Telecommunication call management and monitoring system
First Claim
1. A method for restricting access to a public telephone network using a telephone call management system, said method comprising the steps of:
- assigning a first identification number to each of a plurality of potential callers;
scanning a first fingerprint of at least one of said potential callers;
storing said first fingerprint and said first identification number in a database;
during each access attempt to said public telephone network by said potential caller;
prompting said caller to input a second identification number;
scanning a second fingerprint of at least one of said potential callers;
matching said first and second identification numbers; and
comparing said second fingerprint with said fingerprint associated with said first identification number; and
granting said caller access to said public telephone network to attempt to place a telephone call if said second fingerprint matches said first fingerprint.
18 Assignments
1 Petition
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account or other related limitations. The system includes management software capable of implementing widespread or local changes to the system and is further capable of modifying or setting any number of user account parameters.
221 Citations
5 Claims
-
1. A method for restricting access to a public telephone network using a telephone call management system, said method comprising the steps of:
-
assigning a first identification number to each of a plurality of potential callers; scanning a first fingerprint of at least one of said potential callers; storing said first fingerprint and said first identification number in a database; during each access attempt to said public telephone network by said potential caller; prompting said caller to input a second identification number; scanning a second fingerprint of at least one of said potential callers; matching said first and second identification numbers; and comparing said second fingerprint with said fingerprint associated with said first identification number; and granting said caller access to said public telephone network to attempt to place a telephone call if said second fingerprint matches said first fingerprint. - View Dependent Claims (2, 3, 4, 5)
-
Specification