Patent classifications
H04M17/10
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Feature management of a communication device
A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.
Systems and methods for digital account activation
A method for registering and activating accounts includes: transmitting a first input from a user regarding opening an account at a financial institution; establishing a communication session based on exchanging encryption keys between the user device and the financial computing system; displaying a graphical user interface (GUI) comprising a request for a user verification; transmitting a received user verification to the financial computing system; updating the GUI to display a request to establish a personal identification number (PIN) for a physical payment card associated with the account; receiving the PIN from the user; transmitting a second input comprising the PIN and a request to provision the account to the user device; receiving a payment token associated with the account before the physical payment card associated with the account of the financial computing system is received by the user; and, storing the payment token for transactions via the user device.
SYSTEM AND METHOD TO ENABLE CHARGING AND POLICIES FOR A UE WITH ONE OR MORE USER IDENTITIES
This disclosure proposes a network function node in a core network, comprising: means for receiving, from User Equipment, UE, a non access stratum, NAS, message including identity information for the UE, and a plurality of user identity information, each of which includes a user identifier for a user that uses the UE; and means for sending, to a policy control and charging function node in the core network, the plurality of the user identity information for creating a Policy and Charging Control, PCC, rule based on the plurality of the user identity information.
MTC device, method and apparatus
An MTC device is provided, including: a memory unit for storing a switching condition for switching at least any one of a SIM and a communication carrier in association with each of sets of the SIM and communication carrier; a measuring unit for measuring communication quality for a set of the SIM and the communication carrier currently in use; and a control unit for controlling the switching of at least any one of the SIM and the communication carrier, when the communication quality satisfies the switching condition associated with the set of the SIM and the communication carrier currently in use.
Message exchange
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.
MESSAGE EXCHANGE
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.
Feature management of a communication device
A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.
Personalized devices for out-bound and in-bound inmate calling and communication
Systems and techniques are disclosed for establishing inbound calls and outbound calls involving inmates and outside parties. One exemplary technique receives input identifying authorized sources who are authorized to initiate and conduct calls with an inmate and stores a list of the authorized sources. The list, for example, can include telephone numbers, VOIP caller identifiers, and/or call privileges associated with the sources. The technique receives an inbound call directed to the inmate and determines whether the source of the inbound call is authorized or not, for example, by comparing information about the source with information in the list of authorized sources and/or based on the call privileges. If the source is authorized, the call is permitted. If not the technique routes the call to a payment interface for the caller to provide payment information.