Patent classifications
H04L65/1069
POLICY CONTROL FOR BROADCAST SESSION
Systems, methods, apparatuses, and computer program products for policy control for broadcast sessions. One method may include receiving, by a multicast/broadcast session management function, at least one broadcast session creation request comprising at least one broadcast session indication associated with at least one policy control function. The multicast/broadcast session management function may receive at least one policy update from the at least one policy control function, and transmit at least one resource allocation request associated with at least one broadcast session transmission to at least one application management function.
PRIVILEGED ELECTRONIC COMMUNICATIONS WITH INMATES
Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
PRIVILEGED ELECTRONIC COMMUNICATIONS WITH INMATES
Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
TECHNIQUES TO PROVIDE SENSITIVE INFORMATION OVER A VOICE CONNECTION
Embodiments may generally be directed components and techniques to detect a request to provide banking account information over a one or more voice connections, identify the requested banking account information, and generate speech data representing the banking account information requested. In embodiments further include communicating the speech data to another device.
HEALTH TESTING AND DIAGNOSTICS PLATFORM
Systems and methods for providing a universal platform for at-home health testing and diagnostics are provided herein. In particular, a health testing and diagnostic platform is provided to connect medical providers with patients and to generate a unique, private testing environment. In some embodiments, the testing environment may facilitate administration of a medical test to a patient with the guidance of a proctor. In some embodiments, the patient may be provided with step-by-step instructions for test administration by the proctor within a testing environment. The platform may display unique, dynamic testing interfaces to the patient and proctor to ensure proper testing protocols and accurate test result verification.
HEALTH TESTING AND DIAGNOSTICS PLATFORM
Systems and methods for providing a universal platform for at-home health testing and diagnostics are provided herein. In particular, a health testing and diagnostic platform is provided to connect medical providers with patients and to generate a unique, private testing environment. In some embodiments, the testing environment may facilitate administration of a medical test to a patient with the guidance of a proctor. In some embodiments, the patient may be provided with step-by-step instructions for test administration by the proctor within a testing environment. The platform may display unique, dynamic testing interfaces to the patient and proctor to ensure proper testing protocols and accurate test result verification.
COMPUTER-IMPLEMENTED DETECTION OF ANOMALOUS TELEPHONE CALLS
Computer-implemented detection of anomalous telephone calls, for example detection of interconnect bypass fraud, is disclosed. A telephone call associated with user devices is analyzed remote from the user devices. A first set of multiple features, for example Mel Frequency Cepstral Coefficients, is derived from a call audio stream. The first set is converted to an embedding vector, for example via a model based on a Universal Background Model comprising a Gaussian Mixture Model, which model is preferably configured based on a training plurality of first sets of multiple features derived form a corresponding training plurality of audio streams. Occurrence, or probability of occurrence, of an anomalous telephone call is determined based on the embedding vector, for example via a back-end classifier, such as a Gaussian Backend Model, which classifier is preferably configured based on labels associated with the training plurality of audio streams.
DETECTION OF SIGNALS IN A VIRTUAL MEETING
A method, a system, and a computer program product for determining whether signals are received by one or more devices in a virtual meeting. The method includes transmitting a data stream received from one or more host computing devices to one or more user computing devices in a plurality of user computing devices. The host and user computing devices are communicatively coupled using a real-time online connection. A first hash in a plurality of hashes is generated by the server using a portion of the data stream and stored in a memory location. The first hash is compared to a second hash received from the user computing devices. The second hash is generated by the user computing devices upon receipt of the transmitted data stream. Based on the comparison, a status of the real-time online connection between the host computing devices and the user computing devices is determined.
NODES AND METHODS FOR HANDLING PROVISION OF AN IMS SERVICE IN A COMMUNICATIONS NETWORK
A method, by a first node, for handling provision of an IMS service. A communications network comprises a first slice handling a first IMS service, and a second slice handling a second IMS service. The first node obtains, from a second node at least one of a first and a second indication. The first indication is of a first routing service instance for a third node handling the first service in the first slice. The second indication is of a second routing service instance for a fourth node handling the second service in the second slice. The first node routes a request, to one of the nodes with one of the proviso that when the request is for the first service, the routing is based on the first indication, and when the request is for the second service, the routing is based on the second indication.
NODES AND METHODS FOR HANDLING PROVISION OF AN IMS SERVICE IN A COMMUNICATIONS NETWORK
A method, by a first node, for handling provision of an IMS service. A communications network comprises a first slice handling a first IMS service, and a second slice handling a second IMS service. The first node obtains, from a second node at least one of a first and a second indication. The first indication is of a first routing service instance for a third node handling the first service in the first slice. The second indication is of a second routing service instance for a fourth node handling the second service in the second slice. The first node routes a request, to one of the nodes with one of the proviso that when the request is for the first service, the routing is based on the first indication, and when the request is for the second service, the routing is based on the second indication.