Patent classifications
H04M3/20
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
System and method for managing audio cut-in policy in MCPTT communication
The present disclosure provides a method and system for managing mission critical push-to-talk (MCPTT) communication. The method includes receiving, by a floor control server, a first floor request message, from a primary floor participant, while a floor is given to a secondary floor participant and a first media transmission is performed by the secondary floor participant; in response to receiving the first floor request message, transmitting, by the floor control server, to the secondary floor participant, a first floor revoke message for stopping the first media transmission of the secondary floor participant, and transmitting, by the floor control server, a first floor grant message to the primary floor participant; and transmitting, by the floor control server, a first floor taken message to the secondary floor participant, wherein the first floor taken message includes information of the primary floor participant given the floor.
Mobile-device-based carrier voicemail reduction
A mobile device having phoning capabilities also include capabilities to optionally reduce an operating load on a centralized mobile carrier voicemail system. The user of the mobile device is presented with a notification of an incoming call and is provided with an opportunity to answer the call in a traditional fashion, to optionally engage the centralized mobile carrier voicemail system, or to instead have the mobile device manage options relating to locally obtaining a voicemail from a maker of the incoming call. When the mobile device manages obtaining a voicemail from the maker of the incoming call, the voicemail is originally obtained and is stored locally, without use of centralized carrier resources at the time of recording the voicemail, and the mobile device can also play the recorded voicemail at any time without use of the centralized carrier resources.
Mobile-device-based carrier voicemail reduction
A mobile device having phoning capabilities also include capabilities to optionally reduce an operating load on a centralized mobile carrier voicemail system. The user of the mobile device is presented with a notification of an incoming call and is provided with an opportunity to answer the call in a traditional fashion, to optionally engage the centralized mobile carrier voicemail system, or to instead have the mobile device manage options relating to locally obtaining a voicemail from a maker of the incoming call. When the mobile device manages obtaining a voicemail from the maker of the incoming call, the voicemail is originally obtained and is stored locally, without use of centralized carrier resources at the time of recording the voicemail, and the mobile device can also play the recorded voicemail at any time without use of the centralized carrier resources.
Controlled Recorded 3-Way Calling
Agencies issue recording devices to personnel for administrating and monitoring controlled calls during the course of their duties. To provide flexible capabilities to agencies, a virtual number is provisioned and configured to enable an operator to administrate controlled calls without dedicated recording devices. Using the virtual number, the operator may setup a controlled call between a victim and a baddie. The victim is contacted via the virtual number by the operator and optionally informed about the controlled call process. In turn, the baddie is contacted using number information of the victim's phone and connected with the victim. Call audio between the victim and baddie is transmitted to the operator. When necessary, the operator may terminate the call remotely from the telephonic device the operator used to setup the call.
Controlled Recorded 3-Way Calling
Agencies issue recording devices to personnel for administrating and monitoring controlled calls during the course of their duties. To provide flexible capabilities to agencies, a virtual number is provisioned and configured to enable an operator to administrate controlled calls without dedicated recording devices. Using the virtual number, the operator may setup a controlled call between a victim and a baddie. The victim is contacted via the virtual number by the operator and optionally informed about the controlled call process. In turn, the baddie is contacted using number information of the victim's phone and connected with the victim. Call audio between the victim and baddie is transmitted to the operator. When necessary, the operator may terminate the call remotely from the telephonic device the operator used to setup the call.
Switch controller for separating multiple portions of call
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for collecting call data, feeding call data to applications, and providing advanced call features.
Switch controller for separating multiple portions of call
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for collecting call data, feeding call data to applications, and providing advanced call features.
Method for encrypted call and terminal
A method and a corresponding terminal for an encrypted call, to resolve disadvantages of an encrypted call that is implemented relying on a key management center (KMC) and network reconstruction, and reduce costs. The method includes establishing, by a first terminal, a circuit switched call with a second terminal, determining, by the first terminal using the circuit switched call, a key for performing an encrypted call with the second terminal, and performing, by the first terminal, an encrypted call with the second terminal using the key.