H04M3/382

SYSTEMS AND METHODS FOR AUTOMATICALLY AUTHENTICATING COMMUNICATIONS WITH A CALLING DEVICE

Systems and methods for automatically authenticating an incoming call are disclosed. In one implementation a method for automatically authenticating an incoming call includes receiving a call from a calling device. The call includes an identifier associated with the calling device. The method further includes receiving, separately from the call, authentication data associated with a device or a user, determining, using the identifier and the authentication data, that the authentication data is associated with the same calling device that initiated the call, verifying the authentication data, and based on a result of the verification, determining that the call is initiated by an authenticated device or user.

Apparatus, methods, or software for data mining user information by providing services over the internet for connecting people

.[.Anonymous voice communication between a first station and a second station is facilitated by providing an interface that allows input of a transaction specification from at least one of the first and second stations. A reference code associated with the transaction is generated, there being a defined relationship between the reference code and the address of the second station for voice communication. The reference code is supplied to the first station, and a voice communication request and the reference code are received from the first station. The reference code is used to recover said address and a channel for voice communication is opened between said first and second stations. Voice communication can thereby be established between the first and second stations without providing the address of the second station to the first station..]..Iadd.An Internet-based service system for data mining user information is herein disclosed and enabled. The disclosed service system may facilitate users posting information, advertising products/services, connecting to other users, and making transactions over the Internet. Data obtained from each transaction submitted through the service are data mined. The collected data may include personal information, private data, interests, intellectual property, etc. To create transactions, the system may create a proposed transaction specifying a transaction between first and second parties based, at least in part, on data mining the first and second party's history of transactions. The service system may transmit a reference code to the first party related to the proposed transaction, and wait to receive a communication request from the first party employing the reference code. The reference code may include text, image(s), video(s), audio, or communication link(s), and the proposed transaction may be an advertisement or matching service..Iaddend.

Secure video visitation system

Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.

Systems and methods for authenticating a caller using biometric authentication

Methods and systems described in this disclosure receive a call from a device associated with a caller and determine whether the caller is eligible for biometric authentication via the device by sending, via a communications network, an eligibility determination request to an issuer of the device. In response to the caller being eligible for biometric authentication, a request to initiate a biometric authentication process on the device is sent to an issuer of the device, where biometric credentials are received by the device and an indication of whether the biometric credentials were verified is received from the issuer of the device.

SIGNAL DETECTION AND BLOCKING FOR VOICE PROCESSING EQUIPMENT

A telephone call processor for processing telephone calls comprising voice signals and data signals, the call processor comprising a first telephone interface and a second telephone interface, the call processor being operable in a first mode and in a second mode. In the first mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface and to transmit voice signals and data signals via the second telephone interface. In the second mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface, to block data signals from being transmitted via the second telephone interface and optionally to transmit voice signals via the second telephone interface.

Preventing foreign initiated fraudulent or unauthorized use of calling service

Novel tools and techniques are provided for implementing prevention of foreign initiated fraudulent or unauthorized use of calling service. In various embodiments, a computing system might receive, from a first user device associated with an originating party, a request to access a first account of a calling system and an access code. Based on a determination that the received access code is valid, the computing system might determine whether the first user device associated with the originating party is located in a foreign country. If so, the computing system might determine whether a database contains a configurable flag indicating that international access is not allowed for the first account. If so, the computing system might initiate one or more first actions. If not, the computing system might provide the first user device with access to the first account of the calling system.

System and methods thereof for real-time fraud detection of a telephone call transaction

A method for detecting of fraudulent calls is provided. The method includes initiating, by an origin node, a call to a target node, and generating, by the origin node, a first call data record (CDR) for the call, wherein the CDR includes at least one call parameter of the call recorded by the origin node upon termination of the call. The method also includes generating, by the origin node, a first secure CDR that contains the first CDR, sending, by the origin node, the first secure CDR to the target node, and generating, by the origin node, a fraud notification based on a second secure CDR received from a first node and the first secure CDR.

MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE IN TELEPHONE CONFERENCING SYSTEMS OR VOICE NETWORKS

Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.

Secure video visitation system

Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.

Systems, methods and computer readable medium for wireless solicitations

Product offering systems are provided. Product offering systems may include sending an offer to a customer that possesses a mobile computing device and has agreed to receive offers for products via the mobile computing device. Agreeing to receive offers would result in the unique data about the customer being available to offer provider. Unique customer data may include data related to the customers wireless service provider or from a financial account in a financial institution, and collecting customer data about the customer, wherein the customer data comprises financial data and personal data. Product offering systems may further include registering a wireless computing device of the customer to able the device to receive the offer, and determining opportunities to send the offer to the customer by monitoring the customer and the customer data. Product offering systems may also include sending the offer to the customer's registered device based on the determination of opportunities.