H04M17/00

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
20180007194 · 2018-01-04 · ·

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.

System and method for authenticating called parties of individuals within a controlled environment
11563734 · 2023-01-24 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
20230231843 · 2023-07-20 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

Wireless service provider system for selling and/or activating wireless services for a wireless device
11533599 · 2022-12-20 · ·

A method and system for the purchase and activation of services on a wireless device are provided. The method and system include the use of an airtime card with a near field communication tag with a unique identifier code used to improve a user's experience and ease of activation/provisioning of services for the wireless device. In some aspects, the unique identifier may be generated during the activation and purchase of the wireless service and it is not required that the unique identifier code be recorded in a backend system of the wireless provider prior to activation. The services to be purchased and activated may include at least one of the following: out of the box activation, device upgrades, device reactivations, wireless number changes, wireless number porting, and the addition or purchasing of services including airtime, data, and/or SMS enrollments or data content.

Method, device, and system for securing an access to at least one service

In a method for securing access to a service, a device is set in a restricted operation mode that allows addressing only a first server and that is associated with a first identifier relating to a first connectivity gateway. The device accesses the first identifier and a subscription profile that is active during the restricted operation mode. The first server receives from the device a request for enrolling a device user and at least one feature relating to a user identity. The first server verifies whether the user identity feature is valid. If the user identity feature is valid, the first server sends to the device a command for deactivating the restricted operation mode. The device deactivates the restricted operation mode while storing, instead of the first identifier, a second identifier relating to a second connectivity gateway. The second identifier allows accessing a second server that manages the service.

Feature management of a communication device

A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.

Feature management of a communication device

A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.

Systems and methods for digital account activation

A method for registering and activating accounts includes: transmitting a first input from a user regarding opening an account at a financial institution; establishing a communication session based on exchanging encryption keys between the user device and the financial computing system; displaying a graphical user interface (GUI) comprising a request for a user verification; transmitting a received user verification to the financial computing system; updating the GUI to display a request to establish a personal identification number (PIN) for a physical payment card associated with the account; receiving the PIN from the user; transmitting a second input comprising the PIN and a request to provision the account to the user device; receiving a payment token associated with the account before the physical payment card associated with the account of the financial computing system is received by the user; and, storing the payment token for transactions via the user device.

Wireless service card having machine readable codes and device and process for use therewith
11496630 · 2022-11-08 · ·

A process for authorizing wireless service includes providing a generally rectangular flat form factor card having a first surface and opposing second surface. The process further includes providing a machine-readable activation code arranged on the first surface, wherein the machine-readable activation code is configured to authorize the wireless service when provided to a system associated with a wireless service provider, receiving the machine-readable activation code in a server, the machine-readable activation code being captured by a wireless device, and provisioning the wireless service to the wireless device from a wireless network when the machine-readable activation code is provided to the system associated with the wireless network.

Wireless service provider system and process for providing customizable wireless service for a wireless device
11490233 · 2022-11-01 · ·

A wireless service provider system for authorizing wireless service on a wireless device includes a backend system. The backend system configured receive a request for the wireless service along with a monetary value of the wireless service in any requested amount from the connected device, receive a payment authorization or a verification of payment for the wireless service in the requested amount from the connected device, and receive a request from the connected device for allocating the wireless service.