H04M2207/18

Reusable multimodal application

A method and system are disclosed herein for accepting multimodal inputs and deriving synchronized and processed information. A reusable multimodal application is provided on the mobile device. A user transmits a multimodal command to the multimodal platform via the mobile network. The one or more modes of communication that are inputted are transmitted to the multimodal platform(s) via the mobile network(s) and thereafter synchronized and processed at the multimodal platform. The synchronized and processed information is transmitted to the multimodal application. If required, the user verifies and appropriately modifies the synchronized and processed information. The verified and modified information are transferred from the multimodal application to the visual application. The final result(s) are derived by inputting the verified and modified results into the visual application.

Fleet location sharing application in association with services provision
11356799 · 2022-06-07 · ·

A system for exchanging GPS or other position data between wireless devices for purposes of group activities, child location monitoring, work group coordination, dispatching of employees etc. Cell phones and other wireless devices with GPS receivers have loaded therein a Buddy Watch application and a TalkControl application. The Buddy Watch application communicates with the GPS receiver and other wireless devices operated by buddies registered in the users phone as part of buddy groups or individually. GPS position data and historical GPS position data can be exchanged between cell phones of buddies and instant buddies such as tow truck drivers via a buddy watch server. Emergency monitoring services can be set up with notifications to programmable individuals in case an individual does not respond. Positions and tracks can be displayed. TalkControl simplifies and automates the process of joining talk groups for walkie talkie services such as that provided by Nextel.

Transferring an active telephone conversation

According to one embodiment, a computing device may conduct an active telephone conversation and a proximity of the computing device to a second computing device may be determined to be within a predetermined distance. Moreover, a determination of a capability of the second computing device to conduct a telephone conversation may be made, and in response to such determinations, the active telephone conversation may be transferred from the computing device to the second computing device. In an example, when a user holding a telephone conversation moves near a smart speaker, the telephone conversation may be transferred to the smart speaker from the user's mobile device, should the user desire such a transfer. Moreover, as the user moves around, the telephone conversation may move with the user from device to device, enabling a seamless and intuitive telephone conversation experience for the user.

COMPUTER-IMPLEMENTED METHOD OF PROCESSING AN EMERGENCY CALL AND EMERGENCY COMMUNICATION NETWORK

A method of processing an emergency call in an emergency communication network can include receiving an emergency call from an emergency caller from a first mobile communication device that is received via a SIP INVITE message; obtaining location information of the location of the first mobile communication device; determining a PSAP that is in the vicinity of the location of the first mobile communication device, and forwarding the emergency call to the PSAP for being handled by a call taker at the PSAP. The ESRP can request location information of all mobile communication devices that are in the vicinity of the first mobile communication device and, upon receipt of the location information, create a list of all mobile communication devices that are in the vicinity of the first mobile communication device for transmitting the list to the PSAP to be displayed at a display device of a call taker.

CALL SCREENING SERVICE FOR DETECTING FRAUDULENT INBOUND/OUTBOUND COMMUNICATIONS WITH SUBSCRIBER DEVICES

An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.

METHOD TO REDUCE EMERGENCY CALL SET-UP
20230269830 · 2023-08-24 ·

Aspects presented herein may improve an emergency call establishment procedure by enabling a UE to transmit emergency register messages more efficiently. In one aspect, a UE transmits, to a network entity, a request to set up an ePDN. The UE receives, from the network entity, a response to the request comprising a set of multiple P-CSCF addresses. The UE transmits, to the network entity, a registering message to each of the multiple P-CSCF addresses simultaneously. The UE receives, from the network entity, at least one acceptance message from at least one of the set of multiple P-CSCF addresses in response to the registering message. The UE transmits, to the network entity, an invitation message to a P-CSCF address from which an acceptance message is received to establish an emergency call connection.

OVER THE AIR PROVISIONING OF MOBILE DEVICE SETTINGS
20220150674 · 2022-05-12 · ·

A mobile device has a display, a memory, an antenna, a transceiver connected to the antenna for communicating voice and data through a wireless communication system, at least one processor, and executable instructions stored in the memory. The executable instructions, when executed by the at least one processor, (i) cause the mobile device to communicate wirelessly with one or more remote servers; (ii) cause the mobile device to display on the display, a user interface for enabling the user of the mobile device to select a mobile network service provider; (iii) in response to a selection, cause the mobile device to be configured for use with a first one of a plurality of mobile network service providers and enable access by the mobile device of wireless communication service; and (iv) in response to a selection, cause the mobile device to be configured for use with a second one of the plurality of mobile network service providers and enable access by the mobile device of wireless communication service provided by the second one of the plurality of mobile network service providers for a service plan offered by the second one of the plurality of mobile network service providers.

Routing Communications By Scanning Visible Codes
20220150662 · 2022-05-12 · ·

Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.

SYSTEM AND METHOD FOR DETECTING AND CONTROLLING CONTRABAND DEVICES IN A CONTROLLED ENVIRONMENT
20220150343 · 2022-05-12 · ·

The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.

Associating a user service with a telephony identifier
11729625 · 2023-08-15 · ·

Associating a user service with a telephony identifier. The user service is accessible by a user of a telephony device via an application on the telephony device. The telephony device is operable in a radio telephony network (RTN) and is contactable via the telephony identifier when operating in the RTN. Network equipment: communicates, between the network equipment and the application on the telephony device, first data comprising a communicated token; receives, from the telephony device, second data comprising a received token, wherein the second data is received from the telephony device via an RTN-native service; receives, from a network node in the RTN, the telephony identifier in control signalling associated with the RTN-native service; and based at least on correlating the received token with the communicated token, associates the received telephony identifier with the user service.