H04M1/72513

Transport-to-transport communication network

An example operation includes one or more of receiving a request from an occupant in a first transport to initiate a voice communication with an occupant in a second transport, determining the occupant in the second transport is available for the voice communication based on a length of time the occupant will remain in the first transport and a length of time the occupant will remain in the second transport, and responsive to the determining, enabling the voice communication between the occupant in the first transport and the occupant in the second transport.

Transport-to-transport communication network

An example operation includes one or more of receiving a request from an occupant in a first transport to initiate a voice communication with an occupant in a second transport, determining the occupant in the second transport is available for the voice communication based on a length of time the occupant will remain in the first transport and a length of time the occupant will remain in the second transport, and responsive to the determining, enabling the voice communication between the occupant in the first transport and the occupant in the second transport.

Device for intercom network

A network device for an intercom network for duplex audio communication between users of the intercom network has a housing and a communication module in or at the housing and that can establish a radio link for transmitting audio signals to and receiving audio signals from another user. The radio link is subject to the DECT protocol or another protocol, and the audio signals to the communication module is broken by reflection into a plurality of radio paths. Multipath interference is prevented or reduced by electronic elements including at least one equalizer for processing a plurality of audio signals received along the plurality of radio paths and performing a signal correction.

Device for intercom network

A network device for an intercom network for duplex audio communication between users of the intercom network has a housing and a communication module in or at the housing and that can establish a radio link for transmitting audio signals to and receiving audio signals from another user. The radio link is subject to the DECT protocol or another protocol, and the audio signals to the communication module is broken by reflection into a plurality of radio paths. Multipath interference is prevented or reduced by electronic elements including at least one equalizer for processing a plurality of audio signals received along the plurality of radio paths and performing a signal correction.

Realtime, interactive and geographically defined computerized personal identification and matching methods

In general, the invention relates to a method of interactive and live computerized matching in which a first user has a personal data device including a wireless communication system. A network is configured to include a server programmed with a personal characteristic database and a database searching algorithm, and a wireless communication system that is capable of communicating with the user's personal data device. The first user is allowed to log on through the wireless communication system to the network using his or her personal data device, and communicates to and stores in the database personal data defining his or her characteristics and those for his or her ideal match. Either the secure network automatically identifies the first users precise geographic location, or the user himself otherwise indicates and stores in the database of the network an identifying address that indicates his current specific geographic location. The user then instructs the database searching algorithm to search for and identify other users on to the network near the same geographic location to facilitate a match.

Realtime, interactive and geographically defined computerized personal identification and matching methods

In general, the invention relates to a method of interactive and live computerized matching in which a first user has a personal data device including a wireless communication system. A network is configured to include a server programmed with a personal characteristic database and a database searching algorithm, and a wireless communication system that is capable of communicating with the user's personal data device. The first user is allowed to log on through the wireless communication system to the network using his or her personal data device, and communicates to and stores in the database personal data defining his or her characteristics and those for his or her ideal match. Either the secure network automatically identifies the first users precise geographic location, or the user himself otherwise indicates and stores in the database of the network an identifying address that indicates his current specific geographic location. The user then instructs the database searching algorithm to search for and identify other users on to the network near the same geographic location to facilitate a match.

Realtime, location-based cell phone enhancements, uses, and applications
09842442 · 2017-12-12 ·

Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.

Automatically accessing an internet session using transferred network login information
11490219 · 2022-11-01 · ·

Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.

Automatically accessing an internet session using transferred network login information
11490219 · 2022-11-01 · ·

Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.

Routing communications by scanning visible codes
11259140 · 2022-02-22 · ·

Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.