Patent classifications
H04M3/42144
LEARNING GAMIFICATION AND SAFETY CONTROL APPLICATION FOR MOBILE DEVICES
An application for mobile devices that enables a server device to control multiple client devices with numerous features and capabilities relevant to both server and client devices, such as learning gamification and safety controls. Running on popular operating systems, this application is compatible with other mobile applications and provides a mechanism for the server device to override internal controls on one or more client devices with ability to configure access controls based on gamification features using parameters that include but not limited to applications, programs, goals, and rewards. This application includes safety and security control features that enables the server device to remotely monitor and control one or more client devices.
Proactively obtaining a voicemail pilot number for a user equipment on a telecommunications network
The disclosed implementations include a method performed on a telecommunications network. A Telephony Application Server (TAS) can receive a first message associated with an operation unrelated to a voicemail service, where the first message is associated with a user equipment (UE) on the telecommunications network. The TAS can send a second message to a home subscriber server (HSS) in response to the first message, where the second message includes a request for a voicemail pilot number. The TAS can receive a third message from the HSS in response to the second message, where the third message includes the voicemail pilot number. A voicemail service is thus proactively enabled with the voicemail pilot number stored at the TAS.
METHOD AND APPARATUS FOR PROVIDING ASSISTANCE TO CALLING CUSTOMERS
A method and apparatus for providing assistance to customers seeking assistance from agents of an enterprise is disclosed. The method includes receiving a signal indicating the caller's wish to speak with a live agent associated with the enterprise to seek the assistance from the live agent. In response to a receipt of the signal, it is determined whether at least one live agent from among a plurality of live agents associated with the enterprise is available for a voice interaction with the caller. Subsequent to determining that no live agent from among the plurality of live agents is currently available for the voice interaction with the caller, the caller is diverted to an asynchronous messaging channel. A textual messaging-based interaction is facilitated between a messaging agent and the caller on the asynchronous messaging channel to provide the assistance to the caller.
Learning gamification and safety control application for mobile devices
An application for mobile devices that enables a server device to control multiple client devices with numerous features and capabilities relevant to both server and client devices, such as learning gamification and safety controls. Running on popular operating systems, this application is compatible with other mobile applications and provides a mechanism for the server device to override internal controls on one or more client devices with ability to configure access controls based on gamification features using parameters that include but not limited to applications, programs, goals, and rewards. This application includes safety and security control features that enables the server device to remotely monitor and control one or more client devices.
Alternate user communication handling based on user identification
The invention relates to providing alternate user communication based on user identification. A communication from a user may be received, and the communication may include an authentication credential from the user. When the user is determined to be an unauthorized user based on the authentication credential, the communication may be extended in order to capture more information from the unauthorized user, and to deter the unauthorized user from making other unauthorized access attempts. In addition to the extension of the communication with the unauthorized user, one or more additional alternate treatments may be presented to the unauthorized user in order to identify, track, and/or prevent access by the unauthorized user.
PROACTIVELY OBTAINING A VOICEMAIL PILOT NUMBER FOR A USER EQUIPMENT ON A TELECOMMUNICATIONS NETWORK
The disclosed implementations include a method performed on a telecommunications network. A Telephony Application Server (TAS) can receive a first message associated with an operation unrelated to a voicemail service, where the first message is associated with a user equipment (UE) on the telecommunications network. The TAS can send a second message to a home subscriber server (HSS) in response to the first message, where the second message includes a request for a voicemail pilot number. The TAS can receive a third message from the HSS in response to the second message, where the third message includes the voicemail pilot number. A voicemail service is thus proactively enabled with the voicemail pilot number stored at the TAS.
VENUE OWNER-CONTROLLABLE PER-VENUE SERVICE CONFIGURATION
There are provided measures for venue owner-controllable per-venue service configuration. Such measures could comprise configuring a per-venue service model of services of a network operator for terminal devices of subscribers of the network operator on the basis of an input by a venue owner of a venue, the per-venue service model including at least one configurable parameter for defining a venue-based service for terminal devices of subscribers residing in a specified venue area of the venue, and controlling provision of services of the network operator to terminal devices or subscribers of terminal devices in accordance with the per-venue service model depending on applicability thereof for the service provision.
ARTIFICIAL INTELLIGENCE DELIVERY EDGE NETWORK
Approaches, techniques, and mechanisms are disclosed for accessing AI services from one region to another region. An artificial intelligence (AI) service director is configured with mappings from domain names of AI cloud engines to IP addresses of edge nodes of an AI delivery edge network. The AI cloud engines are located in an AI source region. The AI delivery edge network is deployed in a non-AI-source region. An AI application, which accesses AI services using a domain name of an AI cloud engine in the AI cloud engines located in the AI source region, is redirected to an edge node in the edge nodes of the AI delivery edge network located in the non-AI-source region. The AI application is hosted in the non-AI-source region. The AI services is then provided, by way of the edge node located in the non-AI-source region, to the AI application.
COMMUNICATION APPARATUS AND COMMUNICATION METHOD
A communication apparatus includes a user signal transmission unit that transmits a user signal required for an end user to perform communication; a manager function implementing unit that implements a function provided to a manager of the present apparatus; a license monitoring unit that monitors a license of the present apparatus, and outputs a function limitation signal when the license has expired; and a function limitation unit that limits the function implemented by the manager function implementing unit when receiving the function limitation signal. In a communication apparatus that transmits a user signal required for an end user to perform communication, a function of the apparatus is limited when a relevant license has expired, while preventing an influence of the limitation upon the end user.
Methods and devices for verifying a communication number
The object of the present application is to provide a method and device for verifying a communication number. Compared with the prior art, the present application includes: a user equipment transmitting a verification request to a network device; the network device transmitting an auxiliary verification number to the user equipment based on the verification request; the user equipment initiating a verification call to the auxiliary verification number via the communication number; the network device obtaining a call record of the auxiliary verification number and determining the verification result based on the call record of the auxiliary verification number. In this way, operator fees would not be caused at both the user equipment and the network device, thus greatly saving costs.