H04M1/253

Terminal and Operating Method Thereof
20220353464 · 2022-11-03 · ·

Provided is a terminal. The terminal may include an input and output interface configured to receive a first video capturing a first user, a communication interface configured to transmit the first video or a first sound of the first user to a terminal of a counterpart and receive a second video or second sound, which is obtained by the terminal of the counterpart, through a video call session, a display configured to display the first video and the second video, and a processor configured to detect a specific event during the video call session, determine whether an inappropriate element is included in the first video or the first sound when the specific event is detected, and stop transmitting the first video or the first sound according to a result of the determination.

Terminal and Operating Method Thereof
20220353464 · 2022-11-03 · ·

Provided is a terminal. The terminal may include an input and output interface configured to receive a first video capturing a first user, a communication interface configured to transmit the first video or a first sound of the first user to a terminal of a counterpart and receive a second video or second sound, which is obtained by the terminal of the counterpart, through a video call session, a display configured to display the first video and the second video, and a processor configured to detect a specific event during the video call session, determine whether an inappropriate element is included in the first video or the first sound when the specific event is detected, and stop transmitting the first video or the first sound according to a result of the determination.

BLOCKING UNDESIRABLE COMMUNICATIONS IN VOICE OVER INTERNET PROTOCOL SYSTEMS
20170303126 · 2017-10-19 · ·

Blocking of undesirable voice over internet protocol (VOIP) communications is disclosed. A communication screening service initiates operations to block a threat posed by a VOIP communication upon receiving the communication from a gateway server. The communication may include an audio/video conversation and/or an audio/video conference. Next, metadata and content of the communication is analyzed to detect a threat, such as a scamming scheme and/or a phishing scheme, from a sender of the communication. A rejection of the communication is generated to disrupt the threat associated with the communication. The rejection is transmitted to the gateway server to prompt the gateway server to block the communication.

Device independent text captioned telephone service

A communication system and method for displaying text captions corresponding to voice communications between an assisted user's mobile wireless device and a separate hearing user's device includes at least one communication component configured to enable the appliance to communicate with a relay, a display, and a processor operably coupled to the at least one communication component and the display. The processor is configured to enable the assisted user to establish an association between the appliance and the mobile device, receive text originating at the relay, the text corresponding to a transcript of the hearing user's voice signal originating at the hearing user's device, and cause text captions corresponding to the received text to be displayed on the display.

Multi-Protocol Field Device in Process Control Systems
20220053074 · 2022-02-17 ·

A field device includes components to communicate with a control and/or asset management system of a process control system or with other field devices using any of several different communication protocols such as several different internet protocol (IP) protocols. This architecture allows for a single version of a field device to be provided in automation or plant control systems that use any of these communication protocols, thus saving on inventory and product development costs. Moreover, the multi-protocol field device or a system using the multi-protocol field device can manage the asset (read and write parameterized data from and to the asset) using one protocol while at the same time communicating real-time process/factory automation information using a second and different protocol. Moreover, the field device may be able to communicate to other devices including other field devices and host devices using both of these protocols or other protocols for different purposes.

METHOD FOR DETECTING THE COMPLETION OF A TELEPHONE CALL INITIATED FROM A WEB BROWSER OF A MOBILE COMMUNICATION DEVICE
20220053077 · 2022-02-17 ·

The invention relates to a method for detecting the success of a telephone call initiated from a web browser of a mobile communication device, comprising an initial step (20) of detecting a click event on display data of a predetermined web page displayed via the web browser, said display data relating to a telephone number, and a step (28) of establishing a telephone communication between said mobile communication device and a terminal corresponding to said telephone number. The method further comprises the following steps—initializing a time counter when a click event is detected (20); detecting (30) a predetermined event;—stopping said time counter when said predetermined event is detected (30);—if the duration recorded by said time counter is within a predetermined time interval, determining (36) that the telephone call was successful.

Providing a proxy server feature at an endpoint

Providing a proxy server feature includes initiating the proxy server feature at an endpoint of a number of endpoints. Registration information comprising addresses for the endpoints is received and then stored in a routing table at the endpoint. The endpoint locates a callee endpoint using the routing table in order to establish a session with the callee endpoint.

ENTERPRISE TELEPHONY INTERCONNECT SERVICE

In various embodiments, a mobile device connected to a cellular network performs a credential exchange with a telephone not connected to an Internet Protocol (IP) network. The mobile device relays, via the cellular network, registration information between the telephone and a telephony interconnect service, based in part on the credential exchange. The mobile device receives an indication of a telephone call associated with a user of the mobile device. The mobile device proxies, via the cellular network, the telephone call between the telephony interconnect service and the telephone.

Load balancing traffic in a MPLS network

A method and system for managing traffic in a network. For each label switch path of at least two logical switch paths, logical paths are identified. Each label switch path begins at a first provider edge and ends at a second provider edge. Most recent data received from the first provider edge is transmitted to the second provider edge via a selected logical path.

Mobile devices having a common communication mode
09743439 · 2017-08-22 · ·

A second communication mode can be enabled for a source device and a destination device. Each device can be a mobile device having a first communication mode and a default number for the first communication mode. The default numbers for the source device and the destination device can be stored. A call request can be received from the source device operating in the second communication mode. The call request can be directed to the default number of the destination device. The destination device can be determined as a client based on the default number of the destination device. A communication session can be established between the source device and the destination device over a network upon determining the destination device is an active client.