Abstract: Methods for providing a video communication with a detention environment are provided. In one aspect, a method includes receiving a request from a first user to initiate a video communication with a second user. The video communication uses a shared communications terminal located in a detention environment. The method further includes determining, based on a schedule of the second user, whether the second user is currently available for participating. The method also includes sending a notification to the second user to accept the request when the determination indicates the second user is currently available, and receiving a response to the notification to accept the request. The method further includes initiating the video communication when the response indicates the second user has accepted the request. Either of the users is detained in the detention environment. Systems and machine-readable media are also provided.
Abstract: An exemplary embodiment provides for a computer-implemented method that generates a time-based multivariable secure facility alarm. The method includes selecting a person for alert monitoring, alert monitor criteria pertaining to the person and alarm notification rules. When an occurrence that satisfies the alert monitor criteria are detected, an alarm notification, based upon the alarm notification rules, is generated. The method's alert monitor criteria include at least two events and a time period such that the alert monitor criteria is satisfied when the at least two events occur within the time period. Additionally, at least one event of the at least two events is a non-telephonic event.
Type:
Application
Filed:
March 14, 2014
Publication date:
September 18, 2014
Applicant:
TELMATE, LLC
Inventors:
Richard Torgersrud, Christopher Ditto, Grant Gongaware
Abstract: In general, in one aspect, the invention relates to a method for reviewing a posting to a secure social network (SSN). The method includes receiving a first media item from a SSN member, evaluating the first media item to identify a first media attribute, and receiving a request to access the first media item from an inmate of a controlled facility. The method further includes retrieving a set of restricted attributes corresponding to the inmate, and determining whether the inmate is allowed to access the media item based on comparing the first media attribute to the set of restricted attributes. When the inmate is allowed to access the media item, granting the inmate access to the media item based on the first determination. When the inmate is not allowed to access the media item, denying the inmate access to the media item based on the first determination.
Abstract: An exemplary embodiment provides for a computer-implemented method for rating telephone calls originating from a secure facility. The method includes receiving a destination number, of a called party, for? a telephone call from the secure facility and determining, based on the destination number, if the called party is pre-verified wherein pre-verified includes at least a billing address of the called party. Next, a rate for the telephone call is then determined based on the billing address of the called party, if the called party is pre-verified.
Abstract: Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal, the request including a first authentication provided by the user, and verifying the first authentication provided by the user. The method also includes identifying the user based on the verified first authentication, determining, based on an actual location of the communications terminal, that the user is restricted from accessing the communications terminal, and requesting a second authentication from the user when the user is attempting to access the communications terminal from an unauthorized or undocumented location. The method further includes receiving the second authentication from the user, verifying the second authentication provided by the user, and providing access to the user to the communications terminal based on the verified second authentication.
Type:
Grant
Filed:
March 15, 2013
Date of Patent:
June 24, 2014
Assignee:
Telmate, LLC
Inventors:
Grant Gongaware, Nick Garcia, Richard Torgersrud, Kevin Krauss
Abstract: A system and method of visually representing relationships, such as transactions, communications, associations or other commonalities, between individuals in detention environments (such as prisons or detention facilities) with one or more individuals within or external to such detention environments.
Type:
Application
Filed:
May 11, 2012
Publication date:
November 14, 2013
Applicant:
Telmate, LLC
Inventors:
Richard Torgersrud, Kevin O'Neil, Christopher Ditto, Grant Gongaware, Kevin E. Krauss, Erik Petersen
Abstract: A system and method for preventing or facilitating communications between individuals who reside in detention environments (such as e.g., prisons or correctional facilities) and individuals who are not in such detention environments using an automated authentication or verification.
Type:
Application
Filed:
September 4, 2012
Publication date:
March 7, 2013
Applicant:
Telmate LLC
Inventors:
Grant Gongaware, Kevin O'Neil, Richard Torgersrud, Nicolas A. Garcia, Morgan J. Collins, Kevin E. Krauss