H04M3/42025

TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
20180213082 · 2018-07-26 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

MULTIFUNCTION WIRELESS DEVICE

A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.

Telecommunication call management and monitoring system using wearable device with radio frequency identification (RFID)
09930172 · 2018-03-27 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Telecommunication call management and monitoring system with voiceprint verification
09888112 · 2018-02-06 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Multifunction wireless device

A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used b r central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.

Using Metadata To Take Action On An SMS Message On A Proprietary System
20180032578 · 2018-02-01 ·

Apparatuses, systems, and processes are discussed for using metadata to take action on an SMS message on a proprietary system. In some embodiments, a wearable electronic device has a wearable device application that can present an SMS notification from an SMS application of a mobile computing device. The wearable device application can provide SMS notification data to a partner application of the mobile computing device. The partner application can perform a reverse look-up in a contacts application of the mobile computing device and construct a first contacts list with potential SMS-message senders. The wearable device application can present one or more SMS-message actions to a user of the wearable electronic device for a user selection thereof. The partner application can communicate with a partner server, which, in turn, can communicate with an SMS provider to effect the user selection of the one or more SMS-message actions.

Multifunction wireless device

A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.

Communication forwarding based on content analysis
12177385 · 2024-12-24 · ·

A communication directed to a recipient is stored in a message box of the recipient. A forwardee is identified based on an analysis of the communication. A request is received to transmit the communication to the forwardee. The communication is forwarded to a message box of the forwardee.

MESSAGE CONSOLIDATION PLATFORM
20250030796 · 2025-01-23 ·

Disclosed are various embodiments for a message consolidation platform. A computing device can receive a request to open a conversation feed where the request identifies a user. The computing device can retrieve a plurality of phone number pairs associated with the user, where each phone number pair includes a sender phone number and a recipient phone number. The computing device can obtain a plurality of pulses, where each pulse corresponds to a phone number pair. The computing device can then join the plurality of pulses to form the conversation feed.

Multifunction wireless device

A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.