H04M2203/553

Security and Public Safety Application for a Mobile Device with Audio/Video Analytics and Access Control Authentication
20180261025 · 2018-09-13 ·

An access control system utilizes authorized users' mobile electronic devices for transmitting biometric identifiers in combination with using an access card, for authenticating the user's access privileges tor unlocking a secure door. The system may further verify proximity of the user's device to the access control reader, which verifies correspondence of the access card with the transmitted biometric characteristics. The system may further require entry of a PIN into the user's device, for its transmission to the access control system for access confirmation. A scanner scans the area around its geographic location for signals emitted by mobile electronic devices, and identifies a position, a type, and an address of each device, using characteristics of the signals. Audio analytics detect/identify a position of sudden sound fluctuations indicating a gunshot/fight incident, and correlates the incident location to a device location. Video analytics correlate imaged people with detected electronic devices.

Mobile terminal apparatus
10051100 · 2018-08-14 · ·

A mobile terminal apparatus checks if a user is a proper user based on the operation of the user and, if the result of authentication is negative, uploads predetermined data, which is part of data stored in a memory, to a predetermined server. After the transmission is completed, the mobile terminal apparatus erases the uploaded data from the memory. It is also possible to instruct the mobile terminal apparatus to upload and erase data from an external source using an electronic mail or a telephone tone signal sequence. This may protect data contained in mobile terminal apparatus that has been lost, from a person who improperly attempts to access the data.

Method and apparatus for storing and retrieving profile data for electronic devices

Apparatuses for storing, transmitting, and identifying changes in relation to, data are provided. One of these apparatuses is a server which includes a processor-implemented controller that receives data from a first electronic device external to the server, determines whether a user identification corresponding to a second electronic device external to the server matches a specified user identification, and transmits at least one portion of the data to the second electronic device based at least in part on a determination that the user identification matches the specified user identification.

Security and public safety application for a mobile device with audio/video analytics and access control authentication
09922477 · 2018-03-20 ·

An access control system utilizes authorized users' mobile electronic devices for transmitting biometric identifiers in combination with using an access card, for authenticating the user's access privileges for unlocking a secure door. The system may further verify proximity of the user's device to the access control reader, which verifies correspondence of the access card with the transmitted biometric characteristics. The system may further require entry of a PIN into the user's device, for its transmission to the access control system for access confirmation. A scanner scans the area around its geographic location for signals emitted by mobile electronic devices, and identifies a position, a type, and an address of each device, using characteristics of the signals. Audio analytics detect/identify a position of sudden sound fluctuations indicating a gunshot/fight incident, and correlates the incident location to a device location. Video analytics correlate imaged people with detected electronic devices.

Security and public safety application for a mobile device with enhanced incident reporting capabilities
09883370 · 2018-01-30 ·

In a plurality of described embodiments, various modules of an application for a client device may operate to enhance personal security for an individual user, and promote public safety in general. An incident reporting module provides the capability for users to submit descriptive details and a location of an incident, with selective uploading of images, which may be transcoded for faster transmission, to be followed by uploading of high resolution images once bandwidth permits. Transmission of the incident report is authenticated by the application generating a unique watermark based on a serial number of the client device, and by transmitting of the incident report with the unique watermark included thereon. The application is configured for maintaining a chain of custody of the incident report, by authenticating an ID of a user transmitting the report.

Security and Public Safety Application for a Mobile Device with Audio/Video Analytics and Access Control Authentication
20180025563 · 2018-01-25 ·

An access control system utilizes authorized users' mobile electronic devices for transmitting biometric identifiers in combination with using an access card for authenticating the user's access privileges for unlocking a secure door. The system may further verify proximity of the user's device to the access control reader, which verifies correspondence of the access card with the transmitted biometric characteristics. The system may further require entry of a PIN into the user's device, for its transmission to the access control system for access confirmation. A scanner scans the area around its geographic location for signals emitted by mobile electronic devices, and identifies a position, a type, and an address of each device, using characteristics of the signals. Audio analytics detect/identify a position of sudden sound fluctuations indicating a gunshot/fight incident, and correlates the incident location to a device location. Video analytics correlate imaged people with detected electronic devices.

System and method for automatic update of calls with portable device

Systems and methods are disclosed for calling desired contacts using a standalone smartphone or other portable device, selecting and using contact information from a customer relationship management (CRM) system, and automatically updating the CRM system with the outcome of each conversation. In addition, systems and methods are disclosed for automatically integrating an automated calling system with a customer relationship management system, contact management system, and/or task management system, so that historical information stored concerning past contact activity and automated calling sessions relating to contacts is automatically updated in the customer relationship management system, contact management system, and/or task management system.

Security and public safety application for a mobile device with audio/video analytics and access control authentication
09773364 · 2017-09-26 ·

An access control system utilizes authorized users' mobile electronic devices for transmitting biometric identifiers in combination with using a key card, for authenticating the user's access privileges for unlocking a secure door. The system may further verify proximity of the user's device to the access control reader, which verifies correspondence of the key card with the transmitted biometric characteristics. The system may further require entry of a PIN into the user's device, for its transmission to the access control system for access confirmation. A scanner scans the area around its geographic location for search signals emitted by mobile electronic devices, and identifies a position, a type, and an address of each device, using characteristics of the search signals. Audio analytics detect/identify a position of sudden sound fluctuations indicating a gunshot/fight incident, and correlates the incident location to a device location. Video analytics correlate imaged people with detected electronic devices.

MOBILE TERMINAL APPARATUS
20170208164 · 2017-07-20 ·

A mobile terminal apparatus checks if a user is a proper user based on the operation of the user and, if the result of authentication is negative, uploads predetermined data, which is part of data stored in a memory, to a predetermined server. After the transmission is completed, the mobile terminal apparatus erases the uploaded data from the memory. It is also possible to instruct the mobile terminal apparatus to upload and erase data from an external source using an electronic mail or a telephone tone signal sequence. This may protect data contained in mobile terminal apparatus that has been lost, from a person who improperly attempts to access the data.

System and method for network setup of wireless device for home network
09692888 · 2017-06-27 · ·

A network device such as a wireless network device is configured using information input from a user computer or a user telephone for a specific home network to which the device will belong. This may be accomplished by obtaining from the user account information which is sent to a configuration server that automatically sets up the device for network use without the users further direct involvement.