Patent classifications
H04M2242/30
Emergency response system with dynamic ALI database alphanumeric character hacking
An improved emergency response method and system are shown and described. A content-specified text field—such as a caller name field—an ALI database record for a communication device is updated to include information about a person experiencing an emergency and the emergency. A PSAP receiving an emergency services call from the communication device receives the caller name field on a terminal display and is thus informed about the emergency via a alphanumeric character communication rather than orally. A particular emergency may be assigned a code that is put in the caller name field. A PSAP operator receiving the emergency services call may then enter the code into an emergency services web interface to retrieve information about the emergency including service provider credentials, the person's medical condition, the person's medical records, real time physiologic data, treatment facility names, treatment facility types, a location of the emergency, a level of care, a videoconference web link, on-site personnel names, disaster information, and hazard information. The code can be transmitted to first responders and downstream medical professionals to enhance their ability to deliver emergency services. The system and method provide a means for legacy PSAPs to receive the benefits of Next Generation 911 systems without the infrastructure changes that would otherwise be required.
Telephone call screener based on call characteristics
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a telephone call screener are disclosed. In one aspect, a method includes the actions of receiving a telephone call. The actions further include determining characteristics of the telephone call. The actions further include, based on the characteristics of the telephone call, determining a level of screening to apply to the telephone call. The actions further include determining screening data based on screening the telephone call according to the level of screening. The actions further include providing, for output, the screening data.
SYSTEMS AND METHODS FOR MOBILE TRACKING, COMMUNICATIONS AND ALERTING
A mobile device that can optionally communicate with a server, the mobile device including latitude/longitude determining capabilities, a display, a data communication system and a power source. The mobile device can be used to communicate, provide location information, track an individual, as well as allow alerting, such in a case of an emergency. This location information could be accompanied with one or more of video information, audio information, multimedia information, and pictures taken by the mobile device. The mobile devices also allow inner-communicability among the devices such as text messaging, chat, voice communications, and the like. The capabilities of the mobile device can also be used to determine if the device has traversed a geo-fence, or defined electronic perimeter, with the crossing of the perimeter capable of triggering special functionality such as the turning on of the mobile device, or smart phone, sending an alert, altering functionality, or the like.
Method and apparatus for content presentation in association with a communication connection
A method and apparatus are provided for presenting content to a caller and/or a called party in association with a telephone call or other communication connection. Content may be presented pre-ring (before the called party's telephone rings), in-call, and/or post-call, and may be related to a party participating in the call or may be related to a third party. Presentation of specified content may include assisted sharing, wherein both parties view the same content and one guides or assists the other. A received call may be split into signal and voice channels, with the signal channel used to notify a call controller of the call and the voice channel being directed to an agent selected by the call controller to handle the call.
Method to determine the quality of civic address produced by reverse geocoder
Systems and methods are provided for determining the quality of a civic address produced by a reverse geocoder, utilizing the uncertainty of a geodetic location and a distance between the geodetic location and a geocoded location (i.e., a civic address) determined by the reverse geocoder. Upon receiving a request by a PSAP for a civic address corresponding to a UE initiating a call for emergency services, a node initially identifies a geodetic location of the UE and an uncertainty of the geodetic location. The node initiates an API call to a reverse geocoder API. The node receives a geocoded location corresponding to the geodetic location and compares the geocoded location to the geodetic location to determine a distance between them. Based on the uncertainty of the geodetic location and the distance between the geodetic location and the geocoded location, a quality of the civic address is determined.
Detection of Spoofed Calls Using Call Header
Implementations described herein relate to methods, systems, and computer-readable media to label incoming phone calls. A method to label an incoming phone call includes detecting the incoming phone call associated with a caller identifier (ID), determining a location associated with the call, and analyzing a call header of the call to determine one or more call characteristics. The method further includes determining, based on the location and the call characteristics, if the location is spoofed and determining, based on the caller ID and the call characteristics, if an access network associated with the call is spoofed. The method further includes applying a trained machine learning model to determine whether the call is a robocall. The method further includes assigning a label to the call that indicates whether the call is a spoofed call or is the robocall and sending the label to a callee device associated with the call.
Detecting SS7 redirection attacks with audio-based distance bounding
Disclosed are various embodiments for detecting Signaling System 7 (SS7) redirection attacks by measuring call audio round trip times between phones. Such redirection attacks force calls to travel longer physical distances than usual, thereby causing longer end-to-end delay. Accordingly, various embodiments implement a distance bounding-inspired protocol that allows for securely characterizing the round trip time between two call endpoints. As a result, telephone users can reliably detect SS7 redirection attacks and protect the information contained in their calls.
SYSTEMS AND METHODS FOR EMERGENCY COMMUNICATIONS AMONGST GROUPS OF DEVICES BASED ON SHARED DATA
Described herein are systems, devices, methods, and media for managing emergency communications providing data sharing amongst groups of devices, proxy calling by one communication device on behalf of another, and seamless data extraction from a communication device by first responders.
VOICE-CONTROLLED SYSTEM THAT CHECKS PROGRAM GUIDE TO DETERMINE CHANNEL ON WHICH PROGRAM NAME DETERMINED ACCORDING TO VOICE-TO-TEXT TRANSCRIPT IS CURRENTLY PLAYING
A voice-controlled system for allowing a guest of a hospitality establishment to play desired media content on an in-room device includes one or more servers coupled to a network and a plurality of in-room devices. A user device captures audio from a microphone and converts the audio into a text transcript utilizing a voice-to-text conversion service. The user device passes the text transcript to the servers where a particular room of the hospitality establishment with which the user device is currently associated is determined. The servers check a program guide for the particular room in order to determine a channel on which a program name determined according to the text transcript is currently playing, and determine one or more target in-room devices of the particular room. The servers send commands causing the target in-room devices to play the channel on which the program name is currently playing.
Automatically accessing an internet session using transferred network login information
Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.