H04M2242/30

Realtime, Interactive and Geographically Defined Computerized Personal Identification and Matching Methods

In general, the invention relates to a method of interactive and live computerized matching in which a first user has a personal data device including a wireless communication system. A network is configured to include a server programmed with a personal characteristic database and a database searching algorithm, and a wireless communication system that is capable of communicating with the user's personal data device. The first user is allowed to log on through the wireless communication system to the network using his or her personal data device, and communicates to and stores in the database personal data defining his or her characteristics and those for his or her ideal match. Either the secure network automatically identifies the first users precise geographic location, or the user himself otherwise indicates and stores in the database of the network an identifying address that indicates his current specific geographic location. The user then instructs the database searching algorithm to search for and identify other users on to the network near the same geographic location to facilitate a match.

Car Surveillance System
20210029239 · 2021-01-28 ·

A safety system particularly for a transport service software application. The system integrates into an existing transport service software application communicates with a cellular network mobile device of a transport service driver or at least one passenger located in a vehicle offering rideshare services. In an emergency, a user of the system may press a panic button on the application. The mobile device activates its camera and microphone turns on to livestreams audio and video to emergency personnel, and transmits GPS data to said emergency personnel.

MOBILE TERMINAL AND COSMETICS AUTOMATIC RECOGNITION SYSTEM

The present invention relates to a mobile terminal and a cosmetics automatic recognition system capable of recognizing cosmetics located nearby and recommending a make-up method using the recognized cosmetics. The present invention may comprise a mobile terminal including: an RFID reader unit configured to recognize cosmetics through an RFID tag attached to a cosmetic and receive cosmetic information from the recognized RFID tag and from cosmetics having an RFID tag which stores cosmetic information attached thereto; a control unit configured to generate a cosmetics list consisting of at least one cosmetic recognized by the RFID reader unit; and a display unit configured to display the cosmetics list.

Methods and devices for configuring and acquiring emergency number

The present disclosure provides a method and a device for configuring an emergency number, and a method and a device for acquiring an emergency number. The method for configuring an emergency number comprises: determining, by a network side device, position information about a UE when the UE has accessed to a wireless local area network; and issuing, by the network side device, an emergency number list corresponding to the position information about the UE to the UE.

SYSTEMS AND METHODS FOR EMERGENCY COMMUNICATIONS AMONGST GROUPS OF DEVICES BASED ON SHARED DATA

Described herein are systems, devices, methods, and media for managing emergency communications providing data sharing amongst groups of devices, proxy calling by one communication device on behalf of another, and seamless data extraction from a communication device by first responders.

Method and system for repositioning a service location
10890457 · 2021-01-12 · ·

A network computer service can receive a service request associated with a first service location. Additionally, the network computer service can detect a user action to associate the service request with a second service location. In some examples, the user input can be detected on a user device. In other examples, the second service location can be different from the first service location. Moreover, the network computer service can determine the second service location satisfies a predetermined permissibility criterion for permitting change of the first service location to the second service location. In response to determining the second service location satisfies the predetermined permissibility criterion, the network computer service can transmit an instruction to cause a device to associate the service request with the second service location in place of the first service location.

Data gate apparatus for integrating functionalities of an interface format into a plurality of services and method thereof
10887469 · 2021-01-05 · ·

A data gate apparatus for integrating functionalities of an interface format into a plurality of services. The data gate comprises a storage device, a communication interface and a processor coupled to the storage device and the communication interface. The processor detects a device supporting a first interface format that is different than the interface formats stored in the storage device. The processor learns the first interface format by receiving data function in the first interface format and associating a field in the data function with a variable representing information of a particular type. The processor verifies that the first interface format has been successfully learnt by generating a message in the first interface format and sending the message to the device. The processor receives a response to the message and parses the response to thereby confirm that the first interface format is functional and integrable into the plurality of services.

Network service for dynamic selection of voice communication medium for call connections

A network computer system can respond to a call connection signal by making a determination as to whether the call connection is likely to be supported for at least one of the caller or receiver using a first voice communication medium, as compared to an alternative voice communication medium. Based on the determination, the network computer system can cause the call connection to be established using the voice communication medium of the determination.

SYSTEMS AND METHODS FOR INTELLIGENT ROUTING OF NOTIFICATIONS OF INCOMING VOICE COMMUNICATION REQUESTS

This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media for intelligent routing of notifications of incoming voice communication requests. A device, such as a smartphone, may receive an incoming voice communication request, such as a cellular voice call. The smartphone may then identify devices connected to it, such as headsets, tablets, etc., and request each device activate a microphone or camera to attempt to locate the user with respect to the connected devices. The smartphone may then select one of the connected devices, or itself, as the device best able to notify the user of the incoming call based on captured audio, images, or video. The smartphone may then request the selected device output a notification, such as a ring tone, to notify the user of the incoming call. Such a technique may avoid inundating the user with simultaneous call notifications from multiple devices.

Transaction fraud prevention tool

Various examples are directed to systems and methods for detecting potentially fraudulent voice calls to a financial services institution. A computing system may receive an indication of a voice call placed by a voice caller to an operator. The computing system may generate a network address indicator describing a network location. The network address indicator may be provided to the voice caller. The computing system may receive an indication of a financial services account indicated by the voice caller. The computing system may also receive an indication of an access to the network location by a remote device. The computing system may determine, using the indication of the access to the network location, a first location associated with the remote device and determine that the first location does not match a second location associated with the financial services account. The computing system may generate an alert indicating that the voice call is potentially fraudulent.