Patent classifications
H04M3/382
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks
Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.
TELEPHONE SWITCHING DEVICE, TELEPHONE TERMINAL, TELEPHONE SWITCHING SYSTEM, CONTROL METHOD AND CONTROL PROGRAM
A telephone switching device (10) according to the present disclosure includes a storage unit (11) that stores a registration table (11a) registering a plurality of personal telephone numbers for each telephone terminal, an acquisition unit (12) that acquires an authentication result of a user with respect to the telephone terminal, a registration unit (13) that registers the telephone terminal and a personal telephone number of the user in the registration table (11a) in association with each other, according to the acquired authentication result, and a control unit (14) that controls incoming/outgoing calls using the personal telephone number of the user in the telephone terminal, based on the registered registration table (11a).
Systems, methods and computer readable medium for wireless solicitations
Product offering systems are provided. Product offering systems may include sending an offer to a customer that possesses a mobile computing device and has agreed to receive offers for products via the mobile computing device. Agreeing to receive offers would result in the unique data about the customer being available to offer provider. Unique customer data may include data related to the customers wireless service provider or from a financial account in a financial institution, and collecting customer data about the customer, wherein the customer data comprises financial data and personal data. Product offering systems may further include registering a wireless computing device of the customer to able the device to receive the offer, and determining opportunities to send the offer to the customer by monitoring the customer and the customer data. Product offering systems may also include sending the offer to the customer's registered device based on the determination of opportunities.
On-hold experience
Technology for placing a user on-hold can include sending a push notification to a user device after the call has been placed on-hold. A link in the push notification can request authentication credentials from the user. When the authentication credentials have been received and verified, a chat window can be launched via an application on the user device. The intent of the call can be determined based at least in part by information received via the chat window. The authentication information and the intent of the call can be transferred to a representative answering the call.
Telecommunication call management and monitoring system with voiceprint verification
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
On-Hold Experience
Technology for placing a user on-hold can include sending a push notification to a user device after the call has been placed on-hold. A link in the push notification can request authentication credentials from the user. When the authentication credentials have been received and verified, a chat window can be launched via an application on the user device. The intent of the call can be determined based at least in part by information received via the chat window. The authentication information and the intent of the call can be transferred to a representative answering the call.
Shared Device Voicemail Access Bypassing User-Specific Security Credential
A shared device voicemail box can be accessed from a device that is an unauthenticated device without a user-specific security credential. The device obtains an image via a camera of the device and transmits a request to a server. The request includes a unique code based on the image. The device accesses the voicemail box based on an access grant received from the server. Using the obtained image, a non-registered user of a telephony system can access a secured voicemail box.
Communication method and device capable of ensuring the security of personal information
A communication method and device capable of ensuring the security of personal information, wherein the device comprises a database, an information processor and a transceiver; wherein in the database at least one Party B's personal information, including a Party B's code and a Party B's means of communication, is saved, if a Party C (anyone else) wants to communicate the Party B, the Party C can use the said communication device capable of ensuring the security of personal information to forward an information, whereby the security of personal information is guaranteed while the Party C is communicating with the Party B.