H04M15/56

Apparatuses, methods, and systems for configuring a trusted java card virtual machine using biometric information
11172352 · 2021-11-09 · ·

Apparatuses, methods, and systems are provided for securely configuring a Java Card virtual machine operating on a cellular device's application processor. In one embodiment, a connected device with an integrated cellular modem, a virtual universal integrated circuit chip and an integrated fingerprint scanner are used. In another embodiment, the cellular device's built-in camera is used, instead of an integrated fingerprint scanner, to capture the user's facial image.

Communications systems, methods, and devices
11756141 · 2023-09-12 ·

Systems, methods, and devices for implementing a communications system having a facility located at a location, first and second communications devices, a data storage device, and a server. The first communications device is arranged to send an alert to a communications server and receive a message from the server in response to the alert, where the first communications device is within a first proximity of the facility and the alert indicates an event type. The second communications device is arranged to receive a notification from the server associated with the alert, where the second communication device is within a second proximity of the facility. The server is arranged to send the notification associated with the alert to the second communications device, such that the notification includes the event type, an identifier of the facility, and a user identifier of the user associated with the first communications device.

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
20220337700 · 2022-10-20 · ·

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.

ADMINSTRATOR DEVICE AND USER INTERFACE FOR INMATE INITIATED VIDEO VISITATION SYSTEM
20220217302 · 2022-07-07 ·

A computer-implemented audio/video visitation system for a correctional facility includes an administrator computer device, a visitation services computer system, and a plurality of tablet computer devices accessible by incarcerated inmates inside the correction facility. The administrator computer device is configured, via an administrator interface, to review and edit registered incarcerated inmate information, review and edit registered remote non-incarcerated visitor information, and suspend or allow access to the visitation computer services system to establish video visitation sessions via one of the plurality of tablet computer devices for selected ones of the registered incarcerated inmates.

System and method for real time fraud analysis of communications data

A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data. The communications data may include calls (e.g., SS7, VoIP, etc. based calls) and messages (e.g., SMS, MMS, etc.). The real time analysis system rejects potentially fraudulent communications data and non-fraudulent communications data in order to be used in real time in the routing path of the communications data. A rejection by the real time analysis system may cause non-fraudulent communications data to still be sent to the intended destination of the communications data. The real time analysis system can be in the routing path of the communications data without further routing non-fraudulent communications data traffic to the next appropriate hop in the routing path.

IMPROVED METHOD AND SYSTEM FOR ROUTING OF INBOUND TOLL-FREE COMMUNICATIONS

Aspects of the present disclosure involve systems, methods, computer program products for consolidating toll-free features of two or more telecommunications networks. In one implementation, the network services may be consolidated through utilization of an Enhanced Feature Server (EFS) or other type of application server deployed in a telecommunications network. The EFS may be configured to receive a toll-free communication and route the communication based on the dialed toll-free number and a carrier identification code (CIC) associated with the communication. Routing the communication based at least on the CIC associated with the communication allows the telecommunications network to consolidate (and ultimately remove) a redundant network or network components from the telecommunications network to improve the operation of the network. In circumstances where a CIC is not associated with a communication, the EFS may request a data schema from a national toll-free number database and determine a CIC for the communication based on an analysis of the data schema.

Voice over long-term evolution (VoLTE) call normalization and alert policy system
11381612 · 2022-07-05 · ·

The present disclosure describes techniques that facilitate detecting a Voice over Long-Term Evolution (VoLTE) call request with a recipient call number that lacks a country code. The VoLTE call request may be initiated by a subscriber device while roaming in a VPLMN. Specifically, a Normalization and Alert Policy (NAP) system is described that is configured to analyze the VoLTE call request and determine an intended country code and adjust the recipient call number to include the country code. Further, the NAP system may analyze the adjusted recipient call number to determine whether initiating a VoLTE call in response to the VoLTE call request may trigger an alert condition. An alert condition may relate to determining that the VoLTE call request may initiate a cost-prohibitive VoLTE communication or that the VoLTE call request relates a fraudulent communication.

Method and System for Managing Telecommunications
20220217233 · 2022-07-07 ·

Methods and systems are disclosed that allow entities set up and send targeted calls and other communications over a network, to intended recipients, who recognize that an approved entity is calling them.

ZERO CHARGE SYSTEMS AND METHODS FOR PACKET-SWITCHED TELEPHONY
20220256040 · 2022-08-11 ·

Asynchronous and/or synchronous telephony protocol systems and methods may include an asynchronous signaling node (ASN) and/or a call duration time quota from a charging onset to place and complete a call based on a first device call request as received from a first user mobile device on a packet switched network. The asynchronous systems include instructions to automatically modify the telephony address with a prefix and destination address when the first device has insufficient or independent balance or upon a network exception; route the modified call signal to the ASN; and deliver and automatically disconnect the call when the call is completed. The synchronous systems are balance-independent and include instructions to automatically set the call duration time quota upon such exception, and deliver and automatically disconnect the call from the second user telephony device when the call is completed or when the call duration time quota is exceeded.

NETWORK EXCEPTION SYSTEMS AND METHODS FOR PACKET-SWITCHED TELEPHONY
20220256039 · 2022-08-11 ·

Asynchronous and/or synchronous telephony protocol systems and methods may include an asynchronous signaling node (ASN) and/or a call duration time quota from a charging onset to place and complete a call based on a first device call request as received from a first user mobile device on a packet switched network. The asynchronous systems include instructions to automatically modify the telephony address with a prefix and destination address when the first device has insufficient or independent balance or upon a network exception; route the modified call signal to the ASN; and deliver and automatically disconnect the call when the call is completed. The synchronous systems are balance-independent and include instructions to automatically set the call duration time quota upon such exception, and deliver and automatically disconnect the call from the second user telephony device when the call is completed or when the call duration time quota is exceeded.