Patent classifications
H04M3/387
Method and apparatus for performing network registration through a selected component for data service
An electronic device is provided, which includes a removable SIM, a secure memory configured to store at least one profile, a processor configured to select at least one of the removable SIM and the secure memory, to be used for packet data transmission and reception, in response to an occurrence of a data service change event, and a communication interface configured to perform network registration through the selected at least one of the removable SIM and the secure memory and to transmit and receive packet data through the registered network.
System and method for assessing security threats and criminal proclivities
A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.
User authentication
A method of user authentication by an application (1a) on a mobile telephony device (1) comprises authenticating the user by interaction with the application (1a), communicating with a remote authentication service (4) to receive a call identifier; and sending the call identifier within a telephone call to the remote telephony service (9), by means of which the user is authenticated to the remote telephony service (9). The mobile telephony device may receive a service code linked to the remote telephony service, and the call identifier may be based on this code. The service code may be captured or entered manually into the mobile device, or obtained from an application on the mobile device (1), such as a mobile banking application. The call identifier may be hidden within the call using audio steganography. The authentication service (4) may link the user to a remote service account ID, which is sent to the remote server.
Secure mobile information management system and method
Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information or travel information, for example.
SYSTEM AND METHOD FOR PROVIDING AN IDENTICAL RESPONSE TO A SIMILAR ISSUE THAT IS RECEIVED FROM DIFFERENT CUSTOMERS, VIA INBOUND-INTERACTION IN A DIGITAL MULTI-CHANNEL CONTACT CENTER
A computer-implemented method for providing an identical response to a similar issue that is received from different customers. The computer-implemented method includes when a contact-center occupancy-rate is above a first-preconfigured-threshold, for each inbound-interaction from a customer that is entering an interactions-queue: (i) creating a temporary-case for an issue raised in the inbound-interaction; (ii) operating a Similarity Detection Module on the created temporary-case and cases in a cases-queue to receive a similarity-score for the created temporary-case; (iii) when the received similarity-score is above a second-preconfigured-threshold, operating a category Qualifier Module on the temporary-case to provide an indication as to qualification of a category of the issue raised; (iv) when the provided indication as to qualification of the category of the issued raised is qualified, merging the temporary-case with cases in the cases-queue and retrieving a response of the cases in the cases-queue; and (v) sending the retrieved response to the customer.