Class / Patent application number | Description | Number of patent applications / Date published |
379142050 | Authentication or authorization | 47 |
20080198991 | Telephone and method of transmitting caller token - The user token input unit accepts an input of a user token from a user. The user verifier reads a user reference from the user reference storage and verifies the user token on the basis of the user reference. When the verification of the user token is successful, the caller token embedder reads a caller token from a caller token storage and embeds the caller token in an audio signal. The caller token extractor extracts a caller token from a received audio signal. The caller verifier reads a caller reference from the caller reference storage and verifies the caller token on the basis of the caller reference. Verification output unit outputs the result of the verification. | 08-21-2008 |
20080219424 | ACCESS CODE ENHANCEMENT FOR CALLER PREVIEW SERVICE - By manipulating parameters of call setup messages, calls made with a caller's access code in a caller preview service may be completed to the called party of voice mail box with caller identification information displayed. | 09-11-2008 |
20080253539 | Control Method Of Telephone User Call And Short Message Transmission - A control method of telephone user call is provided, which includes the following steps. A telephone user makes a call, and transmits a calling message to a corresponding processing device. The processing device extracts calling information of the user from the calling message, compares with a trap identification (trap ID) database, and determines whether a called number matches with one of the trap IDs in the database. If the called number does not match with any of the trap IDs, the call continues. If the called number matches with one of the trap IDs, the processing device notifies the query result and warning information to the user. | 10-16-2008 |
20090074163 | ONE NUMBER, INTELLIGENT CALL PROCESSING SYSTEM - A one number, multi-application, intelligent call processing system provides service benefits to a caller, a servicing location and/or a vanity number advertiser during a call, parallel to the call and/or post call in an integrated common architecture. The system utilizes VRU technology in conjunction with the national telecommunications network connected via Computer Telephone Integration (CTI) to a virtual telephone number database containing a nationwide master list of telephone numbers with attribute data items associated by Spatial Key linkage to each telephone number. The process of the invention is initiated by a caller dialing a selected telephone number to request information and/or services. Based on the number dialed, a caller or network provided ten-digit telephone number and VRU prompted for and received caller input, the system retrieves the application requested data from the virtual telephone number database and provides it to the network. | 03-19-2009 |
20090116630 | INHIBITION OF TELEPHONY BASED PHISHING - Embodiments of the present invention address deficiencies of the art in respect to telephonic phishing and provide a method, system and computer program product for preventing telephonic phishing. In an embodiment of the invention, a method for preventing telephonic phishing can be provided. The method can include receiving in a third-party validation service a request by an enterprise caller to establish a telephone call with a customer, validating the enterprise caller in the third-party validation service, and notifying the customer of whether or not the enterprise caller is legitimate or illegitimate. | 05-07-2009 |
20090161851 | ORIGINATING SIMULTANEOUS RING SERVICES - A device receives information associated with a calling party, and validates the calling party for an originating simultaneous calls service based on the calling party information. The device also receives information associated with a called party, retrieves called party destination information based on the called party information, and sends an instruction to originate two or more simultaneous calls to the called party based on the called party destination information. | 06-25-2009 |
20090274285 | METHOD AND APPARATUS FOR SELECTING COMMUNICATION IDENTIFIERS - A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to retrieve a targeted party telephone number, retrieve a telephone number assigned to the communication device, submit to a system at least a portion of the targeted party telephone number and at least a portion of the telephone number assigned to the communication device, receive from the system information indicating a dialing format for the targeted party telephone number, and initiate communications according to the information supplied by the system. Other embodiments are disclosed. | 11-05-2009 |
20090304167 | AUTOMATIC DENIAL OF CALL RQUEST - A method may include receiving, from a network, a call request in a communication device, the call request including an identification of a calling party; notifying a user of the communication device of the call request; receiving an indication to deny the call request; prompting the user of the communication device, in response to receiving the indication to deny the call request, regarding automatically denying call requests having the identification of the calling party; receiving, from the user, an indication to deny call requests having the identification of the calling party; and sending an instruction to the network to automatically deny the call requests having the identification of the calling party. | 12-10-2009 |
20100008485 | DEVICE FOR SCREENING OUT NON-ORIGINAL CALLING NUMBERS - A device for screening out non-original calling numbers includes at least one teleport and a called party operator which are interconnected by a telecommunication network. The teleport has a calling module which generates a calling signal to carry out a talk; the calling signal is transmitted to the telecommunication network and is transmitted through the telecommunication network to a toll-free telephone module of the called party operator. The calling signal is also transmitted to a screening device to detect whether the calling signal is the original calling number and to screen out the non-original calling number. Therefore, the called party operator can effectively screen out the non-original calling number used by the teleport, assure using the original calling number to activate, deactivate, authorize or access data of a service unit, and prevent from resulting in infringement and loss of rights and money to people. | 01-14-2010 |
20100046727 | METHOD AND APPARATUS FOR CONTROLLING UNSOLICITED MESSAGING - Sensor nodes (or addresses therefore), acting as real-time message decoys, are distributed across a real-time communications network to attract unsolicited real-time messages. Filtering rules are derived from the message characteristics (such as the source address) and messaging content of the traffic encountered at the sensor nodes. The filtering rules are distributed to filtering agents positioned in the communications network in such a way that they can filter traffic for legitimate users. The filtering agents may identify and control the disposition of real-time messaging traffic that is part of a mass communication campaign on behalf of legitimate users of the real-time messaging communication system. Disposition may include suppressing, diverting, or labeling. | 02-25-2010 |
20100067677 | Device for Filtering Out Unwanted Phone Solicitations - A call silencing device filters unsolicited incoming calls to a user's telephone. The call silencer powers up form the telephone and requires no user data input or intervention. An incoming call is silenced if the call is a toll-free number or if the number is not in the buffer and not in the permitted call list or if the number is in the buffer but the caller called back after more than a predetermined amount of time. The incoming call is allowed if the number is in the permitted call list or if the number is in the buffer and the caller called back within a predetermined time. If the call duration is more than a predetermined time, the incoming phone number is stored in the permitted call list. The software program and the permitted call list can be stored in non-volatile memory to maintain data despite power loss. | 03-18-2010 |
20100091965 | SERVICE SUBSCRIPTION METHOD, SYSTEM AND SERVER - A service subscription method is provided. The method includes the following steps. A service subscription request is received from a client. The request carries a service identifier (ID). Service information about a service that the client requests to subscribe to and information about related services of the service that the client requests to subscribe to are obtained according to the service ID. Related-service-set subscription information is obtained according to the information about the service to be subscribed to and the information about its related services. The related-service-set subscription information is returned to the client. Moreover, a service subscription system and server are also provided. Through the technical solutions of the present invention, the interaction process of related-service subscription is simplified and the system resources are saved, and the real-time performance of service subscription and the probability of related-service subscription are also increased. | 04-15-2010 |
20100111276 | TRUSTED ENVIRONMENT FOR COMMUNICATION BETWEEN PARTIES - A method of establishing communication including providing a communication by a sending party to a receiving party, and verifying the sending party's identity by a trusted instrumentality. The trusted instrumentality can be at least the sending party communication controller and is usually both the sending and receiving parties' communication controllers. The communication controllers should be certified and preferably be certified by a mutually trusted communication controller certification authority. Also disclosed is a system for establishing communication. | 05-06-2010 |
20100135477 | Verifying User Identity Using a Reverse Caller ID Process - The present disclosure provides a method and a system for verifying identity of a user and a system for generating and maintaining verification codes. The method and the system use system-generated caller numbers as verification codes. When an application system needs to verify the identity of a user, the verification system generates a caller phone number and uses a communication switching system to place a call originating from the caller phone number to the user's phone. The user's phone has a caller ID display function to automatically display the caller number, which serves as a user identity verification code. The user provides the received caller number to the application system for user identity verification. No text messaging or other ways of communication is required. The method and the system can achieve reliable user identity verification. A centralized system may support multiple application systems for user identity verification. | 06-03-2010 |
20100172481 | User Status Management in a Voice Calling Architecture - A mechanism for indicating a specific response message to be played to a caller is provided. A call that comprises an identification of a caller is received in a recipient device. If the recipient device is operating in the phone management mode, a recipient notification of the call is blocked on the recipient device. If the caller is identified as a known caller based on the identification of the caller, a caller specific response message is sent to the known caller. The caller specific response message is at least one of an interactive or a non-interactive caller specific response message. The interactive response message includes a code with which to respond. If the response message is the interactive response message and the caller enters the code associated with the interactive response message, then the recipient notification of the call is activated on the recipient device. | 07-08-2010 |
20100303220 | ORIGINATING LOCATOR SERVICE - A device receives information associated with a calling party, validates the calling party for an originating locator service based on the calling party information, and sends an instruction to play an announcement requesting information associated with a called party. The device also receives the called party information from the calling party in response to the announcement, and retrieves called party destination information based on the called party information. The device then sends an instruction to originate a sequence of calls to the called party based on the called party destination information. | 12-02-2010 |
20100310061 | Account number security system with communication system - An account number security system with communication system, which, prior to and after a user uses a specific account number, includes the following steps: (a) dialing up a host server using a communication equipment provided with a specific number; (b) receiving of the incoming call and retrieving the telephone number by the host server; (c) storing of the incoming telephone number in a data bank by the host server; (d) comparing of the incoming telephone number with contents of already registered account number data for matching data; (e) enabling or locking of the account number of the user when matching data is found; and (f) terminating comparing of data when no matching data is found. According to the above steps, the present invention improves upon prior art in which unrecoverable loss to users occurs due to account numbers and passwords being easily leaked or misappropriated. | 12-09-2010 |
20100329439 | METHOD AND SYSTEM FOR DETERMINING AUTHORIZATION LEVELS IN A VIRTUAL PRIVATE NETWORK (VPN) - Example methods, apparatus and articles of manufacture to determine authorization levels in a virtual private network are disclosed. A disclosed example method includes determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network by a first user of a plurality of users associated with the virtual private network, querying a private-number table based on at least one of a switch identifier representing a service switching point, a trunk group identifier representing the private branch exchange, or an originating station identifier representing the originating station to obtain a private number assigned to the first user, and providing an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level. | 12-30-2010 |
20110013760 | INFORMATION PROVIDED TO PARENT REGARINDG A CALLED FOR CHILD PROTECTION - The present disclosure describes a system, method, and computer readable medium for providing information of a calling party to an alert party, wherein the calling party is in communication with the receiving party in a communications network. The method includes receiving a message from a calling party to a receiving party and performing a lookup of information relating to the calling party in a database, wherein the lookup is based on an identifier associated with the message, Thereafter, an alert is sent to the alert party if the calling party information is unavailable in a contact list of the receiving party. | 01-20-2011 |
20110026699 | METHOD AND SYSTEM FOR AUTHENTICATING TELEPHONE CALLERS AND AVOIDING UNWANTED CALLS - A service that handles incoming telephone calls without bothering the telephone subscriber is disclosed. The service permits a call to go through to a subscriber if the service determines that the call is not unwanted and the caller has been unauthenticated. The authentication is based on challenging the caller to prove its identity rather than relying on caller ID displays. Prospective callers pre-register with the service providing caller account information. When a caller is issued a challenge, the caller may prove its authenticity by supplying the challenge back to the service along with its registered information. | 02-03-2011 |
20110085650 | CALLER AUTHENTICATION SYSTEM AND METHOD FOR PHISHING PREVENTION - A caller authentication system that may enable a called party to be provided with identification information of a caller may be provided. The caller authentication system, including: a communication system to transmit, when a call request signal is received from a calling terminal of a caller, network information and a telephone number of the calling terminal to a certificate authority server, and to request identification of the caller, the network information and the telephone number being included in the call request signal, to transmit, when identification information of the caller is received from the certificate authority server in response to the identification request, the identification information to a called terminal of a called party, and to enable the identification information to be displayed on the called terminal. | 04-14-2011 |
20110206195 | SYSTEM AND METHOD FOR VERIFYING THE USER'S ALIAS - The present invention provides a method and system for verifying a user alias. The method comprises: a calling terminal inserting a set alias and a calling user's own number into calling information when calling a called terminal; after the called terminal receives the calling information, when the calling terminal registers calling number display restriction or when the calling terminal cancels the calling number display restriction and the calling number of the calling is inconsistent with a calling user number stored locally in the called terminal, determining whether the calling user's own number matches successfully with the calling user number stored locally in the called terminal to display in different modes when the matching is successful and unsuccessful, respectively. The technical scheme in accordance with the present invention is able to not only inform, after the calling user changes the number, the change when the called terminal is called, but also remind a certain user to take care when someone impersonate others to call this user such that security hidden trouble existing in prompting modes of caller ID detection in prior art is eliminated successfully. | 08-25-2011 |
20110211682 | TELEPHONY FRAUD PREVENTION - A method for guarding against telephony-based fraud that includes, at a telephony device, identifying a caller ID of an incoming call or a dialled number of an outgoing call attempt or a number to be dialled. The identified caller ID or dialled number or number to be dialled is then compared against a blacklist of telephone numbers. In the event that a match is found, a warning is presented to a user of the device and/or the call or call attempt is terminated. | 09-01-2011 |
20110317824 | ANTI-HACKING SYSTEM THROUGH TELEPHONE AUTHENTICATION - The present invention relates to an anti-hacking system through telephone authentication, in which authentication is performed over a communication network in order to guarantee safer integrity authentication in implementing an authentication system configured to issue various documents to only an authenticated user through electronic financial transactions, such as Internet banking, or verification or accessible to only the authenticated user. The anti-hacking system through telephone authentication includes an access terminal connected to an Internet and configured to access a site requiring user authentication, a communication terminal owned by a user of the access terminal, a main server configured to access the communication terminal, perform telephone authentication by checking authenticity of the user, and process the user authentication. | 12-29-2011 |
20120014517 | Methods and Systems for Controlling the Blocking of Telephone Calls - Computer-implemented systems and methods for controlling the blocking of telephone calls are disclosed. A person, for example, bothered by calls from a prison inmate may desire to block future call attempts from that inmate or even desire to block all calls from the confinement/correctional institution at which the inmate is housed. To reduce accidental and fraudulent call blocking, various techniques are used to verify that the party requesting the block is, in fact, the party in control of the telephone number requested to be blocked. Embodiments herein enable call blocking using systems that require little or no human interaction to process a block request, reduce or eliminate accidental blocks via a callback confirmation process, create a documentation trail via the use of a profile and PIN system used for the processing of a block, and/or reduce fraudulent blocks by parties other than those authorized to do so via CNAM (Caller ID) verification. | 01-19-2012 |
20120170731 | METHOD FOR RE-CONFIGURING A COMMUNICATIONS DEVICE - A communications device ( | 07-05-2012 |
20120201365 | CONTROLLING HOLD QUEUE POSITION ADJUSTMENT - A question of a first caller from among multiple callers waiting in a hold queue of a call center is published. Responsive to a second caller from among multiple callers indicating a readiness to answer to the question, the first caller is connected with the second caller. Responsive to the second caller answering the question, the second caller is awarded an advancement token for storage in association with an authenticated identifier for the second caller in a caller profile for redemption by the second caller for a value selected by the second caller. | 08-09-2012 |
20120250845 | System granting access to application data and methods thereof - A system granting access to application data and methods thereof are provided in the present disclosure. Application data can be sent that can be utilized by applications resident within a telephony switching system or end devices involved in a call. When the calling party dials the called party, the switching system can be triggered to substitute a database key into the calling party number. The switching system can use the act of making the call to enable permission for the called party to access the data referenced by the database key. The telephony switching system, having provided the key, is capable of mapping the key back into the original calling party number. This allows the calling party number, through the database key, to be stored as a contact or dialed from a call log, which can provide backwards compatibility to devices that do not support this feature. | 10-04-2012 |
20120307994 | TELEPHONE SYSTEM AND SERVER APPARATUS AND CONTROL METHOD USED IN TELEPHONE SYSTEM - According to one embodiment, a telephone system includes a plurality of telephone terminals, a first server apparatus and a second server apparatus. The first server apparatus includes a license authentication module and a transmission controller. The license authentication module performs license authentication by comparing a terminal ID included in a registration request with a terminal ID stored in the license memory. The transmission controller reads from the license memory a license authentication code corresponding to a telephone terminal, and transmits to the telephone terminal a license authentication code added check information. | 12-06-2012 |
20130016819 | METHOD AND STRUCTURE FOR CONTROLLING INCOMING COMMUNICATION NOTIFICATIONAANM Cheethirala; RajeshAACI TracyAAST CAAACO USAAGP Cheethirala; Rajesh Tracy CA US - A method and structure for avoiding undesirable interruptions by incoming calls during face-to-face conversations or oral presentations. A speaker recognition circuit is trained to recognize the user's voice, even in the presence of other voices and ambient noise. A number of speaker recognition algorithms may be employed within the scope of the invention. The phone is configured to constantly monitor the aural phone environment, while recording in a FIFO memory a short interval of digitized sound. When an incoming call is received, the Caller ID is checked against a pre-defined Priority List of numbers to be directed to the user's attention as in the prior art. If the Caller ID is not on the Priority List, speaker recognition verifies whether the user has been speaking within the past few seconds, and, if so, directs the incoming call to voice mail without interrupting the user. Other sensor input and criteria can also be used to determine how to route an incoming communication. | 01-17-2013 |
20130101104 | METHOD AND A SYSTEM FOR ESTABLISHING A COMMUNICATION CHANNEL BETWEEN A PREDETERMINED NUMBER OF SELECTED DEVICES AND A DEVICE AND A SERVER ARRANGED FOR USE IN THE SYSTEM - A method for establishing a communication channel ( | 04-25-2013 |
20130235989 | INFORMATION PROVIDED TO PARENT REGARINDG A CALLED FOR CHILD PROTECTION - The present disclosure describes a system, method, and computer readable medium for providing information of a calling party to an alert party, wherein the calling party is in communication with the receiving party in a communications network. The method includes receiving a message from a calling party to a receiving party and performing a lookup of information relating to the calling party in a database, wherein the lookup is based on an identifier associated with the message, Thereafter, an alert is sent to the alert party if the calling party information is unavailable in a contact list of the receiving party. | 09-12-2013 |
20130301818 | METHOD AND APPARATUS FOR CONTROLLING CALLING-PARTY IDENTIFICATION - The present invention provides a system, method, and apparatus for managing the calling-party identification information offered to called parties. Accordingly, a caller can designate the Caller ID information to the called party based on the context of the call (e.g. the role of the caller) rather than the terminal used. Typically the calling party does this by selecting which of multiple values they wish to have sent with the call request. It is beneficial to implement such a mechanism in a secure manner—the ability to employ a different calling-number or calling-name ID should be restricted to properly-authorized and authenticated persons—in order to ensure the quality of this information. Accordingly, preferred embodiments include an authentication mechanism for verifying the calling party information is authentic. | 11-14-2013 |
20140105373 | METHODS AND SYSTEMS FOR INBOUND CALL CONTROL - An indication of an incoming call may be received at a call control unit communicatively coupled to, and/or resident within, a telephone. The indication may include identification information for the incoming call. It may be determined whether additional information regarding a caller associated with the identification information exists, and if so, a first operation may be performed on the incoming call responsively to the additional information, otherwise, a second operation may be performed on the incoming call responsively to an absence of the additional information. The additional information my include a user-configurable list of desired callers (e.g., a whitelist) and/or undesired callers (e.g., a blacklist). The additional information may also include caller identification information and/or a spam score. The first operation may be blocking the incoming call, forwarding the incoming call to a voice mailbox, transmitting the incoming call to the telephone, enabling the telephone to receive the incoming call, and/or answering the incoming call and then terminating the incoming call. In some embodiments, the first and/or second operations performed on the incoming call is/are user configurable. | 04-17-2014 |
20140133641 | AUTOMATED ATTENDANT FOR A PRIVATE TELEPHONE SYSTEM - A call management device is connected to one or more internal networks and one or more external networks, and it operates to receive incoming calls or messages from the external networks and make a determination as to whether or not the call is from a qualified source. If the call is from a qualified source, the call is immediately forwarded to a destination device connected to the one or more internal networks, and if the call is from a source that is not qualified, the call is either terminated or the caller is prompted to enter a required response and identification information prior to the call be forwarded to the destination device. | 05-15-2014 |
20140161241 | SYSTEM AND METHOD FOR CALL AND DATA MATCHING IN A CONTACT CENTER - A system and method for processing interaction requests includes a computer system that receives over a data channel from an end user device accessible to the customer, a request for an interaction. The request includes data from an application running on the end user device. The data is stored by the computer system upon receipt. When a voice call from a telephony device accessible to the customer is received, a voice media session is established with the telephony device over a voice channel. The data is identified based on information associated with the voice call. A contact center resource is further identified for routing the voice call. The data is attached to a request to route the call to the identified contact center resource. | 06-12-2014 |
20140219430 | ELECTRONIC SYSTEM AND METHOD FOR SCREENING INCOMING COMMUNICATIONS - The present invention relates generally to electronic systems and methods for screening incoming phone calls and more particularly to a system and method of hosting a cloud synced database of authorized or unauthorized callers, phone numbers, or numbers associated with unauthorized merchant identification numbers which is a solution to robo-calling and telemarketers. | 08-07-2014 |
20140233715 | METHOD AND APPARATUS FOR PROVIDING TRUSTED CALLER ID SERVICES - Methods and apparatus for providing trusted caller identification services between a first entity and a second entity are provided herein. In some embodiments, a method for validating an identity of a first entity to the second entity may include registering the first entity with a trust authority, wherein registering the first entity includes authenticating the identity of the first entity, and associating the unique code with a caller ID name (CNAM) of the first entity, receiving an identifier in association with a call request, determining that the identifier is correlated with the unique code, and providing to the second entity the CNAM together with an indication of validity. | 08-21-2014 |
20140341364 | SYSTEMS AND METHODS OF PROVIDING COMMUNICATIONS SERVICES - An IP telephony system allows a user to register a telephony device that receives its native telephony service from a different telephony service provider as an extension telephone. The user can then place calls through the IP telephony system using the extension telephone. Such calls may or may not be established using the extension telephone's native telephony service provider. | 11-20-2014 |
20150043724 | CALLER ID VERIFICATION - A device may receive first identification information associated with a sending device. The first identification information may be provided by a receiving device, and may be associated with a request to establish a connection between the sending device and the receiving device. The device may receive a request to verify the first identification information. The device may determine, based on the request, second identification information identifying the sending device. The second identification information may be provided by the sending device, and may be associated with the request to establish the connection between the sending device and the receiving device. The device may compare the second identification information and the first identification information. The device may provide verification information indicating a result of the comparison. | 02-12-2015 |
20150063552 | CALL AUTHENTIFICATION METHODS AND SYSTEMS - A system and method of authenticating a calling party to a remote service, including receiving a request via a communications network to approve a future call to the remote service using a calling identifier associated with the calling party, recording an approval of the future call subject to the future call being made within a predetermined period of time, the remote service receiving a call at a point in time using a calling identifier, determining if a call at that point in time using the received calling identifier is recorded as approved by the authentication system, and, if so, the remote service accepting the call and using the approval of the authentication system to authenticate the calling party. | 03-05-2015 |
20150092932 | PERSONAL ALLOWED NUMBER SYSTEM - A system and method for preventing or facilitating communications between individuals who reside in detention environments (such as e.g., prisons or correctional facilities) and individuals who are not in such detention environments using an automated authentication or verification. | 04-02-2015 |
20150092933 | STOPPING ROBOCALLS - A robocall is prevented from reaching a telephone subscriber, by an automated calling screening system that tests for presence of a human caller on the line, and disconnects calls absent a predetermined response. Audio messages to stymy a robocaller but answerable by a human are used, such as Broadway-style singing and/or a question or instruction that a robocalling system and/or a Siri system, could not handle. | 04-02-2015 |
20150117625 | REGISTRATION, VERIFICATION AND NOTIFICATION SYSTEM - A user provides at least one electronic contact address, such as a telephone number, during a registration process. The user is verified by establishing a connection with the user via the electronic contact address. Notification events are established, and the electronic contact address re-verified with the user via the electronic contact address when the notification event occurs. A re-verification code is conveyed to the user, which is returned by the user via an on-line form or telephone entry. | 04-30-2015 |
20160014278 | SECURE DATA ENTRY SYSTEM | 01-14-2016 |
20160088152 | APPARATUS FOR BLOCKING UNWANTED TELEPHONE CALLS AND FAXES - An apparatus for blocking unwanted calls is disclosed. The apparatus incorporates a whitelist which the user can program so that known friendly callers are not interrupted by the apparatus. The apparatus also incorporates a blacklist which automatically rejects known unwanted callers so that the user is not interrupted by these calls. Additionally, the apparatus allows the user to easily add new numbers to either the blacklist or white list and also to delete numbers from the white list, blacklist or master list of caller IDs. For new numbers, callers are presented with a simple but yet effective message that states that the caller should hang up if the caller is a solicitor or telemarketer, or otherwise press zero so that the apparatus can allow the call to go through to the telephone. | 03-24-2016 |
20160156781 | SECURELY AND EFFICIENTLY TRANSFERRING SENSITIVE INFORMATION VIA A TELEPHONE | 06-02-2016 |