Technology For Combating Mobile Phone Criminal Activity
First Claim
1. A method for crime control comprising:
- receiving a voucher identifier for a mobile phone credit voucher purchased under duress by a victim;
generating a request for a legal order directing a telecommunication service provider to obtain certain information about use of the voucher;
receiving approval for the legal order and transmitting the legal order and the voucher identifier by a law enforcement agency computer system via a network to a computer system of the telecommunication service provider;
receiving, via the network from the telecommunication service provider computer system, a phone number associated with a mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and
performing an automated analysis of the call by a voice recognition process of the law enforcement agency computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
Technology for crime control includes receiving a voucher identifier for a mobile phone credit voucher purchased under duress by a victim and generating a request for a legal order directing a telecommunication service provider to obtain certain information about use of the voucher. Approval for the legal order is received and the legal order and the voucher identifier are transmitted by a law enforcement agency computer system via a network to a computer system of the telecommunication service provider. A phone number associated with a mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number are received via the network from the telecommunication service provider computer system and the law enforcement agency computer system performs an automated analysis of the call by a voice recognition process.
18 Citations
20 Claims
-
1. A method for crime control comprising:
-
receiving a voucher identifier for a mobile phone credit voucher purchased under duress by a victim; generating a request for a legal order directing a telecommunication service provider to obtain certain information about use of the voucher; receiving approval for the legal order and transmitting the legal order and the voucher identifier by a law enforcement agency computer system via a network to a computer system of the telecommunication service provider; receiving, via the network from the telecommunication service provider computer system, a phone number associated with a mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and performing an automated analysis of the call by a voice recognition process of the law enforcement agency computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
at least one computing processor; and a computer-readable storage media connected to the at least one computing processor, wherein the computer-readable storage media has stored thereon a program for controlling the at least one computing processor to perform crime control actions, and wherein the at least one computing processor is operative with the program to execute the program to; receive a voucher identifier for a mobile phone credit voucher purchased under duress by a victim; generate a request for a legal order directing a telecommunication service provider to obtain certain information about use of the voucher; receive approval for the legal order and transmitting the legal order and the voucher identifier via a network to a computer system of the telecommunication service provider; receive, via the network from the telecommunication service provider computer system, a phone number associated with a mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and perform an automated analysis of the call by a voice recognition process. - View Dependent Claims (9, 10, 11, 12)
-
-
13. The system of claim 13, wherein the at least one computing processor is operative with the program to execute the program to communicate to other telecommunication service providers authorization to disable the mobile phone having the identified International Mobile Station Equipment Identity number.
-
14. A computer program product for crime control, the computer program product comprising:
-
a computer-readable storage medium; and computer-readable program code embodied in the computer-readable storage medium, wherein the computer-readable program code is configured to cause at least one computing processor to; receive a voucher identifier for a mobile phone credit voucher purchased under duress by a victim; generate a request for a legal order directing a telecommunication service provider to obtain certain information about use of the voucher; receive approval for the legal order and transmitting the legal order and the voucher identifier via a network to a computer system of the telecommunication service provider; receive, via the network from the telecommunication service provider computer system, a phone number associated with a mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and perform an automated analysis of the call by a voice recognition process. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification