Telecommunication call management and monitoring system
DC CAFCFirst Claim
1. A method for restricting access to a public telephone network using a telephone call management system, said method comprising the steps of:
- assigning a first identification number to each of a plurality of potential callers;
recording a first voice print of at least one potential caller;
storing said first voice print and said first identification number in a database;
during each access attempt to said public telephone network by said potential caller;
prompting said at least one potential caller to input a second identification number;
recording a second voice print of said at least one potential caller;
matching said first and second identification numbers;
comparing said second voice print with said first voice print associated with said first identification number;
granting said at least one potential caller access to said public telephone network to attempt to place a telephone call if said second voice print matches said first voice print;
monitoring at least one conversation to detect the presence of a three-way call attempt; and
recording at least one conversation between said at least one potential caller and a third-party remotely located from said at least one potential caller if said recording is permissible; and
detecting the presence of predetermined keywords in audio of said at least one conversation.
17 Assignments
Litigations
1 Petition
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account or other related limitations. The system includes management software capable of implementing widespread or local changes to the system and is further capable of modifying or setting any number of user account parameters.
113 Citations
7 Claims
-
1. A method for restricting access to a public telephone network using a telephone call management system, said method comprising the steps of:
-
assigning a first identification number to each of a plurality of potential callers; recording a first voice print of at least one potential caller; storing said first voice print and said first identification number in a database; during each access attempt to said public telephone network by said potential caller; prompting said at least one potential caller to input a second identification number; recording a second voice print of said at least one potential caller; matching said first and second identification numbers; comparing said second voice print with said first voice print associated with said first identification number; granting said at least one potential caller access to said public telephone network to attempt to place a telephone call if said second voice print matches said first voice print; monitoring at least one conversation to detect the presence of a three-way call attempt; and recording at least one conversation between said at least one potential caller and a third-party remotely located from said at least one potential caller if said recording is permissible; and detecting the presence of predetermined keywords in audio of said at least one conversation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification