Patent classifications
H04M3/382
Evolving rule based contact exchange
Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends upon adherence or proper application of a prior set. In an embodiment, an initial set of restrictions are generated based on input from a first user, the restrictions relating to contact made by a second user to the first user. These initial restrictions are subsequently modified in response to the second user contacting the first user based on the contact made and a characteristic of the contact. The methods may apply to any form of contact between the first and second users and in an embodiment applies to contact made by the second user to a cellular telephone number belonging to the first user.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
System and method for providing an interactive voice response system with a secondary information channel
A call processing system and method for providing a secondary information channel to a caller. Upon reception of a call from a caller to a customer service representative on a primary access channel determine a device (secondary device) associated with the caller that is separate from the device the caller is using for the primary access channel. The secondary device is to be used to provide a secondary information access channel. The secondary information access channel is complimentary to the primary access channel between the caller and the customer service representative and is utilized to deliver information content to the caller and/or provide other services supportive of the conversation with the company service representative.
Validating automatic number identification data
Verifying caller identification information is described. A query to verify a first communications connection associated with an observed caller ID is received. Using a second communications channel, a message to a device associated with the observed caller ID is transmitted. A response to the message is received. The message is evaluated to perform a security determination. The security determination is provided as output.
RESOURCE RESERVATION SYSTEM AND RESOURCE USAGE METHOD
A resource reservation system includes an information processing apparatus configured to accept a request to use a resource that is reserved; and an information processing terminal configured to communicate with a terminal apparatus. The information processing terminal includes a communicator configured to transmit, to the information processing apparatus, identification information of the terminal apparatus received from the terminal apparatus. The information processing apparatus includes a resource manager configured to determine whether to allow usage of the resource that is reserved, based on the identification information of the terminal apparatus transmitted from the information processing terminal.
Non-resident initiated communication with a controlled-environment facility resident
Systems and methods for initiating communication with a controlled-environment facility resident by a non-resident may employ a controlled-environment facility secure communication platform that receives an incoming communication request from a non-resident, directed to a telephone number assigned to a controlled-environment facility resident and/or a controlled-environment facility media and/or communications device associated with the resident, for a communication with the resident. The facility secure communication platform sends an event notice to the device associated with the resident or a controlled-environment facility media and/or communications terminal associated with the resident, in response to receipt of the incoming communication request. The device or terminal presents an option to accept the event notice and the controlled-environment facility secure communication platform and/or the device or terminal connects an outgoing communication from the device or terminal to a device associated with the non-resident, in response to acceptance of the event notice.
Methods and systems for authenticating a user on a call
Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.
System and method for customizing inmate communication notification
The present disclosure provides details of a system and method for customizing an inmate communication notification. Such a system provides an inmate different customized notification messages to be played to different called parties. The system includes a list of different contacts, and each of the contacts can be associated with one or more contact numbers. Each contact number is associated with one or more customized notification messages. The customized notification messages include terms, phrases, and sentences that draw the called party's attention and sound familiar to the called party. The customized notification messages include customized text files, audio files, and video files. An inmate chooses one or more customized notification messages to be played to a called party.
Data access system for representatives
Embodiments described herein disclose methods and systems for providing selective data access to representatives. In some embodiments, the system can monitor a call between a user and a representative regarding a subject matter. The user can have an associated profile with data, and the data can be locked such that the representative cannot access the data. During the conversation between the representative and the user, the system can continuously convert both parties' speech into text. The system can determine an intent of the call based on the text and unlock a portion of the data about the user based on the determined intent of the call. Only the unlocked portion of the data is displayed to the representative.
Preventing foreign initiated fraudulent or unauthorized use of calling service
Novel tools and techniques are provided for implementing prevention of foreign initiated fraudulent or unauthorized use of calling service. In various embodiments, a computing system might receive, from a first user device associated with an originating party, a request to access a first account of a calling system and an access code. Based on a determination that the received access code is valid, the computing system might determine whether the first user device associated with the originating party is located in a foreign country. If so, the computing system might determine whether a database contains a configurable flag indicating that international access is not allowed for the first account. If so, the computing system might initiate one or more first actions. If not, the computing system might provide the first user device with access to the first account of the calling system.