Patent classifications
H04L2101/65
METHOD TO PROVIDE AD HOC AND PASSWORD PROTECTED DIGITAL AND VOICE NETWORKS
A method and system includes the ability for individuals to set up an ad hoc digital and voice network easily and rapidly to allow users to coordinate their activities by eliminating the need for pre-entry of data into a web or identifying others by name, phone numbers or email. This method is especially useful for police, fire fighters, military, first responders or other emergency situations for coordinating different organizations at the scene of a disaster to elevate conventional communication problems either up and down the chain of command or cross communication between different emergency units. The method and system provides that the users are only required to enter a specific Server IP address and an ad hoc event name, a password and perhaps the name of the particular unit.
Call center mobile messaging
A method and system enables communications with a call center via SMS/MMS and provides an additional communications channel to communicate with the call center in addition to voice, Internet email/IM chat and fax. The call center obtains location information and images from a customer using SMS messages and web pages via a messaging hub.
MSISDN request handling for identity fraud management
Techniques are described for delivering subscriber information of a subscriber of a wireless carrier network to an authorized partner. The techniques include receiving, from a requesting entity device, a request for subscriber information of a subscriber, the request comprising a public Internet Protocol (IP) address of a user device associated with the subscriber, determining whether the requesting entity device is associated with an authorized partner based at least on one or more credentials associated with the requesting entity device, in response to determining that the requesting entity device is associated with the authorized partner, routing the request to at least one subscriber database of a plurality of subscriber databases to obtain the subscriber information using the public IP address of the user device, and transmitting the subscriber information of the subscriber to the requesting entity device.
Identity and phone number verification
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving, from a computer system, a request comprising a phone number, identifying a primary channel and one or more secondary channels based on, at least in part, respective performance data of the primary and secondary channels, sending a first message comprising a first text string via the primary channel to a destination device associated with the phone number, after sending the first message, determining that a conversion event for the message and the primary channel did not occur within a specified time period, and based on the determining, sending a second message comprising the first text string via a particular secondary channel to the destination device.
MESSAGE COMMUNICATION METHOD AND STORAGE MEDIUM STORING PROGRAM
The disclosed technique provides a message communication method comprising: receiving, from a client providing a message delivery service to a user of the client, an address of the user and a message to be transmitted to the address, the address being a phone number of the user or an address equivalent to the phone number; searching a database by using the address and outputting a first search result; associating the address with an opt-in status and storing the address in the database in a case where the first search result indicates that there was no hit for the address; controlling transmission of the message in such a manner as to inhibit the transmission of the message to the address in a case where the first search result indicates that the address has an opt-out status, and to transmit the message to the address in a case where the first search result indicates that the address has an opt-in status or that there was no hit for the address.
Systems and methods for suggesting contacts
An example method of suggesting contacts in a communications routing system includes: routing, via a routing engine, communications events between a communications device and a plurality of further communications devices coupled to the communications routing system as VoIP calls using respective VoIP telephone numbers; storing, for a user account associated with the communications device, a contact database representing VoIP telephone numbers stored in a contact tracking application of the communications device; storing, in the contact database for the user account, a log of communications events including a record for each new telephone number; and when the record for a new telephone number satisfies a threshold condition, providing a prompt, at the communications device, to add the new telephone number to the contact tracking application.
Call routing while roaming on a 5G wireless telecommunication network
Disclosed is a system and method to route a call from a roaming UE on a 5G network. The system receives from a UE belonging to a home network an indication of a call to a dialed number. The call requires information associated with the UE that is not available to the first wireless telecommunication network, because the UE is roaming on a visitor network. The indication of the call includes a unique identifier of the visitor network. The system can determine based on the unique identifier that the UE is roaming and send a request to the visitor network to provide instructions on how to route the received call. Upon obtaining the instructions on how to route the received call, the system routes the received call.
SELECTING CONTENT TRANSMISSIONS BASED ON ENCODING PARAMETERS
Methods and systems for providing content are disclosed. An example method can comprise receiving an encoding parameter associated with a first content transmission. The encoding parameter can indicate a level of complexity to encode the first content transmission. The method can comprise selecting, based on the encoding parameter, a second content transmission. The second content transmission can be encoded at a second bit rate that is different than a first bit rate of the first content transmission. The method can also comprise generating a third content transmission. The third content transmission can comprise the second content transmission.
System and method for detecting and controlling contraband devices in a controlled environment
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
CALL ROUTING WHILE ROAMING ON A 5G WIRELESS TELECOMMUNICATION NETWORK
Disclosed is a system and method to route a call from a roaming UE on a 5G network. The system receives from a UE belonging to a home network an indication of a call to a dialed number. The call requires information associated with the UE that is not available to the first wireless telecommunication network, because the UE is roaming on a visitor network. The indication of the call includes a unique identifier of the visitor network. The system can determine based on the unique identifier that the UE is roaming and send a request to the visitor network to provide instructions on how to route the received call. Upon obtaining the instructions on how to route the received call, the system routes the received call.