Matches 1 - 33 out of 33


Match Document Document Title
US20110306319 Telephone Security System  
Novel methods and devices for securing telephone access. A security code is associated with a phone number that is to be secured. A securing device that stores the security code is connected with...
US20120099716 System and Method for Call Treatment Using a Third Party Database  
Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third party databases are shown. For example, a controlled...
US20120014517 Methods and Systems for Controlling the Blocking of Telephone Calls  
Computer-implemented systems and methods for controlling the blocking of telephone calls are disclosed. A person, for example, bothered by calls from a prison inmate may desire to block future...
US20150201072 System and Method for Controlling Free Phone Calls Through an Institutional Phone System  
A method of controlling free phone calls places from within a secured premises through an institutional phone system generally includes assigning a unique access identifier to an individual caller...
US20130010943 System and Method for Controlling Free Phone Calls Through an Institutional Phone System  
A method of controlling free phone calls places from within a secured premises through an institutional phone system generally includes assigning a unique access identifier to an individual caller...
US20120099714 System and method for controlled call handling  
A telephone call management system is provided including a local system and a central site server using improved blocked or restricted call means including network traffic management. Decisions to...
US20120039453 EVENT IDENTIFICATION IN PEER TO PEER NETWORKS  
A system and method for event notification and access control for Distributed Hash Tables (DHTs) using an event triggering mechanism for DHT-based Peer-to-Peer (P2P) overlay networks is described....
US20070276678 Provision of public information  
Techniques are described for determining agency information and event information, wherein the event information is related to a plurality of events, of which at least one event is associated with...
US20140270124 INDIVIDUAL LOCATION TRACKING IN DETENTION ENVIRONMENTS  
Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal,...
US20120045045 INTERACTIVE NETWORKING SYSTEMS  
A networking system may comprise a web site serviced by a web server assembly. The web site may generally comprise a combination of the following components: a crediting system, a chat bidding...
US20130177146 METHODS AND APPARATUS FOR AUTHORIZATION AND/OR ROUTING OF OUTDIAL COMMUNICATION SERVICES  
Example methods disclosed herein include parsing a request to obtain input criteria associated with the request, the request for authorizing an outdial communication service call initiated by a...
US20120039452 Communication Connection Establishment Control for Preventing Unsolicited Communication  
There is proposed a mechanism for controlling a communication connection establishment to a subscriber using service including blacklisting, whitelisting, authentication request and/or Turing test...
US20120263168 Communication System and Method  
A system comprising: one or more first user terminals each for a respective user, each of the first user terminals comprising a first interface to a service run over a communication network; an...
US20050078810 Automatic telephone call holding system  
An economic alternative to expensive answering services intercepts incoming phone calls after a predetermined number of rings and plays a prerecorded greeting to the incoming caller. After the...
US20050002507 Technique for selectively implementing security measures in an enhanced telecommunications service  
To gain access to an enhanced telecommunications service, security measures are put in place to verify the identity of a caller. In accordance with the invention, some of the security measures may...
US20150023486 TELEPHONIC COMMUNICATION REDIRECTION AND COMPLIANCE PROCESSING  
Processing telephonic communication is disclosed. A request to establish communication is received from a first communication participant. A first identifier associated with the request is mapped...
US20150023487 METHOD AND SYSTEM FOR ENHANCED CONFERENCE CALL SECURITY  
A method for controlling access by of communication devices to a conference call, the method comprising associating proximity settings with a conference call, the proximity settings indicating a...
US20060182246 Maintenance information communication terminal, image forming apparatus provided with same, maintenance information management host,and communication method  
A maintenance information communication terminal, the terminal exchanging maintenance information on an apparatus to be maintenanced with a maintenance information management host, the terminal...
US20070004383 Method and apparatus for providing a call reminder  
In embodiments described herein, a reminder option is provided (310, 418, 606) for user input that subsequently reminds a user of a call event having a call identifier. In response to the user's...
US20070071207 Facsimile apparatus and error call monitoring apparatus  
There are described an facsimile apparatus and a monitor apparatus, which make it possible to prevent occurrence of an error call for an unintended receiver or destination and to provide...
US20110261941 MONITORING INMATE CALLS USING SPEECH RECOGNITION  
A system and method for monitoring telephone activity and conversation content in a correctional facility comprises providing a communicative connection between a caller and a recipient, alerting...
US20060210024 Method of screening calls and communication device having the call screening function  
A method for screening incoming calls includes programming a phone with a call screening function, and activating the call screening function on the phone for screening all incoming calls which...
US20110221579 Systems and methods for RFID-based access management of electronic devices  
Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a RFID tag having unique...
US20080118046 Authorization to place calls by remote users  
A system includes a first interface to connect with a network, and a second interface to connect with a telephone device of an enterprise. A unit controls a connection between the first and second...
US20090080629 SYSTEM AND METHOD FOR CONTROLLING FREE PHONE CALLS THROUGH AN INSTITUTIONAL PHONE SYSTEM  
A method of controlling free phone calls placed from within a secured premises through an institutional phone system generally includes assigning a unique access identifier to an individual caller...
US20090207987 Method and apparatus for treating potentially unauthorized calls  
The present invention seeks to avoid origination or continuation of unauthorized calls, while also avoiding the inconvenience, expense and uncertainty for call parties resulting from premature...
US20150078543 SYSTEM AND METHOD FOR RECONNECTING A DEVICE TO A GROUP CALL  
A system and method for reestablishing a voice communications session moderated by a group call server between two or more telephony devices. The method is performed by a processor monitoring the...
US20160036986 Usage Parameters for Communication Content  
In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present...
US20160021243 TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION  
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management...
US20150365522 METHODS AND SYSTEMS FOR MULTI-FACTOR AUTHENTICATION IN SECURE MEDIA-BASED CONFERENCING  
Methods and apparatuses, including computer program products, are described for multi-factor authentication of media-based (e.g., video and/or audio) conferencing between a plurality of end point...
US20150288810 TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION  
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management...
US20150271343 METHODS AND SYSTEMS FOR PROVIDING TELECOMMUNICATION SERVICES FROM DISPARATE TELECOMMUNICATION SERVICE PROVIDERS  
The technique relates to a method and system for providing a plurality of telecommunication services from disparate telecommunication service providers. This technique involves authenticating the...
US20130084831 Methods of Using Biometric Data in a Phone System and Apparatuses to Perform the Methods  
A system includes a processor and a memory accessible to the processor. The memory includes instructions that, when executed by the processor, cause the processor to perform operations including,...

Matches 1 - 33 out of 33