Skip to main content

Features

JERC Sentry provides a robust suite of tools designed to protect vulnerable individuals from voice-based scams. Our features work at the network level, combining advanced AI analysis with immediate caregiver intervention.


Core Security Features

Real-Time Whisper Warning

When the system detects a high-threat interaction using our AI inference pipeline, it plays a subtle "whisper" audio warning directly into the Protectee's ear.

  • Proactive: Alerts the user during the call, before they disclose sensitive information.
  • Non-Intrusive: The caller cannot hear the warning, allowing the Protectee to react safely.
  • AI-Driven: Powered by Deepgram (STT) and Groq (Llama 3.1) for ultra-low latency detection.

Remote Call Termination

Protectors can instantly end a suspicious call from their mobile application.

  • Immediate Action: Clicking TERMINATE CALL REMOTELY sends a command to our Telnyx backbone to drop the connection.
  • Safety First: Prevents the scammer from continuing the conversation once a threat is confirmed.

Live Call Joining

The JOIN CALL NOW feature allows a Protector to seamlessly bridge themselves into the active conversation.

  • Direct Support: Speak directly to the Protectee to provide reassurance.
  • Confrontation: Intervene directly with the caller to stop the scam in its tracks.

Protector App Capabilities

Secure Access

  • Protector Sign Up: Create a new account with email, phone number, and password via our secure Firebase-backed registration flow.
  • Protector Login: Securely access your monitoring dashboard.
  • Protector Sign Out: Safely end your session to maintain account security.

Protectee Management

  • Protectee Registration: Link a Protectee to your account in seconds. Registration generates a unique virtual routing number and provides the specific CCF carrier codes needed for setup.
  • Dashboard Monitoring: A central hub to view all registered Protectees.
    • Live Status: See if a Protectee is currently on a monitored call.
    • Threat Assessment: Review real-time AI reasoning for active threats.

Reliability & Support

Report a Bug

We've integrated feedback directly into the experience. Protectors can use the Report a Bug feature within the app to notify the development team of any issues.

  • Direct Integration: Submits a detailed report directly to our GitHub Issue tracker.
  • Continuous Improvement: Helps us refine our threat detection logic and platform stability based on real-world usage.