H04M1/56

Method and system for providing additional information to called parties

A system for providing additional information to called parties, the system comprises a base unit device for sending additional information to called parties, the base unit comprises a microprocessor, at least one Ethernet port, at least one telephone port, a first transceiver, and a first wireless antenna; and a display unit for receiving the additional information from the base unit device and displaying the additional information to the called parties, the display unit comprises a second transceiver, a liquid crystal display, a second wireless antenna, and a set of keys.

Telephone caller authentication

Techniques for authenticating the identity of a caller in a telephone call are disclosed. The device generating the call implements encrypting caller identification information and initiating the telephone call, said initiating comprising providing a voice carrier signal including the caller identification information; and simultaneously providing a data carrier signal including the encrypted caller identification information. The receiving device implements receiving the telephone call; decrypting the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of verifying the authenticity of a certificate used to encrypt the caller identification information; and comparing the decrypted caller identification information with the caller identification information from the voice carrier signal. A telephony device implementing such an authentication technique is also disclosed.

System and method for call treatment using a third party database

Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third party databases are shown. For example, a controlled environment facility information management system may access a database external thereto, such as a victim notification database, which is created and maintained by a third party unrelated to the controlled environment facility. Such third party database access may be accomplished at the point of call validation or caller verification for determining the treatment of the call (e.g., allowed, blocked, allowed with limitations, etcetera). Such call treatment determinations may be made with respect a particular prisoner or other resident of the controlled environment facility making the call, may be made with respect to all calls made from a particular controlled environment facility, may be made with respect to a group of controlled environment facilities, etcetera.

Automatically altering characteristics of audio alerts
09654622 · 2017-05-16 · ·

In general, a computing device is described that receives an indication of a particular communication from a particular sender. The computing device determines a relationship score based at least in part on a relationship context between the particular sender and a user of the computing device. The relationship score indicates a degree of strength of a relationship between the particular sender and the user of the computing device. While outputting an alert indicative of the communication, the computing device adjusts one or more characteristics of the alert based at least in part on the relationship score.

Methods and devices for labeling a number
09648152 · 2017-05-09 · ·

A method for a device to label a number is disclosed. The method includes: receiving an application identification of a service application and an unknown number sent from a calling terminal, the unknown number being a telephone number provided to a user by the service application, and the calling terminal invoking a telephone application through the service application to call the unknown number; acquiring an application type of the service application according to the application identification; and labeling the unknown number according to the application type.

METHOD AND DEVICE FOR MAKING CALL
20170126888 · 2017-05-04 · ·

The present disclosure relates to a method and a device for making a call. Aspects of the disclosure provide a method for communication. The method includes determining, at a terminal device, whether a user of the terminal device is in a vehicle-driving state, and when the user of the terminal device is in the vehicle-driving state, sending a first message to a server for the server to make the vehicle-driving state of the user noticeable to one or more contact persons of the user to avoid calling disturbance from the one or more contact persons.

Identifying a contact based on a voice communication session

Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.

Abuse detection for phone number lookups
09621737 · 2017-04-11 · ·

A system and method for rate-limiting phone number lookups. An account look-up application receives an address book of a first user, the address book including a phone number that belongs to a second user, creates a phone edge by associating the phone number in the address book with an account of the second user, receives a request including the phone number from the first user for obtaining the account associated with the phone number, determines an edge cost associated with the phone edge for the first user, determines whether to provide the phone edge to the first user based on the edge cost, and provides the phone edge to the first user responsive to a positive determination.

Providing a phone call which indicates context to a call receiving device

A technique provides a phone call from a caller device operated by a human caller to an answerer device operated by a human answerer. The technique involves receiving a call request from the caller device. The call request includes a call button identifier which uniquely identifies a browser call button which is rendered on the caller device to the caller. The technique further involves identifying a source phone number based on the call button identifier. The technique further involves placing a call communication to the answerer device operated by the human answerer. The call communication indicates the source phone number as a source of the call communication. Accordingly, if the answerer device already has the context of associated with the source phone number already saved (e.g., in a contact list), the answerer device is able to automatically display that context in response to the call.

Crisis negotiation telephone

A negotiator makes and receives calls and SMS with a subject through a virtual number. Parties of individuals serving specialized functions are optionally dialed in to monitor the call/receive the SMS each time those communications occur. Alternatively, a member of a particular party can dial in ahead of a call and be placed in a waiting room for the party until the call happens. Different parties may have different functions. For example, one party may be configured such that members can discuss amongst themselves while hearing the negotiator and the subject communicate. Another party may be configured such that communications among the members is disabled such that each member only hears audio from the negotiator and subject.