Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 2841. Отображено 100.
19-01-2012 дата публикации

Methods and Systems for Controlling the Blocking of Telephone Calls

Номер: US20120014517A1
Принадлежит: Individual

Computer-implemented systems and methods for controlling the blocking of telephone calls are disclosed. A person, for example, bothered by calls from a prison inmate may desire to block future call attempts from that inmate or even desire to block all calls from the confinement/correctional institution at which the inmate is housed. To reduce accidental and fraudulent call blocking, various techniques are used to verify that the party requesting the block is, in fact, the party in control of the telephone number requested to be blocked. Embodiments herein enable call blocking using systems that require little or no human interaction to process a block request, reduce or eliminate accidental blocks via a callback confirmation process, create a documentation trail via the use of a profile and PIN system used for the processing of a block, and/or reduce fraudulent blocks by parties other than those authorized to do so via CNAM (Caller ID) verification.

Подробнее
15-03-2012 дата публикации

Apparatus for a Receiving Party

Номер: US20120064871A1
Автор: Timo Tokkonen
Принадлежит: Nokia Oyj

Apparatus comprising at least one processor configured to compare an identifier of a calling party with one or more contacts of a receiving party to determine privilege information associated with the calling party, the privilege information providing one or more authorised receiving party location-based responses. The apparatus further comprising at least one processor configured to determine a location of the receiving party and provide an associated authorised response to the calling party.

Подробнее
22-03-2012 дата публикации

Seamlessly conferencing a previously-connected telephone call

Номер: US20120069983A1
Автор: Bouna Sall
Принадлежит: International Business Machines Corp

An already-connected telephone call is conferenced in a seamless manner that is transparent to the call participants, after which one or more additional participants may join the conference. The existing call is preferably moved to a conference bridge responsive to an existing call participant either logging on to a network-accessible user interface (such as a web page or portal-type page) or entering some special key or key combination using the participant's phone (which may be a software application that provides phone-like services). The participant requesting the move may be authenticated, and the authorization of the participant to request the move may be verified, before moving the call.

Подробнее
13-09-2012 дата публикации

Anonymous communication method

Номер: US20120231767A1
Автор: Natsuko Kagawa
Принадлежит: NEC Corp

An anonymous communication establishing device establishes a communication session between a first communication terminal and a second communication terminal if the anonymity level of a calling party terminal, designated in a communication connection request received from the first communication terminal, is allowable for a communication from the first communication terminal to the second communication terminal. Then, when the anonymous communication establishing device receives, from the second communication terminal, a communication transfer request designating the first communication terminal as the calling party terminal and designating a third communication terminal as a transfer destination communication terminal, the anonymous communication establishing device determines whether or not the anonymity level of the first communication terminal as the calling party terminal, designated in the communication transfer request, is allowable for a communication from the first communication terminal to the third communication terminal. If the anonymity level is not allowable, the anonymous communication establishing device determines an anonymity level of the first communication terminal allowable for the communication from the first communication terminal to the third communication terminal, and performs transfer control of the communication session with use of the determined anonymity level.

Подробнее
13-09-2012 дата публикации

Intelligent Policy Deployment

Номер: US20120233216A1
Автор: Keng Lim
Принадлежит: Nextlabs Inc

In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.

Подробнее
29-11-2012 дата публикации

Circuit switching user agent system, communicating device, and service providing method used therefor

Номер: US20120302238A1
Принадлежит: NEC Corp

A circuit switching user agent system includes a service processing device arranged in a home network of an IMS (IP Multimedia Subsystem)/MMD (Multi-Media Domain). The circuit switching user agent system also includes a communication device arranged in a visited network where a mobile terminal has visited, the communication device having a function of interconversion between a UNI (User-Network Interface) signal in a circuit switching network to which the mobile terminal is connected and a signal used in the IMS/MMD.

Подробнее
03-01-2013 дата публикации

Implementing method and system for terminal communications, and implementing method for terminal location update

Номер: US20130005334A1
Принадлежит: ZTE Corp

An implementing method and system for terminal communication are disclosed, the method includes: a first visitor location register judging, according to an identifier of a first terminal which initiates a communication, whether the first terminal has registered first real name system information in a network, wherein, the first visitor location register is the location register which is currently visited by the first terminal, the communication is initiated by the first terminal to a second terminal, the first real name system information includes the identifier of the first terminal and subscriber identity information of the first terminal, and the subscriber identity information corresponds to the identifier of the first terminal; and in a case when the first visitor location register determines that the first terminal has not registered the first real name system information in the network, terminating the communication initiated by the first terminal.

Подробнее
03-01-2013 дата публикации

Teleconferencing adjunct and user interface to support temporary topic-based exclusions of specific participants

Номер: US20130007635A1
Принадлежит: Avaya Inc

An aspect associates people participating in a conference with one or more specific topics. This association can limit a particular participant's participation to specific topic(s) they are associated with, the one or more media streams for the other topics excluded from viewing and/or listening. For example, if a participant is to provide a presentation for Item 4, and that is the only item the participant should be participating in, that participant could be allowed to join the conference with a status message being provided to the participant as the conference progresses through Items 1-3. An “on-deck” message can be provided to the meeting participant indicating their agenda item is almost ready for discussion, and when Item-4 is selected to be discussed, the participant is provided with one or more appropriate media streams for the conference. The media for the other media streams blocked from the participant for the other items.

Подробнее
17-01-2013 дата публикации

Intelligent parental controls for wireless devices

Номер: US20130017806A1
Принадлежит: Qualcomm Inc

Methods, systems and devices for controlling mobile device functions via a combination of parental control settings set by a parent-user and parental control settings set by a third party-user. A parental control server receives parental control settings and context criteria from a parent-user, and parental control settings from a third party user. The parental control server receives authorization from the parent-user to allow third party parental controls to control a child's device. When the context criteria identified by the parent is present (e.g., child device is in identified location, time of day, day of week, etc.), a combination of parental controls designated by the parent-user and the third party control the mobile device.

Подробнее
24-01-2013 дата публикации

Controlling the use of a wireless mobile communication device

Номер: US20130023263A1
Автор: Mark A. Weinzierl
Принадлежит: Enfora LP

A controlling party can set limitations on a controlled party's access to applications operating on the controlled party's wireless mobile communication device. The controlling party can effectuate these limitations via various different mechanisms. In one instance, the controlling party uses another wireless communication device to effectuate the limitations. In another instance, the limitations are effectuated by the controlling party's operation of a data apparatus connected by a wired data communication bus to the controlled party's wireless mobile communication device. In a still further instance, the controlling party effectuates the limitations by accessing a website supported by a web server.

Подробнее
31-01-2013 дата публикации

Computer telephony

Номер: US20130028252A1
Принадлежит: British Telecommunications plc

Computer-telephony events are initiated by a user operating a computer terminal to control, through a computer-telephony controller, operation of a communications terminal. The computer-telephony controller receives from a first computer terminal a request for a first computer-telephony event; in which the request for the first computer-telephony event comprises a label value. The computer-telephony controller refers to a mapping between the label value and an identifier of a communications terminal; and initiates the requested first computer-telephony event controlling operation of the communications terminal. The computer-telephony controller then receives, from second computer terminal 2 B, a request for the label value. The computer-telephony controller authenticates the label value request and provides to second computer terminal the requested label value. The computer-telephony controller then receives from second computer terminal a request for a second computer-telephony event, in which the request for the second computer- telephony event comprises the label value. The computer-telephony controller refers to the mapping; and initiates the requested second computer telephony event controlling operation of the communications terminal.

Подробнее
21-02-2013 дата публикации

Access Level Control Method And Related Service System

Номер: US20130045718A1
Автор: Ju-Ting Yang
Принадлежит: HTC Corp

An access level control method for an EVVM client in a service system is disclosed. The access level control method comprises applying a plurality of access levels on a message corresponding to a plurality of recipients; and forwarding the message to the plurality of recipients.

Подробнее
07-03-2013 дата публикации

Voice authentication system and method using a removable voice id card

Номер: US20130060569A1
Принадлежит: International Business Machines Corp

A voice authentication system using a removable voice ID card comprises: at server side, a voiceprint database for storing the voiceprints of all authorized users; a voiceprint updating means for updating the voiceprints in said voiceprint database; and a voiceprint digest generator for generating a voiceprint digest according to a request from a client; at client side, a voice ID card for storing the voiceprint of an authorized user; a validation means for validating the voiceprint in the voice ID card on the basis of the voiceprint digest from the server; an audio device for performing voice interaction with a user; and a voice authentication means for determining whether the voiceprint from said voice ID card is of the same speaker as the voice from said audio device.

Подробнее
11-04-2013 дата публикации

METHODS, SYSTEMS, AND DEVICES FOR PROVIDING VOICE-CALL SERVICES RESPONSIVE TO A DIALED SEQUENCE

Номер: US20130089191A1
Автор: Lin Shiejye Geoffrey
Принадлежит: AT&T Intellectual Property I, L.P.

A connection is established in a communications network responsive to receiving a Dual Tone Multi-Frequency (DTMF) signal at a port having an assigned sequence associated therewith. A dialed sequence corresponding to the received DTMF signal is identified. If the dialed sequence is associated with a request for a specified service, first and second fields of a packet-switched signaling protocol message are populated with the assigned sequence associated with the port. The populated packet-switched signaling protocol message is transmitted over a packet-switched network to request the specified service, and a connection is established to provide the specified service through the port. Related systems and devices are also discussed. 1. A method of establishing a connection between a public-switched telephone network and an internet protocol network , the method comprising:receiving a dual tone multi-frequency signal corresponding to a dialed sequence at a port of a network access device, wherein the dialed sequence is a shorter numerical sequence than a first numerical sequence associated with the port;identifying the dialed sequence as a request for a specified service that is different than a connection with another port associated with the dialed sequence;populating a destination field of a session initiation protocol message with a second numerical sequence that is different from the dialed sequence responsive to identifying the dialed sequence as the request for the specified service; andtransmitting the session initiation protocol message from the network access device to a server to request the specified service.2. The method of claim 1 , further comprising:populating the destination field of the session initiation protocol message with the dialed sequence when the dialed sequence is not associated with a request for the specified service.3. The method of claim 1 , wherein the specified service comprises a voice-call service.4. The method of claim 1 , further ...

Подробнее
25-04-2013 дата публикации

METHOD AND SYSTEM FOR DETERMINING AUTHORIZATION LEVELS IN A VIRTUAL PRIVATE NETWORK (VPN)

Номер: US20130101105A1
Принадлежит: AT&T Intellectual Property I, L.P.

Example methods, apparatus and articles of manufacture to determine authorization levels in a virtual private network are disclosed. A disclosed example method includes determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network by a first user of a plurality of users associated with the virtual private network, querying a private-number table based on at least one of a switch identifier representing a service switching point, a trunk group identifier representing the private branch exchange, or an originating station identifier representing the originating station to obtain a private number assigned to the first user, and providing an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level. 1. A method comprising:determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network, the call originating on behalf of a first user of a plurality of users associated with the virtual private network;querying, with a service switching point, a private-number table based on a trunk group identifier representing the private branch exchange and an originating station identifier representing the originating station to obtain a private number assigned to the first user; andproviding an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level.2. The method of claim 1 , wherein the private-number table associates the switch identifier and the trunk group identifier with the private number.3. The method of claim 1 , wherein the private-number table associates a switch identifier ...

Подробнее
06-06-2013 дата публикации

CLEARINGHOUSE SERVER FOR INTERNET TELEPHONY AND MULTIMEDIA COMMUNICATIONS

Номер: US20130142041A1
Принадлежит: TransNexus, Inc.

A clearinghouse server for routing multi-media communications, including telephony calls, between a source device and a destination device via a distributed computer network, such as the global Internet. The clearinghouse server can authorize the completion of a communication from a source device to a destination device and collect usage-related information for the completed communication. In response to an authorization request issued by an enrolled source device, the clearinghouse server can identify one or more available destination devices available to accept a communication from an authorized source device. The clearinghouse server can provide a list of the identified destination devices, typically organized in a rank order, by sending an authorization response to the source device. In turn, the source device can use this list to select a destination device and contact that selected device via the computer network to complete the communication. 140-. (canceled)41. A method for authorizing and routing a communication with a clearinghouse server between a source device and a destination device , comprising the steps of:receiving an authorization request from a source device;determining a communication route for completing a communication originating at the source device;identifying one or more destination devices available to complete the communication;balancing use of the one or more destination devices with the clearinghouse server by ranking the one or more destination devices with weighted values which are assigned to each destination device;generating a list comprising the ranked destination devices;forwarding the list to the source device; andreceiving a selection of a destination device from the list.42. The method of claim 41 , wherein each device comprises a Voice over Internet Protocol device.43. The method of claim 41 , wherein ranking the one or more destination devices comprises applying an algorithm that determines the weighted values.44. The method ...

Подробнее
20-06-2013 дата публикации

TRANSPARENT VOICE REGISTRATION AND VERIFICATION METHOD AND SYSTEM

Номер: US20130156166A1
Автор: Gilbert Mazin
Принадлежит: AT&T Intellectual Property I, L.P.

A method includes receiving a communication from a party at a voice response system and capturing verbal communication spoken by the party. Then a processor creates a voice model associated with the party, the voice model being created by processing the captured verbal communication spoken by the party. The creation of the voice model is imperceptible to the party. The voice model is then stored to provide voice verification of the party during a subsequent communication. 1. A method comprising:receiving a communication from a party at a voice response system;capturing verbal communication spoken by the party;creating, with a processor, a voice model associated with the party, the voice model being created by processing the captured verbal communication spoken by the party; andstoring the created voice model to provide voice verification of the party during a subsequent communication,wherein the creating of the voice model is imperceptible to the party.2. The method according to claim 1 , further comprising:receiving a communication from a requester;prompting the requester for information;capturing speech of the requester;processing the captured speech of the requester; andcomparing the processed speech of the requester with the stored voice model.3. The method according to claim 2 , further comprising determining whether the processed speech of the requester matches the stored voice model.4. The method according to claim 3 , further comprising granting the requester access to account information when the processed speech of the requester matches the stored voice model.5. The method according to claim 3 , further comprising denying the requester access to account information when the processed speech of the requester fails to match the stored voice model.6. The method according to claim 3 , further comprising screening the requester when the processed speech of the requester fails to match the stored voice model.7. The method according to claim 3 , further ...

Подробнее
11-07-2013 дата публикации

METHODS AND APPARATUS FOR AUTHORIZATION AND/OR ROUTING OF OUTDIAL COMMUNICATION SERVICES

Номер: US20130177146A1
Принадлежит: AT&T Intellectual Property l, L.P.

Example methods disclosed herein include parsing a request to obtain input criteria associated with the request, the request for authorizing an outdial communication service call initiated by a message center. Such example methods also include retrieving authorization rules correlating the input criteria to an authorization result for the outdial communication service call, the input criteria comprising a first input criterion having one of at least two values, a first value indicating that the outdial communication service call is for a real-time outdial service initiated in response to an indial communication service received at the message center, a second value indicating that the outdial communication service call is for a non-real-time outdial service initiated by an application server associated with the message center. Such example methods further include evaluating the authorization rules using the input criteria to determine whether the outdial communication service call is authorized. 1. A method to authorize an outdial communication service call , the method comprising:parsing a request to obtain input criteria associated with the request, the request for authorizing the outdial communication service call initiated by a message center;retrieving authorization rules correlating the input criteria to an authorization result for the outdial communication service call, the input criteria comprising a first input criterion having one of at least two values, a first value indicating that the outdial communication service call is for a real-time outdial service initiated in response to an indial communication service received at the message center, a second value indicating that the outdial communication service call is for a non-real-time outdial service initiated by an application server associated with the message center; andevaluating the authorization rules using the input criteria to determine whether the outdial communication service call is authorized.2 ...

Подробнее
18-07-2013 дата публикации

USER-BASED AUTHENTICATION FOR REALTIME COMMUNICATIONS

Номер: US20130182832A1
Принадлежит: MICROSOFT CORPORATION

Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location. 1. A method of communications , the method comprising acts of:initiating a request via a telephone for access to a communications network, the request comprises a telephone number and a personal identification number (PIN);discovering the communications network via the telephone based on the request;authenticating the telephone of a user to the communications network using the telephone number and the PIN;issuing a certificate to the telephone based on the telephone number and the PIN;registering the telephone to the communications network using the certificate; andconfiguring a microprocessor to execute instructions associated with at least one of the acts of initiating, discovering, authenticating, issuing, or registering.2. The method of claim 1 , further comprising provisioning a cell phone claim 1 , as the telephone claim 1 , using at least one of the acts of initiating claim 1 , discovering claim 1 , authenticating claim 1 , issuing claim 1 , or registering.3. The method of claim 1 , further comprising discovering a communications server of ...

Подробнее
26-09-2013 дата публикации

System and Method for Control of Communications Connections and Notifications

Номер: US20130251130A1
Принадлежит: Gryphon Networks Corp.

A method and system for selectively establishing a communications connection between an origin and destination in a communications network based on one or mediations rules and one or more lists of prohibited and exempted destination identifiers including preferences either in real-time using a control unit or with a pre-check using an analysis unit while also providing notification messages associated with the allowed or designated allowed communications connections. 1. Apparatus for selectively prohibiting a communications connection between an origin and destination in a communications network , comprising:an interface unit that receives or initiates a connection request for a communication connection between an origin and destination, the request including a destination identifier and a target preference, wherein the target preference is a preference selected as criteria for exempting the destination identifier from a list of otherwise prohibited destinations;a control unit that prohibits or allows the requested communications connection based on lists of prohibited and exempted destination identifiers wherein exempted destinations are determined based on a corresponding preference designation, the control unit determining whether to allow the communications connection depending on the target preference matching at least one of the preference designations.2. The apparatus of wherein the interface unit is any one of an Interactive Voice Response application claim 1 , a predictive dialer server claim 1 , a distributed predictive dialer system claim 1 , a switch claim 1 , a router claim 1 , and an electronic mail server.3. The apparatus of wherein the destination identifier is a telephone number.4. The apparatus of wherein the destination identifier is a facsimile number.5. The apparatus of wherein the destination identifier is an electronic mail address.6. The apparatus of wherein the control unit is a computer server that resides on the premises of any one of a ...

Подробнее
24-10-2013 дата публикации

Telecommunications Network and Method for Time-Based Network Access

Номер: US20130281061A1

The invention relates to a telecommunications network configured for providing access to a plurality of terminals is proposed and a method therefore. Each terminal comprises a unique identifier for accessing the telecommunications network. The telecommunications network comprises a register, an access request receiver and an access module. The register is configured for storing the unique identifier of at least one terminal in combination with at least one grant access time interval, or an equivalent thereof, during which access for the terminal is permitted. The access request receiver is configured for receiving the access request and the unique identifier for accessing the telecommunications network from the terminal. The access module is configured for denying access for the terminal if the access request is received outside the time interval, or the equivalent thereof.

Подробнее
14-11-2013 дата публикации

Disabling Operation Of Features On A Handheld Mobile Communication Device Based Upon Location

Номер: US20130303149A1
Принадлежит: BlackBerry Ltd

Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical boundaries of a restricted operating area is stored on the device. The present position of the device is ascertained and a determination is made whether the device is located within the restricted operating area. A restriction on the subsystem or functional aspect is imposed when it is determined the device is within the restricted operating area. The subsystem or functional aspect restriction can be communicated to the device via a wireless communication network. Additionally, the restrictions and boundaries can be communicated to the device as part of an IT security policy.

Подробнее
12-12-2013 дата публикации

Telecommunication Call Management and Monitoring System With Voiceprint Verification

Номер: US20130329867A1
Автор: Hodge Stephen Lee
Принадлежит: Value-Added Communications, Inc.

A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party. 1. A call management system for detecting an unauthorized party , comprising: store voiceprints;', 'monitor audio information of a telephone conversation between a local user and a remote user to detect a presence of a first characteristic;', 'search of the stored voiceprints for a matching voiceprint containing a second characteristic that substantially matches the first characteristic;', 'wherein the stored voiceprints include voiceprints of inmates and voiceprints of called parties., 'a control platform configured to2. The system of claim 1 , wherein the control platform is further configured to analyze the audio information to detect the presence of the first characteristic.3. The system of claim 1 , wherein each of the first characteristic and the second characteristic is at least one of a pitch claim 1 , a loudness claim 1 , a frequency or a timbre.4. The system of claim 1 , wherein the control platform is further configured to take an action based on a result of the search of the stored records.5. The system of claim 1 , wherein the control platform is further configured to request an audio sample from the called party claim 1 , ...

Подробнее
26-12-2013 дата публикации

VOICE TRAFFIC GATEWAY

Номер: US20130343531A1
Принадлежит: BAE SYSTEMS plc

A voice traffic gateway including: a voice traffic input, a voice traffic output, a first domain router, non-secure warning (NSW) tone application apparatus and a signalling filter. The input receives voice traffic including voice messages and signalling messages from a first traffic domain. The output delivers output voice messages and signalling messages to a second, different traffic domain. The first domain router routes voice messages to the NSW apparatus and routes signalling messages to the signalling filter. The NSW apparatus applies a NSW tone to a received voice message to form an output voice message. The signalling filter compares a feature of a received signalling message with a reference feature. The signalling filter will pass a signalling message if the signalling message feature is the same as the reference feature and will block a signalling message if the signalling message feature is not the same as the reference feature. 116-. (canceled)17. A voice traffic gateway comprising:a voice traffic input arranged to receive voice traffic from a first traffic domain of a communications network, the voice traffic including voice messages and signalling messages;a voice traffic output arranged to deliver output voice messages and output signalling messages to a second, different traffic domain of the communications network;a first domain router coupled to the voice traffic input and configured to route voice messages received from the first traffic domain to a non-secure warning tone application apparatus and to route signalling messages received from the first traffic domain to a signalling filter;wherein the non-secure warning tone application apparatus is configured to apply a non-secure warning tone to each voice message that it receives to form a respective output voice message; andthe signalling filter is configured to compare a feature of each signalling message that it receives with a reference feature, to pass said signalling message as an output ...

Подробнее
26-12-2013 дата публикации

METHOD AND APPARATUS FOR PROVIDING SPECIAL CALL HANDLING FOR VALUED CUSTOMERS OF RETAILERS

Номер: US20130343533A1
Принадлежит: AT&T INTELLECTUAL PROPERTY II, L.P.

The present invention enables users of a network service to register with the network as valued shoppers, thereby allowing them to receive specialized treatment when calling registered retailers. The present invention enables retailers to register with the network, thereby allowing them to set preferred service logic for handling valued customer calls by the network. 1. A method for processing a call setup message in a communication network , comprising:receiving, by a processor in the communication network, the call setup message from an endpoint device of a calling party to a called party;verifying, by the processor, the calling party is associated with a valued customer status and the called party is a registered retailer based upon the call setup message; andprocessing, by the processor, the call setup message in accordance with a registered service logic when the calling party is associated with the valued customer status and the called party is the registered retailer instead of processing the call setup message in accordance with a service logic associated with a regular customer status, wherein the registered service logic directs a call to a live attendant.2. The method of claim 1 , wherein the communication network is a voice over internet protocol network.3. The method of claim 1 , further comprising:registering a phone number of the calling party as being associated with the valued customer status; andregistering a phone number of the called party as being associated with the registered retailer.4. The method of claim 3 , wherein the phone number of the called party is a toll-free phone number.5. The method of claim 3 , wherein the phone number of the called party is a toll phone number.6. The method of claim 1 , wherein the calling party being associated with the valued customer status is selectively set by the calling party.7. The method of claim 1 , wherein the calling party being associated with the valued customer status is selectively set by the ...

Подробнее
02-01-2014 дата публикации

Method And Apparatus For Providing Telephone Service

Номер: US20140004819A1
Автор: Kenneth W. Brent
Принадлежит: Alcatel Lucent USA Inc

A telephony kiosk and method of providing communications services using a telephony kiosk. A preferred telephony kiosk includes a cabinet on which are mounted a user interface and an operator interface, as well as a number of handsets. The handsets preferably include a minimal number of components so that they cost less than fully-functional personal communications devices and to provide a disincentive for theft. Inside the cabinet in this embodiment is an RF module containing a plurality of RF chains that each including a transceiver for sending and receiving communications between one or more handset and a communications network (or networks). A handset manager bridges the handset cord to the RF module. The kiosk is preferably portable.

Подробнее
02-01-2014 дата публикации

Mobility call management

Номер: US20140004833A1
Принадлежит: Aegis Mobility Inc

A mobility call management service is disclosed that provides enhanced call management functionality for a wireless mobile terminal (MT). Incoming and/or outgoing calls are managed based on an assessment of the degree of motion of the MT, or other available data pertinent to the MT's physical situation, such as but not limited to its location, movement, or rate of movement. The degree of motion or other assessment may be used to determine whether a communication can safely terminate on, originate from, or continue safely on the MT, so as to reduce or remove driver distraction.

Подробнее
16-01-2014 дата публикации

Systems and methods for facilitating conference calls using security keys

Номер: US20140018043A1
Принадлежит: BlackBerry Ltd

Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first primary communication device; providing a second primary communication device; providing a conference call controller; establishing a first control link between the first primary communication device and the conference call controller; communicating first identification data between the first primary communication device and the conference call controller via the first control link; establishing a media link between the first and second primary communication devices via the conference call controller. In certain embodiments, the first identification data corresponds to at least one participation level of the first primary communication device with respect to the media link. The method may further comprise establishing a second control link between the second primary communication device and the conference call controller; communicating second identification data between the second primary communication device and the conference call controller via the second control link; wherein the second identification data establishes a participation level of the second primary communication device with respect to the media link.

Подробнее
30-01-2014 дата публикации

SYSTEMS AND METHODS FOR USING THE ADVANCED INTELLIGENT NETWORK TO REDIRECT DATA NETWORK TRAFFIC

Номер: US20140029740A1
Принадлежит: Verizon Services Corp.

A method and system are disclosed for providing a low cost mechanism for remotely rerouting queries in a telecommunications network. A service control point (SCP) executes an application which causes a queries to be launched over a LAN or WAN to a remotely located data center. The system contains a primary and secondary data center, in which the secondary data center operations on a ‘hot-standby’ basis. Based on a manually provided indication, maintenance personnel may telephone and interact with a voice response unit or a web-based interface, which indicates that the SCP or SCP application should route queries to the secondary data center. Similarly, the same mechanism can be used to indicate that queries should be re-routed back to the primary data center. This allows remote management for controlling the queries without having to extensively modify the related infrastructure. 1. A method comprising:receiving, at a web server, as part of a switchover from a primary data center to a secondary data center, a request from a user indicating that redirection of a query to the secondary data center be initiated at a service control point;transmitting, using an IP based communication protocol, an indication from the web server to the service control point that the query should be transmitted to the secondary data center; andascertaining, at the service control point, an IP address associated with the secondary data center to be used for transmitting said query.2. The method of claim 1 , further comprising:transmitting the query from the service control point to the secondary data center using the IP address associated with the secondary data center.3. The method of claim 1 , further comprising:routing the query from the service control point over a data communications network to the secondary data center using the IP address.4. The method of claim 2 , further comprising the steps of:receiving a user identifier and a password from the user;verifying the user identifier ...

Подробнее
13-03-2014 дата публикации

Voice over ip based voice biometric authentication

Номер: US20140075530A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A request from a party is received by a receiver from a remote system. The request from the party is received when the party attempts to obtain a service using the remote system. A selective determination is made to request, over a network, authentication of the party by a remote biometric system. A request is sent to the remote system for the party to provide a biometric sample responsive to determining to request authentication of the party. The service is provided contingent upon authentication of the party by the remote biometric system.

Подробнее
03-04-2014 дата публикации

Interjurisdictional recording mechanism

Номер: US20140093055A1
Автор: William J. Dawson
Принадлежит: Veridicom SA de CV

The present invention provides a system for recording an interaction including, a telephone call between a caller and a digital processing system placed over an interjurisdictional boundary, and may include a telephone call placed to at least one called recipient. For example, a caller may place a telephone call over an interjurisdictional boundary to a remote computer server. The server may use an interactive voice response (IVR) unit to obtain caller identification information, provide recording identification information to the caller, and receive authorization from the caller to record an interaction between the caller and a call recipient. The server can also obtain testamentary intent information. A telephone call may then be placed by the server to the recipient, and a two-party digital voice recording can be made on the remote server of a three-way telephone call, in which the server is one of the parties.

Подробнее
10-04-2014 дата публикации

CONTROLLING HOLD QUEUE POSITION ADJUSTMENT

Номер: US20140098944A1

A computer system detects a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller. The computer system accesses a caller profile according to the identity of the caller, wherein the caller profile comprises at least one previously earned advancement token. The computer system offers the caller an option of redeeming the previously earned advancement token for adjustment of a position of the caller in the hold queue. 1. A method for call queue management of advancement tokens , comprising:receiving, by a computer system, a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller;accessing, by the computer system, a caller profile according to the identity of the caller, wherein the caller profile comprises at least one previously earned advancement token; andoffering, by the computer system, the caller an option of redeeming the previously earned advancement token for adjustment of a position of the caller in the hold queue.2. The method according to claim 1 , further comprising:publishing, by the computer system, a question of a second caller from among a plurality of callers waiting in the hold queue;responsive to the caller indicating a readiness to answer to the question, connecting, by the computer system, the second caller with the caller; andresponsive to the caller answering the question, awarding, by the computer system, the caller the advancement token and storing the advancement token in the caller profile for redemption by the caller.3. A method for call queue management of advancement tokens claim 1 , comprising:receiving, by a computer system, a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller;detecting, by the computer system, a characteristic of the caller for which an automatic advancement token is granted; ...

Подробнее
06-01-2022 дата публикации

Door-Knocking For Teleconferencing

Номер: US20220006975A1
Автор: Ghafran ABBAS
Принадлежит: Vitalchat Inc

A method for teleconferencing between a monitoring device and a user device includes establishing an audio channel connection between the user device and the monitoring device of a remote user; displaying an entry code on a display of the monitoring device; obtaining from a user of the monitoring device a verbal confirmation of the entry code; and, in response to receiving the entry code from the remote user, enabling a camera of the monitoring device. In response to the verbal confirmation, the entry code is sent to the remote user. Enabling the camera of the monitoring device establishes an audio-visual connection between the user device and the monitoring device.

Подробнее
05-01-2017 дата публикации

Telecommunication Call Management and Monitoring System With Voiceprint Verification

Номер: US20170006155A1
Автор: Hodge Stephen Lee
Принадлежит: Globel Tel*Link Corp.

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters. 1. A system comprising: store biometric data of a plurality of users;', 'store first identifying information associated with the plurality of users in correspondence with the biometric data; and, 'a database configured to [ receive second biometric data associated with a calling party;', 'receive second identifying information related to the calling party;', 'find in the database third identifying information from among the first identifying information that matches the second identifying information received from the calling party;', 'retrieve from the database third biometric data associated with the third identifying information;', 'compare the second biometric data received from the calling party with the third biometric data retrieved from the database; and', 'authenticate the calling party based on the comparison; and, 'prior to a call, acquire and store biometric information of the called party;', 'acquire, at regular intervals, biometric information of a person speaking;', 'compare the acquired biometric information of the person speaking to at least one of the stored third ...

Подробнее
07-01-2016 дата публикации

METHOD AND APPARATUS FOR CONTROLLING A DEVICE

Номер: US20160007199A1
Автор: MONONEN Jari
Принадлежит:

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising a memory configured to store a time parameter defining a locking period, processing circuitry configured to determine, using the time parameter, whether the locking period has elapsed, the processing circuitry being further configured to, responsive to a determination that the locking period has elapsed, cause a locking feature to be disabled, wherein the locking feature is, when enabled, configured to restrict use of the apparatus to use with identity modules of a first type. The locking period may comprise an exclusivity period. The identity module may comprise a subscriber identity module. 123-. (canceled)24. An apparatus , comprising:a memory configured to store a time parameter defining a locking period;processing circuitry configured to determine, using the time parameter, whether the locking period has elapsed; 'wherein the locking feature is, when enabled, configured to restrict use of the apparatus to use with identity modules of a first type.', 'the processing circuitry being further configured to, responsive to a determination that the locking period has elapsed, cause a locking feature to be disabled,'}25. An apparatus according to claim 24 , wherein the time parameter comprises at least one of a length of time and an end time.26. An apparatus according to claim 25 , wherein the end time comprises an end date.27. An apparatus according to claim 24 , wherein the processing circuitry is further configured to begin the locking period as part of an initial setup procedure of the apparatus.28. An apparatus according to claim 24 , wherein the locking feature is enabled during the locking period.29. An apparatus according to claim 24 , wherein the processing circuitry is comprised in a secure processing environment in the apparatus.30. An apparatus according to claim 24 , wherein the processing circuitry is configured to claim 24 , responsive to ...

Подробнее
04-01-2018 дата публикации

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION

Номер: US20180007194A1
Автор: Hodge Stephen Lee
Принадлежит:

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use. 1. A method , comprising:interfacing an incoming communication processing system to an outgoing communication processing system, wherein the outgoing communication processing system includes hardware separate from the incoming communication processing system;receiving an incoming communication, wherein the incoming communication includes an inmate identification;determining an inmate communication device associated with the inmate identification using inmate communication device information stored by the outgoing communication processing system; androuting the incoming communication to the determined inmate communication device based on the determining.2. The method of claim 1 , wherein the incoming communication includes a text component and a video component.3. The method of claim 1 , wherein the inmate communication device is a personal wireless device.4. The method of claim 1 , further comprising:monitoring biometric information included in the incoming communication to detect a presence of an unauthorized party.5. The method of claim 1 , wherein the inmate communication device information includes routing rules configured to route the incoming communication based on identification information related to an outside party originating the incoming communication.6. The method of claim 5 , wherein the determining claim 5 , further comprises:searching a block list based on the identification information; ...

Подробнее
14-01-2016 дата публикации

Telecommunication call management and monitoring system with voiceprint verification

Номер: US20160014270A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.

Подробнее
21-01-2016 дата публикации

Telecommunication call management and monitoring system with voiceprint verification

Номер: US20160021242A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Подробнее
21-01-2016 дата публикации

Telecommunication call management and monitoring system with voiceprint verification

Номер: US20160021243A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.

Подробнее
22-01-2015 дата публикации

Telephone system, apparatus, and method for providing enhanced privacy features

Номер: US20150023485A1
Принадлежит:

A telephone system for enhanced privacy management includes a telephone switch, a rejected call handler, a user preference database, and an internet app privacy manager, whereby an incoming call can be assigned to a calling class, and routed according to a calling rule associated with the calling class. Using an interactive voice response menu or an application portal, the user can assign callers to calling classes and specify call handling rules and schedules. A rejected call handler includes a voice interface, a switch control, a voicemail, interactive voice response, call progress simulator, in-message options, in-call options, post-call options, and other components. Further disclosed is a method for determining a calling rule, including determining the caller id status, querying a calling rules table, and determining a calling rule. 2. The telephone system for enhanced privacy management of claim 1 , further comprising a user preference database claim 1 , wherein the rejected call handler stores and retrieves the calling rules in the user preference database.3. The telephone system for enhanced privacy management of claim 2 , wherein the rejected call handler is further comprising an interactive voice response component claim 2 , wherein the interactive voice response component controls touch-tone based privacy rule set-up processing claim 2 , and stores the results of the users selections in the user preference database.4. The telephone system for enhanced privacy management of claim 2 , further comprising an internet app privacy manager claim 2 , wherein the internet app privacy manager stores the results of user selections in the user preference database claim 2 , and the internet app privacy manager controls functions provided by the rejected call handler.5. The telephone system for enhanced privacy management of claim 1 , wherein the media traffic further comprises a telephone call.6. The telephone system for enhanced privacy management of claim 1 , ...

Подробнее
22-01-2015 дата публикации

TELEPHONIC COMMUNICATION REDIRECTION AND COMPLIANCE PROCESSING

Номер: US20150023486A1
Принадлежит:

Processing telephonic communication is disclosed. A request to establish communication is received from a first communication participant. A first identifier associated with the request is mapped to a second identifier associated with a second communication participant. The second identifier is used to establish communication between the first and the second participant in a manner that allows at least a portion of the communication between the first and second participants to be monitored. Compliance processing is performed with respect to at least a portion of said at least a portion of the communication between first and the second participant. The first identifier is made available to the first participant in a manner that causes the first participant to associated the first identifier with the second participant, the first identifier cannot be used to reach the second participant directly, and the second identifier is not provided to the first participant. 1. A method of processing a communication , comprising:receiving from a first communication device a request to establish communication with a particular second communication device;establishing a communication session terminated between the first communication device and a compliance system prior to the request being allowed to trigger an indication available to a human user associated with the second communication device, the indication indicating that the request is received;mapping a first identifier included in the request to a second identifier not included in the request, wherein the first identifier is used by the first communication device to specify the second communication device to establish communication with, and wherein the first identifier cannot be used to reach the second communication device directly;using the second identifier to conference the second communication device in to the established communication session terminated between the first communication device and the compliance system ...

Подробнее
21-01-2021 дата публикации

SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES

Номер: US20210021703A1
Автор: VOLKART Mitch
Принадлежит: Global Tel*Link Corporation

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts. 1. A threat prediction system for predicting a threat potential of an inmate , the system comprising:one or more circuits and/or processors configured to:receive a previously-stored inmate communication;receive a plurality of topics and a plurality of topic weights that correspond to the plurality of topics;determine one or more topics present in the previously-stored inmate communication;assign a topic score to each of the determined one or more topics;retrieve previously-stored threat information of the inmate;compare the received topics to the previously-stored threat information; andassign a threat score to the inmate based on the comparison.2. The threat prediction system of claim 1 , wherein the one or more circuits and/or processors are further configured to scale the topic weights by a number of data points examined for the inmate;3. The threat predication system of claim 2 , wherein the one or more circuits and/or processors are further configured to normalize the scaled weights based on scaled weights of other ...

Подробнее
21-01-2021 дата публикации

SYSTEM AND METHOD FOR ELECTRONIC NOTIFICATION IN INSTITUTIONAL COMMUNICATIONS

Номер: US20210021708A1
Автор: SEYFETDINOV Serge
Принадлежит: Value-Added Communications, Inc.

Disclosed is a multi-mode communication notification system and method for improving communication between an inmate and a third party by enabling a third party to send a web-initiated contact request for a specific inmate and further allowing the inmate to check his/her contact requests or be automatically notified of contact requests. Additionally, the system electronically notifies the third party when the specific inmate has been notified of the contact request. Further, the system notifies the third party if they have missed a call from the specific inmate. 1. A call management system for a correctional institute that provides web-initiated contact requests , the system comprising:a telephonic instrument located at the correctional institute and associated with an inmate of the correctional institute;a router coupled to the telephonic instrument and configured to route telephonic communications to and from the telephonic instrument, the telephonic communications being between a local user using the telephonic instrument and a remote user located outside the correctional institute; and receive a call attempt from an external caller directed to the inmate;', 'determine that the inmate is unavailable to receive the call;', 'terminate the call attempt; and', 'transmit a notification message to the inmate, notifying the inmate of the missed call attempt., 'a control platform configured for monitoring, recording, controlling, storing, and billing related to the telephonic communications, the control platform comprising one or more processors and/or circuits configured to2. The call management system of claim 1 , wherein the control platform is further configured to transmit claim 1 , in response to transmitting the notification message to the inmate claim 1 , a message to the external caller that informs the external caller that the inmate has been notified of the missed call attempt.3. The call management system of claim 1 , wherein the control platform is further ...

Подробнее
24-01-2019 дата публикации

EVOLVING RULE BASED CONTACT EXCHANGE

Номер: US20190028486A1
Принадлежит:

Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends upon adherence or proper application of a prior set. In an embodiment, an initial set of restrictions are generated based on input from a first user, the restrictions relating to contact made by a second user to the first user. These initial restrictions are subsequently modified in response to the second user contacting the first user based on the contact made and a characteristic of the contact. The methods may apply to any form of contact between the first and second users and in an embodiment applies to contact made by the second user to a cellular telephone number belonging to the first user. 1. A method , comprising:receiving, from a user device of a first user of a communication system, initial access right data corresponding to contact information of the first user, the initial access right data including at least one condition associated with a second user connecting with the first user via the communication system;receiving a first contact from a user device of the second user and via the communication system, the first contact associated with the contact information;determining that the first contact comprises an initial request by the second user to connect with the first user via the communication system; andgenerating modified access right data associated with a subsequent use of the contact information by the second user of the communication system.2. The method according to claim 1 , further comprising receiving the contact information from the user device of the first user of the communication system claim 1 , the contact information enabling the second user to connect with the first user via the communication system.3. The method according to claim 1 , further comprising generating the contact information including temporary contact details.4. The method according to claim 3 , further ...

Подробнее
02-02-2017 дата публикации

Method and apparatus for controlling visitor call in home network system

Номер: US20170034689A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Disclosed is a technology for a sensor network, machine to machine (M2M), machine type communication (MTC), and internet of things (IoT). The present disclosure can be used for intelligent services (for example, services related to a smart home, smart building, smart city, smart car, connected car, health care, digital education, retail business, security, and safety) based on the technology. A method of controlling a visitor's call by a first terminal in a home network system includes: reading home information pre-stored in the communication module when communication with a communication module installed inside the home is possible; transmitting a visit request message including the home information and identification information of the first terminal to the smart home server or a at least on second terminal from among a plurality of second terminals; and communicating with the at least one second terminal when at least one of the plurality of second terminals accepts communication with the first terminal.

Подробнее
04-02-2016 дата публикации

Usage Parameters for Communication Content

Номер: US20160036986A1
Принадлежит:

In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present application. 1134-. (canceled)135. A system comprising:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction;circuitry for determining one or more network communications channels associated with at least one voice conference enabling substantially live discourse involving one or more recipient devices; andcircuitry for transmitting the at least one content item and the associated usage parameter indicating the at least one usage restriction to the one or more recipient devices via the one or more network communications channels associated with the at least one voice conference.136. The system of claim 135 , wherein the circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction comprises:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction, the at least one content item including at least some substantially live discourse.137. The system of claim 135 , wherein the circuitry for determining one or more network communications channels associated with at least one voice conference enabling substantially live discourse involving one or more recipient devices comprises:circuitry for determining one or more network communications channels associated with at least one internet-based voice conference enabling substantially live discourse involving one or more recipient devices.138. The system of claim 135 , wherein the circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction comprises:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage ...

Подробнее
04-02-2016 дата публикации

AUTO-DIALER DETECTOR FOR INTER-CARRIER NETWORK SWITCH

Номер: US20160036991A1
Принадлежит:

To maximize efficiencies and to reduce termination costs of inter-carrier exchanges, an auto-dialer detection system enables an inter-carrier network switch to detect, in real-time or in near real-time, calls that are originated by auto-dialers. A call router of the switch may receive an incoming call attempt that includes a particular Automatic Number Identification (ANI). The auto-dialer detection system allows for a real-time or near-real time determination, based on the ANI and contents of a cache during a sliding window of time coincident with the reception of the origination, whether or not the call should be routed through the switch. Further, the auto-dialer detection system provides a real-time or a near real-time update to the cache contents to enable further real-time or near-real time detection and blocking of auto-dialed calls. Overrides to the cache (e.g., to always allow and/or to always block calls that include certain ANIs) may be provided. 1. A method for detecting auto-dialed calls in real-time or near real-time , the method comprising:receiving, at a call router of an inter-carrier network switch communicatively connected to a data storage device storing call data records (CDRs), an indication of an incoming call received at the inter-carrier network switch and including an Automatic Number Identification (ANI);based on the reception of the indication of the incoming call, causing an indication of a call attempt corresponding to the ANI to be stored in a cache;determining, by the call router, whether to allow or to deny the incoming call based on contents of the cache;when the incoming call is determined to be allowed, processing the incoming call through a Private Packet Network Backbone Exchange (PPNBE) of the inter-carrier network switch to a terminating exchange, and causing a call data record for the incoming call to be stored in the CDR data storage device; andwhen the incoming call is determined to be denied, not processing the incoming ...

Подробнее
30-01-2020 дата публикации

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT

Номер: US20200036832A1
Автор: HODGE Stephen
Принадлежит: Global Tel*Link Corporation

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified. 1. A call processing platform for processing telecommunications of a controlled environment , comprising:one or more circuits and/or processors configured to:set up a user account, the setup including:communicating with an application running on a mobile device associated with a user, the call processing platform configured to handshake with the application;receiving an image of a personal physical printed document of the user via the application;extracting personal verification information printed on the personal physical printed document from the image; andregister the user by storing the personal verification information included in the image in association with an identifier of the mobile device.2. The call processing platform of claim 1 , wherein the image of the personal physical printed document is an image of a physical printed document that includes a plurality of pieces of personal information of the user.3. The call processing platform of claim 2 , wherein the one or more circuits and/or processors are further configured to extract the pieces of personal information from the image.4. The call ...

Подробнее
04-02-2021 дата публикации

Call Processing System for Modifying Inmate Communication Limits

Номер: US20210037141A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.

Подробнее
06-02-2020 дата публикации

Method for verifying the validity of a telephone line of a user of a service or of a software application

Номер: US20200045543A1
Автор: Taig Khris
Принадлежит: ONOFF TELECOM

Verification of the validity of a telephone line of a user likely to use a service or a software application, the verification process can include: the allocation to said validation procedure, by a validation system, of a temporary validation telephone number that has a predetermined validity duration; the generation of a call by the communication terminal of the user, via a telephone communication network, to the temporary validation telephone number; the verification of the correspondence between the temporary validation telephone number called and the validation procedure; and the validation of the telephone line of the user insofar as the correspondence between the temporary validation telephone number called by the communication terminal of the user and the validation procedure has been verified in the preceding step, such that the client system is able to authorise the user to use the service or software application.

Подробнее
16-02-2017 дата публикации

Telecommunication Call Management and Monitoring System With Voiceprint Verification

Номер: US20170048384A1
Автор: Hodge Stephen Lee
Принадлежит: Globel Tel*Link Corp.

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters. 1. A call management system for controlling access to a communication network , the system comprising:a telephone terminal;a biometric sensor;a central site server including a memory that stores a plurality of inmate data records, each inmate data record containing a corresponding first identifier and a corresponding biometric baseline sample of a corresponding inmate, prompt the user to input a second identifier using the telephone terminal;', 'select an inmate data record from among the plurality of inmate data records whose first identifier matches the second identifier;', 'prompt the user to provide a biometric sample using the biometric sensor;', 'compare the biometric sample only to the biometric baseline sample of the selected inmate data record;', 'determine that the biometric sample matches the biometric baseline sample with a predetermined degree of similarity; and', 'grant the user access to the communication network to attempt to place a telephone call based on the determining., 'the central site server configured to, during each attempt to access the communication network by ...

Подробнее
15-02-2018 дата публикации

MANAGING ACCESS TO A CONFERENCE CALL

Номер: US20180048684A1

Managing access to a conference call includes obtaining, via a calendar application, a list of participants, the list of participants includes a number of participants to be included in a conference call, identifying, from the list of participants, a first portion of the participants that have personal passcodes, generating guest passcodes for a second portion of the participants associated with the list of participants that do not have the personal passcodes, and permitting, based on the personal passcodes or the guest passcodes, each of the participants to participate in the conference call. 1. A system for managing access to a conference call , the system comprising a computer implementing a managing system , the computer comprising a network interface and being programmed to:obtain, via a calendar application, a list of participants to be included in a conference call;identify, from the list of participants, a first portion of the participants that have personal passcodes and a second portion of the participants that do not have a personal passcode;generate a guest passcode for each of the participants that do not have a personal passcode; andpermit each of the participants presenting either a personal passcode or a guest passcode to participate in the conference call;wherein each guest passcode is unique and generating the guest passcodes comprises:designating each of the participants that do not have a personal pass code as a frequent guest or an infrequent guest;retrieving a corresponding electronic mail (email) addresses for each of the frequent guests;storing, in a library, the guest passcode as a personal passcode for each of the frequent guests along with the corresponding email address for that frequent guest.2. The system of claim 1 , the computer comprising a network interface further being programmed to identify claim 1 , based on a passcode entered by a participant claim 1 , to which of a plurality of conference calls the participant is to be joined. ...

Подробнее
15-02-2018 дата публикации

METHODS AND SYSTEMS FOR INBOUND AND OUTBOUND CALL CONTROL

Номер: US20180048759A1
Автор: Sharpe Benjamin
Принадлежит:

An indication of an outgoing call may be received at a call control unit communicatively coupled to, and/or resident within, a telephone. The indication may include identification information for the outgoing call. It may be determined whether additional information regarding a called party associated with the identification information exists, and if so, a first operation may be performed on the incoming call responsively to the additional information, otherwise, a second operation may be performed on the incoming call responsively to an absence of the additional information. The additional information my include a user-configurable list of desired callers (e.g., a whitelist) and/or undesired callers (e.g., a blacklist). The additional information may also include caller identification information and/or a spam score. The first operation may be blocking the incoming call, forwarding the incoming call to a voice mailbox, transmitting the incoming call to the telephone, enabling the telephone to receive the incoming call, and/or answering the incoming call and then terminating the incoming call. In some embodiments, the first and/or second operations performed on the incoming call is/are user configurable. 1. A method comprising:receiving an indication of an outgoing call at a call control unit communicatively coupled to, or resident within a telephone, the indication including identification information for the outgoing call; anddetermining whether additional information regarding a called party associated with the identification information exists, and if so, performing a first operation on the outgoing call responsively to the additional information, otherwise, performing a second operation on the outgoing call responsively to an absence of the additional information.2. The method of claim 1 , wherein determining whether additional information regarding a called party associated with the identification information exists is performed at the call control unit using ...

Подробнее
15-02-2018 дата публикации

METHOD AND SYSTEM PROVIDING INMATE TEXT-INITIATED WEB-BASED AUDIO-VIDEO SECURED VISITOR VISITATION

Номер: US20180048862A1
Автор: Humphries Gary James
Принадлежит:

A web-based audio/video visitation system and method providing inmate text message initiated audio/video visitation services to inmates located in a prison on an endpoint control free basis for self-initiating via texting communication services to an inmate selected visitor located external to the prison, including a webserver hosting the web-based audio/video visitation web service enabling the inmate to prepare and transmit a text-message to an inmate selected inmate-visitor, the text-message indicating a request of the inmate to establish an web-based audio/video communication with a selected inmate-visitor, transmitting of the text-message to the selected inmate-visitor, and enabling the visitor interface of the selected inmate-visitors to receive the inmate initiated text-message, to establish the inmate initiated web-based audio/video communication to the inmate-visitor workstation of the selected inmate-visitor, the established web-based audio/video communication. 120-. (canceled)21. A method of providing inmate text message initiated audio/video visitation services to inmates located in a prison on an endpoint control free basis for self-initiating via texting communication services to an inmate selected visitor located external to the prison , in a server having a processor , memory and non-transitory memory with computer executable instructions , and having instructions for performing the following method comprising:hosting a web-based audio/video visitation service application having one or more webpages accessible over a data network and hosting an inmate interface, a visitor interface and an administrative interface, each of which is configured separately and each of which has separate and distinct functions, but each of which cooperate to provide the functioning of the audio/video visitation service application;the administrative interface hosting an administrative user web-interface accessible over the data network of the audio/video visitation ...

Подробнее
26-02-2015 дата публикации

System and method for authenticating a communication device

Номер: US20150058632A1

A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to transmit to a communication system a PKI certificate, and engage in encrypted communications responsive to receiving a public key from the communication system. The communication system can have a plurality of network elements that integrate operations of a circuit-switched communication network and a packet-switched communication network. Other embodiments are disclosed.

Подробнее
03-03-2016 дата публикации

CONTACT CENTER ANTI-FRAUD MONITORING, DETECTION AND PREVENTION SOLUTION

Номер: US20160065732A1
Принадлежит:

A method of fraud detection is disclosed. The method includes determining that a first agent at a first workstation of a contact center is not on a call at a first time. The contact center includes a plurality of workstations attended to by a plurality of agents. The method includes determining that the first agent is accessing a client based resource at the first time, wherein the resource is associated with a client. The method includes collecting electronic evidence of the first workstation. 1. A method of fraud detection , comprising:monitoring activity of a plurality of agents attending to a plurality of workstations of a contact center;determining that a first agent at a first workstation of said contact center is not on a call at a first time;determining that said first agent is accessing a client based resource at said first time, wherein said client based resource is associated with and managed by a client at a back end server remote from said contact center, wherein said client based resource is accessed by an electronic resource at said first workstation through a communication network; andcollecting electronic evidence of said first contact center workstation, wherein said electronic evidence is associated with potential fraudulent activity being conducted at said first workstation, wherein said potential fraudulent activity occurs when a first condition is satisfied when said first agent is not said call at said first time, and when a second condition is satisfied when said first agent is accessing said client based resource at said first time.2. The method of claim 1 , wherein said determining that said first agent is accessing a client based resource further comprises:determining that said first agent is accessing an unauthorized application of said client, wherein said unauthorized application becomes authorized for access when said first agent is actively on a call providing services to a customer of said client.3. The method of claim 1 , wherein ...

Подробнее
20-02-2020 дата публикации

MESSAGE EXCHANGE

Номер: US20200059562A1
Автор: HODGE Stephen, Woody David
Принадлежит: Value-Added Communications, Inc.

Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means. 120.-. (canceled)21. A platform for processing messages between a calling party and a called party , the platform comprising:a call processor configured to attempt to connect an outgoing call by the calling party to the called party;a memory that stores a message and a plurality of notification options associated with the message recipient; detect that the outgoing call was not answered by the called party;', 'access messaging restrictions associated with the calling party;', 'verify that the calling party is authorized to send messages;', 'prompt the calling party for a message;', 'receive the message from the calling party;', 'store the message in the memory; and', 'carry out a first notification option from among the plurality of notification options in order to attempt to notify the called party of the message., 'at least one processor and/or circuit coupled to the memory, the at least one processor and/or circuit configured to22. The platform of claim 21 , wherein the at least one processor and/or circuit is further configured to carry out a second notification option from among the plurality of notification options in order to attempt to notify the called party of the message upon a failure of the first notification option to successfully notify the called party claim 21 ,wherein the first notification option is different from the ...

Подробнее
02-03-2017 дата публикации

MANAGING ACCESS TO A CONFERENCE CALL

Номер: US20170063943A1

Managing access to a conference call includes obtaining, via a calendar application, a list of participants, the list of participants includes a number of participants to be included in a conference call, identifying, from the list of participants, a first portion of the participants that have personal passcodes, generating guest passcodes for a second portion of the participants associated with the list of participants that do not have the personal passcodes, and permitting, based on the personal passcodes or the guest passcodes, each of the participants to participate in the conference call. 1. A method for managing access to a conference call , the method comprising , with a computer:obtaining, via a calendar application, a list of participants to be included in a conference call;identifying, from the list of participants, a first portion of the participants that have personal passcodes and a second portion of the participants that do not have a personal passcode;generating a guest passcode for each of the participants that do not have a personal passcode; andpermitting each of the participants presenting either a personal passcode or a guest passcode to participate in the conference call.2. The method of claim 1 , further comprising identifying claim 1 , based on the passcode entered claim 1 , to which of a plurality of conference calls the participant is to be joined.3. The method of claim 1 , further comprising an original moderator transferring responsibility to a fill-in moderator.4. The method of claim 1 , further comprising claim 1 , in response to receiving an action from at least one of the participants claim 1 , generating an uninvited passcode for an uninvited participant that is valid for the duration of the conference call5. The method of claim 1 , further comprising claim 1 , in response to receiving an action from at least one of the participants claim 1 , allowing at least one of the participants to switch between the conference call and a ...

Подробнее
02-03-2017 дата публикации

Emergency Signal For M2M Devices

Номер: US20170064078A1
Принадлежит:

A method includes receiving, at a server connected to a network, a plurality of emergency alerts from a plurality of devices connected to the network. The method also includes analyzing, by the server, the plurality of emergency alerts to determine an emergency type of each of the plurality of emergency alerts. The method includes categorizing, by the server, the plurality of emergency alerts based on the emergency type of each of the plurality of emergency alerts. The method includes prioritizing a first category of the plurality of emergency alerts and consolidating the plurality of emergency alerts of the first category into a consolidated alert. The method includes causing the consolidated alert to be provided to an emergency responder. 1. A method comprising:receiving, at a server connected to a network, a plurality of emergency alerts from a plurality of devices connected to the network;analyzing, by the server, the plurality of emergency alerts to determine an emergency type of each of the plurality of emergency alerts;categorizing, by the server, the plurality of emergency alerts based on the emergency type of each of the plurality of emergency alerts;consolidating the plurality of emergency alerts of a first category into a consolidated alert;consolidating the plurality of emergency alerts of a second category into a second consolidated alert;prioritizing the second category lower than the first category based on at least the emergency type indicated by the first category being ranked higher than the emergency type indicated by the second category; andcausing the consolidated alert to be provided to a recipient at a first transport QoS level before causing the second consolidated alert to be provided to the recipient at a lower transport QoS level than the first transport QoS level.2. The method of claim 1 , further comprising:identifying a subset of the plurality of devices from which the first category of the plurality of emergency alerts was received; ...

Подробнее
12-03-2015 дата публикации

ATTACHING MULTIPLE PHONE LINES TO A SINGLE MOBILE OR LANDLINE PHONE

Номер: US20150071425A1
Принадлежит:

Agencies issue multiple devices to personnel for maintaining distinct identities over the course of assigned investigations. To provide flexible capabilities to agencies, a phone is converted for use with multiple attached telephone numbers. Accordingly, a single phone may be used to manage multiple identities over the course of one or more investigations. Using a multiple attached number, a given device can place and receive calls over the network to and from contacts. In addition to providing multiple attached numbers, calls using the multiple attached numbers may be monitored live and recorded to establish evidence. 1. A computer based method comprising:receiving a message transmitted from a telephonic device to a virtual number on a message service, the message including sender information comprising a transmitting number corresponding to the telephonic device, recipient information comprising the virtual number, and message content;identifying the telephonic device as a contact device;responsive to identifying the telephonic device as the contact device, attaching the sender information to the message content;identifying an operator device associated with the virtual number in a mapping table; andproviding the message content with the attached sender information to the operator device.2. The method of claim 1 , wherein identifying the telephonic device as the contact device comprises analyzing a formatting of the message content claim 1 , the formatting of the message indicating the message is an inbound message to the operator device from the contact device.3. The method of claim 2 , wherein analyzing the formatting of the message content comprises parsing the message to identify at least one of appended and prepended information attached to the message content claim 2 , the inbound message lacking appended and prepended information attached to the message content.4. The method of claim 1 , wherein providing the message content with the sender information to ...

Подробнее
08-03-2018 дата публикации

Usage parameters for communication content

Номер: US20180068096A1
Принадлежит: Triplay Inc

In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present application.

Подробнее
08-03-2018 дата публикации

Method and apparatus for selectively releasing personal contact information stored in an electronic or telephonic database

Номер: US20180068270A1
Автор: Felman Hillel
Принадлежит:

A method and apparatus for screening access to personal contact information in an electronic or telephonic database is provided. The embodiments include a querying party generating a query signal to obtain personal contact information. The query signal is received by a bridge website server and the bridge website server sends a query notification signal to a listing party so as to inform him or her of the existence of a query for personal contact information and the identity of the querying party. The listing party generates a consent/no-consent signal that is sent to the bridge website server, wherein the consent/no-consent signal indicates the personal contact information that is to be revealed to the querying party. A personal contact information signal is then generated by the server, wherein the personal contact information signal provides the querying party the revealed personal contact information of the listing party. 1. A method performed by at least one computer in connection with a bridge website server associated with a bridge website and a personal contact information database containing personal contact information of a listing party comprising two or more of a name , a street address , a telephone number , a fax number , a pager number , a social security number , and an email address of the listing party , the method comprising: [ one or more search terms selected from the group consisting of the name, the street address, the telephone number, the fax number, the pager number, and the social security number of the listing party, and', 'personal contact information of the querying party,, 'wherein the querying signal comprises, 'wherein the querying party is a first person, and', 'wherein the listing party is a second person;, 'at the bridge website server, receiving, over the Internet from a first device executing a web browser, a querying signal generated by the web browser in response to input provided by a querying party into a web page displayed ...

Подробнее
10-03-2016 дата публикации

CEASE AND DESIST CALL FLAGGING

Номер: US20160072938A1
Принадлежит:

Embodiments of the invention relate to systems, methods, and computer program products for providing cease and desist call flagging. The system, method, and computer program product are configured to provide a user interface for reporting cease and desist requests associated with a plurality of customers; receive, via user input into the user interface, a cease and desist request associated with a customer having at least one account maintained by an entity, wherein the cease and desist request specifies at least one rule to be implemented when contacting the customer; and automatically terminate contact to the customer on behalf of the entity based at least partially on the at least one rule specified in the cease and desist request. 1. A system for terminating customer contact procedures based on cease and desists requests , the apparatus comprising:a memory;one or more computing processors; anda software module stored in the memory, said software module comprising instruction code executable by one or more computing processors, and configured to cause the one or more computing processors to:provide a user interface for reporting cease and desist requests associated with a plurality of customers;receive, via user input into the user interface, a cease and desist request associated with a customer having at least one account maintained by an entity, wherein the cease and desist request specifies at least one rule to be implemented when contacting the customer; andin response to receiving the cease and desist request, automatically terminate contact to the customer on behalf of the entity based at least partially on the at least one rule specified in the cease and desist request.2. The system of claim 1 , wherein the entity contacts the customer using an automated dialer claim 1 , and wherein automatically terminating contact to the customer on behalf of the entity comprises:blocking the automated dialer from dialing one or more telephone numbers associated with the ...

Подробнее
28-02-2019 дата публикации

Method and apparatus for controlling visitor call in home network system

Номер: US20190068788A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Disclosed is a technology for a sensor network, machine to machine (M2M), machine type communication (MTC), and internet of things (IoT). The present disclosure can be used for intelligent services (for example, services related to a smart home, smart building, smart city, smart car, connected car, health care, digital education, retail business, security, and safety) based on the technology. A method of controlling a visitor's call by a first terminal in a home network system includes: reading home information pre-stored in the communication module when communication with a communication module installed inside the home is possible; transmitting a visit request message including the home information and identification information of the first terminal to the smart home server or a at least on second terminal from among a plurality of second terminals; and communicating with the at least one second terminal when at least one of the plurality of second terminals accepts communication with the first terminal.

Подробнее
19-03-2015 дата публикации

METHODS AND SYSTEMS FOR INBOUND CALL CONTROL

Номер: US20150078542A1
Автор: Sharpe Benjamin
Принадлежит:

An indication of an incoming call may be received at a call control unit communicatively coupled to, and/or resident within, a telephone. The indication may include identification information for the incoming call. It may be determined whether additional information regarding a caller associated with the identification information exists, and if so, a first operation may be performed on the incoming call responsively to the additional information, otherwise, a second operation may be performed on the incoming call responsively to an absence of the additional information. The additional information my include a user-configurable list of desired callers (e.g., a whitelist) and/or undesired callers (e.g., a blacklist). The additional information may also include caller identification information and/or a spam score. The first operation may be blocking the incoming call, forwarding the incoming call to a voice mailbox, transmitting the incoming call to the telephone, enabling the telephone to receive the incoming call, and/or answering the incoming call and then terminating the incoming call. In some embodiments, the first and/or second operations performed on the incoming call is/are user configurable. 1. A method comprising:receiving an indication of an incoming call at a call control unit communicatively coupled to or resident within a telephone, the call control unit being positioned between a telecommunication service provider providing the incoming call and the telephone, the indication including identification information for the incoming call; andquerying, by the call control unit, a server external to a telecommunication service provider providing the call and the telephone to determine whether additional information regarding a caller associated with the identification information exists, and if so, performing a first operation on the incoming call responsively to the additional information, otherwise, performing a second operation on the incoming call ...

Подробнее
19-03-2015 дата публикации

SYSTEM AND METHOD FOR RECONNECTING A DEVICE TO A GROUP CALL

Номер: US20150078543A1
Принадлежит:

A system and method for reestablishing a voice communications session moderated by a group call server between two or more telephony devices. The method is performed by a processor monitoring the communications session. The method comprises: storing one or more data records representing group call information; detecting disconnection of at least one participating telephony device from the group communications session, and determining that the disconnection was not intentionally initiated; accessing the stored call group information data and causing signals to enable reestablishment of participation by the disconnected device to be sent to the disconnected device; and upon receipt by the group call server from the disconnected device of signals representing a request to reconnect the disconnected device, outputting command signals for reestablishing a communications session between the disconnected device and at least one other device participating in the group communications session. 116-. (canceled)17. A method executed by a group call server for reestablishing a voice communication session moderated by the group call server providing a group communications session between two or more telephony devices , the method comprising:monitoring for a request for disconnection of a voice communication session from a telephony device of the two or more telephony devices;detecting a disconnection of the voice communication session;in response to detecting that the voice communication session has been disconnected, and that the request for disconnection of the voice communication session has not been received, sending an invitation to the telephony device to reestablish the voice communication session; andin response to receiving an acceptance to the invitation from the telephony device, reestablishing the voice communication session with the telephony device.18. The method of claim 17 , wherein detecting the disconnection of the voice communication session includes:monitoring ...

Подробнее
24-03-2022 дата публикации

SIGNAL DETECTION AND BLOCKING FOR VOICE PROCESSING EQUIPMENT

Номер: US20220092603A1
Принадлежит:

A telephone call processor for processing telephone calls comprising voice signals and data signals, the call processor comprising a first telephone interface and a second telephone interface, the call processor being operable in a first mode and in a second mode. In the first mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface and to transmit voice signals and data signals via the second telephone interface. In the second mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface, to block data signals from being transmitted via the second telephone interface and optionally to transmit voice signals via the second telephone interface. 1. A method of processing a telephone call comprising voice signals and data signals between a caller and an agent , the method comprising:receiving a trigger signal indicating that sensitive information is about to be received from the caller;receiving from the caller at a first telephone interface data signals comprising sensitive information; andin response to having received the trigger signal, masking at least some of the data signals to prevent at least some of the sensitive information from being transmitted via a second telephone interface to the agent.2. The method of claim 1 , further comprising forwarding the voice signals between the first and second telephone interfaces thereby maintaining voice communication between caller and agent.3. The method of claim 1 , further comprising transmitting at least some of the data signals received via the second telephone interface to the agent or to an agent computer.4. The method of claim 1 , further comprising determining whether the data signals comprise sensitive information before blocking at least some of the sensitive information from being transmitted via a second telephone interface claim 1 , preferably wherein the determination is implied from the context of ...

Подробнее
05-03-2020 дата публикации

Administrator device and user interface for inmate initiated video visitation system

Номер: US20200077046A1
Автор: Humphries Gary James
Принадлежит:

A computer-implemented video visitation system of a correctional facility includes an administrator computer device in communication with a visitation services computer system and a database. The administrator computer device is configured, via an administrator interface displayed on the administrative computer device, to enable or disable privileges for selected inmates in the inmate population allowing inmates access to the visitation services computer system, and set visitation session preferences including maximum visitation session length and visitation session cost that applies to the visitation services. The visitation services computer system is configured to receive requests for electronic visitation sessions initiated by incarcerated inmates, confirm that each request involves an authorized registered incarcerated inmate or an authorized registered remote non-incarcerated visitor, transmit invitations to the respective recipients in response to each received request for an electronic visitation session, and automatically establish interconnections between visitor computer devices at the remote locations and inmate computer devices in the correctional facility without requiring endpoint control to schedule or initiate a visitation session by administrative personnel of the correctional facility. 124-. (canceled)25. A computer-implemented visitation system for a correctional facility housing a population of incarcerated inmates , the system comprising:an administrator computer device in communication with a visitation services computer system and a database including authorized user data and information for visitation services offered to the inmate population and financial account information for visitation services, the administrator computer device including a display and an input element for use by administrative personnel of the correctional facility; review and edit registered incarcerated inmate information in the authorized user data and information ...

Подробнее
22-03-2018 дата публикации

USER EQUIPMENT TO PERSONALIZE USE OF SERVICE AND OPERATING METHOD THEREOF

Номер: US20180084102A1
Принадлежит: SAMSUNG ELECTRONICS CO., LTD.

An operating method of user equipment configured to personalize use of service is provided. The user equipment includes a storage that stores personalization management information including pieces of personalization information and pieces of service operator information corresponding to each of the pieces of personalization information. The operating method includes accessing the storage to read the personalization management information and, from the personalization management information, detecting personalization information and service operator information matched to reference information registered in the user equipment, and determining whether a user is able to use the service, by using user information that is received from the outside and a result of the detection. 1. An operating method of user equipment configured to personalize use of service , wherein the user equipment comprises a storage configured to store personalization management information comprising a plurality of pieces of personalization information and a plurality of pieces of service operator information corresponding to each of the plurality of pieces of personalization information , the operating method comprising:accessing the storage to read the personalization management information and, from the personalization management information, detecting personalization information and service operator information matched to reference information registered in the user equipment; anddetermining whether a user is able to use the service, by using user information that is received from the outside and a result of the detection.2. The operating method of claim 1 , wherein the reference information comprises at least one activated personalization category claim 1 , based on which the user equipment personalizes the use of service claim 1 , from among a plurality of personalization categories claim 1 , and information indicating at least one pre-set service operator providing the service.3. The ...

Подробнее
02-04-2015 дата публикации

SYSTEM AND METHOD OF COMMUNICATION IN AN IP MULTIMEDIA SUBSYSTEM NETWORK

Номер: US20150092614A1
Принадлежит:

A system and method of communication in an IMS network is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a call processing server having a controller element that receives from a terminal device a calling ID for establishing communications with a called party, submits to a telephone number mapping (ENUM) server a query corresponding to the calling ID, receives from the ENUM server a plurality of communication identifiers retrieved from a Naming Authority Pointer record according to a grade of service (GoS) of the called party, and selects according to the GoS of the called party a communication identifier from the plurality of communication identifiers to establish communications with the called party. Additional embodiments are disclosed. 1. A method comprising:receiving, by a system comprising a processor, a plurality of communication identifiers for an end user of a communication network;receiving, by the system, a selection of a grade of service from a communication device of the end user; andretrieving, by the system, presence information from a presence server subscribed to by the end user;wherein the grade of service corresponds to a subset of the plurality of communication identifiers, the subset of the plurality of communication identifiers being temporally variable,wherein each of the communication identifiers corresponds to a different communication device comprising an end point in the communication network, andwherein at a given time the end user is accessible by equipment of another party via the network in accordance with the grade of service and the presence information.2. The method of claim 1 , further comprising presenting an offer of grades of service via a communication device of the end user claim 1 , wherein the selection of the grade of service is received in response to the offer.3. The method of wherein claim 1 , in accordance with the selection claim 1 , the subset of the plurality ...

Подробнее
19-06-2014 дата публикации

Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services

Номер: US20140169541A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Data used to implement a communications service is managed. A request for a user interface is received over a first communications network from a hosting client. The user interface is sent over the first communications network to the hosting client in accordance with the request. The data used to implement the communications service is received over the first communications network from the hosting client via the user interface. The data used to implement the communications service is forwarded to within a second communications network. The communications service is implemented in the second communications network in accordance with the data.

Подробнее
19-06-2014 дата публикации

METHOD AND SYSTEM FOR INTEROPERATION BETWEEN MULTIPLE CONFERENCE SYSTEMS

Номер: US20140169544A1
Принадлежит: Huawei Technologies Co., Ltd.

Embodiments of the present disclosure disclose a method and a system for interoperation between multiple conference systems. The method includes: sending, by a first conference system, a call request message to a second conference system, where the call request message includes conference authentication information of the second conference system, so that the second conference system authenticates the first conference system according to the conference authentication information; and after the authentication is passed, joining, by the first conference system, the second conference system as a participant, where a type of the participant is a conference. In the solutions provided in the embodiments of the present disclosure, the first conference system joins the second conference system as a participant, thereby implementing interoperation between the first conference system and the second conference system and imposing no additional requirement on a terminal. 1. A method for interoperation between multiple conference systems , comprising:sending, by a first conference system, a call request message to a second conference system, wherein the call request message includes conference authentication information of the second conference system, to enable the second conference system to authenticate the first conference system according to the conference authentication information; andafter the authentication is passed, joining, by the first conference system, the second conference system as a participant, wherein a type of the participant is a conference.2. The method according to claim 1 , wherein the call request message further includes access information of the first conference system claim 1 , and the method further comprising:receiving, by the first conference system, an access request that is sent by the second conference system according to the access information, andproviding, by the first conference system, a conference control interface for the second ...

Подробнее
25-03-2021 дата публикации

SYSTEMS AND METHODS FOR CALLER VERIFICATION

Номер: US20210092227A1
Принадлежит:

Briefly, claimed subject matter may relate to a caller verification system having a signaling resource for forming a communications channel for a call placed between a call source and a call destination. The signaling resource may generate a call setup record having parameters relevant to the formed communications channel. The call verification system may additionally include a call verification device that provides call parameters to the signaling resource and receives from the signaling resource, an indication of a match between the provided call parameters and the parameters of the call setup record. 1. A caller verification system , comprising:a signaling resource that forms a communications channel for a call placed between a call source and a call destination, the signaling resource to generate a call setup record having parameters relevant to the formed communications channel; anda call verification device to provide call parameters to the signaling resource, and to receive from the signaling resource, an indication of a match between the provided call parameters and the parameters of the call setup record.2. The caller verification system of claim 1 , further comprising one or more number allocation databases which claim 1 , responsive to a query initiated at the call destination claim 1 , determines a communication services carrier from a plurality of communication services carrier that formed the communications channel between the call source and the call destination.3. The caller verification system of claim 1 , further comprising:a processor to determine that the call placed between the call source and the call destination is fraudulent based, at least in part, on a mismatch between the provided call parameters and the parameters of the call setup record.4. The caller verification system of claim 1 , wherein the call verification device is adapted to receive a telephone number corresponding to the call source.5. The caller verification system of claim 1 ...

Подробнее
05-05-2022 дата публикации

Inmate device and user interface for inmate initiated video visitation system

Номер: US20220141421A1
Автор: Gary James Humphries
Принадлежит: Homewav LLC

A secured party audio and audio/video communication system and method providing administration, management and control that includes a portable secured communication device in possession solely of a secured party positioned in a secured environment, the portable secured communication device being exclusive to the secured party and communicatively connectable only to a secured connection management system, in a secured connection management system hosting a secured communication device interface, hosting a remote communication device interface, storing in the database information related to the secured party, the portable secured communication system, and the external party, at least one of which includes a predetermined connection parameter, creating the selective communication between the portable secured communication device and only the remote communication device response to the stored database information and controlling a duration of the communication as a function of the predetermined connection parameter as stored in the database.

Подробнее
16-04-2015 дата публикации

CONFERENCE SYSTEM WITH ENHANCED SECURITY AND AUTHENTICATION

Номер: US20150103991A1
Принадлежит: AT&T Intellectual Property I, L.P.

A system receives, at a conference platform, a communication from a communications device of a requester requesting to host an audio conference. The system determines whether an access code provided by the requester is a valid access code associated with a provider communications address specified by the requester. A processor identifies a country from which the communication of the requester originated and determines whether the country from which the communication of the requester originated is a pre-authorized country, associated with a host account, from which to host the global audio conference. An audio conference is established when the access code specified by the requester is determined to be a valid access code associated with the provider communications address specified by the requester and when the country from which the communication of the requester originated is determined to be a pre-authorized country from which to host the audio conference. 1. A method of authenticating a request to host a conference in a communications network , comprising:receiving, at a conference platform, a communication from a communications device of a requester requesting to host a global audio conference, the communication including an access code specified by the requester;determining whether the access code is a valid access code associated with a provider communications address specified by the requester;identifying, with a processor, a country from the which the communication of the requester originated;determining, with the processor, whether the country from which the communication of the requester originated is a pre-authorized country, associated with a host account, from which to host the global audio conference; andestablishing the global audio conference when the access code specified by the requester is determined to be a valid access code associated with the provider communications address specified by the requester and when the country from which the ...

Подробнее
01-04-2021 дата публикации

Global Dialing Format

Номер: US20210099576A1
Принадлежит:

Described herein is at least one non-transitory computer-readable medium comprising instructions to direct at least one processor to utilize a global dialing format. The at least one processor is directed to retrieve a phone number stored on a communication device. The retrieved phone number is converted to the global dialing format by a reformatting sequence or a manual intervention sequence and the reformatted phone number thereby obtained is saved to a global contacts list on the communication device. A local phone number is retrieved from the reformatted phone number when a user selects the reformatted phone number for dialing. The local phone number is in a destination country. A call logic sequence is initiated to assemble the dialing protocol necessary to complete the phone call. An authentication sequence is executed to confirm that the local phone number is an actual phone number in the destination country. The authentication sequence results in an authenticated local phone number which is concatenated with the dialing protocol assembled by the call logic sequence. A concatenated phone number is obtained. The retrieved phone number is saved to a call log in the global dialing format. The concatenated phone number is called. 1. At least one non-transitory computer-readable medium , comprising instructions to direct at least one processor to:retrieve a phone number stored on a communication device;initiate a reformatting sequence to reformat the phone number, wherein the reformatting sequence comprises a first logic sequence, a second logic sequence, a third logic sequence, and a fourth logic sequence;enable a manual intervention sequence when the reformatting sequence is unable to reformat the phone number;save a reformatted phone number to the communication device, wherein the reformatted phone number is in a global dialing format and wherein the reformatted phone number is obtained from the reformatting sequence or from the manual intervention process; ...

Подробнее
14-04-2016 дата публикации

Providing Enhanced User Authentication Functionalities

Номер: US20160105546A1
Принадлежит:

Methods, systems, apparatuses, and computer-readable media for providing enhanced user authentication functionalities are presented. In one or more embodiments, a server computing device may authenticate a user of a user computing device to a customer portal. Subsequently, the server computing device may receive a click-to-call request from the user computing device. In response to receiving the click-to-call request, the server computing device may generate a one-time passcode for the user. Then, the server computing device may provide the one-time passcode to the user. Thereafter, the server computing device may receive one-time-passcode input from an interactive voice response (IVR) server, and such input may be received from a caller. The server computing device then may validate the one-time-passcode input based on the one-time passcode provided to the user. In response to validating the one-time-passcode input, the server computing device may cause the IVR server to authenticate the caller as the user. 1. A method , comprising:authenticating, by a server computing device, a user of a user computing device to a customer portal provided by the server computing device;receiving, by the server computing device, a click-to-call request from the user computing device;in response to receiving the click-to-call request from the user computing device, generating, by the server computing device, a one-time passcode for the user of the user computing device;providing, by the server computing device, the one-time passcode to the user of the user computing device;receiving, by the server computing device, one-time-passcode input from an interactive voice response (IVR) server, the one-time-passcode input corresponding to input provided to the IVR server by a caller;validating, by the server computing device, the one-time-passcode input based on the one-time passcode provided to the user of the user computing device; andin response to validating the one-time-passcode input, ...

Подробнее
12-04-2018 дата публикации

METHODS, APPARATUS AND DEVICES FOR AUTHENTICATING A CALL SESSION

Номер: US20180103144A1
Принадлежит:

Methods and apparatus for authenticating a calling party in respect of a call session are disclosed. The call session is carried out over a communications network between a first communication terminal associated with the calling party and a second communication terminal associated with a called party. The calling party is associated with an organization and the method includes retrieving contact information of one or more calling parties from a database in communication with the server, the contact information including, for each said calling party, an association between a phone number of the first communication terminal and an identity of the associated organization of the calling party, and transmitting the contact information to the second communication terminal, to cause information representing the identity of the associated organization to be displayed by the second communication terminal in response to the second communication terminal receiving an incoming call from the phone number. 1. A method performed by a server for authenticating a calling party for a call session over a communications network between a first communication terminal associated with the calling party and a second communication terminal associated with a called party , wherein the calling party is associated with an organization , the method comprising:retrieving contact information of one or more calling parties from a database in communication with the server, said contact information comprising, for each said calling party, an association between a phone number of the first communication terminal and an identity of the associated organization of the calling party; andtransmitting the contact information to the second communication terminal, to cause information representing the identity of the associated organization to be displayed by the second communication terminal in response to the second communication terminal receiving an incoming call from a given said phone number.2. The ...

Подробнее
13-04-2017 дата публикации

Telecommunication Call Management and Monitoring System With Voiceprint Verification

Номер: US20170104869A1
Автор: Hodge Stephen Lee
Принадлежит: Globel Tel*Link Corp.

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters. 1. A method for restricting access to a call management system , the method comprising: receiving a first image from the user via a camera;', 'verifying the first image is indicative of a face using image recognition; and', 'associating the verified first image with the user; and', 'storing the verified first image in a database; and', receiving the call access request by the user of the call management system;', 'prompting the user for a second image;', 'determining whether a visual characteristic of the second image is a statistical match to a visual characteristic of the stored verified first image; and', 'allowing or rejecting the call to proceed based on the determination., 'authenticating a call access attempt by the user, the authenticating including], 'registering a user of the call management system in an institution, the registering including2. The method of claim 1 , further comprising:after the allowing the call to proceed, sampling image data of the user during the call;comparing the sampled image data with the visual characteristic of the stored verified first image; ...

Подробнее
19-04-2018 дата публикации

METHOD AND APPARATUS FOR PERFORMING NETWORK REGISTRATION THROUGH A SELECTED COMPONENT FOR DATA SERVICE

Номер: US20180109676A1
Принадлежит:

An electronic device is provided that includes a removable SIM to store a first profile including information related to a home network and information related to a roaming network. The portable electronic device also includes an eSIM, and communication circuitry. The portable electronic device further includes at least one processor adapted to determine that the portable electronic device is out of network service coverage corresponding to the home network based at least in part on the first profile, establish, using the communication circuitry, a specified communication connection with the roaming network using the first profile based at least in part on the determining, transmit a request for a second profile associated with data service via the specified communication connection, and receive, in response to the request, the second profile via the specified communication connection, the receiving including storing the second profile in the eSIM. 1. A portable electronic device comprising:a removable subscriber identity module (SIM) to store a first profile including information related to a home network and information related to a roaming network;an embedded subscriber identity module (eSIM);communication circuitry; and determine that the portable electronic device is out of network service coverage corresponding to the home network based at least in part on the first profile;', 'establish, using the communication circuitry, a specified communication connection with the roaming network using the first profile based at least in part on the determining;', 'transmit a request for a second profile associated with data service via the specified communication connection; and', 'receive, in response to the request, the second profile via the specified communication connection, the receiving including storing the second profile in the eSIM., 'at least one processor adapted to2. The portable electronic device of claim 1 , wherein the second profile includes information ...

Подробнее
30-04-2015 дата публикации

METHOD OF SAFEGUARDING ANONYMITY DURING A TELEPHONE COMMUNICATION AND TELECOMMUNICATION SYSTEM FOR IMPLEMENTING THE METHOD

Номер: US20150117620A1
Принадлежит: ORANGE

A method is provided for safeguarding anonymity during a communication with a correspondent, between a caller and a user being called. The communication has an anonymous nature. The method includes the following steps: upon receiving a response from the correspondent to the communication sent by the caller, putting the caller on hold; analysis of the response received from the correspondent, for determining whether the correspondent corresponds to the voicemail of the user being called; and in the case of a positive determination, playing to the caller an anonymous welcome message in which the identity of the user being called is masked. 115-. (canceled)16. A method for safeguarding anonymity during a communication with a correspondent , between a caller and a user being called , the communication being of an anonymous nature , the method comprising the following steps:upon receiving a response from the correspondent to the communication sent by the caller, putting on hold the caller,simultaneously when the caller is put on hold, analysis of the response received from the correspondent, in order to determine whether the correspondent corresponds to a voicemail of the user being called, andin the case of a positive determination, playing to the caller an anonymous welcome message in which the identity of the user being called is masked.17. The method as claimed in furthermore comprising the following steps:saving a message left by the caller in response to the anonymous welcome message,transmission of an indication of the presence of a message left by the caller to the user being called.18. The method as claimed in claim 16 , in which claim 16 , when the correspondent has been determined as corresponding to the voicemail of the user being called claim 16 , the communication link between the caller and the correspondent is interrupted.19. The method as claimed in claim 16 , in which the putting on hold of the caller is implemented by sending to the caller a succession ...

Подробнее
30-04-2015 дата публикации

REGISTRATION, VERIFICATION AND NOTIFICATION SYSTEM

Номер: US20150117625A1
Принадлежит:

A user provides at least one electronic contact address, such as a telephone number, during a registration process. The user is verified by establishing a connection with the user via the electronic contact address. Notification events are established, and the electronic contact address re-verified with the user via the electronic contact address when the notification event occurs. A re-verification code is conveyed to the user, which is returned by the user via an on-line form or telephone entry. 1. A verification and notification process implemented by a computing system , the process comprising:receiving, from a user, information responsive to at least part of a form that is presented to the user on a website, the received information including an electronic contact address associated with the user; establishing a first telephonic connection with the user using the received electronic contact address;', 'communicating a first communicated verification code to the user through the first telephonic connection;', 'receiving a first submitted verification code after it is entered by the user via the website; and', 'verifying the received electronic contact address if the first submitted verification code is the same as the first communicated verification code;, 'verifying the received electronic contact address, wherein verifying the received electronic contact address includesestablishing a notification event associated with the user; conveying a second communicated verification code to the user;', 'receiving a second submitted verification code from the user via a telephone associated with the electronic contact address, the second submitted verification code received from the telephone via a keypad; and', 're-verifying the electronic contact address if the second submitted verification code is the same as the second communicated verification code; and, 'upon detecting an occurrence of the established notification event, re-verifying the electronic contact address, ...

Подробнее
09-06-2022 дата публикации

END-TO-END MANAGEMENT OF AUTHENTICATED COMMUNICATIONS

Номер: US20220182487A1
Принадлежит: NEUSTAR, INC.

Disclosed herein are systems and methods for providing mobile call authentication. For instance, a token indicative of a call request can be received from a calling party. The token can include a called party number and a time of the request. A subscriber database can be accessed to determine identifying information associated with the calling party based at least in part on the token. The token can be authenticated based at least in part on the identifying information and using one or more predefined authentication protocols. The token can be stored in a call session registry storing data indicative of a plurality of active telephone call events. A verification request for the call request can be received from the called party. The call request can be verified based at least in part on the token. The called party can be notified that the call request has been verified. 1. A computer-implemented method for providing end-to-end mobile call authentication , the method comprising:receiving, by one or more computing devices, a token indicative of a call request from a calling party, the token comprising a called party telephone number and a time of the call request, wherein the called party telephone number is associated with a called party and a called party device;accessing, by the one or more computing devices, a subscriber database to determine the identifying information associated with the calling party based at least in part on the token;authenticating, by the one or more computing devices, the token based at least in part on the identifying information and using one or more predefined authentication protocols;storing, by the one or more computing devices, the token in a call session registry, the call session registry storing data indicative of a plurality of active telephone call events;receiving, by the one or more computing devices, a verification request for the call request from the called party;verifying, by the one or more computing devices, the call ...

Подробнее
07-05-2015 дата публикации

INHERENT DISORDER READER ADAPTED TO BE CONNECTED TO A MOBILE DEVICE

Номер: US20150126244A1

Embodiments of the invention provide an adaptor that presents information from an inherent disorder feature as an optical signal. The adaptor is configured to direct the optical signal onto an optical processing unit built into a camera of a mobile device, such as a mobile telephone, to generate an image usable to identify an object. The adaptor is configured to be user attachable to the mobile device. 1. An inherent disorder reader , comprising:an adaptor that presents information from an inherent disorder feature as an optical signal, the adaptor configured to direct the optical signal onto an optical processing unit built into a camera of a mobile device to generate an image usable to identify an object, wherein the adaptor is configured to be user attachable to the mobile device.2. The inherent disorder reader of claim 1 , wherein the adaptor is configured to be removably attached to the mobile device.3. The inherent disorder reader of claim 1 , wherein the mobile device comprises a mobile telephone.4. The inherent disorder reader of claim 1 , wherein the adaptor is configured to be attached to the mobile device using a suction cup.5. The inherent disorder reader of claim 1 , wherein the adaptor is configured to be attached to the mobile device using at least one of a suction-based fastener claim 1 , a clipping fastener claim 1 , a magnetic fastener claim 1 , a threaded fastener claim 1 , a hook and loop fastener claim 1 , an adjustable bracket claim 1 , a re-attachable adhesive claim 1 , and a permanent adhesive.6. The inherent disorder reader of claim 1 , wherein the inherent disorder feature comprises a magnetic inherent disorder feature claim 1 , and wherein the adaptor uses a magneto-optical substrate to present information from the inherent disorder feature as an optical signal.7. The inherent disorder reader of claim 1 , wherein the adaptor is further configured to read an optical feature.8. The inherent disorder reader of claim 7 , wherein the optical ...

Подробнее
07-05-2015 дата публикации

SIGNAL DETECTION AND BLOCKING FOR VOICE PROCESSING EQUIPMENT

Номер: US20150127538A1
Принадлежит:

A telephone call processor for processing telephone calls comprising voice signals and data signals, the call processor comprising a first telephone interface and a second telephone interface, the call processor being operable in a first mode and in a second mode. In the first mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface and to transmit voice signals and data signals via the second telephone interface. In the second mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface, to block data signals from being transmitted via the second telephone interface and optionally to transmit voice signals via the second telephone interface. 110-. (canceled)11. A method of processing a transaction via a telephone call , the method comprising:receiving via a first interface a telephone call, the telephone call comprising voice signals and data signals;obtaining an identifier for the telephone call;receiving transaction information signals encoded in the data signals;associating the identifier with the transaction information signals;generating a request based on the transaction information signals;transmitting via a data interface the request to an external entity;receiving via the data interface a message from the entity to identify success or failure of the request;matching the received message to the telephone call in dependence on the identifier; andprocessing the transaction information signals in dependence on the success or failure of the request.12. The method according to claim 11 , the method further comprising:transmitting via a second interface at least some of the voice signals and the data signals with at least some of the data signals modified to prevent all of the transaction information signals being transmitted via the second interface.13. The method according to claim 12 , further comprising modifying at least some of the data signals by masking ...

Подробнее
14-05-2015 дата публикации

DESTINATION DEVICE BILLING ACCORDING TO CALL RECIPIENT

Номер: US20150131789A1
Принадлежит:

A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices. 1. A method comprising:receiving, by a billing service communicatively connected through a data network to a destination device for a first subscriber, a biometric sampling comprising a first subscriber authenticated identifier for the first subscriber from the destination device during a data signal transmission between the first subscriber and a second subscriber, wherein the first subscriber authenticated identifier authenticates an identity of the first subscriber with an authentication service communicatively connected with the data network;accessing, by the billing service, billing specifications for the first subscriber using the first subscriber authenticated identifier;accessing, by the billing service, a payment request for a sale by the second subscriber to the first subscriber; andprocessing, by the billing service, a payment for the payment request from the first subscriber to the second subscriber using the billing specifications.2. The method according to claim 1 , further comprising:automatically filling in an order form with the billing specifications for an order placed by the first subscriber, wherein the billing specifications specify at least one billing provider for fulfilling the payment for the order from the first subscriber to the second subscriber.3. The method according to claim 2 , further comprising:transmitting the order form to the first subscriber at the destination device, wherein the first subscriber is ...

Подробнее
14-05-2015 дата публикации

Admission Control Of A Communication System

Номер: US20150131790A1
Принадлежит:

Aspects of the disclosure relate to admission control of a communication session in a network. The admission control can be implemented by a network node at the boundary of the network or a subsystem thereof. In one aspect, the admission control can be implemented during a predetermined period and can be based at least on an admission criterion, which can be specific to an end-point device, e.g., a target device or an origination device. The admission criterion can be configurable and, in certain implementations, it can be obtained from historical performance associated with establishment of communication session. Such historical performance can be assessed within a period of a configurable span. 1initiating, at a first network node, a communication session between an originating device and a target device;determining, at the first network node, if a record is cached that is indicative of one or more of the originating device or a user associated with the originating device;processing, by the first network node, the communication session based at least on a predetermined session admission metric in response to the record being determined to be cached; andprocessing the communication session in response to the record being determined to not be cached.. A method comprising: This application is a Continuation of U.S. Non-Provisional application Ser. No. 13/834,452 filed Mar. 15, 2013, herein incorporated by reference in its entirety.Establishment of a communication session (e.g., an interactive multimedia session) generally entails allocation of network resources (e.g., bandwidth, communication channels (such as signaling channels), PDPs, processing resources, and the like), regardless of the communication session being established successfully or failing to initiate. Such allocation can block network resources and can incur processing that can create network congestion, particularly in scenarios in which the communication session is an automated voice session.It is to ...

Подробнее
25-04-2019 дата публикации

IDENTIFYING PROFILE INFORMATION OF SENDERS OF DIRECT DIGITAL MESSAGES

Номер: US20190124177A1
Принадлежит:

This disclosure covers methods, non-transitory computer readable media, and systems that analyze a previously unrecognized communication number associated with a sender of a direct digital message when a client device receives the direct digital message from the previously unrecognized communication number. Based on this analysis, the methods, non-transitory computer readable media, and systems provide profile information associated with the communication number for the client device to present together with the direct digital message. To find relevant profile information for the communication number, the disclosed methods, non-transitory computer readable media, and systems optionally query a social networking system for profile information connected to the communication number. 1. A non-transitory computer readable medium storing instructions thereon that , when executed by at least one processor , cause a client device to:receive, through a messaging system, a direct digital message and a sender communication number associated with a sender of the direct digital message;determine that the sender communication number does not correspond to contact information stored on the client device;query a networking system for profile information associated with the sender communication number;receive from the networking system the profile information associated with the communication number; andpresent the profile information with the direct digital message using a messaging application of the networking system.2. The non-transitory computer readable medium of claim 1 , wherein the instructions that cause the client device to receive the sender communication number associated with the sender of the direct digital message comprise instructions that claim 1 , when executed by the at least one processor claim 1 , cause the client device to receive a phone number or short code associated with the sender of the direct digital message.3. The non-transitory computer readable ...

Подробнее
16-04-2020 дата публикации

ATTACHING MULTIPLE PHONE LINES TO A SINGLE MOBILE OR LANDLINE PHONE

Номер: US20200120206A1
Принадлежит:

Agencies issue multiple devices to personnel for maintaining distinct identities over the course of assigned investigations. To provide flexible capabilities to agencies, a phone is converted for use with multiple attached telephone numbers. Accordingly, a single phone may be used to manage multiple identities over the course of one or more investigations. Using a multiple attached number, a given device can place and receive calls over the network to and from contacts. In addition to providing multiple attached numbers, calls using the multiple attached numbers may be monitored live and recorded to establish evidence. 1. (canceled)2. A computer based method comprising:detecting communication of a message from a communications device to a virtual number;in response to detecting the communication of the message, retrieving, from a mapping table, an entry corresponding to the virtual number;determining, based on information in the entry, whether the communications device is the operator device or a contact device;in response to determining that the communications device is a contact device, transmitting instructions for transmitting the message to the operator device from a respective virtual number indicated in the entry that corresponds to the contact device; andin response to determining that the communications device is the operator device, identifying, based on the information in the entry, a respective contact device to which the message is to be directed, and transmitting instructions for transmitting the message to the respective contact device from the virtual number.3. The method of claim 2 , further comprising:provisioning the virtual number with a virtual number provider; andconfiguring the virtual number with number information operable on a public switched telephony network, wherein the message comprises the number information configured for the virtual number, and wherein the message is transmitted on a short messaging service.4. The method of claim 2 , ...

Подробнее
21-05-2015 дата публикации

INTERJURISDICTIONAL RECORDING MECHANISM

Номер: US20150139408A1
Автор: Dawson William J.
Принадлежит:

The present invention provides a system for recording an interaction including, a telephone call between a caller and a digital processing system placed over an interjurisdictional boundary, and may include a telephone call placed to at least one called recipient. For example, a caller may place a telephone call over an interjurisdictional boundary to a remote computer server. The server may use an interactive voice response (IVR) unit to obtain caller identification information, provide recording identification information to the caller, and receive authorization from the caller to record an interaction between the caller and a call recipient. The server can also obtain testamentary intent information. A telephone call may then be placed by the server to the recipient, and a two-party digital voice recording can be made on the remote server of a three-way telephone call, in which the server is one of the parties. 1. A method comprising:receiving a telephone call from a caller at a digital processing system;obtaining at least one target identifier corresponding to at least one call recipient;obtaining a caller selection to record an interaction based on causing the recording to have legal value, wherein the caller selecting comprises (1) the caller providing one of an implicit authorization or an explicit authorization to record the interaction in a selected jurisdiction, and (2) the caller selecting an interjurisdictional boundary across which one of the call from the caller is made or a call will be made between the digital processing system and the at least one call recipient as part of the interaction, and wherein the interaction comprises the telephone call being made between the caller, the digital processing system and the at least one call recipient;recording the telephone call between the caller, the digital processing system, and the at least one call recipient;protecting the recording from being modified by one of the callers or the at least one call ...

Подробнее
21-05-2015 дата публикации

Systems and Methods for Providing Emergency Callback Procedures

Номер: US20150140946A1
Автор: Hursey John
Принадлежит: AT&T Intellectual Property I, L.P.

Enhanced services, such as call restriction, call forwarding, anonymous call rejection, and proprietary services, may interfere with an emergency callback potentially preventing the callback from reaching the intended destination. Systems and methods for processing emergency calls to eliminate emergency callback failure in response to an emergency call being released are provided herein. 1. A method comprising:receiving, by a gateway mobile switching center from a safety answering point, an emergency callback comprising a calling party number set to a number associated with the safety answering point and further comprising a calling party category set to an emergency service call category;processing, by the gateway mobile switching center, the emergency callback received in response to an unexpected release of an established emergency call between the safety answering point and a mobile device to reestablish communication between the safety answering point and the mobile device;issuing, by the gateway mobile switching center based at least in part on the emergency service call category of the emergency callback received from the safety answering point, a special use send routing information message to a home location register, the special use send routing information message comprising a call blocking parameter to suppress call blocking features enabled for a calling party of the established emergency call, the call blocking features comprising a call restriction service, a bar all incoming calls service, and an anonymous call rejection service;processing, by the gateway mobile switching center, a special use send routing information acknowledgement message received by the gateway mobile switching center from the home location register in response to the special use send routing information message comprising the call blocking parameter, the special use send routing information acknowledgement message comprising a mobile station roaming number obtained from a mobile ...

Подробнее
01-09-2022 дата публикации

Systems and methods for automatically authenticating communications with a calling device

Номер: US20220279067A1
Принадлежит: Neustar Inc

Systems and methods for automatically authenticating an incoming call are disclosed. In one implementation a method for automatically authenticating an incoming call includes receiving a call from a calling device. The call includes an identifier associated with the calling device. The method further includes receiving, separately from the call, authentication data associated with a device or a user, determining, using the identifier and the authentication data, that the authentication data is associated with the same calling device that initiated the call, verifying the authentication data, and based on a result of the verification, determining that the call is initiated by an authenticated device or user.

Подробнее
19-05-2016 дата публикации

SYSTEM AND METHOD TO DETECT AND CORRECT IP PHONE MISMATCH IN A CONTACT CENTER

Номер: US20160142545A1
Автор: Gajjar Hiten Sampat
Принадлежит:

Detecting an IP address mismatch in a contact center includes receiving a workstation login request from a workstation of the center that include login credentials associated with an agent of the center for logging into the workstation. The method also includes retrieving from a database a predetermined first IP address assigned to the agent; receiving an application login request related to an application from a workstation of the center on which the application is executing; extracting a second IP address from the application login request; and comparing the predetermined first IP address with the second IP address and granting the agent access if the addresses match. 1. A method for detecting an Internet Protocol address mismatch in a contact center comprising: 'wherein the workstation login request comprises login credentials associated with an agent of the contact center for logging into the first workstation;', 'receiving, by an authentication server, a workstation login request from a first workstation of the contact center,'}retrieving, by the authentication server, from a contact center database a predetermined first Internet Protocol address assigned to the agent,receiving, by the authentication server, an application login request related to an application, wherein the application login request is received from a workstation of the contact center on which the application is executing;extracting, by the authentication server, a second Internet Protocol address from the application login request, wherein the second Internet Protocol address is that of the workstation on which the application is executing;comparing, by the authentication server, the predetermined first Internet Protocol address with the second Internet Protocol address; andgranting, by the authentication server, the agent access to the first workstation and the application when the predetermined first Internet Protocol address matches the second Internet Protocol address.2. The method of ...

Подробнее
17-05-2018 дата публикации

System and Method for Communicating With Inmates in a Privileged Communication

Номер: US20180139207A1
Автор: Stephen L. Hodge
Принадлежит: Global Tel Link Corp

A system and method for with an inmate in a privileged communication are disclosed. a communication system includes a portal subsystem that determines whether a communication should be monitored, or not, based on received information, including access information, from a first communication device. Based on the determination, the communication system bypasses a monitoring subsystem and stores and/or transmits the communication to a second communication device by way of a non-monitoring subsystem.

Подробнее
28-05-2015 дата публикации

Customer Service Controller

Номер: US20150149342A1
Принадлежит:

Information about a caller is provided to an agent, such as a customer service operator in a customer service call center. In one embodiment, the agent may receive detailed account and/or personal information about the caller before being connected to the actual or live call. For example, the agent receives information from a customer database regarding a customer profile and information from an order database regarding order or transaction information. The customer database and the order database are external to the call center. The agent may modify the customer profile and/or the order or transaction information. The customer database and order database are update accordingly and the information may be transferred along with the call to another agent. 1. A method comprising:receiving, from a telephony system, identification data identifying a caller;obtaining, automatically from a database based on the identification data, order information related to the caller that includes information on previously received currently pending orders to trade futures and/or options contracts as visible to a market which is actively trading therein;presenting the obtained order information to an agent;receiving instructions from the agent representing a plurality of requests of the caller, each of the plurality of requests comprising one or more of cancelling all orders by a firm, canceling all orders by a trader, cancelling specific orders by a trader for more than one product, cancelling orders by more than one trader for a specific product, cancelling individual orders, changing the quantity of an individual order, and changing the quantity of a set of orders for a trader or a firm;prioritizing the plurality of requests based on a predetermined priority algorithm which is based on market risk and/or execution risk associated with the previously received currently pending orders;receiving instructions from the agent to fulfill the plurality of requests of the caller; andsending ...

Подробнее
18-05-2017 дата публикации

System and method for electronic notification in institutional communications

Номер: US20170142258A1
Автор: Serge Seyfetdinov
Принадлежит: VALUE-ADDED COMMUNICATIONS Inc

Disclosed is a multi-mode communication notification system and method for improving communication between an inmate and a third party by enabling a third party to send a web-initiated contact request for a specific inmate and further allowing the inmate to check his/her contact requests or be automatically notified of contact requests. Additionally, the system electronically notifies the third party when the specific inmate has been notified of the contact request. Further, the system notifies the third party if they have missed a call from the specific inmate.

Подробнее
18-05-2017 дата публикации

Clearinghouse server for internet telephony and multimedia communications

Номер: US20170142260A1
Принадлежит: TransNexus Inc

A clearinghouse server for routing multi-media communications, including telephony calls, between a source device and a destination device via a distributed computer network, such as the global Internet. The clearinghouse server can authorize the completion of a communication from a source device to a destination device and collect usage-related information for the completed communication. In response to an authorization request issued by an enrolled source device, the clearinghouse server can identify one or more available destination devices available to accept a communication from an authorized source device. The clearinghouse server can provide a list of the identified destination devices, typically organized in a rank order, by sending an authorization response to the source device. In turn, the source device can use this list to select a destination device and contact that selected device via the computer network to complete the communication.

Подробнее
09-05-2019 дата публикации

USAGE PARAMETERS FOR COMMUNICATION CONTENT

Номер: US20190138699A1
Принадлежит:

In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present application. 1. A system comprising:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction;circuitry for determining one or more network communications channels configured to transport one or more Internet Protocol (IP) packets from one endpoint to another endpoint; andcircuitry for transmitting the at least one content item and the associated usage parameter indicating the at least one usage restriction to the one or more recipient devices via the one or more network communications channels.2. The system of claim 1 , wherein the one or more network communications channels are associated with at least one voice conference enabling substantially live discourse involving one or more recipient devices.3. The system of claim 1 , wherein the circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction comprises:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction, the at least one content item including at least some substantially live discourse.4. The system of claim 2 , wherein the circuitry for determining one or more network communications channels comprises:circuitry for determining the one or more network communications channels associated with at least one internet-based voice conference enabling substantially live discourse involving one or more recipient devices.5. The system of claim 1 , wherein the circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction comprises:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction ...

Подробнее
26-05-2016 дата публикации

INTELLIGENT CONTENT RECOGNITION SYSTEM

Номер: US20160150073A1
Принадлежит:

Arrangements described herein relate to electronic communications and, more particularly, to the exchange of information over a telephonic communication channel. For example, during a telephone call session established over a telephonic communication channel between a user communicating using a first communication device and a customer service system, a content recognition system can receive media content or a digital signature, transmitted by the first communication device during the telephone call session. The media content or digital signature can be communicated over the telephonic communication channel used to support audio communication between the first communication device and the customer service system in the telephone call session. The digital signature can be processed to authenticate an identity of the user. 1. A method , comprising:during a telephone call session established over a telephonic communication channel between a user communicating using a first communication device and a customer service system, receiving by a content recognition system, executed by a processor, a digital signature transmitted by the first communication device during the telephone call session, the digital signature communicated over the telephonic communication channel used to support audio communication between the first communication device and the customer service system in the telephone call session; andresponsive to receiving by the content recognition system the digital signature, processing the digital signature to authenticate an identity of the user.2. The method of claim 1 , wherein the audio communication between the user and the customer service system over the telephonic communication channel occur in the telephone call session prior to and after the digital signature being transmitted.3. The method of claim 1 , wherein the audio communication between the user and the customer service system comprises audio communication between the user and an interactive ...

Подробнее
26-05-2016 дата публикации

PLAYING A PERSONALIZED PRERECORDED AUDIO OF A CALL RECIPIENT TO THE CALL RECIPIENT TO AUTHENTICATE A TELEPHONE CALLER

Номер: US20160150074A1
Принадлежит:

An audio segment recorded by an individual is stored in a computational device controlled by an entity, where the computational device is coupled to a telephony device having a speaker and a microphone that are configurable to be enabled or disabled by the computational device. An electronic communication is initiated to the individual via the telephony device when the speaker and the microphone are both enabled. The stored audio segment is retrieved from an audio recording database that stores a plurality of audio segments of a plurality of individuals and played to the individual to authenticate the entity, in response to the initiating of the electronic communication to the individual. 17-. (canceled)8. A system , comprising:a memory; anda processor coupled to the memory, wherein the processor performs operations, the operations comprising:storing, in a computational device controlled by an entity, an audio segment recorded by an individual, wherein the computational device is coupled to a telephony device;initiating, via the telephony device having a speaker and a microphone that are configurable to be enabled or disabled, an electronic communication to the individual when the speaker and microphone are both enabled; andretrieving the stored audio segment from an audio recording database that stores a plurality of audio segments of a plurality of individuals and playing the stored audio segment to the individual to authenticate the entity, in response to the initiating of the electronic communication to the individual.9. The system of claim 8 , wherein the electronic communication is a telephone call claim 8 , wherein the telephone call is initiated by a representative of the entity to the individual via the telephony device coupled to the system claim 8 , the operations further comprising:disabling the speaker of the telephony device while the stored audio segment is played to prevent the representative from hearing the audio segment recorded by the individual ...

Подробнее