Patent classifications
H04M3/38
SYSTEM AND METHOD FOR UNIFIED AUTODIAL CAMPAIGN MANAGEMENT
A system and method for unified autodial campaign management, comprising a campaign management console, a data services engine, a traffic shaper, an agent desktop, Control agent desktop, an auto-dialer, and a simple dialer which allows enterprises to conduct unified communications campaigns without differentiating between prior expressed written consent consumers, and those who have not provided prior expressed written consent, to being autodialed or receiving artificial or pre-recorded voice messages, allowing for compliance with regulations regarding such consent without splitting or bifurcating or otherwise hampering communications campaigns for the enterprise customers.
Admission control of a communication session
Aspects of the disclosure relate to admission control of a communication session in a network. The admission control can be implemented by a network node at the boundary of the network or a subsystem thereof. In one aspect, the admission control can be implemented during a predetermined period and can be based at least on an admission criterion, which can be specific to an end-point device, e.g., a target device or an origination device. The admission criterion can be configurable and, in certain implementations, it can be obtained from historical performance associated with establishment of communication session. Such historical performance can be assessed within a period of a configurable span.
Admission control of a communication session
Aspects of the disclosure relate to admission control of a communication session in a network. The admission control can be implemented by a network node at the boundary of the network or a subsystem thereof. In one aspect, the admission control can be implemented during a predetermined period and can be based at least on an admission criterion, which can be specific to an end-point device, e.g., a target device or an origination device. The admission criterion can be configurable and, in certain implementations, it can be obtained from historical performance associated with establishment of communication session. Such historical performance can be assessed within a period of a configurable span.
DETECTING AND MITIGATING EFFECTS OF UNAUTHORIZED TELEPHONE NUMBER SPOOFING
The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, facilitating, by a first device, receiving a first communication directed to a second device from a third device associated with a first telephone number. The method can further include determining, by the first device, that the first communication comprises a reference to a second telephone number different from the first telephone number, resulting in a number discrepancy. Further, based on the number discrepancy and an analysis of the first communication, the method can further include preventing, by the first device, communication of the first communication to the third device.
MESSAGE EXCHANGE
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.
MESSAGE EXCHANGE
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.
Authentication using DTMF tones
A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.
Detection and prevention of inmate to inmate message relay
Secure system and method of detecting and preventing inmate to inmate message relays. A system and method which monitors inmate communications for similar phrases that occur as part of two or more separate inmate messages. These similar phrases may be overlapping in real time as in a conference call or can occur at separate times in separate messages. The communications that appear similar are assigned a score and the score is compared to a threshold. If the score is above a certain threshold, the communication is flagged and remedial actions are taken. If the flagged communication contains illegal matter then the communication can be disconnected or restricted in the future.
Detection and prevention of inmate to inmate message relay
Secure system and method of detecting and preventing inmate to inmate message relays. A system and method which monitors inmate communications for similar phrases that occur as part of two or more separate inmate messages. These similar phrases may be overlapping in real time as in a conference call or can occur at separate times in separate messages. The communications that appear similar are assigned a score and the score is compared to a threshold. If the score is above a certain threshold, the communication is flagged and remedial actions are taken. If the flagged communication contains illegal matter then the communication can be disconnected or restricted in the future.
METHOD AND SYSTEM TO INTERCEPT ACCIDENTAL EMERGENCY CALLS IN A DEVICE REPAIR FACILITY
A system for intercepting accidental emergency calls in a facility, the system including at least one dead air network element configured within the facility, the at least one dead air network element providing a cellular signal stronger than live cellular signals as seen by electronic devices within the facility, wherein electronic devices connecting to the at least one dead air network element cannot reach emergency services.