Communication logging system
First Claim
Patent Images
1. A method for logging a communication from a first user to a second user, comprising:
- receiving a phone call from a first user;
receiving a log-in request from the first user via the phone call to confirm an identity of the first user and allow the first user to log in to a system;
confirming the identity of the first user based on a first password or other form of security identification entered by the first user, and allowing the first user to log in to the system based upon the confirmation;
recording a voicemail communication from the first user via the phone call in an event database;
recording a first time stamp record in the event database comprising a time the communication was recorded and a length of the communication;
receiving a log-in request from a second user to confirm an identity of the second user and allow the second user to log in to the system;
confirming the identity of the second user based on a second password or other form of security identification entered by the second user, and allowing the second user to log in to the system based upon the confirmation;
delivering the communication to the second user;
recording a second time stamp in the event database comprising a time the communication was delivered to the second user;
restricting access to the event database such that the communication, first time stamp record and second time stamp record cannot be modified or deleted, thereby providing an unalterable record of the communication and its associated first time stamp record and second time stamp record;
receiving a log-in request from an administrator to confirm an identity of the administrator and allow the administrator to log in to the system;
confirming the identity of the administrator based on an administrator password or other form of security identification entered by the administrator, and allowing the administrator to log in to the system based upon the confirmation;
receiving a request from the administrator for a report comprising the communication, the first time stamp, and the second time stamp;
providing the report to the administrator;
notifying the second user of the communication prior to receiving the log-in request from the second user; and
receiving a request from the first user to change the first status of the communication, and changing the first status of the communication in response to the request from the first user.
0 Assignments
0 Petitions
Accused Products
Abstract
A communication logging system facilitates communications between two or more users. A secured database stores communications from each user, and the system notifies the intended recipients of the communications. The system records times of creation of the communications, times of access to the communications, and who created and/or accessed the communications. The communications may not be altered or deleted once recorded, so there is a permanent source of reliable evidence as to the content of the communications and information associated therewith.
35 Citations
13 Claims
-
1. A method for logging a communication from a first user to a second user, comprising:
-
receiving a phone call from a first user; receiving a log-in request from the first user via the phone call to confirm an identity of the first user and allow the first user to log in to a system; confirming the identity of the first user based on a first password or other form of security identification entered by the first user, and allowing the first user to log in to the system based upon the confirmation; recording a voicemail communication from the first user via the phone call in an event database; recording a first time stamp record in the event database comprising a time the communication was recorded and a length of the communication; receiving a log-in request from a second user to confirm an identity of the second user and allow the second user to log in to the system; confirming the identity of the second user based on a second password or other form of security identification entered by the second user, and allowing the second user to log in to the system based upon the confirmation; delivering the communication to the second user; recording a second time stamp in the event database comprising a time the communication was delivered to the second user; restricting access to the event database such that the communication, first time stamp record and second time stamp record cannot be modified or deleted, thereby providing an unalterable record of the communication and its associated first time stamp record and second time stamp record; receiving a log-in request from an administrator to confirm an identity of the administrator and allow the administrator to log in to the system; confirming the identity of the administrator based on an administrator password or other form of security identification entered by the administrator, and allowing the administrator to log in to the system based upon the confirmation; receiving a request from the administrator for a report comprising the communication, the first time stamp, and the second time stamp; providing the report to the administrator; notifying the second user of the communication prior to receiving the log-in request from the second user; and receiving a request from the first user to change the first status of the communication, and changing the first status of the communication in response to the request from the first user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for logging a communication from a first user to a second user, comprising:
-
receiving a phone call from a first user; receiving a log-in request from the first user via the phone call to confirm an identity of the first user and allow the first user to log in to a system; confirming the identity of the first user based on a first password or other form of security identification entered by the first user, and allowing the first user to log in to the system based upon the confirmation; recording a voicemail communication from the first user via the phone call in an event database; recording a first time stamp record in the event database comprising a time the communication was recorded and a length of the communication; receiving a log-in request from a second user to confirm an identity of the second user and allow the second user to log in to the system; confirming the identity of the second user based on a second password or other form of security identification entered by the second user, and allowing the second user to log in to the system based upon the confirmation; delivering the communication to the second user; recording a second time stamp in the event database comprising a time the communication was delivered to the second user; restricting access to the event database such that the communication, first time stamp record and second time stamp record cannot be modified or deleted, thereby providing an unalterable record of the communication and its associated first time stamp record and second time stamp record; notifying the second user of the communication prior to receiving the log-in request from the second user; and receiving a request from the first user to change the first status of the communication, and changing the first status of the communication in response to the request from the first user. - View Dependent Claims (7, 8, 9)
-
-
10. A method for logging a communication from a first user to a second user, comprising:
-
receiving a phone call from a first user; receiving a log-in request from the first user via the phone call to confirm an identity of the first user and allow the first user to log in to a system; confirming the identity of the first user based on a first password or other form of security identification entered by the first user, and allowing the first user to log in to the system based upon the confirmation; recording a voicemail communication from the first user via the phone call in an event database; recording a first time stamp record in the event database comprising a time the communication was recorded and a length of the communication; receiving a log-in request from a second user to confirm an identity of the second user and allow the second user to log in to the system; confirming the identity of the second user based on a second password or other form of security identification entered by the second user, and allowing the second user to log in to the system based upon the confirmation; delivering the communication to the second user; recording a second time stamp in the event database comprising a time the communication was delivered to the second user; restricting access to the event database such that the communication, first time stamp record and second time stamp record cannot be modified or deleted, thereby providing an unalterable record of the communication and its associated first time stamp record and second time stamp record; and notifying the first user that the communication was delivered to the second user. - View Dependent Claims (11, 12)
-
-
13. A communication logging system for logging a communication from a first user to a second user, comprising a computer having one or more processors executing instructions to implement software modules, the system comprising:
-
a storage device having a user database having stored therein a password or other form of security identification of a first user and a password or other form of security identification of a second user; an event database configured to store communications, time stamp record and status information associated with communications; a message recording module configured to receive a phone call and record a voicemail communication from the first user to the second user by requiring the first user to log-in to the system using the password or other form of security identification of the first user, electronically receiving the communication from the first user via a communication protocol, associating the communication as having been entered by the first user based on the first user'"'"'s log-in, and storing the communication in the event database; a message checking module configured to enable the second user to access the communication by requiring the second user to log-in to the system using the password or other form of security identification of the second user, accessing the communication stored in the event database, and electronically transmitting the communication to the second user; a time-stamp module configured to generate a) a first time stamp record comprising a time the communication was recorded by the first user and a length of the communication by identifying the time the communication was received from the first user and determining the length of the communication, and b) a second time stamp record comprising a time the communication was accessed by the second user by identifying a time the communication was accessed by the second user and storing the second time stamp record in the event database; a user control module configured to control the status of the communication by enabling the first user to change a first status of the communication and storing the first status from a perspective of the first user in the event database until subsequently changed by the first user, and configured to control the status of the communication by enabling the second user to change a second status of the communication and storing the second status from a perspective of the second user until subsequently changed by the second user; and a master control module configured to prevent modification or deletion of the communication, the first time stamp record and the second time stamp record in the event database such that the event database provides an unalterable record of the communication, the first time stamp record and the second time stamp record, and configured to produce a report of selected contents of the event database including the communication, the first time stamp, and the second time stamp; wherein the password or other form of security identification of the first user comprises a biometric.
-
Specification