication device. The system further includes an authentication subsystem that provides one or more challenge questions to the first communication device based on the profile information, receives at least one response to the one or more challenge questions from the first communication device, and authorizes connection of the communication between the first communication device and the second communication device based on the at least one response.
Abstract:
The present disclosure provides details of a system for monitoring an offender during a correctional supervisory program. The system includes an offender communication device that transmit and receive communications via a communication and monitoring center. The offender communication device include a smart phone or tablet that obtains identity information including biometric information from an offender before a communication is transmitted or received. The offender communication device also stores data including metadata, metrics, or content of a communication and transmits the stored data to the communication and monitoring center. The communication and monitoring center transmits and receives communications from the offender communication device and another communication device. Further, the communication and monitoring center provides monitoring functionality to record a communication and determine that a location of an offender is in an authorized location based on rules and requirements of the correctional supervisory program.
Abstract:
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
Abstract:
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.
Abstract:
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.
Abstract:
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.