Technology for combating mobile phone criminal activity
First Claim
1. A method for crime control comprising:
- receiving an incident report for a crime victim notifying a law enforcement agency that the crime victim is under duress to obtain a mobile phone credit voucher due to actions of a criminal suspect;
tagging words received in the incident report that the crime victim remembers were used by the criminal suspect who coerced the victim to purchase the mobile phone credit voucher;
providing for the crime victim a voucher identifier for the mobile phone credit voucher, wherein the mobile phone credit voucher is configured for charging up a mobile phone with calling time and wherein the phone number for the mobile phone is unknown to the crime victim and the law enforcement agency;
generating a request for a legal order directing a telecommunication service provider to obtain information about use of the mobile phone credit voucher;
receiving approval for the legal order and transmitting the legal order and the voucher identifier, by a law enforcement agency computer system via a network, to a computer system of the telecommunication service provider;
receiving, via the network from the telecommunication service provider computer system, a phone number associated with the mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and
performing an automated analysis of the telephone call by a voice recognition process of the law enforcement agency computer system comprising;
retrieving the received words by respective tags;
comparing the received words with the recording of the telephone call to identify at least specific words indicating that the telephone call includes information useful for apprehending a person who coerced the victim to purchase the identified credit voucher; and
identifying connections between the incident report from the crime victim and the recording of the telephone call.
2 Assignments
0 Petitions
Accused Products
Abstract
Technology for crime control includes receiving a voucher identifier for a mobile phone credit voucher purchased under duress by a victim and generating a request for a legal order directing a telecommunication service provider to obtain certain information about use of the voucher. Approval for the legal order is received and the legal order and the voucher identifier are transmitted by a law enforcement agency computer system via a network to a computer system of the telecommunication service provider. A phone number associated with a mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number are received via the network from the telecommunication service provider computer system and the law enforcement agency computer system performs an automated analysis of the call by a voice recognition process.
-
Citations
18 Claims
-
1. A method for crime control comprising:
-
receiving an incident report for a crime victim notifying a law enforcement agency that the crime victim is under duress to obtain a mobile phone credit voucher due to actions of a criminal suspect; tagging words received in the incident report that the crime victim remembers were used by the criminal suspect who coerced the victim to purchase the mobile phone credit voucher; providing for the crime victim a voucher identifier for the mobile phone credit voucher, wherein the mobile phone credit voucher is configured for charging up a mobile phone with calling time and wherein the phone number for the mobile phone is unknown to the crime victim and the law enforcement agency; generating a request for a legal order directing a telecommunication service provider to obtain information about use of the mobile phone credit voucher; receiving approval for the legal order and transmitting the legal order and the voucher identifier, by a law enforcement agency computer system via a network, to a computer system of the telecommunication service provider; receiving, via the network from the telecommunication service provider computer system, a phone number associated with the mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and performing an automated analysis of the telephone call by a voice recognition process of the law enforcement agency computer system comprising; retrieving the received words by respective tags; comparing the received words with the recording of the telephone call to identify at least specific words indicating that the telephone call includes information useful for apprehending a person who coerced the victim to purchase the identified credit voucher; and identifying connections between the incident report from the crime victim and the recording of the telephone call. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
at least one computing processor; and a non-transitory computer-readable storage media connected to the at least one computing processor, wherein the computer-readable storage media has stored thereon a program for controlling the at least one computing processor to perform crime control actions, and wherein the at least one computing processor is operative with the program to execute the program to; receive an incident report for a crime victim notifying a law enforcement agency that the crime victim is under duress to obtain a mobile phone credit voucher due to actions of a criminal suspect; tag words received in the incident report that the crime victim remembers were used by the criminal suspect who coerced the victim to purchase the mobile phone credit voucher; provide for the crime victim a voucher identifier for the mobile phone credit voucher, wherein the mobile phone credit voucher is configured for charging up a mobile phone with calling time and wherein the phone number for the mobile phone is unknown to the crime victim and the law enforcement; generate a request for a legal order directing a telecommunication service provider to obtain information about use of the mobile phone credit voucher; receive approval for the legal order and transmit the legal order and the voucher identifier, by a law enforcement agency computer system via a network, to a computer system of the telecommunication service provider; receive, via the network from the telecommunication service provider computer system, a phone number associated with the mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and perform an automated analysis of the telephone call by a voice recognition process of the law enforcement agency computer system comprising; retrieving the received words by respective tags; comparing the received words with the recording of the telephone call to identify at least specific words indicating that the telephone call includes information useful for apprehending a person who coerced the victim to purchase the identified credit voucher; and identifying connections between the incident report from the crime victim and the recording of the telephone call. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for crime control, the computer program product comprising:
-
a non-transitory computer-readable storage medium; and computer-readable program code embodied in the computer-readable storage medium, wherein the computer-readable program code is configured to cause at least one computing processor to; receive an incident report for a crime victim notifying a law enforcement agency that the crime victim is under duress to obtain a mobile phone credit voucher due to actions of a criminal suspect; tag words received in the incident report that the crime victim remembers were used by the criminal suspect who coerced the victim to purchase the mobile phone credit voucher; provide for the crime victim a voucher identifier for the mobile phone credit voucher, wherein the mobile phone credit voucher is configured for charging up a mobile phone with calling time and wherein the phone number for the mobile phone is unknown to the crime victim and the law enforcement agency; generate a request for a legal order directing a telecommunication service provider to obtain certain information about use of the mobile phone credit voucher; receive approval for the legal order and transmitting the legal order and the voucher identifier, by a law enforcement agency computer system via a network to a computer system of the telecommunication service provider; receive, via the network from the telecommunication service provider computer system, a phone number associated with the mobile phone to which a credit associated with the voucher identifier was applied and a recording of a telephone call to or from the phone number; and perform an automated analysis of the telephone call by a voice recognition process of the law enforcement agency computer system comprising; retrieving the received words by respective tags; comparing the received words with the recording of the telephone call to identify at least specific words indicating that the telephone call includes information useful for apprehending a person who coerced the victim to purchase the identified credit voucher; and identifying connections between the incident report from the crime victim and the recording of the telephone call. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification