×

Communication logging system

  • US 10,498,899 B2
  • Filed: 06/15/2015
  • Issued: 12/03/2019
  • Est. Priority Date: 06/16/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method for logging a communication from a first user to a second user, comprising:

  • receiving a phone call from a first user;

    receiving a log-in request from the first user via the phone call to confirm an identity of the first user and allow the first user to log in to a system;

    confirming the identity of the first user based on a first password or other form of security identification entered by the first user, and allowing the first user to log in to the system based upon the confirmation;

    recording a voicemail communication from the first user via the phone call in an event database;

    recording a first time stamp record in the event database comprising a time the communication was recorded and a length of the communication;

    receiving a log-in request from a second user to confirm an identity of the second user and allow the second user to log in to the system;

    confirming the identity of the second user based on a second password or other form of security identification entered by the second user, and allowing the second user to log in to the system based upon the confirmation;

    delivering the communication to the second user;

    recording a second time stamp in the event database comprising a time the communication was delivered to the second user;

    restricting access to the event database such that the communication, first time stamp record and second time stamp record cannot be modified or deleted, thereby providing an unalterable record of the communication and its associated first time stamp record and second time stamp record;

    receiving a log-in request from an administrator to confirm an identity of the administrator and allow the administrator to log in to the system;

    confirming the identity of the administrator based on an administrator password or other form of security identification entered by the administrator, and allowing the administrator to log in to the system based upon the confirmation;

    receiving a request from the administrator for a report comprising the communication, the first time stamp, and the second time stamp;

    providing the report to the administrator;

    notifying the second user of the communication prior to receiving the log-in request from the second user; and

    receiving a request from the first user to change the first status of the communication, and changing the first status of the communication in response to the request from the first user.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×