Patent classifications
H04M3/2281
PROMPT DETECTION BY DIVIDING WAVEFORM SNIPPETS INTO SMALLER SNIPPLET PORTIONS
Prompt snippets (typically 800 ms long) that are used to detect voice prompts within a call waveform may be divided into smaller sniplet portions (approx. 100 ms) long. The presence of a prompt in a call waveform may be detected by detecting the sniplets and determining if a sufficient number of the sniplets of a snippet were detected in sequence and within allowable time constraints. The use of sniplets improves accuracy of prompt detection in call waveforms in lower quality transmissions.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
System and method for three-way call detection
A system for detecting three-way calls in a monitored telephone conversation includes a speech recognition processor that transcribes the monitored telephone conversation and associates characteristics of the monitored telephone conversation with a transcript thereof, a database to store the transcript and the characteristics associated therewith, and a three-way Call detection processor to analyze the characteristics of the conversation and to detect therefrom the addition of one or more parties to the conversation. The system preferably includes at least one domain-specific language model that the speech recognition processor utilizes to transcribe the conversation. The system may operate in real-time or on previously recorded conversations. A query and retrieval system may be used to retrieve and review call records from the database.
Inmate device and user interface for inmate initiated video visitation system
A secured party audio and audio/video communication system and method providing administration, management and control that includes a portable secured communication device in possession solely of a secured party positioned in a secured environment, the portable secured communication device being exclusive to the secured party and communicatively connectable only to a secured connection management system, in a secured connection management system hosting a secured communication device interface, hosting a remote communication device interface, storing in the database information related to the secured party, the portable secured communication system, and the external party, at least one of which includes a predetermined connection parameter, creating the selective communication between the portable secured communication device and only the remote communication device response to the stored database information and controlling a duration of the communication as a function of the predetermined connection parameter as stored in the database.
METHOD OF COATING METALLIC POWDER PARTICLES WITH SILICON
A method of coating metallic powder particles includes disposing an amount of metallic powder particles in a fluidizing reactor and removing moisture adhered to the powder particles within the reactor with a working gas at an elevated temperature for a predetermined time. The method further includes coating the powder particles in the reactor with silicon present within the precursor gas at an elevated temperature for a predetermined time and purging the precursor gas from the reactor using the working gas.
System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.
Artificial intelligence driven sentiment analysis during on-hold call state in contact center
Aspects of the present disclosure include monitoring a contact's communication device while a communication session is in a hold state to determine a sentiment of the contact. Natural language recognition and natural language processing are used to determine a sentiment score of the contact based on overheard communications while the communication session is in the hold state. Then, an action is performed based on the sentiment score of the contact.
Call traffic data monitoring and management
One example method of operation may include determining a call received from a calling party and intended for a subscriber device has an elevated likelihood of being a scam call, determining a percentage of calls over a current period of time being filtered as scam calls by a carrier server, when the percentage of calls being filtered as scam calls during the current period of time is above a call threshold percentage, retrieving call history information associated with a subscriber profile of the subscriber device, identifying one or more call patterns from the call history information of the subscriber profile corresponding to the received call, and determining whether to permit the received call based on the identified one or more call patterns.
TELEPHONY COMMUNICATIONS SYSTEM FOR DETECTING ABUSE IN A PUBLIC TELEPHONE NETWORK
A telephony communications system for detecting abuse in a public telephone network to which a telephone network subscriber is connected includes: a telephone system server, configured to: emulate an extension subscriber in order to simulate the existence of the emulated extension subscriber of the telephone system vis-à-vis an attacking entity, receive a control command from the attacking entity to establish a telephone connection between the emulated extension subscriber and the telephone network subscriber, and send a connection request to the telephone network subscriber in response to receiving the control command in order to initiate the establishment of the telephone connection between the emulated extension subscriber and the telephone network subscriber; and a telephone network abuse detection device configured to detect an abuse attempt in the public telephone network on the basis of the telephone network address of the telephone network subscriber.
Inbound Calls to Intelligent Controlled-Environment Facility Resident Media and/or Communications Devices
An inbound call connection request may be received from a non-resident, directed to a controlled-environment facility resident and/or the resident's device. A determination may be made that a calling account of the resident does not have sufficient funds to pay for the inbound call, whereupon a message may be provided to the non-resident offering billing options, including at least a wireless carrier billing option, to complete the call connection. The call may be connected with the resident device in response to a determination a calling account of the inmate has sufficient funds to pay for the call or acceptance of one of the payment methods by the non-resident, along with authentication that the non-resident is associated with an address identifier (AID) of the resident device, and verification that the resident operating the device is associated with the AID of the device.