with either audible or subaudible tones corresponding to the keys pressed being modulated onto the radio frequency carrier, and then being demodulated on reception and linked to the database. Another alternative uses voice recognition software to encode information received by telephone to enter check ...