Patent classifications
H04M3/205
Support of non-secure warning tones on packet-switched networks, particularly across multiple security domains
A method for supporting non-secure warning tones on packet-switched networks involves receiving a call attempt from a source phone to a destination phone, checking if a connection of the security domains of the source phone and the destination phone via a MLS voice gateway is allowed, and checking if a generation of a non-secure warning tone locally by the source phone is required. A call is established from the source phone to the destination phone upon acknowledgement of the local generation of the non-secure warning tone by the source phone.
Systems and methods for positioning a user of a hands-free intercommunication
A hands-free intercom may include a user-tracking sensor, a directional microphone, a directional sound emitter, a display device, and/or a communication interface. The user-tracking sensor may determine a location of a user so the directional microphone can measure vocal emissions by the user and the directional sound emitter can deliver audio to the user. The hands-free intercom may provide privacy to the user. The hands-free intercom may prevent an eavesdropper from hearing the user's vocal emissions, for example, by canceling the vocal emissions at the eavesdropper's ear. The directional sound emitter may deliver out-of-phase sound to cancel the vocal emissions. The hands-free intercom may also, or instead, cancel ambient noise at the user's ear. The hands-free intercom may measure or predict a filtration of the sound to be canceled and compensate for the filtration when canceling the sound.
Mitigating an induced electrical signal from an appliance in a powered-off state
An isolation unit may include input pins to receive an electrical signal induced by ambient sound waves incident on an appliance in a powered-off state, one or more first transformers, connected to the input pins, to electrically isolate the induced electrical, one or more second transformers, connected to the first transformers, to provide a common mode choke function on the induced electrical signal, one or more inductors, connected to the one or more second transformers, one or more resistors, connected to the one or more inductors, wherein the one or more inductors and the one or more resistors are configured to limit an amplitude of a current of the induced electrical signal, and output pins, connected to the one or more inductors, to receive a modified electrical signal from the one or more inductors to propagate the modified electrical signal to a downstream cable.
Method, apparatus and computer program product for verifying caller identification in voice communications
Techniques are disclosed for verifying caller identification in voice communications. In one embodiment, there is disclosed a method comprising receiving a request to establish a voice call between communications devices. The request comprising encrypted information and an identifier identifying a caller associated with the request to establish the voice call. The method further comprises retrieving, in response to receiving the request, a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the identifier. The method further comprises utilizing the decryption key to decrypt the encrypted information and produce decrypted information as well as comparing the decrypted information and the identifier to determine a similarity therebetween. The method further comprises providing, based on the comparison, an indication of whether or not the request is deemed associated with fraud.
System and method for detecting three-way call circumvention attempts
Disclosed is a three-way call detection system and method for use with a telephone management system. Specifically, a three-way call detection system and method for detecting continuous noise indicative of an attempt to mask a three-way call attempt. The continuous noise detection system and method may be stand alone or used in conjunction with any existing three-way call detection system and method.
Method for Encrypted Call and Terminal
A method and a corresponding terminal for an encrypted call, to resolve disadvantages of an encrypted call that is implemented relying on a key management center (KMC) and network reconstruction, and reduce costs. The method includes establishing, by a first terminal, a circuit switched call with a second terminal, determining, by the first terminal using the circuit switched call, a key for performing an encrypted call with the second terminal, and performing, by the first terminal, an encrypted call with the second terminal using the key.
System And Method For Detecting And Locating Contraband Devices In A Secure Environment
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring and control provided by the inmate communication system provided by the correctional facility, and thus pose a significant security risk. The present disclosure provides details of a system and method that leverages the sanctioned mobile devices and the wireless infrastructure of the inmate communication system to scan for and triangulate the location of contraband devices. The mobile and wireless infrastructure devices scan for transmissions indicative of a contraband device and send alerts to each other and to a central monitoring system. The central monitoring system then leverages multiple alerts to determine a location of the contraband device using multiple triangulation techniques. The triangulation may also be performed by the mobile devices themselves.
INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
System and Method for Detecting and Controlling Contraband Devices in a Controlled Environment
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
Recording detection during a communication session
A method of identifying recording of a conversation during a communication session, including establishing a communication session between a first participant and one or more remote participants, transmitting audio packets from a communication device of the first participant to the one or more remote participants, receiving audio packets from the one or more remote participants, including echo packets responsive to the transmitted audio packets, analyzing the received audio packets by an analysis application to identify delays in the echo packets relative to the transmitted packets providing an indication of the presence of a recording application at a communication device of a remote participant, notifying the communication device of the first participant.