Patent classifications
H04M15/06
Using secondary channel information to provide for gateway recording
Systems and methods for using secondary communication channel information, such as RTCP information to facilitate correlating business information to allow gateway recording. Using information in this secondary communication channel the recording system can correlate the business metadata either directly (e.g., using a phone extension) or through one or more indirect operations (e.g., a call ID-to-universal call id-to-phone extension). Additionally, information in the primary communication channel may be used to perform an indirect operation to correlate auxiliary business information (e.g., using the CALLID or UCID in SIP signaling to resolve the agent's phone extension and thereby access auxiliary business information.)
METHOD OF REDIRECTING DATA STREAMS FROM A MOBILE ACCOUNT TO ANOTHER MOBILE ACCOUNT
A method of redirecting data streams exchanged by a mobile terminal associated with a “third-party” account, with a first telecommunications network. The method includes a prior stage including: the first network receiving from the mobile terminal a registration request, and recovering the profile of the third-party account; the first network sending a DNS request including a “redirection” access point name; the DNS system responding by supplying the IP address of a “stream redirection” server; the first network setting up a tunnel between the server and the mobile terminal, by providing the server with at least one identifier of the third-party account; the server supplying a second telecommunications network with which the user of the mobile terminal holds a personal account that is distinct from the third-party account, with at least one identifier of the personal account; and the stream redirection server setting up a tunnel with the second network.
Information provided to parent regarding a called for child protection
The present disclosure describes a system, method, and computer readable medium for providing information of a calling party to an alert party, wherein the calling party is in communication with the receiving party in a communications network. The method includes receiving a message from a calling party to a receiving party and performing a lookup of information relating to the calling party in a database, wherein the lookup is based on an identifier associated with the message, Thereafter, an alert is sent to the alert party if the calling party information is unavailable in a contact list of the receiving party.
Information provided to parent regarding a called for child protection
The present disclosure describes a system, method, and computer readable medium for providing information of a calling party to an alert party, wherein the calling party is in communication with the receiving party in a communications network. The method includes receiving a message from a calling party to a receiving party and performing a lookup of information relating to the calling party in a database, wherein the lookup is based on an identifier associated with the message, Thereafter, an alert is sent to the alert party if the calling party information is unavailable in a contact list of the receiving party.
Personalized devices for out-bound and in-bound inmate calling and communication
Systems and techniques are disclosed for establishing inbound calls and outbound calls involving inmates and outside parties. One exemplary technique receives input identifying authorized sources who are authorized to initiate and conduct calls with an inmate and stores a list of the authorized sources. The list, for example, can include telephone numbers, VOIP caller identifiers, and/or call privileges associated with the sources. The technique receives an inbound call directed to the inmate and determines whether the source of the inbound call is authorized or not, for example, by comparing information about the source with information in the list of authorized sources and/or based on the call privileges. If the source is authorized, the call is permitted. If not the technique routes the call to a payment interface for the caller to provide payment information.
AC/DC phone line detector
An example AC/DC phone line detection system may include one or more of an electronic circuit that is floating with reference to ground, a first A/D converter coupled to the electronic circuit and configured to detect ringing voltages from DC voltages included in a telephone line, a second A/D converter coupled to the electronic circuit and configured to detect caller identification information from AC voltages included in the telephone line, and a processor configured to control signals detected by the first and second A/D convertors and output information about the signals to call taking equipment.
SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
Providing additional information to called parties
A system, method, and computer readable medium for providing additional information to called parties comprises receiving a call from a calling party, performing a lookup of information associated with the calling party in a database, receiving the information from the database, and forwarding the information to a called party. The system comprises at least one device for receiving a call from a calling party, and at least one database for storing information associated with the calling party, wherein the at least one device is operable to perform a lookup of information associated with the calling party in a database, receive the information from the database, and forward the information to a called party.
Using calling party number for caller authentication
Embodiments include a system, method, and computer program product that authenticates a caller using calling party information. In an embodiment, an authentication device receives the call request and associated calling party information that includes a calling party number. The authentication device retrieves parameters associated with the calling party number, where a retrieved parameter is a number of accounts linked to the calling party number. The authentication device determines whether the number of accounts is between one and a threshold value, inclusive, and verifies that the call request originates from a location or a device associated with the calling party number. Based on the verifying and determining, the authentication device generates an authentication result that indicates whether the calling party number is authenticated. Then, the authentication device sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result.