H04M3/42008

Data cycling

The disclosed systems and techniques enable data cycling operations for an aliasing system to refresh first and second copies of aliases maintained by an aliasing server and a server that interacts with end-user devices (e.g., an enterprise server). More generally, the disclosed systems and techniques enable an enterprise system to use alias addresses (e.g., email addresses, phone numbers) for users while avoiding storing and managing the users' personal addresses. For example, the enterprise system may forward personal addresses (e.g., received from a user) to a relay or aliasing server configured to generate alias addresses (e.g., alias email addresses or alias phone numbers) based on the personal addresses. The aliasing server may operate as a “middle man” that receives emails, phone calls, or text messages directed to the alias addresses and that forwards the messages to the personal addresses (when appropriate).

Systems and methods for dynamic network pairings to enable end-to-end communications between electronic devices

A system and method for configuring network pairings enabling end-to-end communications between electronic devices is disclosed. The system receives a network pairing request from a requesting device to communicate with a target device. The system identifies historic data associated with the communication object and determines whether an affinity group associated with the requesting device is found. Further, the system determines whether the communication object has a valid permission token associated therewith. If a valid permission token is unavailable, the system checks whether a subscriber filter criteria is met by the requesting device. If the filter criteria is met, system calculates a subscriber access score (SAS) for the requesting device and compares the score to a threshold. When the SAS is greater than the predetermined threshold value, system creates a dynamic network pairing between the requesting device and the target device.

Apparatus, methods, or software for data mining user information by providing services over the internet for connecting people

.[.Anonymous voice communication between a first station and a second station is facilitated by providing an interface that allows input of a transaction specification from at least one of the first and second stations. A reference code associated with the transaction is generated, there being a defined relationship between the reference code and the address of the second station for voice communication. The reference code is supplied to the first station, and a voice communication request and the reference code are received from the first station. The reference code is used to recover said address and a channel for voice communication is opened between said first and second stations. Voice communication can thereby be established between the first and second stations without providing the address of the second station to the first station..]..Iadd.An Internet-based service system for data mining user information is herein disclosed and enabled. The disclosed service system may facilitate users posting information, advertising products/services, connecting to other users, and making transactions over the Internet. Data obtained from each transaction submitted through the service are data mined. The collected data may include personal information, private data, interests, intellectual property, etc. To create transactions, the system may create a proposed transaction specifying a transaction between first and second parties based, at least in part, on data mining the first and second party's history of transactions. The service system may transmit a reference code to the first party related to the proposed transaction, and wait to receive a communication request from the first party employing the reference code. The reference code may include text, image(s), video(s), audio, or communication link(s), and the proposed transaction may be an advertisement or matching service..Iaddend.

Method and apparatus for handling callback of a public-safety officer

A method for routing civilian calls to an associated public-safety officer is provided herein. During operation, a call processor receives a civilian call having a target identifier number identifying a target of the call. An incident identifier is then received from the calling party. A current workflow point is determined for the identified incident, and the call is routed to an appropriate person based on the workflow point for the identified incident.

METHODS, SYSTEMS, AND DEVICES FOR MASKING CONTENT TO OBFUSCATE AN IDENTITY OF A USER OF A MOBILE DEVICE

Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.

SYSTEM AND METHOD FOR ESTABLISHING ONE-TO-ONE VOICE CALL BETWEEN TWO SELECTED SMARTPHONES
20220286554 · 2022-09-08 · ·

A system and method for establishing a one-to-one voice call between two selected smartphones are disclosed which include the sequential steps of receiving predetermined preference data and an indication of ready for internet telephony call by a data storage device from a first smartphone, retrieving from the data storage device a list of smartphones each having the same predetermined preference data and being ready for internet telephony call, the list of smartphones including feature data of a second smartphone, displaying the list of smartphones on the first smartphone, alerting a request for an internet telephony call on the second smartphone when the second smartphone is selected on the first smartphone, and establishing an internet telephony call between the first and the second smartphone when the request is accepted on the second smartphone.

Private vertical communication platform
11425540 · 2022-08-23 ·

The present disclosure provides a method of sending vertical SMS messages comprising a lead administrator contacting a first server with a request to create a group and providing certain identifying information to the first server; assigning an identification number to the group; creating and assigning at least one access code to the group; sharing the access code to desired members of the group and adding members to the group that send the access code to the identification number; and sending a SMS message to members of the group from the lead administrator, wherein the SMS messages are only shared vertically within the group.

Telecommunication method and system for simplifying communication such as conference calls
11290428 · 2022-03-29 · ·

A method of simplifying electronic communications between a plurality of users by communication implementation and management. Each user has an electronic identifier, which may be of a type, such as a website address, domain, LinkedIn address, etc. Each identifier is unique to each user. The electronic identifier can be changed at any time prior to contact enabling privacy and the method may be effected on a singular telecommunications platform (SIP) or mixed platform (SIP and PSTN) or other voice or text medium for cost efficiency. The system renders communication between users passive and allows for simultaneous and instantaneous communication while maintaining anonymity of the identifiers used.

Data integrity checker

The disclosed systems and techniques enable data integrity checks by an enterprise system to verify that a local alias address matches an alias maintained by an aliasing system. More generally, the disclosed systems and techniques enable an enterprise system to use alias addresses (e.g., email addresses, phone numbers) for users while avoiding storing and managing the users' personal addresses. For example, the enterprise system may forward personal addresses (e.g., received from a user) to a relay or aliasing server configured to generate alias addresses (e.g., alias email addresses or alias phone numbers) based on the personal addresses. The aliasing server may operate as a “middle man” that receives emails, phone calls, or text messages directed to the alias addresses and that forwards the messages to the personal addresses (when appropriate).

SYSTEMS AND METHODS FOR DYNAMIC NETWORK PAIRINGS TO ENABLE END-TO-END COMMUNICATIONS BETWEEN ELECTRONIC DEVICES
20220094693 · 2022-03-24 ·

A system and method for configuring network pairings enabling end-to-end communications between electronic devices is disclosed. The system receives a network pairing request from a requesting device to communicate with a target device. The system identifies historic data associated with the communication object and determines whether an affinity group associated with the requesting device is found. Further, the system determines whether the communication object has a valid permission token associated therewith. If a valid permission token is unavailable, the system checks whether a subscriber filter criteria is met by the requesting device. If the filter criteria is met, system calculates a subscriber access score (SAS) for the requesting device and compares the score to a threshold. When the SAS is greater than the predetermined threshold value, system creates a dynamic network pairing between the requesting device and the target device.