H04M3/382

Validating automatic number identification data
11856132 · 2023-12-26 · ·

Verifying caller identification information is described. A query to verify a first communications connection associated with an observed caller ID is received. Using a second communications channel, a message to a device associated with the observed caller ID is transmitted. A response to the message is received. The message is evaluated to perform a security determination. The security determination is provided as output.

SYSTEM AND METHOD FOR ELECTRONIC NOTIFICATION IN INSTITUTIONAL COMMUNICATIONS
20210021708 · 2021-01-21 · ·

Disclosed is a multi-mode communication notification system and method for improving communication between an inmate and a third party by enabling a third party to send a web-initiated contact request for a specific inmate and further allowing the inmate to check his/her contact requests or be automatically notified of contact requests. Additionally, the system electronically notifies the third party when the specific inmate has been notified of the contact request. Further, the system notifies the third party if they have missed a call from the specific inmate.

Secure video visitation system

Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.

Door-knocking for teleconferencing
10887552 · 2021-01-05 · ·

Teleconferencing between a monitoring device and a user device includes receiving a first request to establish a first audio-visual conference from the user device of a remote user; in response to the first request, performing steps including enabling an audio channel of the monitoring device to receive audio input from the user device and disabling a camera of the monitoring device; displaying, on a display of the monitoring device, an entry code; receiving, from the user device of the remote user, an entered code; and in response determining that the entered code is equal to the entry code, enabling the camera of the monitoring device.

SYSTEM AND METHOD FOR DETERMINING SPOOFING OF AT LEAST ONE IDENTIFIER
20200404098 · 2020-12-24 ·

A system and method for determining spoofing of at least one identifier are described, the identifier being intended for the use of a communication device, during communication between a first communication terminal and a second communication terminal. The method can be implemented by a device for determining spoofing of at least one identifier. The method can include receiving a signaling message of the communication from the first communication terminal and intended for the second communication terminal, the signaling message including at least one identifier and at least one first item of certification data, obtaining at least one second item of certification data on the basis of the at least one received identifier, comparing the at least one first item of certification data with said at least one second item of certification data, and transmitting at least the message to the second terminal on the basis of the result of the comparison.

Systems and methods for authenticating a caller using biometric authentication

Methods and systems described in this disclosure receive a call from a device associated with a caller and determine whether the caller is eligible for biometric authentication via the device by sending, via a communications network, an eligibility determination request to an issuer of the device. In response to the caller being eligible for biometric authentication, a request to initiate a biometric authentication process on the device is sent to an issuer of the device, where biometric credentials are received by the device and an indication of whether the biometric credentials were verified is received from the issuer of the device.

Alternate user communication handling based on user identification

The invention relates to providing alternate user communication based on user identification. A communication from a user may be received, and the communication may include an authentication credential from the user. When the user is determined to be an unauthorized user based on the authentication credential, the communication may be extended in order to capture more information from the unauthorized user, and to deter the unauthorized user from making other unauthorized access attempts. In addition to the extension of the communication with the unauthorized user, one or more additional alternate treatments may be presented to the unauthorized user in order to identify, track, and/or prevent access by the unauthorized user.

System and method for processing high frequency callers

A call processing system and method for processing calls from high volume callers. A frequency of call activity is monitored for callers to determine reception of a call from a high frequency caller. When a call is received from such a caller, provided is information predicted to be requested from the caller prior to the caller being voice connected to a company representative. The retrieved information is then provided to a company representative prior to the caller being voice connected with a company representative as to expedite the call. Additionally, a customized message for the high frequency caller may be generated prior to the caller being voice connected with a company representative whereby the customized message contains information predicted to be responsive to a predicted inquiry from the determined high frequency caller to mitigate the need to connect the caller to a company representative.

AUTHENTICATION USING DTMF TONES
20200366788 · 2020-11-19 ·

A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.

Monitoring and Detection of Fraudulent or Unauthorized Use in Telephone Conferencing Systems or Voice Networks
20200366719 · 2020-11-19 ·

Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.