H04M3/387

IDENTIFYING PROFILE INFORMATION OF SENDERS OF DIRECT DIGITAL MESSAGES

This disclosure covers methods, non-transitory computer readable media, and systems that analyze a previously unrecognized communication number associated with a sender of a direct digital message when a client device receives the direct digital message from the previously unrecognized communication number. Based on this analysis, the methods, non-transitory computer readable media, and systems provide profile information associated with the communication number for the client device to present together with the direct digital message. To find relevant profile information for the communication number, the disclosed methods, non-transitory computer readable media, and systems optionally query a social networking system for profile information connected to the communication number.

SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES
20190014207 · 2019-01-10 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

Dual-card and dual-system terminal, incoming call processing method and apparatus thereof, and storage medium thereof

Disclosed is an incoming call processing method for a dual-card and dual-system terminal. A first operating system receives an incoming call of a first SIM card; a second operating system triggers an event to notify the first operating system of an incoming call of a second SIM card upon receiving the same; the first or second operating system partitions a display screen into first and second display regions; and the first operating system displays an operating interface of the SIM card corresponding to the first operating system in the first display region, and triggers an event to notify the second operating system of display in the second display region; or the second operating system displays an operating interface of the SIM card corresponding to the second operating system in the second display region, and triggers an event to notify the first operating system of display in the first display region.

Method and system to intercept accidental emergency calls in a device repair facility
10135962 · 2018-11-20 · ·

A system for intercepting accidental emergency calls in a facility, the system including at least one dead air network element configured within the facility, the at least one dead air network element providing a cellular signal stronger than live cellular signals as seen by electronic devices within the facility, wherein electronic devices connecting to the at least one dead air network element cannot reach emergency services.

SYSTEMS AND METHODS FOR RFID-BASED ACCESS MANAGEMENT OF ELECTRONIC DEVICES
20180276433 · 2018-09-27 ·

Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include an RFID tag having unique identification information associated with a wearer of the RFID tag. The RFID tag may be comprised in a non-removable item worn by the wearer, such as a bracelet. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether a wearer in the coverage zone is authorized to use the electronic device based at least in part on detected RFID tag's unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines the authorized wearer is detected in the coverage zone.

System and method for assessing security threats and criminal proclivities
10074362 · 2018-09-11 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

System and Method for Assessing Security Threats and Criminal Proclivities
20180218730 · 2018-08-02 · ·

A centralized and, robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment, facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

DUAL-CARD AND DUAL-SYSTEM TERMINAL, INCOMING CALL PROCESSING METHOD AND APPARATUS THEREOF, AND STORAGE MEDIUM THEREOF
20180167853 · 2018-06-14 ·

Disclosed is an incoming call processing method for a dual-card and dual-system terminal. A first operating system receives an incoming call of a first SIM card; a second operating system triggers an event to notify the first operating system of an incoming call of a second SIM card upon receiving the same; the first or second operating system partitions a display screen into first and second display regions; and the first operating system displays an operating interface of the SIM card corresponding to the first operating system in the first display region, and triggers an event to notify the second operating system of display in the second display region; or the second operating system displays an operating interface of the SIM card corresponding to the second operating system in the second display region, and triggers an event to notify the first operating system of display in the first display region.

Systems and methods for RFID-based access management of electronic devices
09971918 · 2018-05-15 ·

Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a RFID tag having unique identification information associated with a wearer of the RFID tag. The RFID tag may be comprised in a non-removable item worn by the wearer, such as a bracelet. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether a wearer in the coverage zone is authorized to use the electronic device based at least in part on detected RFID tag's unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines the authorized wearer is detected in the coverage zone.

METHOD AND APPARATUS FOR PERFORMING NETWORK REGISTRATION THROUGH A SELECTED COMPONENT FOR DATA SERVICE
20180109676 · 2018-04-19 ·

An electronic device is provided that includes a removable SIM to store a first profile including information related to a home network and information related to a roaming network. The portable electronic device also includes an eSIM, and communication circuitry. The portable electronic device further includes at least one processor adapted to determine that the portable electronic device is out of network service coverage corresponding to the home network based at least in part on the first profile, establish, using the communication circuitry, a specified communication connection with the roaming network using the first profile based at least in part on the determining, transmit a request for a second profile associated with data service via the specified communication connection, and receive, in response to the request, the second profile via the specified communication connection, the receiving including storing the second profile in the eSIM.