Patent classifications
H04M2207/185
USER EQUIPMENT-ASSISTED SECURE CALL TRANSFERS
Techniques described provide for transferring calls between a first user equipment (UE) and a second UE. One implementation may include receiving a request to transfer a call, which has been established established between the first UE and a third party device, to be between a second UE and the third party device. Location information for the first and second UEs may be received. A determination may be made to determine whether the first and second UE are in proximity to each other. In the event that a determination is made that the first and second UE are in proximity to each other, the established call may be transferred from the first UE to the second UE. Other aspects and features are also claimed and described.
COMPLEX COMPUTING NETWORK FOR IMPROVING STREAMING OF AUDIO CONVERSATIONS AND DISPLAYING OF VISUAL REPRESENTATIONS ON A MOBILE APPLICATION
Systems, methods, and computer program products are provided for improving of audio conversations and displaying of visual representations among mobile devices. For example, a method comprises determining a first user accesses a mobile application on a first mobile device of a first user; determining a second user accesses the mobile application on a second mobile device of the second user; initiating audio communication between the first mobile device of the first user and the second mobile device of the second user; and streaming the audio communication, either as a substantially live stream or as a recorded stream, to a third mobile device of a third user.
COMPLEX COMPUTING NETWORK FOR GENERATING AND HANDLING A WAITLIST ASSOCIATED WITH A SPEAKER IN AN AUDIO CONVERSATION ON A MOBILE APPLICATION
Systems, methods, and computer program products are provided for generating and handling a waitlist during an audio conversation on a mobile application. For example, a method comprises: receiving a request from a first user, listening to a first audio conversation involving a second user and a third user, to join a waitlist associated with the second user or the first audio conversation; adding the first user to the waitlist associated with the second user or the first audio conversation; enabling the second user to view the waitlist; and initiating a second audio conversation between the second user and a user on the waitlist upon termination of the first audio conversation.
Method and apparatus for interactive voice response
A system and method for providing an interactive voice response dialogue by using a cloud computing system coupled to a mobile computing device. The cloud computing system may receive a request from a mobile computing device to initiate communication with an interactive voice response system having a tree structure including audio files in the cloud computing system. An interactive voice response dialogue may be conducted using the cloud computing system when the mobile computing device does not have the capacity to receive the one or more files. When the mobile computing device does have the capacity to receive the one or more files, one or more files may be transmitted from the cloud computing system to the mobile computing device, so that he mobile computing device may conduct the interactive voice response dialogue.
Communications Method and Apparatus
A communications method includes receiving, by user equipment (UE), a first message from a network side, where the first message is used to indicate to the UE to perform circuit switched fallback (CSFB) as a called party, where the first message includes first information, and where the first information is used to indicate an incoming call number. If it is determined that a preset condition is met, the communications method further includes sending a second message to the network side, where the second message is used to indicate that the CSFB is rejected, and where the preset condition includes at least one of the incoming call number is restricted or the UE is in a mode of automatically rejecting a CSFB incoming call.
UE AND COMMUNICATION METHOD FOR SAME
A User Equipment (UE) includes a controller configured to, in a case of a failure of a first emergency call connection attempt using Packet Switched (PS) domain, perform a second emergency call connection attempt using the PS domain, and a transmission and/or reception unit configured to receive a Packet Data Unit (PDU) SESSION ESTABLISHMENT REJECT message as the failure of the first emergency call connection attempt. The UE uses a first access network for the first emergency call connection attempt, and the UE uses a second access network for the second emergency call connection attempt. Thus, for a 5th Generation (5G) mobile communication system corresponding to a next generation mobile communication system, a control method is provided that is performed by a user equipment, an access network apparatus, a core network apparatus, and an IMS apparatus to allow the user equipment to connect to a network suitable for an emergency notification service.
REMOTE MANAGEMENT
A system enables collaboration through electronic devices executes software or an operating system feature that allows a first device's computing environment to run remotely on a second devices computing software by scanning predetermined wireless channels to detect remote clients via a communication controller. The system transmits device profiles that include protocol versions that multiple clients support. The system generates a link layer that joins a first device to a second device and generates authenticating keys that establish a communication channel. The system enables operating modes of the first and second devices that establish the content and control of those devices.
ROUTE EVALUATION APPARATUS
A route-evaluation-apparatus evaluating a route of a worker: including a microprocessor and memory. The microprocessor functions as: an information-acquisition-unit acquiring location-information of the worker calculated based on GPS-signals, and acquiring time-information about when the location-information is calculated. The route-evaluation-apparatus further includes: a display-unit displaying plotted-points corresponding to the location information, and an icon-placement-unit placing a first icon and second icon on the travel route. The microprocessor functions as: a start-point/end-point-selection-unit selecting an end-point corresponding to the second-icon, and a required-time-calculation-unit calculating a required-time-period for a section from the start-point to the end-point. The travel-route sequentially passes through predetermined-areas in a predetermined-passing-order. The icon-placement-unit places the first-icons on each entering-points of the predetermined-areas, and place the second-icons on each exiting-points of the predetermined-areas. The required-time-calculation-unit calculates the required-time-period for each of the sections corresponding to the predetermined-areas.
CALL PROTECT GEOLOCATOR DISPLAY FOR 5G OR OTHER NEXT GENERATION NETWORK
Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.
Call content management for mobile devices
One example method of operation may include initiating a call via a calling device to a mobile device via a mobile device telephone number, responsive to initiating the call, retrieving call content data associated with a calling device profile, forwarding the call content data, via a content provider device, to the mobile device prior to establishing the call, hashing the mobile device telephone number to create a hashed value, storing the hashed value in the content provider device, authorizing the mobile device to receive the call content data, receiving a token representing the hashed value from the mobile device via the content delivery device, and connecting the call to the mobile device responsive to the token being authenticated.