Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
DCFirst Claim
Patent Images
1. A method of managing telephone activity in an institution, comprising the steps of:
- (1) identifying an institutional caller who wishes to place an outside call to an outside recipient;
(2) blocking the institutional caller, and while the institutional caller'"'"'s line remains blocked;
(a) calling said outside recipient;
(b) providing the identity of said institutional caller to said outside recipient; and
(c) receiving a control code from said outside recipient;
(3) determining, in response to said control code, whether to connect the institutional caller to the outside recipient;
(4) determining, in response to said control code, whether to prohibit all callers within said institution from calling said outside recipient in the future.
30 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A method and apparatus for managing institutional telephone activity utilizes a computer control unit to control a trunk management unit, which connects institutional telephones to outside telephone lines. The computer control unit contains a database for storing the calling privileges and restrictions of institutional users and for recording calling transactions made by the users. The computer control unit implements a prospective call screening feature whereby outside recipients of undesired calls from the institution may enter a code that directs the computer control unit to prohibit similar calls in the future.
-
Citations
21 Claims
-
1. A method of managing telephone activity in an institution, comprising the steps of:
-
(1) identifying an institutional caller who wishes to place an outside call to an outside recipient; (2) blocking the institutional caller, and while the institutional caller'"'"'s line remains blocked; (a) calling said outside recipient; (b) providing the identity of said institutional caller to said outside recipient; and (c) receiving a control code from said outside recipient; (3) determining, in response to said control code, whether to connect the institutional caller to the outside recipient; (4) determining, in response to said control code, whether to prohibit all callers within said institution from calling said outside recipient in the future. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of managing telephone activity in an institution, comprising the steps of:
-
(1) identifying an institutional caller who wishes to place an outside call to an outside recipient; (2) blocking the institutional caller, and while the institutional caller'"'"'s line remains blocked; (a) calling said outside recipient; (b) providing the identity of said institutional caller to said outside recipient; and (c) receiving a control code from said outside recipient; (3) determining, in response to said control code, whether to connect the institutional caller to the outside recipient; and (4) determining, in response to said control code, whether to prohibit said institutional caller from calling said outside recipient in the future. - View Dependent Claims (12, 13)
-
-
14. A method of managing telephone activity in an institution, comprising the steps of:
-
(1) identifying an institutional caller who wishes to place an outside call to an outside recipient; (2) blocking the institutional caller, and while the institutional caller'"'"'s line remains blocked; (a) calling said outside recipient; (b) providing the identity of said institutional caller to said outside recipient; and (c) receiving a control code from said outside recipient; (3) determining, in response to said control code, whether to connect the institutional caller to the outside recipient; and (4) determining, in response to said control code, whether to prohibit all callers within said institution, or within one or more related institutions, from calling said outside recipient in the future. - View Dependent Claims (15, 16)
-
-
17. A method of managing telephone activity in an institution, comprising the steps of:
-
(1) identifying an institutional caller who wishes to place an outside call to an outside recipient; (2) blocking the institutional caller, and while the institutional caller'"'"'s line remains blocked; (a) calling said outside recipient; (b) providing the identity of said institutional caller to said outside recipient; and (c) receiving a control code from said outside recipient; (3) determining, in response to said control code, whether to connect the institutional caller to the outside recipient; and (4) determining, in response to said control code, whether to;
(i) prohibit said institutional caller from calling said outside party in the future and (ii) prohibit any caller from within said institution from calling said outside caller in the future. - View Dependent Claims (18, 19, 20, 21)
-
Specification