Abstract:
A computer system (10) is described that includes a capability to receive and store graphic images form remote facsimile machines (30). The system includes a software (16) that can convert graphic images of textual material into an ASCII coded file so that either keywords or the converted text may be converted to speech giving the adressee-user the ability to review incoming facsimiles from a remote telephone (36). The system includes a relay capability, the capability to print on command and to originate fascimiles either from text files or scanned papers.
Abstract:
Method and system for defining access rights in a telephone switching system comprising functions for controlling the operating system of the telephone switching system on the basis of commands entered. In the method, the right of access to the operating system is determined on the basis of a user identifier and a password associated with it. Moreover, a user profile is formed, said profile comprising one or more user identifiers and having a predetermined validity period. According to the method, a validity parameter associated with the user data is decreased on the basis of elapsed time and/or the number of log-on times and/or the weighting values of the commands entered.
Abstract:
In a telephone banking service, initial log-on (before service has identified the user) must use speaker-independent recognition (i.e. the speech recognizer (2) operates in accordance with a word template drawn from the population at large). Once the speaker is identified, the recognizer (2) employs a template specific to each individual speaker; this is much more accurate. The invention assists the log-on procedure by assigning each speaker a password consisting of a string of, for example, 5 digits which uniquely identify him, measuring the clarity with which the speaker recites each digit, compared to the standard template, and selecting his password from only those digits which he can clearly pronounce. The first digit may be used to indicate whether the speaker is male or female, and thereafter a respective "male" or "female" standard template may be employed.
Abstract:
A method of operating a mobile terminal includes receiving mobile communications and transmitting mobile communications in a first mode of operation, and enabling at least one function that is not available in the first mode of operation while preventing transmission of mobile communications in a second mode of operation. The first mode of operation is activated responsive to receiving a valid authorization code in the second mode of operation. Related devices and computer program products are also discussed.
Abstract:
A system (10) that allows a user to send a series of motivational messages and/or questions to a client (50) to motivate a specific behavioral problem. The system (2) consists of a client database (12) that includes for each client the name, calling schedule and personal ID and a client program (14) that includes for each client unique motivational messages and/or questions which can be used alone or with such devices as an electronic weight scale (38), olfactory unit (40), and voice stress analyzer (42) that require a client response. The database and program are operated by a computer (16) that at preselected time periods sends the messages and/or questions to a client's telephone set (26) via a converter (18) and a network (24).
Abstract:
A telephone communication system having a locator system for locating telephone users and generating location information. The telephone communication system includes a plurality of telephone functions which are user accessible for usage in conjunction with the location information. Each telephone (12, 14, 16) of the system may be configured to facilitate interactive control and selection of the system features by the users.
Abstract:
The invention relates to a telecommunication system and a method for authenticating a subscriber in a telecommunication system. The system comprises a transmission network having subscriber identity codes of a first format and a first subscriber authentication procedure. An exchange (MSC1, MSC2) of the transmission network is connected to a subsystem having subscriber identity codes of a second format and a second subscriber authentication procedure. The calls of the subscribers (MT1 to MT6) of the subsystem are routed through the transmission network and said exchange (MSC1, MSC2). In the invention, the authentication of both subscriber types is enabled in the transmission network by locating the parameter generation algorithms of both the first and the second authentication procedure in a transmission network authentication centre (AC). The proper algorithm for each subscriber to be authenticated is selected on the basis of the type of the subscriber (MS, MT1 to MT6).
Abstract:
In order to enable an authorized user of a secured system to detect unauthorized use of that system, the system records identifying information (40) about the user (20) (e.g., a sample of the user's voice) each time the user uses the system. The system also plays back (40) to the user the information recorded the last time that user used the system. If the user does not recognize the information played back or detects anything else wrong with that information, the user knows that someone else has gained access or at least attempted to gain access to the system by posing as him or her.
Abstract:
A telephonic-interface lottery system (D) interfaces with a multiplicity of individual terminals (T1-Tn) of a telephone network facility (C) to enable lottery players to call and play for at least one additional chance to possibly win by dialing a pay-to-dial telephone number indicated on a "scratch-off" or online game lottery ticket (LT) for use in the system. At the terminals (T1-Tn), callers are prompted by voice-generated instructions to provide digital data, such as their telephone number, age, social security number, and/or drivers license number. In addition, the sequence number of the caller as well as the date and time of the call is recorded for positive association with a caller and is stored for processing. The caller's identification data is confirmed using various techniques and callers may be ranked and accounted for on the basis of entitlement and sequence. In accordance with one format, an instant winner is selected online by utilizing techniques such as determining a random winning sequence number or a winning lottery number generated by a number generator. As an adjunct or alternative, the identification data is processed at a later time to determine a grand prize drawing winner by using various processing techniques for determining winners.
Abstract:
In a Computer Telephony Integration environment, to reduce the risk of inadvertent or fraudulent registration of the association of a user's computer terminal with the wrong telephone, i.e. one other than the telephone adjacent to the computer terminal or the user's mobile telephone, a host computer instructs the user via a screen display to call a particular extension of a CTI-enabled PABX. When a call to that extension is detected, the PABX treats the call as having been answered, and reports this to the host computer. The user is now instructed to dial a codeword, and when this is received at the PABX and reported to the host computer, the telephone is registered as associated with the computer terminal provided that the reported codeword matches the codeword provided to the user. A number of variants and refinements provide for greater security against fraudulent registration.