H04M1/677

Portable system for institutional telephone service provision

One exemplary embodiment provides a device comprising: a connection panel configured to accept a removable connection to a telephone of a controlled access residential institution; a network router connected to the connection panel and configured to connect to a remote network; and an access and security module connected to the network router and configured to control access by the telephone to telephone services provided by accessing a remote call processing center via the remote network. The connection panel, the network router, and access and security module can be at least partially enclosed within a portable enclosure. The device may further comprise a power distribution unit within the enclosure and connected to provide power to the network router and to the access and security module.

Portable system for institutional telephone service provision

One exemplary embodiment provides a device comprising: a connection panel configured to accept a removable connection to a telephone of a controlled access residential institution; a network router connected to the connection panel and configured to connect to a remote network; and an access and security module connected to the network router and configured to control access by the telephone to telephone services provided by accessing a remote call processing center via the remote network. The connection panel, the network router, and access and security module can be at least partially enclosed within a portable enclosure. The device may further comprise a power distribution unit within the enclosure and connected to provide power to the network router and to the access and security module.

A Box to Improve User Focus
20190132440 · 2019-05-02 · ·

A box to encourage a user not to use a mobile device comprising a space to receive the mobile device, a communication logic and wireless technology, selected from near field communication technology (NFC) and personal area network (PAN) technology, to establish a communication between the mobile device and the box, a blocking mechanism to block the mobile device from alerting the user, wherein a time the mobile device is in the box is logged.

System and method for mobile number verification

A mobile phone number that is been provided by a customer during enrollment is verified for use. SS7 protocol data associated with the mobile phone number is collected and evaluated, and if the condition of the subscriber account associated with phone number has changed or is inconsistent with the circumstances surrounding the enrollment of the phone number, the phone number is designated as one that is not to be called.

System and method for mobile number verification

A mobile phone number that is been provided by a customer during enrollment is verified for use. SS7 protocol data associated with the mobile phone number is collected and evaluated, and if the condition of the subscriber account associated with phone number has changed or is inconsistent with the circumstances surrounding the enrollment of the phone number, the phone number is designated as one that is not to be called.

SYSTEM AND METHOD FOR MOBILE NUMBER VERIFICATION

A mobile phone number that is been provided by a customer during enrollment is verified for use. SS7 protocol data associated with the mobile phone number is collected and evaluated, and if the condition of the subscriber account associated with phone number has changed or is inconsistent with the circumstances surrounding the enrollment of the phone number, the phone number is designated as one that is not to be called.

SYSTEM AND METHOD FOR MOBILE NUMBER VERIFICATION

A mobile phone number that is been provided by a customer during enrollment is verified for use. SS7 protocol data associated with the mobile phone number is collected and evaluated, and if the condition of the subscriber account associated with phone number has changed or is inconsistent with the circumstances surrounding the enrollment of the phone number, the phone number is designated as one that is not to be called.

Enforcement of compliance rules
10142494 · 2018-11-27 · ·

Disclosed are various embodiments for enforcing restrictions or compliance rules specified by a dialer application or messaging application executed by a client device such as a smartphone. Such a device can be managed by an enterprise and assigned to a particular user. Restrictions can be based on a location of the client device, a network to which the client device is communicating, or other environmental variables.

Enforcement of compliance rules
10142494 · 2018-11-27 · ·

Disclosed are various embodiments for enforcing restrictions or compliance rules specified by a dialer application or messaging application executed by a client device such as a smartphone. Such a device can be managed by an enterprise and assigned to a particular user. Restrictions can be based on a location of the client device, a network to which the client device is communicating, or other environmental variables.

Virtual telephony assistant

Examples are disclosed for screening an inbound telephony call to a called party. At a communications server, an inbound telephony call intended for a called party's telephone number is received and checked against a whitelist database and a blacklist database. When the caller ID of the inbound call matches a telephone number contained in the blacklist database, the communications server automatically routes the call to a voicemail system or spam folder associated with the called party's telephone number. When the caller ID of the inbound call matches a telephone number contained in the whitelist database, the communications server determines whether the called party is available to receive the call. Otherwise, when the caller ID of the inbound call does not match a telephone number contained in either the whitelist database or the blacklist database, the communications server prompts the caller for additional information.