Usage Guide
The JERC Sentry beta currently supports iPhones only for Protectees. Android compatibility will be added in a future update.
Key Terminology :
- Protector — the caregiver or person actively monitoring the Protectee.
- Protectee — the person being kept safe, whose device routes unknown calls through the network layer.
JERC Sentry operates seamlessly as a network-integrated gateway. By making a few simple adjustments to their phone's native settings, the Protectee enables the Protector to monitor alerts without ever needing to download an application. This guide walks through the complete workflow, from account creation to active intervention.
Step 1: Protector — Create an account and register a Protectee
To begin, the Protector sets up their account and registers the individual they will be monitoring. This establishes the connection and generates the necessary routing information for the Protectee's device.
- Download the JERC Sentry app and tap Sign up.
- Enter your name, email address, phone number, and a secure password.
- Accept the Terms of Service.
- Once logged in, click on the Protectee widget.
- Enter the Protectee's name and phone number, then review and accept the consent box.
- Confirm the details to finalize the registration.
Step 2: Protectee — Configure initial settings
The Protectee must adjust specific native phone settings to ensure unknown callers are correctly routed to the JERC Sentry network rather than ringing through or going to standard voicemail.
- Open the native Settings app on the Protectee's device.
- Navigate to the Phone settings menu.
- Toggle off live voicemail.
- Toggle on the option to silence unsaved numbers.
Step 3: Protectee — Create a trusted contact
To ensure alerts and safe calls successfully bypass the silencing of unsaved numbers setting, the Protectee needs to save the JERC Sentry virtual number as a recognized contact on their device.
- Using the Protectee's phone camera, scan the QR code displayed on the Protector's device at the end of Step 1.
- This will automatically generate a new contact card containing the virtual number.
- Save the contact. All unknown calls will now flow through this trusted contact, preventing them from being silenced.
Your existing contacts will not be affected; only unknown calls will be monitored by JERC Sentry.
Step 4: Protectee — Set up Conditional Call Forwarding (CCF)
The final setup step for the Protectee is enabling CCF. This infrastructure-first approach routes unknown calls directly through JERC Sentry's virtual number.
- Open the native phone dialer on the Protectee's device.
- Dial the specific CCF carrier code and phone number string generated on the Protector's app at the end of Step 1.
- Press the call button to activate the forwarding service.
Step 5: Protector — Intervene
With the network configuration complete, the system actively monitors for threats. When suspicious activity is detected, the Protector receives an alert and can take immediate action.
- Monitor the app dashboard for incoming notifications.
- When an alert arrives, review the active call session details.
- Choose to either terminate the call immediately or join the call to intervene directly.