H04M1/67

System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
11501395 · 2022-11-15 ·

A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.

System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
11501395 · 2022-11-15 ·

A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.

Data control system for a data server and a plurality of cellular phones, a data server for the system, and a cellular phone for the system
20230053110 · 2023-02-16 · ·

A data control system comprises a user terminal such as a cellular phone, or an assist appliance, or a combination thereof, and a server in communication with the user terminal. The user terminal acquires the name of a person and an identification data of the person for storage as a reference on an opportunity of the first meeting with the person, and acquires the identification data of the person on an opportunity of meeting again to inform the name of the person with visual and/or audio display if the identification data is in consistency with the stored reference. The reference is transmitted to a server which allows another person to receive the reference on the condition that the same person has given a self-introduction both to a user of the user terminal and the another person to keep privacy of the same person against unknown persons.

Method for Remedying a Security Breach on a Mobile Device

A method and device for providing notification of improper access to secure data on a mobile device. The mobile device detects a request to record content displayed on a display of the mobile device. A determination is then made regarding whether the content that was displayed on the screen when the request to record was received is protected content. If the displayed content was protected, then a third party is notified that a security breach has been detected. A remedial action is also performed regarding the security breach. A device may receive protected content on a mobile device from a third party computer. A device may display the protected content and non-protected content on a display on the mobile device. A device may receive a request to record the protected content and the non-protected content currently displayed on the display on the mobile device. A device may determine whether the protected content is currently on the display on the mobile device. A device may notify the third party computer of the request to record the protected content. A device may take remedial action.

Method for Remedying a Security Breach on a Mobile Device

A method and device for providing notification of improper access to secure data on a mobile device. The mobile device detects a request to record content displayed on a display of the mobile device. A determination is then made regarding whether the content that was displayed on the screen when the request to record was received is protected content. If the displayed content was protected, then a third party is notified that a security breach has been detected. A remedial action is also performed regarding the security breach. A device may receive protected content on a mobile device from a third party computer. A device may display the protected content and non-protected content on a display on the mobile device. A device may receive a request to record the protected content and the non-protected content currently displayed on the display on the mobile device. A device may determine whether the protected content is currently on the display on the mobile device. A device may notify the third party computer of the request to record the protected content. A device may take remedial action.

Telecommunication call management and monitoring system with voiceprint verification
11496621 · 2022-11-08 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Telecommunication call management and monitoring system with voiceprint verification
11496621 · 2022-11-08 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Notification of a security breach on a mobile device

A method and device for providing notification of improper access to secure data on a mobile device. The mobile device detects a request to record content displayed on a display of the mobile device. A determination is then made regarding whether the content that was displayed on the screen when the request to record was received is protected content. If the displayed content was protected, then a third party is notified that a security breach has been detected. A remedial action is also performed regarding the security breach.

Notification of a security breach on a mobile device

A method and device for providing notification of improper access to secure data on a mobile device. The mobile device detects a request to record content displayed on a display of the mobile device. A determination is then made regarding whether the content that was displayed on the screen when the request to record was received is protected content. If the displayed content was protected, then a third party is notified that a security breach has been detected. A remedial action is also performed regarding the security breach.

Mobile terminal device with function limitation, function limitation method thereof, and processing program used in same

The purpose is to provide a mobile terminal device that can limit the use of the application by detecting the user position of the mobile terminal device and the speed of the vehicle by itself. To this end, provided is a function limitation method of a mobile terminal device with function limitation capable of limiting a use of an application, including, a step of determining whether or not a limitation target application of the mobile terminal device is in activation, a usage position check step of determining, by the mobile terminal device, a user of the mobile terminal device is on a driver seat, and a speed check step of calculating, by the mobile terminal device, a vehicle in which the user of the mobile terminal device is riding is traveling, in which the use of the application is limited or terminated when the user of the mobile terminal device is on the driver seat, and the vehicle is traveling.