H04W4/16

Systems and methods for analyzing and optimizing conference experiences

Disclosed is a system for analyzing and optimizing conference experiences. The system may identify parameters associated with a conference between a set of User Equipment (“UEs”) used by different conference participants to access the conference. The system may compare the identified parameters to sets of parameters associated with a classification model. The system may identify, based on the comparing and the model output, a particular classification for the conference, and may calculate an impact of each conference parameter on the particular classification based on a particular parameter combination included in the model for the particular classification. The system may determine that a subset of the conference parameters has a larger impact on the particular classification than other conference parameters, may select one or more actions that are associated with the particular classification and the subset of parameters, and may perform the one or more actions.

Systems and methods for analyzing and optimizing conference experiences

Disclosed is a system for analyzing and optimizing conference experiences. The system may identify parameters associated with a conference between a set of User Equipment (“UEs”) used by different conference participants to access the conference. The system may compare the identified parameters to sets of parameters associated with a classification model. The system may identify, based on the comparing and the model output, a particular classification for the conference, and may calculate an impact of each conference parameter on the particular classification based on a particular parameter combination included in the model for the particular classification. The system may determine that a subset of the conference parameters has a larger impact on the particular classification than other conference parameters, may select one or more actions that are associated with the particular classification and the subset of parameters, and may perform the one or more actions.

Voice Call Transfer Method and Electronic Device
20220408321 · 2022-12-22 ·

A voice call transfer method includes when a target device receives an incoming voice call as a called party, displaying, on a call application interface, a device identifier of a first device that can perform voice call transfer, receiving a selection operation performed on the device identifier, triggering the target device to enter a voice call transfer mode, and sending first voice data from a calling party device to the first device when it is determined that the target device performs a voice call with the calling party device and is in the voice call transfer mode, so that the first device plays the first voice data.

Voice Call Transfer Method and Electronic Device
20220408321 · 2022-12-22 ·

A voice call transfer method includes when a target device receives an incoming voice call as a called party, displaying, on a call application interface, a device identifier of a first device that can perform voice call transfer, receiving a selection operation performed on the device identifier, triggering the target device to enter a voice call transfer mode, and sending first voice data from a calling party device to the first device when it is determined that the target device performs a voice call with the calling party device and is in the voice call transfer mode, so that the first device plays the first voice data.

METHOD AND APPARATUS FOR SHARING REASON CAUSE FOR MCX COMMUNICATION OVER PRE-ESTABLISHED SESSION

A method for sharing a reason cause for a mission critical communication (MCX) communication over pre-established session in an MCC network is provided. The method includes transmitting, to the server, a call initiation request to initiate a call, wherein the call initiation request includes first information on a session type and second information on a resource list, receiving, from the server, a mission critical pre-established session control (MCPC) connect message including a security message, determining whether an authentication for the security message is successful, and transmitting, to the server, a first MCPC acknowledgement message including a reason cause field to inform a reason for terminating the call in response to determining that the authentication for the security message is not successful.

DATA EXCHANGE DURING A VOICE CALL SESSION
20220407957 · 2022-12-22 ·

Techniques for performing data exchanges during voice call sessions is described. In one example, a network server may facilitate a voice call session between user devices and associate a unique session number (USN) to each of the voice call sessions. The USN may be used as a reference when toggling between voice call sessions. In one example, when a particular voice call session is toggled to an active state, the network server may limit recipients of sensitive financial information to be between transacting parties in the active voice call session. By isolating other user devices that are not privy to transactions in the active voice call session, the chances for a transacting party in the active voice call session to accidentally send payments, for example, to an unintended recipient can be substantially minimized.

DATA EXCHANGE DURING A VOICE CALL SESSION
20220407957 · 2022-12-22 ·

Techniques for performing data exchanges during voice call sessions is described. In one example, a network server may facilitate a voice call session between user devices and associate a unique session number (USN) to each of the voice call sessions. The USN may be used as a reference when toggling between voice call sessions. In one example, when a particular voice call session is toggled to an active state, the network server may limit recipients of sensitive financial information to be between transacting parties in the active voice call session. By isolating other user devices that are not privy to transactions in the active voice call session, the chances for a transacting party in the active voice call session to accidentally send payments, for example, to an unintended recipient can be substantially minimized.

Tracking device operation in safety-classified zone
11533582 · 2022-12-20 · ·

Tracking devices can be associated with safe zones, smart zones, and high risk zones. Safe zones correspond to regions where a likelihood that a tracking device is lost within the safe zone is lower than outside the safe zone. High risk zones correspond to regions where a likelihood that a tracking device is lost within the high risk zone is higher than outside the high risk zone. Smart zones correspond to an expected tracking device, mobile device, or user behavior. Home areas are geographic regions in which a user resides, and travel areas are geographic regions in which a user does not reside. A tracking device can be configured to operate in a mode selected based on a presence of the tracking device within a safe zone, a smart zone, a high risk zone, a home area, or a travel area.

Tracking device operation in safety-classified zone
11533582 · 2022-12-20 · ·

Tracking devices can be associated with safe zones, smart zones, and high risk zones. Safe zones correspond to regions where a likelihood that a tracking device is lost within the safe zone is lower than outside the safe zone. High risk zones correspond to regions where a likelihood that a tracking device is lost within the high risk zone is higher than outside the high risk zone. Smart zones correspond to an expected tracking device, mobile device, or user behavior. Home areas are geographic regions in which a user resides, and travel areas are geographic regions in which a user does not reside. A tracking device can be configured to operate in a mode selected based on a presence of the tracking device within a safe zone, a smart zone, a high risk zone, a home area, or a travel area.

On-hold experience

Technology for placing a user on-hold can include sending a push notification to a user device after the call has been placed on-hold. A link in the push notification can request authentication credentials from the user. When the authentication credentials have been received and verified, a chat window can be launched via an application on the user device. The intent of the call can be determined based at least in part by information received via the chat window. The authentication information and the intent of the call can be transferred to a representative answering the call.