Patent classifications
H04M7/1295
Emoji commanded action
A system and method for receiving and executing emoji based commands is disclosed. The system and method may include processes such as identifying ,emojis in a message, determining one or more action based on the emoji, and completing the determined actions.
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Door entry systems and methods
Various implementations include systems and methods for unlocking a door to a building on behalf of a tenant of the building that addresses the shortcomings of legacy telephone entry systems and allows for more efficient and safer management of building entry requests from third parties. In some implementations, the system taps into the legacy telephone entry systems to communicate with third parties seeking entry into the building. In some implementations, the system communicates with third party computing devices (e.g., stationary or mobile devices) to process entry requests. And, in some implementations, the system communicates entry preferences (or parameters) associated with a tenant with a door lock system to allow for entry during certain time windows or under certain conditions.
Message sending device and method thereof
Disclosed herein are a telephone, a switchboard, and a method for sending a message between the telephone and the switchboard using a Dual Tone Multiple Frequency (DTMF) signal. The telephone includes a sensor interface unit for collecting sensing signals by being connected to sensors, a transmission unit for generating a message using the sensing signals, converting the message into a DTMF signal, and transmitting the DTMF signal and a telephone signal, and a power distribution unit for being supplied with power from the switchboard and distributing the power to operation units.
Preventing double digit detection caused by in-band dual-tone multi-frequency signaling
A T2P (TDM to packet) delay buffer is provided. The delay buffer can prevent double digit detections caused by in-band DTMF leak when out-of-band DTMF is used. The T2P delay buffer is initialized with an audio pattern that represents silence in a configurable amount of delay. When a DTMF digit is detected, the system can stop taking the voice payload from the T2P delay buffer and start injecting RFC4733 RTP packets into the RTP stream at a pre-configured rate. The RFC4733 DTMF RTP packets continue to be injected into the RTP stream until the DTMF digit stops. Once the end of the DTMF digit is detected, the content of the T2P delay buffer can be discarded and the T2P delay buffer is reinitialized with an audio pattern that represents silence in a configurable amount of delay. After the T2P delay buffer is reinitialized, the voice packetization can be continued.
DOOR ENTRY SYSTEMS AND METHODS
Various implementations include systems and methods for unlocking a door to a building on behalf of a tenant of the building that addresses the shortcomings of legacy telephone entry systems and allows for more efficient and safer management of building entry requests from third parties. In some implementations, the system taps into the legacy telephone entry systems to communicate with third parties seeking entry into the building. In some implementations, the system communicates with third party computing devices (e.g., stationary or mobile devices) to process entry requests. And, in some implementations, the system communicates entry preferences (or parameters) associated with a tenant with a door lock system to allow for entry during certain time windows or under certain conditions.
DOOR ENTRY SYSTEMS AND METHODS
Various implementations include systems and methods for unlocking a door to a building on behalf of a tenant of the building that addresses the shortcomings of legacy telephone entry systems and allows for more efficient and safer management of building entry requests from third parties. In some implementations, the system taps into the legacy telephone entry systems to communicate with third parties seeking entry into the building. In some implementations, the system communicates with third party computing devices (e.g., stationary or mobile devices) to process entry requests. And, in some implementations, the system communicates entry preferences (or parameters) associated with a tenant with a door lock system to allow for entry during certain time windows or under certain conditions.
METHOD OF PROVIDING DTMF-BASED INTERACTIVE TEXT RESPONSE SERVICES
In a wireless communication system, when receiving a START DTMF message with an ITR indicator from a transmitting device, a network is configured to send a START DTMF ACK message to the transmitting device. After adjusting its settings and entering a text receiving mode, the transmitting device is configured to send a CONFIRM START DTMF TXT message to the network. The network is configured to send keypad information associated with the number of a receiving device to the receiving device. The receiving device is configured to send the corresponding text message to the network, which then forwards the text message to the transmitting device.
PREVENTING DOUBLE DIGIT DETECTION CAUSED BY IN-BAND DUAL-TONE MULTI-FREQUENCY SIGNALING
A T2P (TDM to packet) delay buffer is provided. The delay buffer can prevent double digit detections caused by in-band DTMF leak when out-of-band DTMF is used. The T2P delay buffer is initialized with an audio pattern that represents silence in a configurable amount of delay. When a DTMF digit is detected, the system can stop taking the voice payload from the T2P delay buffer and start injecting RFC4733 RTP packets into the RTP stream at a pre-configured rate. The RFC4733 DTMF RTP packets continue to be injected into the RTP stream until the DTMF digit stops. Once the end of the DTMF digit is detected, the content of the T2P delay buffer can be discarded and the T2P delay buffer is reinitialized with an audio pattern that represents silence in a configurable amount of delay. After the T2P delay buffer is reinitialized, the voice packetisation can be continued.
SYSTEMS AND METHODS FOR ROUTING USER DATA
Apparatus for initiating a phone call is provided. The apparatus may comprise a receiver configured to receive a request from a user to initiate a phone call. The apparatus may also comprise a transmitter. In response to the receipt of the request to initiate the phone call, the transmitter may be configured to transmit user data over a data communications network to a remote computer platform. The remote computer platform may be in communication with one or more agent desktops.