Patent classifications
H04M3/533
Systems and methods for providing headset voice control to employees in quick-service restaurants
Systems and methods for providing headset/ear bud voice control to crew members in a quick-service restaurant are disclosed. Exemplary implementations may: transmit transmission signals from a headset to the base station, receive reception signals by the headset from the base station; capture audio information from a first crew member, generate sound based on the received reception signals, generate the transmission signals to form a headset-specific uplink packet based on the captured audio information; generate semantic information based on the headset-specific uplink packet, wherein the semantic information includes one or more individual words; determine one or more commands that modify operation of the communication system, based on the semantic information, and facilitate execution of the one or more commands to control and/or modify the operation of the communication system.
Sound Localization for an Electronic Call
During an electronic call between two individuals, a sound localization point simulates a location in empty space from where an origin of a voice of one individual occurs for the other individual.
Verification of caller identification using application
Technology for identifying that a communication is from a verified enterprise includes receiving, by a device associated with a user, a data packet from a phone network. The data packet can be included in a communication to the device, which can have an application configured to verify communications from at least one enterprise. A token within the data packet can be identified by the application, and the application can compare the token to at least one token identifier associated with the at least one enterprise. In response to the token corresponding to at least one token identifier, the application can verify that the communication is from the at least one enterprise. In response to the communication being verified, the application can display a validation image on the device.
Verification of caller identification using application
Technology for identifying that a communication is from a verified enterprise includes receiving, by a device associated with a user, a data packet from a phone network. The data packet can be included in a communication to the device, which can have an application configured to verify communications from at least one enterprise. A token within the data packet can be identified by the application, and the application can compare the token to at least one token identifier associated with the at least one enterprise. In response to the token corresponding to at least one token identifier, the application can verify that the communication is from the at least one enterprise. In response to the communication being verified, the application can display a validation image on the device.
SYSTEM AND METHOD FOR PROCESSING VOICEMAIL
In one example, a recorded voicemail is first converted from speech to text, and a proposed action to be performed by the user is extracted from the voice message. For example, in the voicemail “this is John, call me at 650.987.0987 at 9 am tomorrow,” the action is to call John. At least one action parameter for undertaking the action is determined. For example, the action parameters may include the 650.987.0987 telephone number and the 9 am time the following morning, The at least one action parameter may be extracted from the voicemail message or it may be determined by other means, e.g., from a user's contact book. Finally, the user is presented with a prompt to facilitate undertaking the action using the at least one the parameter. For example, the user may be given the option to set a reminder to call John the following morning at 9 am.
SYSTEM AND METHOD FOR PROCESSING VOICEMAIL
In one example, a recorded voicemail is first converted from speech to text, and a proposed action to be performed by the user is extracted from the voice message. For example, in the voicemail “this is John, call me at 650.987.0987 at 9 am tomorrow,” the action is to call John. At least one action parameter for undertaking the action is determined. For example, the action parameters may include the 650.987.0987 telephone number and the 9 am time the following morning, The at least one action parameter may be extracted from the voicemail message or it may be determined by other means, e.g., from a user's contact book. Finally, the user is presented with a prompt to facilitate undertaking the action using the at least one the parameter. For example, the user may be given the option to set a reminder to call John the following morning at 9 am.
SENDER AND RECIPIENT DISAMBIGUATION
Systems and methods for sender profile and/or recipient profile disambiguation and/or confirmation are disclosed. In instances where a sender profile is not indicated by a user sending a communication from a communal device, heuristic data may be utilized to infer the sender profile. Similar heuristic data may also be used when selection of the sender profile is associated with a low confidence level. Heuristic data may also be used to infer the recipient profile when the user does not indicate the recipient profile or when selection of the recipient profile is associated with a low confidence. Various confirmations may result from the sender and recipient profile disambiguation.
System and method for identifying and handling unwanted callers using a call answering system
A method and system for identifying an unwanted caller using a call answering system. The method comprises receiving, by a call records server, information about callers from a plurality of telephony devices and one or more phone number data sources, classifying, by the call records server, one or more of the callers as either wanted or unwanted callers based on the received information, and storing, by the call records server, the received information and the classification of the one or more of the callers into a directory. The method further comprises identifying, by a call answering server, that a call from a given caller from a phone number to a receiving telephony device is from an unwanted caller by searching the directory, and handling, by the call answering server, the call from the given caller according to one or more preferences of the user, the one or more preferences including rejecting the call from the receiving telephony device, playing a recorded message, and disposing of the call.
Sender and recipient disambiguation
Systems and methods for sender profile and/or recipient profile disambiguation and/or confirmation are disclosed. In instances where a sender profile is not indicated by a user sending a communication from a communal device, heuristic data may be utilized to infer the sender profile. Similar heuristic data may also be used when selection of the sender profile is associated with a low confidence level. Heuristic data may also be used to infer the recipient profile when the user does not indicate the recipient profile or when selection of the recipient profile is associated with a low confidence. Various confirmations may result from the sender and recipient profile disambiguation.
SYSTEM AND METHODS FOR USING ENHANCED QR CODES IN A CALL TO ACTION
A system and method for using enhanced QR codes in a call to action, that provides enhanced functionality for generating a call to action element or providing personalized content when scanned, and that combine additional data dimensions with existing QR code technologies to expand the QR code capability beyond what is enabled by standard QR code specifications.