Patent classifications
H04M2203/6081
PRIVILEGED ELECTRONIC COMMUNICATIONS WITH INMATES
Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
Displaying a textual message based on configuration of the user equipment
In various aspects, a system that receives a first message, wherein the first message comprises a communication device identification and a feature tag having a language indication that indicates a language configuration of a user equipment. In response to the receiving the first message, storing the language indication and associating the language indication with the communication device identification. The system determines whether an incoming call is not authenticated and in response to the determining that the incoming call is not authenticated, transmitting a textual message to the communication device using the language configuration to indicate the incoming call is not authenticated.
Techniques for implementing phone number-based user accounts with permissions to access varying levels of services utilizing visible and hidden contact addresses
This application sets forth techniques for managing phone number-based user accounts. According to some embodiments, a server computing device can be configured to carry out the steps of (1) receiving, from a first client computing device, a request to create a user account based on a phone number, (2) in response to authenticating that the first client computing device is associated with the phone number: creating the user account based on the phone number, creating a hidden contact address based on the phone number, and assigning the hidden contact address to the user account, and (3) in response to receiving a notification that a second client computing device is associated with the phone number: requiring the user account to be updated to be based on a different phone number, or assigning, to the user account, a visible contact address based on the phone number.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
System and method for predicting intelligent voice assistant content
A method including receiving an incoming call from a calling device of a caller and determining identification information for the calling device. The method also includes receiving voice audio data of the caller from the calling device, converting the voice audio data to caller phones, and identifying a customer account associated with the identification information. The method further includes obtaining user phones for multiple candidate users associated with the identified customer account, comparing the caller phones to the user phones for the multiple candidate users, and determining the identity of the caller based on the comparison.
Techniques for Registering An Internet Protocol (IP) Endpoint For Emergency Services Calling
Techniques are described for obtaining current location data for a non-traditional telephony endpoint for emergency calling purposes. An emergency services (ES) provider receives, from a telephony server responding to a telecommunication session establishment request from a telephony endpoint, a location registration request, the location registration request including telephony endpoint identification information and a mobile device telephone number. The ES provider may send a short message service (SMS) message to the mobile device telephone number, the SMS message including an executable registration link that when executed on a mobile device receiving the SMS message causes the mobile device to retrieve location data of the mobile device. The ES provider may then receive the current location data from the mobile device and store it and the telephony endpoint identification information for subsequent use should a 911 call be made from that telephony endpoint. The ES provider may then send the telephony server an authorization acknowledgement for the telecommunication session establishment request.
SYSTEMS AND METHODS FOR AUTHENTICATION USING BROWSER FINGERPRINTING
Embodiments described herein provide for authenticating callers to call centers using browser fingerprinting. A call center system or third-party analytics system includes a server that transmits notifications to a caller device that includes an interactive hyperlink or URL to a particular webpage. When a browser of the caller device navigates to the webpage, the server captures certain types of information about the caller device and generates a browser fingerprint for the caller device. The browser fingerprint is compared against a database of registered browser fingerprints to verify that the caller device of the current call is the registered, expected caller device. The server transmits the notification via any number of communication channels and protocols, such as text messages (e.g., SMS messages, MMS messages), emails, and push notifications associated with client-side software, among others.
Communication system and method of using the same
A communication system can include terminal devices that communicate with a social network or a computer server device for scheduling use of conference resources and/or for using conference appliances that may be located in a conference room being used for a video conference or teleconference. The communication system can be configured to permit a user to use such resources without having to have a user's device be physically and directly connected by wiring to a conference appliance or communication device. The communication system can also be configured to validate participants to help ensure that only authorized personnel are properly attending a scheduled conference based on audio and/or video input received for the different participants and can also be configured to allow screen sharing to be performed during a video conference or teleconference.
System and method of performing secured transactions in a communication network
A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.