CORRECTIONAL POSTAL MAIL CONTRABAND ELIMINATION SYSTEM

- HLFIP HOLDING, INC.

A method and system for eliminating contraband in postal mail at a correctional facility comprising a central processing facility and a network of inmate email kiosks and correctional institution staff review stations. The postal mail utilizes scanning stations to create electronic versions of the mail and associates various information about the sender, recipient, mail contents, and institution into a format that is easily reviewable and provides tracking data. The scanned mail may then be made available to the intended inmate and institution staff. Institution staff may also then access the associated information and tracking data.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History
Description

This continuing application claims priority to prior U.S. Non-provisional application Ser. No. 15/153,171, filed on May 12, 2016, U.S. Provisional Application No. 62/286,046, filed on Jan. 22, 2016, and U.S. Provisional Application No. 62/160,054, filed on Mar. 12, 2015, each of which is hereby incorporated by reference in its entirety.

FIELD OF THE INVENTION

The presently disclosed invention relates in general to the field of postal mail delivery, and in particular, to a system and method for providing copies of postal mail to individuals incarcerated in a correctional facility in a safe manner in order to ensure the elimination of any contraband and reduce administrative costs for the correctional facility.

BACKGROUND

Methods for the delivery of postal mail and electronic mail to inmates are known in the art. Procedures or methods for dispensing mail via traditional postal systems have been described in U.S. Patent No. Systems for using electronic messaging in institutions. such as prisons, have been described in U.S. Patent No. Such publications are incorporated herein by Such procedures, however, do not adequately' address the conversion of postal mail to electronic mail for the elimination of any contraband being delivered to prison inmates. Embodiments of the presently disclosed invention address such limitations, infer alia, by providing an improved system and method for the elimination of contraband in correctional postal mail via the delivery of electronic copies of such postal mail.

SUMMARY

The present invention provides a system and method for eliminating contraband in postal mail for a correctional facility. Staff at a central facility may receive postal mail for inmates. Upon receipt of the mail, the postal mail may be reviewed for information. Such information may be addressee or recipient inmate information, sender information, institution information, or any other information discoverable upon review or analysis of the postal mail. Additionally, upon receipt of the postal mail, an analysis or screening of the mail for contraband may optionally be performed. Once information is retrieved from the mail, the information may be associated with the intended recipient inmate, such as through an inmate email account. The postal mail may then be scanned to create an electronic copy. The electronic copy may be stored, such as on a server which may be accessed over a network. The electronic copy may include any and all information obtained from the postal mail and additional information such as whether contraband was found in the postal mail. Other tracking data, such as how many times a specific sender has sent mail to a specific inmate may also be associated with the electronic copy, such as through a log or database.

Once the electronic record of the postal mail, which may include the electronic copy and any associated information, is stored on a server, the electronic record may be viewed by institution staff. Upon review, the staff may determine if the electronic copy of the postal mail may be accessed by the intended recipient inmate. If access is permitted, the electronic record may be made available to the intended recipient inmate via an email kiosk, which may be a fixed or a portable device. Additional information may be associated with the electronic record, such as date and time of each access by the inmate or institution staff.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other objects, features, and advantages of the invention will be apparent from the following more particular description of embodiments as illustrated in the accompanying drawings in which reference characters refer to the same parts throughout the various views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating principles of the invention.

FIG. 1 illustrates a block diagram of the manual method of delivering postal mail to inmates in a correctional institution;

FIG. 2 illustrates a block diagram of an embodiment of a method and system in accordance with certain embodiments of the invention, in which postal mail processing occurs within a correctional facility;

FIG. 3 illustrates a block diagram of an embodiment of a method and system in accordance with certain embodiments of the invention, in which at least a portion of postal mail processing occurs at a central mail processing center capable of serving a plurality of correctional facilities;

FIG. 4 is a flowchart showing certain steps that may conveniently be carried out in the mail processing centers illustrated in FIGS. 2 and 3 in connection with certain embodiments of methods and systems of the invention;

FIG. 5 illustrates a display that may conveniently be used in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 6 illustrates a display that may conveniently be used in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 7 illustrates a display that may conveniently be used in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 8 illustrates a display that may conveniently be used in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 9 illustrates a display that may conveniently be used in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 10 depicts a scanned item of postal mail that may conveniently be displayed in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 11 is a display that may conveniently be used in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 12 illustrates a display that may conveniently be used in connection with steps illustrated in FIG. 4 and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 13 illustrates a display that may conveniently be used by inmates in a correctional facility and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 14 illustrates a second display that may conveniently be used by inmates in a correctional facility and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 15 illustrates a third display that may conveniently be used by inmates in a correctional facility to display scanned postal mail and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 16 illustrates a display that may conveniently be used by staff in a correctional facility or investigators and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 17 illustrates a second display that may conveniently be used by staff in a correctional institution or investigators and suitable for use in with certain embodiments of methods and systems according to the present invention;

FIG. 18 is schematic representation of an architecture suitable for use with embodiments of the system and method according to the present invention consistent with FIG. 3.

DETAILED DESCRIPTION OF THE EMBODIMENTS

Reference will now be made in detail to the embodiments of the presently disclosed invention, features of which are illustrated in the accompanying drawings.

Postal mail is a federal right to U.S. citizens incarcerated in a correctional agency within the United States. Traditionally, postal mail sent to an incarcerated individual is searched by hand and may be scanned through a contraband detection machine to detect for drugs, weapons, chemicals, and poison, and then hand delivered to the inmate. Stamps and stickers may also be removed as a further security measure. Either the inspected mail or a photocopy (for added security) is then delivered by facility personnel to the inmate. In some correctional agencies, postal mail sent to the facility is limited to only postcards in an effort to reduce administrative cost and handling time.

This manual process for processing postal mail is illustrated in FIG. 1 magazines 12, Attorney Mail 14, and other Postal Mail 10 (jointly “mail”) are received at correctional facility 20, and sent to an in-facility manual mail processing center 22 Facility mail processing staff 30 then review and process the mail to verify recipient inmates, identify contraband and illicit content, etc. Such contraband or illicit content may include pornography, dangerous objects or criminal communication. Reviewed mail determined to be appropriate for delivery is then delivered to recipient inmates 34 by facility delivery staff 32 (which may or may not be the same persons as facility mail processing staff 30).

Postal mail contraband sent to correctional facilities is a daily problem and security risk that every correctional agency must combat. Many manual processes such as those described in connection with FIG. 1 have been used to reduce the chances of contraband reaching the recipient inmates. These processes are labor intensive, expensive and time consuming for the staff of the correctional facility and they delay mail delivery to the recipient. Although these steps help reduce the problem of the transmittal of contraband, they do not entirely eliminate contraband. Common practice to combat contraband in the postal mail including: hand searching each piece of mail; testing or scanning mail for drugs, chemicals, and poison; removing stamps, photos, and stickers; and making photocopies of mail to be hand delivered to an inmate instead of the original item that was mailed to facility.

One objective of the presently disclosed system and method is an application in which such problems are reduced by, where possible, delivering electronic copies to inmates as opposed to physical copies. In such an embodiment, contraband cannot reach the inmate because an electronic copy is made of the postal mail and that electronic copy transmitted to the inmate for viewing on a kiosk or portable device. The possibility of any contraband reaching the inmate is thereby eliminated for all practical purposes. In addition, because physical copies are not provided to the inmate, the processing required when postal mail 10 is received (such as removing stamps or analyzing for substances incorporated into the paper) can be reduced. A further benefit is that an electronic form of the postal mail is delivered electronically to the inmate without the correctional institution staff having to hand deliver the mail. Accordingly, in addition to reducing contraband risk, certain embodiments may include the benefits of reducing manual labor, reducing staff and inmate interaction, and reducing foot traffic inside the facility, all of which can be benefits in a correctional environment.

Furthermore, often with postal mail, there is no record of the piece of mail once it has been delivered to the inmate, unless a copy was made and saved by the prison's staff. Where copies are made, such copies are most often physical copies and are hard to search or for outside investigators to access. In certain embodiments of the present invention security is enhanced because every piece of postal mail 10 can be documented, saved electronically and in many cases, made searchable for further review by prison staff and detectives, and may be linked to the specific inmate to whom the postal mail was addressed. Further, additional information, such as sender information, may be associated with the with the electronically saved mail. Specific sender information may then be linked or associated with individual inmates or groups of inmates. The association of sender information with specific inmates may allow for the discovery of trends or patterns of mail delivery to specific inmates, or by specific senders, or even to specific institutions or groups of institutions. Mail may thus be reviewed under an inmate's postal mail history on the system, in accordance with some embodiments. Mail items may be also reviewed under a sender's postal mail history on the system, in accordance with some embodiments.

It will also be understood that, when physical mail is to be delivered, the delivery is most often to the facility where the inmate is housed. This means that each such facility must separately implement the receiving and distribution procedures discussed above, often using institution staff that have other important responsibilities. Embodiments of the present invention allow multiple facilities to receive postal mail at a central location, thereby offering further opportunities for cost savings and security enhancement. Only magazines 12 and attorney mail 14 need to be physically delivered to the facility. Magazines 12 and attorney mail 14 typically require less processing, in part, because they are sent to the inmate by third parties other than friends, business associates and family members, and who are unlikely to attempt to deliver contraband to the inmate. The result is that only a smaller amount of comparatively low-risk mail need be processed by the institution staff, with the higher-volume, higher-risk postal mail 10 being processed by a centralized receiving center.

As is noted above, an advantage of some embodiments for the present invention may be a practically complete elimination of contraband in postal mail for the corrections industry. Another benefit may be a system embodiment that delivers postal mail to inmates electronically, without staff having to hand deliver postal mail. A further benefit may be improved record keeping. Certain embodiments may thus improve agency security, reduce manual labor, and increase postal mail efficiency in correctional agencies.

While an inmate email system for inmates housed by correctional agencies can provide inmates a contraband-free written communication alternative to postal mail, such email systems do not combat contraband in postal mail. Even if email systems are provided, postal mail must also be allowed as a federal right to inmates. The introduction of email systems may have helped reduce postal mail volume being sent to correctional agencies, allowing the agency to focus on a smaller volume of postal mail that does come into the facility. However, email systems have not replaced postal mail and have not otherwise directly impacted postal mail handling. Conventional email systems were merely introduced as an alternative to postal mail and were not meant to stop contraband in postal mail. Postal mail is thus still reaching inmates and still creates contraband issues for facilities. Because contraband is being sent in that postal mail, it is impossible to completely eliminate contraband reaching the inmate because not all of the transmitted contraband can be detected (for example, lacing letters with drugs or poison, or finding previously undiscovered ways of hiding hard-to-detect weapons in postal mail). Even with the current methods and technology in place, some mail with contraband may still pass through detection by both humans and technology.

In correctional facilities- inmate communications with the outside world are intentionally limited. Postal mail is the oldest form of communication in the corrections industry. Contraband being sent through postal mail has thus been a problem since the beginning of corrections hundreds of years ago, yet the same basic process is still used today, and federal law has created a right for inmates to receive postal mail. Postal mail is sent into a correctional facility, and even though some inspection processes are in place, that postal mail traditionally gets hand delivered to the inmate the same way it was hundreds of years ago. Since the ability to receive postal mail is required by law and the corrections environment promotes limited controlled communication, any change as to how postal mail reaches inmates has been discouraged. As payment for the postal mail has already been made to the postal service, there has been no financial incentive for anyone to invest money or technology to improve the way inmates received their postal mail.

In order for inmates to be able to receive electronic copies of their postal mail, an investment is required to implement embodiments of the presently disclosed system and method. Since inmates may not be charged additional money for delivery of postal mail over and above the postal service fee, there has been no financial incentive for facility to invest this capital. The labor cost savings and the benefit of essentially eliminating the chance of any contraband reaching inmates through the mail, can justify an investment and can also result in further advantages such as reducing the carbon footprint of mail improving security throughout the country, reducing recidivism, lowering the cost of incarceration per inmate, and lowering the burden on tax payers across the country. Costs may still be seen as prohibitive if it is necessary to implement an electronic infrastructure to deliver scanned mail to inmates. However, in facilities where kiosks or portable devices are already in use by inmates for the purpose of providing other paid services (for example email or video visitation), the cost of implementing embodiments of the present invention are reduced and may also be offset by other revenue streams for the facility, resulting from other services delivered through such devices. In certain embodiments of methods according to the present disclosure, processing of postal mail 10 by a third-party facility may be at little or no cost to the facility by a third-party kiosk or email vendor.

Embodiments of the presently disclosed invention thus enable postal mail that is sent to correctional facilities to be reduced to an electronic copy and delivered to the inmate electronically, thereby essentially eliminating the chance that mailed contraband will reach the inmate. FIG. 2 illustrates an embodiment according to the present disclosure that is implemented within a correctional facility 20, but using a remote or cloud-based data center 100. The postal mail 10 is received into in-facility manual mail processing center 200. Comparatively lower-risk magazines 12 and attorney mail 14 are processed and delivered by manual delivery. For other postal mail 103 the contents and the envelope may be loaded into a scanner station 210. In some alternative embodiments, where some institutions may only allow post cards to be sent to inmates, the post cards may be loaded into a scanner station. Scanner station 210 may comprise a computer or portable device connected to a scanner, or a camera, and capable of creating an electronic image of the postal mail 10, thereby reducing the postal mail to an electronic form. In some embodiments, the electronic form may come in multiple parts. For example, an envelope may be scanned thereby capturing the sender information and the recipient inmate information. The contents of the envelope may then be scanned capturing the content information. The recipient inmate information may be used to associate the electronic image or version to an inmate email account or other inmate designation. Additionally, this information may be logged or stored. Additional information such as the date received, date scanned, or other related information may logged as well. High speed scanning technology may be used for high volume applications. The scanned image may be uploaded into a software system, and the software system may prompt the user (e.g. correctional agency staff) either before or after the scanning is performed for the inmate's identification. This may be the inmate's prison number, the inmate's name, or some other unique identifier. The inmate identifier may be entered by the facility staff 32 (e.g., by selection from a presented list), and the software system may then retrieve the inmate's account based on the identifier that was entered into the system. The staff or user may then confirm that the postal mail, in electronic form, has been sent to the correct inmate identified in the software system which may conveniently be implemented in a local, remote, or cloud-based data center 100. The staff may also enter the postal mail sender information. In certain embodiments, redaction of obscene material may also be performed at this stage either electronically or prior to scanning. After scanning, the original may either be stored or destroyed according to the policies of the correctional facility 20 and any legal requirements.

Magazines 12 and attorney mail 14, which must be delivered to inmates 34 in physical form, (after any required processing or logging) are provided to other institution staff 32 for deliver to inmate 34. Postal mail 10, however, is delivered to inmates 34 through computer terminal 4003 which may conveniently be a kiosk, such as is used to deliver email to inmates, a portable device such as a tablet or MP4 player, or a worn device used by inmates, or any other electronic device with a display capability and a network connection capability, by the system in data center 100. Where other institution staff 32 need to monitor electronically delivered postal mail for investigative or other appropriate reasons, workstations, computers, portable devices 500 can access an institution staff interface implemented by the system hosted in data center 100.

Other intermediate steps may also take place in certain embodiments. In certain embodiments, once the mail processing staff 30 confirms the correct inmate as the recipient of the particular postal mail 103 and the staff submits the electronic form of the postal mail to the inmate's account, an electronic copy of the postal mail may be delivered electronically to the inmate's postal mail account via a computer terminal 400 (e.g. a kiosk within the correctional facility) wired or wireless, or via a computer terminal (not illustrated) located inside the inmate's housing unit 3 or on a wireless mobile device (e.g. a handheld tablet, smartphone, laptop, MP4 player, or wom device) not illustrated. The inmate may log into his or her account by access through the above mentioned devices in order to view the electronic copy of the postal mail 10, or may download a copy on a mobile device in order to view it, in the same manner that inmate email is delivered today, such as through an inmate email account, except that the delivery may be an image of the original (in a format such as PDF) instead of a text-only message. Optical character recognition of the scanned message (either as part of scanning or later) may be used to make the images text-searchable by institution staff, investigators or inmate* depending on the needs of the facility. Where handwriting is not susceptible to optical character recognition manual transcription may be used either before or after the scanned image is made available to inmate 34.

All postal mail 10 may be memorialized in the system for each inmate, in accordance with certain embodiments. Mail processing staff 30 may upload and hold postal mail for review before it is released and thereby made accessible to the inmate. The staff 30 may reject postal mail so the inmate cannot view the postal mail even after it has been uploaded to the system. In some embodiments, the processing staff 30 and institution staff 32 may review, search, print, forward, add notes, flag, delete, each postal mail that has been uploaded to the system for each inmates account. Whereas attorney mail 14 may be delivered in physical form, without review by processing staff 30 or institution staff 32 to preserve confidentiality, other procedures may also be put in place for communications from legal counsel to ensure such communications remain private such as automated opening and scanning and flagging of the messages so that staff cannot access the images of them. Additionally, the electronic copies of certain postal mail may be flagged based on sender information or the discovery of contraband. For example, if a specific sender has repeatedly sent postal mail which contained contraband, any postal mail from that sender may be indicated for review by a flagging of the scanned copies. It is understood that a correctional institution may desire to flag scanned version of postal mail for any number of reasons to further tracking, investigation and review and all of these reasons are considered within the scope of the exemplary embodiments disclosed.

Referring to FIG. 3, embodiments according to the present disclosure my utilize a single mail processing center 200 that receives postal mail 10 for one correctional facility 20 or a plurality of correctional facilities 20, 2(Y, 20″. In such embodiments, institution staff 32 may receive attorney mail 14 and magazines 12 for physical delivery to inmates 34 with limited review and pre-processing. Other postal mail 10 would be received by outside mail processing center 200% in which processing staff 30 would receive and process postal mail 10, perhaps for a plurality of correctional facilities. Scanning station(s) 2 IOC would be used to create scanned images of postal mail 10 and upload them to a system in data center 1003 which may be physically within mail processing center 200′, or remote from it, or cloud based. Certain steps of the processing within mail processing center 200! are illustrated in FIG. 4, with example displays shown in FIGS. 5-11.

As illustrated in step I of FIG. 4, and via the sample display in FIG. 5, when a piece of postal mail 10 is received, it is determined if the addressee is an inmate capable of receiving scanned mail. For example, a directory of inmate email accounts may be referenced. If the addressee is not capable of receiving o mail, for example because the inmate was released or transferred prior to the date of receipt the mail is marked “return to sender” and is deposited in outgoing mail as is shown in step 1b. In some embodiments, the mail may be scanned and put into the system even if the inmate has been released. In that case, the system would convert that mail to the inmate outside of the correctional facility. In certain exemplary embodiments, the inmate may be able to log into his inmate email account from outside of the correctional facility to access email and scanned postal mail. In even further embodiments, scanned postal mail may be forwarded to third parties, such as family members. For example, where an inmate has been released for a period of time, and has left no forwarding information, the scanned postal mail may be forwarded to an attorney of record or next of kin. As is shown in FIG. 5, identifying the recipient may be accomplished by searching a name or an identification number provided by the correctional facility and previously communicated to the sender of the postal mail per facility policies. Searches may be within a facility or across all facilities. In certain embodiments, the system housed in data center 100 may allow a given inmate to have aliases. In other embodiments, policies and procedures may require the use of a standard name or the marking of the envelope with a unique identification number. Where one or more matching inmates are found, the appropriate recipient may be selected from a list as shown in FIG. 6. Selection may occur by a variety of means including by selecting the name (displayed as a hyperlink as illustrated) or through buttons, touch selection, or other selecting from a drop down or list box.

In step 2 of FIG. 4, and as shown in the example display in FIG. 7, the sender's name may be entered for tracking purposes. As illustrated, a list of prior senders may be displayed, any of which may be selected. Where the sender cannot be identified, or has not previously been entered into the system, the name and/or location, and any other information deemed appropriate for tracking, of the sender may be entered at this stage, after which the “proceed” control can be used to move to the next step.

As shown in step 3 of FIG. 4 and in the example display in FIG. 8 the postal mail can then be prepared for scanning. Preparation may involve opening the envelope, initial review for obscene material, and trimming to a size suitable for scanning.

As shown in step 4 of FIG. 4 and illustrated in the example display in FIG. 9, scanning may then be accomplished. This can be done in any variety of ways including by placing a scan control on the screen (not illustrated), or by utilizing the interface of the scanner itself (not illustrated). The scanner may be a network device or may be connected to the workstation being used. The scanner will then assign a unique identifier to the file scanned (preferably a GUID to avoid duplication among scanners), and present it as pdf file. Clicking a “preview scan” link or similar control can cause a copy of the scanned image (as shown in FIG. 10) to be displayed. This allows the worker to associate the image with the inmates account (step 5) and review the scanned copy for legibility (step 6). As is shown in the sample display illustrated in FIGS. 11 and 12, if legibility is not sufficient, a new scan can be performed either replacing or supplementing the original scan, as required by facility policies.

Once the scan is deemed acceptable further review and processing may occur, as shown in step 7 of FIG. 4. Such processing may involve one or more of redacting obscene content, manually flagging the communication for investigation, optical character recognition (to enable searching), printing to create a physical copy, forwarding to an investigative agency, or adding notes or comments for later review by investigators or institution staff or the inmate. Once the review process is complete, the scanned image is made available to the inmate as is further described below or is held for further review and release according to facility policies. Where electronic searching is desired by the facility, and optical character recognition fails to adequately read the contents, the scanned image may be manually transcribed (step 8), with a text version being associated with the scanned image by the system. Transcription and optical character recognition are optional and may be used not at all on particular messages flagged for transcription in step 73 or for all messages not amenable to optical character recognition.

FIG. 13 illustrates an example display that an inmate 34 would see on a computer terminal 400 when a scanned image of postal mail 10 is delivered electronically. In the illustrated embodiment, postal mail delivery is combined with other features of an inmate kiosk including email capability, photo delivery, requests to facility administration, grievances, etc. When Postal Mail is selected, a list of scanned postal mail 10 is provided, with icons and type face being used to indicate if the message has been read. As illustrated, the control View Postal Mail Addresses is provided to enable the inmate 34 to see the addresses to which postal mail may be sent. Activating that control, in the illustrated embodiment, takes the inmate to the example display illustrated in FIG. 14. As has been noted above, certain postal mail (including attorney mail 14 magazines 12, books (not illustrated) and other approved parcels (not illustrated)) may not be amenable to electronic delivery and, therefore, are more conveniently sent to the facility in which inmate 34 is housed. The illustrated example screen provides instructions explaining the addresses to which different types of postal mail should be sent according to facility policy.

Referring again to FIG. 13, if an item of postal mail 10 is selected by selecting the hyperlink in the “From” column or the icon next to the hyperlink. the scanned version of postal mail 10 can be displayed to the inmate 34 (with redactions if applicable). FIG. 16 illustrates an example display showing a scanned version of postal mail 10.

In a controlled environment such as a correctional facility, postal mail is subject to review and analysis by institution staff and, sometimes, investigative personnel. FIG. 16 shows an example display of an administrative interface intended for use by institution staff or investigators. As illustrated, the interface is integrated with the facility administrative interface for email and other inmate communication actions accessible to inmates through computer terminal 400. Selecting “Postal Mail” invokes a search interface that allows personnel to search for particular messages. Searching may conveniently be enabled by keyword (for messages that have undergone optical character recognition or transcription), name, date, recipient, sender, or any other field associated with messages. The more detail entered when the postal mail 10 is initially processed, the more search options can be presented. Flags are used to call attention to particular messages. Flags may be set manually (using predefined categories) by institution staff 32 or mail processing staff 30. Flags may also be set automatically based on analysis of the message and its metadata. Examples of automatic flagging could include flagging messages from predefined individuals or locations (e.g. cities or countries or addresses) and flagging messages based on keywords in the message body. By clicking on a message, the details of the message are shown, as illustrated on FIG. 17. In addition to the content of the message and the scanned image being made available, staff may also manually flag or reassign a message to a different inmate. Erroneous messages can also be deleted. By accessing the link to the scanned image, the message can also be printed or forwarded to another person. Each function could, in certain embodiments. also be accessed through controls made available on the message detail display. Status information, such as whether the message has been reviewed, and what flags have been attached, may also be shown, for example, on the right-hand side of the display. In certain embodiments, each step of accessing, reviewing, and updating each message can be logged in database tables or log files for auditing purposes.

FIG. 18 illustrates a block diagram of an embodiment for postal mail 10 coming into correctional facility 20 through mail processing center 200 or 200′. Receiving facility terminal(s) 910 may be computers, tablets, or dumb terminals for use by facility personnel. Receiving facility terminal(s) 910 are connected electronically to scanner(s) 920. Scanner(s) 920 may be connected to individual receiving facility terminal(s) 910 as shown or may be on a common network (not illustrated). In certain embodiments scanner(s) 920 may be in the correctional facility and in others they may be in a remote location such as a central processing facility. In other embodiments, one or more high speed scanners (not illustrated) may be shared by multiple receiving facility terminals 910.

Receiving facility terminal(s) 910 are connected by a local area or wide area network (not shown) to one or more server 930 in a data center 100. Preferably, server 930 provides a web server that delivers the screens used by receiving facility terminal(s) 1 it should be noted that in FIGS. 2 and 3, scanner station 210, 21(Y are referenced. In FIG. 18, Receiving Facility Terminal 910 and Scanner 920 are referenced separately. It will be understood that scanner station 210, 210′ shown in FIGS. 2 and 3 comprise the combination of Receiving Facility Terminal 910 and Scanner 920 illustrated in FIG. 18. Similarly, whereas FIGS. 2 and 3 refer to computer terminal 400 (which may be a variety of electronic devices used by an inmate), in the system embodiment illustrated in FIG. 18, Inmate Kiosk 950 and inmate Portable Device 960 (both of which are examples of computer terminal 400 shown in FIGS. 2 and 3) are shown separately for exemplary and discussion purposes.

910 as web pages. which may include active controls capable of controlling scanner(s) 920. Server 930 preferably is connected to database 940 which may contain records of the inmates in the correctional facility, records of postal mail processing and viewing, text indexes of electronic messages, and records of the personnel responsible for such processing. If the postal mail system is integrated with an electronic mail, video visitation or other system, a common database 940 can be used to support all features. Where electronic messages are scanned using optical character recognition, such scanning may occur on scanner(s) 920, receiving facility terminal(s) 910 or server 930. Alternatively, receiving facility terminals 910, or other remote terminals (not illustrated) may be used to allow entering of transcribed messages. As will be understood by those of skill in the art, server 930 and database 940 may be on one or more separate servers, may be on a single server, or may be on one or more of receiving facility terminal(s) 910.

Inmate kiosk(s) 950 and inmate portable device(s) 960 are electronically connected to server 930 through a local area network or wide area network, either of which may be wired or wireless. It will be understood that inmate kiosk(s) 950 and inmate portable device(s) 960 are examples of computer terminals 400 described above. Inmate kiosk(s) 950 may conveniently be the same kiosk(s) used for purposes such as email delivery, commissary ordering, video visitation, and/or other services such as the SmartKiosk is offered by Smart Communications. Alternatively, inmate kiosks 950 may be kiosks dedicated to delivery of electronic images of postal mail.

Inmate portable device(s) 960 may be portable tablets, music players, smart phones, or other portable devices used by inmates and capable of communicating with server 930 through a network connection. In certain embodiments (not illustrated) inmate portable device(s) 960 may include the ability to download messages from server 930 while connected to a network, for later viewing when not connected to the network. [00541 As discussed above, server 930 may conveniently deliver the interface to inmate kiosk(s) 950 and/or inmate portable device(s) 960 as web pages, thereby minimizing the need for custom client software. As coordination and viewing is controlled by server 930 in such embodiments, server 930 may monitor and log such accesses (either in log files or database tables as appropriate).

It will be understood by those of skill in the art that either inmate kiosk(s) 950 or inmate portable device(s) 960, or both, may be used in a single installation and that the number of each may be one or many depending on available network bandwidth and the capabilities of server 930. Some installations may thus only have a single inmate kiosk 950 or a single inmate portable device 960, while other installations have one or more of each.

As has been discussed above, there are times when it may be necessary for institution staff or outside investigators to have access to processed postal mail. In institution staff/investigator terminal(s) 500 (within the correctional facility) and outside institution staff/investigator terminals 500′ can be used for this purpose. Such terminals may be computers, laptops, dumb terminals, virtual machines, kiosks or any other electronic device with a display and the ability to connect to server 930 through a network. Login credentials and other user identification means known in the industry (e.g. 2-step authentication biometrics, hardware identification, electronic key devices and the like) may be used to identify authorized staff and investigators and enhance system security.

While the invention has been particularly shown and described with reference to an embodiment thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.

Claims

1. A computer program product for processing communication that is sent to an inmate at a corrections facility, the computer program product comprising a non-transitory computer readable storage medium having instructions encoded thereon that, when executed by a processor, cause the processor to:

receive a digital representation of postal mail that is sent to an inmate at a corrections facility;
store the digital representation of the postal mail in a database;
receive an identification of the inmate who is an intended recipient of the postal mail;
identify an inmate postal mail account associated with the identified inmate and an inmate identifier associated with the identified inmate;
flag, within the database, the digital representation of the postal mail if a flag is applicable to at least one of the digital representation of the postal mail and the postal mail;
associate, within the database, the digital representation of the postal mail with the identified inmate postal mail account, the identified inmate identifier, and the one or more flags that are applicable to the digital representation of the postal mail; and
transmit the digital representation of the postal mail to the identified inmate postal mail account.

2. The computer program product of claim 1, wherein the digital representation of the postal mail to an inmate is comprised of a digital image of contents of the postal mail.

3. The computer program product of claim 2, wherein the digital representation of the postal mail to an inmate is further comprised of a digital image of envelope that is used to enclose the contents of the postal mail.

4. The computer program product of claim 1, wherein the digital representation of the postal mail to an inmate is comprised of a text-readable digital data representing contents of the postal mail.

5. The computer program product of claim 1, wherein receiving inmate identification is further comprised of receiving the first and last name of the inmate who is the intended recipient of the postal mail.

6. The computer program product of claim 1, wherein receiving inmate identification is further comprised of receiving text-readable data that is extracted from an envelope that is used to enclose contents of the postal mail and automatically identifying the first and last name of the recipient inmate based on received text-readable data.

7. The computer program product of claim 1, wherein the identified inmate postal mail account is identified by referencing a directory.

8. The computer program product of claim 1, wherein a flag comprises a contraband flag indicating that at least one of the digital representation of the postal mail and the postal mail includes contraband.

9. The computer program product of claim 1, wherein a flag comprises a return to sender flag indicating that at least one of the recipient name, the recipient identifier, and the identified inmate postal mail account is absent from the directory.

10. The computer program product of claim 1, wherein the inmate identifier is provided by staff, and the processor identifies the inmate postal mail account associated with the identified inmate based on the obtained identifier.

11. The computer program product of claim 1, wherein a flag is received from a corrections facility computing device, wherein the flag is generated by staff based on their review of at least one of the postal mail and the digital representation of the postal mail.

12. The computer program product of claim 11, wherein the flag is set by the staff using predefined categories.

13. The computer program product of claim 1, wherein a flag is generated automatically based on an analysis of the postal mail.

14. The computer program product of claim 13, wherein a flag is generated automatically based on at least one of information that is extracted from an envelope that is used to enclose contents of the postal mail, and an analysis of text-readable information in digital representation of the postal mail.

15. The computer program product of claim 1, wherein the flag is generated automatically based on analysis of at least one of the postal mail, the digital representation of the postal mail, and metadata associated with the digital representation of the postal mail.

16. The computer program product of claim 15, wherein the flag is generated automatically based on at least one of identification of a sender of the postal mail in a predefined list, identification of location associated with the postal mail in a predefined list, and identification of keywords in the digital representation of the postal mail.

17. The computer program product of claim 1, wherein a flag is generated if the postal mail includes at least one of: pornography, dangerous objects, criminal communication, attorney-client privileged communication, and a magazine.

18. The computer program product of claim 1, further comprising instructions that cause the processor to: assign a unique identifier, within the database, to the digital representation of the postal mail.

19. The computer program product of claim 1, further comprising instructions that cause the processor to: receive a notification that the digital representation of the postal mail is viewed by an inmate.

20. The computer program product of claim 17, further comprising instructions that cause the processor to: update that the database when a viewed notification is received.

21. The computer program product of claim 1, further comprising an email account associated with the identified inmate, the email account capable of receiving email that is addressed to the inmate.

22. The computer program product of claim 21, wherein content available on at least one of the postal mail account and email account is viewable on a computer terminal display that is accessible to the inmate.

23. The computer program product of claim 22, wherein the computer terminal is comprised of at least one of a kiosk and a wireless mobile device.

24. A system for processing postal mail that is sent to an inmate at a corrections facility, the system comprising: one or more processors; and one or more computer-readable non-transitory storage media coupled to one or more of the processors and comprising instructions operable when executed by one or more of the processors to cause the system to:

receive a digital representation of postal mail that is sent to an inmate at a corrections facility;
store the digital representation of the postal mail in a database;
receive an identification of the inmate who is an intended recipient of the postal mail;
identify an inmate postal mail account associated with the identified inmate and an inmate identifier associated with the identified inmate;
flag, within the database, the digital representation of the postal mail if a flag is applicable to at least one of the digital representation of the postal mail and the postal mail;
associate, within the database, the digital representation of the postal mail with the identified inmate postal mail account, the identified inmate identifier, and the one or more flags that are applicable to the digital representation of the postal mail; and
transmit the digital representation of the postal mail to the identified inmate account.

25. A computer-implemented method for processing postal mail that is sent to an inmate at a corrections facility, the method comprising, by one or more computing devices:

receiving a digital representation of postal mail that is sent to an inmate at a corrections facility;
storing the digital representation of the postal mail in a database;
receiving an identification of the inmate who is an intended recipient of the postal mail;
identifying an inmate postal mail account associated with the identified inmate and an inmate identifier associated with the identified inmate;
flagging the digital representation of the postal mail if a flag is applicable to at least one of the digital representation of the postal mail and the postal mail;
associating the digital representation of the postal mail with the identified inmate postal mail account, the identified inmate identifier, and the one or more flags that are applicable to the digital representation of the postal mail; and
transmitting the digital representation of the postal mail to the identified inmate postal mail account.

26. A computer-implemented method for inmate communication at a correctional facility, the method comprising:

receiving at least one of an email and a digital representation of a postal mail for an inmate at a corrections facility;
identifying an inmate email account comprising of at least one of email account associated with the inmate and an inmate postal mail account;
receiving an indication of whether a flag is applicable to at least one of the received email, the received digital representation of the postal mail, and postal mail;
if a digital representation of postal mail is received, associating the digital representation of the postal mail with at least one of the inmate postal mail account, the inmate identifier, and one or more flags that are applicable to the digital representation of the postal mail; and
transmitting the digital representation of the postal mail to the corrections facility for electronic review by the inmate on a computer terminal that is capable of displaying data associated with the inmate email account.
Patent History
Publication number: 20220060475
Type: Application
Filed: Jun 30, 2021
Publication Date: Feb 24, 2022
Applicant: HLFIP HOLDING, INC. (Placida, FL)
Inventor: Jonathan D. Logan (Tampa, FL)
Application Number: 17/363,499
Classifications
International Classification: H04L 29/06 (20060101); H04L 12/58 (20060101); G06K 9/00 (20060101); G06K 9/34 (20060101);