H04M3/382

System and method for authenticating called parties of individuals within a controlled environment
10819704 · 2020-10-27 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

SYSTEMS AND METHODS FOR AUTOMATICALLY AUTHENTICATING COMMUNICATIONS WITH A CALLING DEVICE

Systems and methods for automatically authenticating an incoming call are disclosed. In one implementation a method for automatically authenticating an incoming call includes receiving a call from a calling device. The call includes an identifier associated with the calling device. The method further includes receiving, separately from the call, authentication data associated with a device or a user, determining, using the identifier and the authentication data, that the authentication data is associated with the same calling device that initiated the call, verifying the authentication data, and based on a result of the verification, determining that the call is initiated by an authenticated device or user.

System and method for electronic notification in institutional communications

Disclosed is a multi-mode communication notification system and method for improving communication between an inmate and a third party by enabling a third party to send a web-initiated contact request for a specific inmate and further allowing the inmate to check his/her contact requests or be automatically notified of contact requests. Additionally, the system electronically notifies the third party when the specific inmate has been notified of the contact request. Further, the system notifies the third party if they have missed a call from the specific inmate.

Systems and methods for authenticating a caller

Methods and systems described in this disclosure receive a call from a caller, generate a first session through a first channel associated with the caller when the call is received and then send a request for authentication credentials to a device associated with the caller. In some embodiments, sending the request for authentication credentials generates a second session through a second channel associated with the caller. The caller can be authenticated to the first session using communication received during the second session through the second channel.

Using calling party number for caller authentication

Embodiments include a system, method, and computer program product that authenticates a caller using calling party information. In an embodiment, an authentication device receives the call request and associated calling party information that includes a calling party number. The authentication device retrieves parameters associated with the calling party number, where a retrieved parameter is a number of accounts linked to the calling party number. The authentication device determines whether the number of accounts is between one and a threshold value, inclusive, and verifies that the call request originates from a location or a device associated with the calling party number. Based on the verifying and determining, the authentication device generates an authentication result that indicates whether the calling party number is authenticated. Then, the authentication device sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result.

Mobile device user validation method and system

A system including a mobile device, a user of the mobile device, a computer system having a telecommunication module for telephonically communicating with the mobile device, a user of the computer system, and a security server is provided. Also provided is a method, at a mobile device, of authenticating a user of the mobile device during a telephone call having the steps of obtaining a user authentication input, obtaining validation of the user authentication input, initiating a telephone call with, or receiving a telephone call from, the computer system, and if the user authentication input is successfully validated, sending a token generated for the telephone call with the computer system via data-over-voice frequency signaling during the telephone call thereby providing an indication that the user authentication input has been successfully validated to the computer system.

Authentication using DTMF tones
10735581 · 2020-08-04 · ·

A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.

SIGNAL DETECTION AND BLOCKING FOR VOICE PROCESSING EQUIPMENT

A telephone call processor for processing telephone calls comprising voice signals and data signals, the call processor comprising a first telephone interface and a second telephone interface, the call processor being operable in a first mode and in a second mode. In the first mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface and to transmit voice signals and data signals via the second telephone interface. In the second mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface, to block data signals from being transmitted via the second telephone interface and optionally to transmit voice signals via the second telephone interface.

APPARATUS AND METHOD FOR HANDLING ESIM PROFILE FOR ISSP DEVICE

A method and apparatus for providing a communication service by installing an eSIM profile even in a terminal to which an iSSP is applied. The method comprises: detecting whether information is input information for eSIM profile download input information from a terminal to which an iSSP is applied, and determining whether the terminal supports the same. Collecting eSIM bundle information of the iSSP by the terminal; selecting an eSIM bundle to be used by referring to a condition designated by the terminal from among the collected eSIM bundles; if there is no bundle to be used or when it is determined that no eSIM bundle is used among existing eSIM bundles, generating an eSIM bundle by the terminal itself or providing an eSIM bundle via communication with the terminal and a server; and on the basis of eSIM bundle information, downloading and installing an eSIM profile package.

Methods, devices, or applications for accessing a service provided over the internet for connecting to another user or device, the service data mines transactions and information of its user

.[.Anonymous voice communication between a first station and a second station is facilitated by providing an interface that allows input of a transaction specification from at least one of the first and second stations. A reference code associated with the transaction is generated, there being a defined relationship between the reference code and the address of the second station for voice communication. The reference code is supplied to the first station, and a voice communication request and the reference code are received from the first station. The reference code is used to recover said address and a channel for voice communication is opened between said first and second stations. Voice communication can thereby be established between the first and second stations without providing the address of the second station to the first station..]. .Iadd.Client (e.g., a device, a station, or an application) for accessing an Internet-based service that data mines user information is herein disclosed and enabled. The service may facilitate a user of the client connecting to other users over the Internet. Data obtained from each transaction submitted through the service are data mined. The collected or obtained data may include private data, interests, intellectual property, and the like. The client may (1) provide, to the user, a proposed transaction specifying a transaction between the user and another user, which is based, at least in part, on data mining the user's history of transactions; (2) provide a reference code to the user related to the proposed transaction; and (3) receive a communication request from the user employing the reference code. The reference code may include text, image(s), video(s), audio, or communication link(s), and the proposed transaction may include an advertisement..Iaddend.