SECURUS TECHNOLOGIES, INC.
|SECURUS TECHNOLOGIES, INC. Patent applications|
|Patent application number||Title||Published|
|20140080443||System and Method for Authorizing and Monetizing a Telephone Call - A system and method of authorizing and monetizing a telephone communication such as a voice call is disclosed. The calling party may be in a controlled environment such as a prison or hospital; the called party is using a mobile telephone device. The call is facilitated by a service provider such as a connect service provider. The call is monetized by a message service charge billed to an account associated with the mobile telephone device. The call is facilitated as a voice call if there is authorization both for a charge for message service to the mobile telephone device and for the call from the calling party. The system is implemented with a system may use a message service communication protocol for the message and billing charge. computer-based system in operation with the interactive voice response system. Revenue from monetization of the call may be shared between service providers.||03-20-2014|
|20120296807||System and Method for Independently Authorizing Auxiliary Communication Services - Systems and methods which determines the likelihood that a calling (or in some cases the called) user will pay for a particular auxiliary service are described. A system of an embodiment considers the user's credit risk and his/her propensity to pay, when deciding if the user is eligible for a particular auxiliary service. A methodology used for determining propensity to pay for an auxiliary service according to embodiments is independent from a determination of propensity to pay for a basic calling service. Thus, the criteria used, and the weight given to each criteria, for determining eligibility for auxiliary services can be different from the criteria and criteria weight used for basic communication connections.||11-22-2012|
|20120294429||Multiple Carriers in Secure Environment - Systems and methods which facilitate selection of communication carriers for communications made in association with a controlled environment facility by a party to the communications are shown. Embodiments allow for a calling party and/or a called party to select a preferred communication carrier from a plurality of communication carriers for a current communication and/or one or more future communications. A party's carrier selection may be stored by a communication processing system for use with respect to a plurality of communication sessions. Embodiments provide a conflict resolution algorithm to arbitrate conflicting carrier selections where both a calling party and a called party to select a carrier for a communication session. Embodiments provide a premise based communication processing system, a centralized communication processing system, or a distributed configuration comprising a hybrid of the foregoing premise based and centralized configurations.||11-22-2012|
|20120257583||Distribution of Broadcast Content to Controlled-Environment Facilities - A system for receiving satellite radio signals and/or internet content and extracting a plurality of channels from the satellite radio signals and/or internet content is disclosed. The content of the channels is converted to IP packets and streamed across an Ethernet network. In one embodiment, each of the channels is associated with an IP address or port. Users receive the content of the channels by selecting the IP address or port associated with the desired content. An administrator may control the channels that are available to the users. In one embodiment, the users each have a subscription to access the content, and the subscription may control the channels that the user access.||10-11-2012|
|20120099716||System and Method for Call Treatment Using a Third Party Database - Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third party databases are shown. For example, a controlled environment facility information management system may access a database external thereto, such as a victim notification database, which is created and maintained by a third party unrelated to the controlled environment facility. Such third party database access may be accomplished at the point of call validation or caller verification for determining the treatment of the call (e.g., allowed, blocked, allowed with limitations, etcetera). Such call treatment determinations may be made with respect a particular prisoner or other resident of the controlled environment facility making the call, may be made with respect to all calls made from a particular controlled environment facility, may he made with respect to a group of controlled environment facilities, etcetera.||04-26-2012|
|20120059760||Systems and methods for transaction and information management - Systems or methods for managing transactions within a controlled environment facility provide an information management engine integrating transaction functionality and telephone calling functionality, establish an account associated with a resident of the controlled environment facility, and use the information management engine to conduct transactions associated with residents of the controlled environment facility. The transactions include at least requests, by the resident, for deposits into the account by a party outside of the controlled environment facility. The systems or methods accept requests from the resident and utilize the telephone calling services of the information management engine to facilitate the request for deposit. The systems or methods may place calls to the individuals outside the controlled environment facility to interact with the individual, request the deposit and accept such deposits.||03-08-2012|
|20110110367||Unauthorized Call Activity Detection And Prevention Systems And Methods For A Voice Over Internet Protocol Environment - Embodiments connect a call in which at least one party is a VoIP call party and monitoring resulting VoIP signals for unauthorized call activity, such as three-way call activity. The monitoring may include monitoring the call for suspend and/or resume events to detect the unauthorized call activity, the suspend and resume events may be generated by a telephone system and passed into a VoIP system associated with the VoIP call party. The monitoring may be carried out by an agent disposed between a VoIP gateway and the VoIP call party or by the VoIP gateway itself.||05-12-2011|
|20110110276||CENTRALIZED CALL PROCESSING - Disclosed are systems and methods which provide a centralized architecture for call processing. Embodiments utilize voice over Internet protocols (VoIP) to carry calls from a location at which calling services are provided to a centralized call processing platform providing call processing functionality, such as calling party identification, call validation, call routing, and connection to the public switched telephone network (PSTN). Call processing gateways may be utilized to provide plain old telephone service (POTS) analog line interfaces for use with a plurality of telephone sets disposed for use at a location and at least one wide area network (WAN) interface for providing high speed data communication to a centralized call processing platform. PSTN interfacing by a call processing platform may be provided as a VoIP connection to the PSTN and/or as POTS trunking Call processing platforms may provide for data sharing, aggregation, and/or analysis across multiple facilities served.||05-12-2011|
Patent applications by SECURUS TECHNOLOGIES, INC.