H04L65/1076

PRIVILEGED ELECTRONIC COMMUNICATIONS WITH INMATES
20230051388 · 2023-02-16 · ·

Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.

COMPUTER-IMPLEMENTED DETECTION OF ANOMALOUS TELEPHONE CALLS

Computer-implemented detection of anomalous telephone calls, for example detection of interconnect bypass fraud, is disclosed. A telephone call associated with user devices is analyzed remote from the user devices. A first set of multiple features, for example Mel Frequency Cepstral Coefficients, is derived from a call audio stream. The first set is converted to an embedding vector, for example via a model based on a Universal Background Model comprising a Gaussian Mixture Model, which model is preferably configured based on a training plurality of first sets of multiple features derived form a corresponding training plurality of audio streams. Occurrence, or probability of occurrence, of an anomalous telephone call is determined based on the embedding vector, for example via a back-end classifier, such as a Gaussian Backend Model, which classifier is preferably configured based on labels associated with the training plurality of audio streams.

Systems and methods of live streaming emergency dispatch data to first responders

Systems, devices, and methods including: capturing, by a capture device, an audio and corresponding location metadata associated with an emergency call; refining the location metadata to provide a refined location metadata; correlating, by the capture device, the refined location metadata of the emergency call with a geofenced location of the computing devices of one or more first responders (FRs); screening, by the capture device or the computing device, the emergency call data; transmitting, by the capture device, a first signal to the one or more computing devices based on the correlation, the transmitted signal including a portion of the captured audio and corresponding location metadata; receiving, by the capture device, an accept signal from the one or more computing devices of one or more FRs; transmitting, by the capture device, a second signal to the one or more computing devices based on the received accept signal.

Call protect geolocator display for 5G or other next generation network

Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.

Methods and systems for facilitating a collaborative work environment
11553011 · 2023-01-10 · ·

The present disclosure describes techniques for facilitating a collaborative work environment. The techniques comprise receiving a request from a first client computing device associated with a first user in the plurality of users to establish a communication with a second user in the plurality of users, the request specifying information associated with the communication; generating and transmitting data to a second client computing device associated with the second user for display of a user interface on the second client computing device, wherein the user interface indicates an invite of communication from the first user, and the user interface comprises information about the first user, the information associated with the communication, and selectable interface elements for accepting or declining the invite; and in response to receiving an indication of acceptance by the second user, establishing a communication channel between the first user and the second user.

Methods and systems for facilitating a collaborative work environment
11553011 · 2023-01-10 · ·

The present disclosure describes techniques for facilitating a collaborative work environment. The techniques comprise receiving a request from a first client computing device associated with a first user in the plurality of users to establish a communication with a second user in the plurality of users, the request specifying information associated with the communication; generating and transmitting data to a second client computing device associated with the second user for display of a user interface on the second client computing device, wherein the user interface indicates an invite of communication from the first user, and the user interface comprises information about the first user, the information associated with the communication, and selectable interface elements for accepting or declining the invite; and in response to receiving an indication of acceptance by the second user, establishing a communication channel between the first user and the second user.

CALL FLOW SYSTEM AND METHOD FOR USE IN A LEGACY TELECOMMUNICATION SYSTEM
20180007608 · 2018-01-04 ·

A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.

CONTEXT-AWARE SOUND IDENTIFICATION FOR MONITORING A CLIENT USER
20230239431 · 2023-07-27 ·

A sound identification system is used for identifying a sound associated with a client user. The sound identification system can receive information from a network device in a network that is associated with the client user. The sound identification system determines one or more context parameters based on the information. A client user can output a sound. This sound can be received as a sound input by the sound identification system. The sound identification system can determine one or more identified sound signatures associated with the client user based on one or more sound signatures. The sound identification system can determine an identified sound based on the one or more identified sound signatures and the one or more context parameters. In this way, a client user is monitored using context-aware sound identification.

CONTEXT-AWARE SOUND IDENTIFICATION FOR MONITORING A CLIENT USER
20230239431 · 2023-07-27 ·

A sound identification system is used for identifying a sound associated with a client user. The sound identification system can receive information from a network device in a network that is associated with the client user. The sound identification system determines one or more context parameters based on the information. A client user can output a sound. This sound can be received as a sound input by the sound identification system. The sound identification system can determine one or more identified sound signatures associated with the client user based on one or more sound signatures. The sound identification system can determine an identified sound based on the one or more identified sound signatures and the one or more context parameters. In this way, a client user is monitored using context-aware sound identification.

CONTEXT-AWARE SOUND IDENTIFICATION FOR MONITORING A CLIENT USER

A monitoring system can provide a sound profile to a network device. The monitoring system can identify a type of location associated with the network device that is located in a network. The monitoring system can determine a sound profile based on the type of location. The monitoring system can provide the sound profile to the network device. The sound profile relates to one or more sounds associated with the location so that the network device need not store and/or process all sounds but rather only those sounds that would typically be received or made at the location. The sound profile can be based or updated based on user sensor data received from the network device. In this way, the network device, the monitoring system, any other network resource, or any combination thereof uses context-aware sound identification to monitor a client user.