Patent classifications
H04M3/533
Personal emergency triggering, notification and communication for smartwatches
A personal safety service notifies a pre-defined group of emergency contacts about an occurrence of emergency associated with a user. To do so, a personal safety service server comprising a processing device and a memory receives an indication of the emergency and a location of the emergency from a wearable mobile device and sends a notification message via a push notification displayed on user devices of a predefined group of emergency contacts indicating the occurrence of the emergency. The personal safety service server periodically receives updates to the location of the wearable mobile device from the personal safety service client application.
Voice enabled IoT using second line service
Enablement of a voice channel being established between an IoT device and a controller through the use of a voice-line service system.
Routing incoming calls made to one or more unreachable numbers into a data client
A method and a call routing system (CRS) are provided for routing an incoming call made to one of multiple numbers of a user to a call receiving client application (CRCA) deployed on one or more user devices when the called number is not reachable. The CRS, in communication with the CRCA deployed on one or more user devices, sets up a user account using one or more of the user's multiple numbers. The CRS detects availability of the CRCA on one or more user devices over a data network to accept an incoming call. The CRS receives the incoming call made to one of the numbers, when the called number is not reachable. The CRS routes the incoming call to the CRCA on one or more user devices over the data network on detecting the availability of the CRCA on one or more user devices over the data network.
Multi-factor message authentication
Systems, methods, and apparatuses are described for authenticating a user device and/or user application. A user device may receive, based on a first authentication request, a plurality of messages sent over a plurality of channels of communication (e.g., a message to a URL address associated with the user device and a binary Short Message Service (SMS) message). Based on information from the messages, the user device may transmit a second authentication request.
Message management methods and systems
A communications device is disclosed. The communications device comprises a memory configured to store instructions and a processor configured to execute the instructions to receive data representing a message provided by a caller, determine at least an attribute of the message based on the received data, generate one or more options based on the attribute of the message, and present the one or more options to the caller to prompt the caller to take an additional action related to the message.
Message management methods and systems
A communications device is disclosed. The communications device comprises a memory configured to store instructions and a processor configured to execute the instructions to receive data representing a message provided by a caller, determine at least an attribute of the message based on the received data, generate one or more options based on the attribute of the message, and present the one or more options to the caller to prompt the caller to take an additional action related to the message.
SYSTEM AND METHOD FOR MOBILE DEVICE ACTIVE CALLBACK PRIORITIZATION
A system and methods for mobile device active callback prioritization, utilizing an enhanced callback prioritization engine operating on a user's mobile device for integration through the operating system and software applications operating on the device, wherein the enhanced callback prioritization engine receives intercepted data or voice messages sent to the mobile device, retrieves and aggregates data related to the assigned messages, inputs the assigned data message and aggregate data into one or more machine learning algorithms wherein the algorithms may analyze the input data, the results of the analysis may be used to compute a priority score for the assigned data message, and generates a callback list from the computed prioritization score. The priority score is in part based on 3rd party application data related to the data or voice messages providing context to the machine learning algorithms.
METHOD TO ACCESS OR MANAGE AN OPERATOR'S VOICEMAIL SYSTEM FROM A DIGITAL ASSIST OR SMART DEVICE
A method, system and apparatus are disclosed. According to some embodiments, an assistant network node configured to communicate with a proxy network node is provided. The assistant network node includes processing circuitry configured to receive, over an internet, a request message associated with a digital assistant device where the request message inquires about a voicemail function of a voicemail system related to a user of a fixed or cellular network, access the voicemail system based at least in part on the request message where the accessing of the voicemail system is performed without establishing a voice channel in the fixed or cellular network, and return a response message to the digital assistant device over the internet based at least in part on the access of the voicemail system in the fixed or cellular network.
Shared Device Voicemail Access Bypassing User-Specific Security Credential
A shared device voicemail box can be accessed from a device that is an unauthenticated device without a user-specific security credential. The device obtains an image via a camera of the device and transmits a request to a server. The request includes a unique code based on the image. The device accesses the voicemail box based on an access grant received from the server. Using the obtained image, a non-registered user of a telephony system can access a secured voicemail box.
AUTOMATED GENERATION OF ENHANCED CALLER IDENTIFICATION DATA
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for automatically generating enhanced caller identification data are disclosed. In one aspect, a method includes the actions of receiving telephone call placement data that indicates the placement of a telephone call from a calling party to a called party. The actions further include receiving caller identification data. The actions further include accessing first telephone call data that reflects characteristics of telephone calls placed and received by the calling party. The actions further include based on the first telephone call data and the identity of the calling party, determining additional data to combine with the caller identification data. The actions further include generating enhanced caller identification data by combining the additional data with the caller identification data. The actions further include providing, for output, the enhanced caller identification data and data indicating the telephone call.