Patent classifications
H04M17/305
LATENCY REDUCTION
Reduced Advanced Audio Distribution Profile (A2DP) latency on a link between a source and a pair of headphones may be achieved by improving the quality of the link between secondary and primary and establishing a direct link between the source and secondary to mitigate the link quality issues of the source and primary link. In one example, this involves receiving, via a first receiver, packets from a source on a first wireless connection, determining, by the first receiver, that a first packet received via the first wireless connection has an error, establishing a second connection between the first receiver and a second receiver, and establishing a third connection between the second receiver and the source. In particular, the first receiver may be configured as a primary True Wireless Stereo (TWS) Bluetooth device and the second receiver may be configured as a secondary TWS Bluetooth device.
Latency reduction
Reduced Advanced Audio Distribution Profile (A2DP) latency on a link between a source and a pair of headphones may be achieved by improving the quality of the link between secondary and primary and establishing a direct link between the source and secondary to mitigate the link quality issues of the source and primary link. In one example, this involves receiving, via a first receiver, packets from a source on a first wireless connection, determining, by the first receiver, that a first packet received via the first wireless connection has an error, establishing a second connection between the first receiver and a second receiver, and establishing a third connection between the second receiver and the source. In particular, the first receiver may be configured as a primary True Wireless Stereo (TWS) Bluetooth device and the second receiver may be configured as a secondary TWS Bluetooth device.
Systems and methods for reusing generic tokens using bluetooth low energy (BLE) beacons
Systems and methods for reusing generic tokens using a Bluetooth low energy (BLE) beacon. The systems and methods include a user device including a wireless transceiver, a memory for storing a generic token, and one or more processors coupled to the memory and the wireless transceiver. The wireless transceiver is configured to communicate with a beacon using a BLE communications protocol, receive a beacon identifier from the beacon, send a check in request to the beacon, and receive token differences from the beacon. The processors are configured to recreate a custom token based on the stored generic token and the received token differences. The beacon is configured to forward the check in request to a server. The server is configured to verify the user device and create the custom token and the token differences between the custom and generic tokens for return to the user device via the beacon.
SYSTEMS AND METHODS FOR REUSING GENERIC TOKENS USING BLUETOOTH LOW ENERGY (BLE) BEACONS
Systems and methods for reusing generic tokens using a Bluetooth low energy (BLE) beacon. The systems and methods include a user device including a wireless transceiver, a memory for storing a generic token, and one or more processors coupled to the memory and the wireless transceiver. The wireless transceiver is configured to communicate with a beacon using a BLE communications protocol, receive a beacon identifier from the beacon, send a check in request to the beacon, and receive token differences from the beacon. The processors are configured to recreate a custom token based on the stored generic token and the received token differences. The beacon is configured to forward the check in request to a server. The server is configured to verify the user device and create the custom token and the token differences between the custom and generic tokens for return to the user device via the beacon.
Systems and methods for reusing generic tokens using bluetooth low energy (BLE) beacons
Systems and methods for reusing generic tokens using a Bluetooth low energy (BLE) beacon. The systems and methods include a user device including a wireless transceiver, a memory for storing a generic token, and one or more processors coupled to the memory and the wireless transceiver. The wireless transceiver is configured to communicate with a beacon using a BLE communications protocol, receive a beacon identifier from the beacon, send a check in request to the beacon, and receive token differences from the beacon. The processors are configured to recreate a custom token based on the stored generic token and the received token differences. The beacon is configured to forward the check in request to a server. The server is configured to verify the user device and create the custom token and the token differences between the custom and generic tokens for return to the user device via the beacon.
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
SYSTEMS AND METHODS FOR REUSING GENERIC TOKENS USING BLUETOOTH LOW ENERGY (BLE) BEACONS
Systems and methods for reusing generic tokens using a Bluetooth low energy (BLE) beacon. The systems and methods include a user device including a wireless transceiver, a memory for storing a generic token, and one or more processors coupled to the memory and the wireless transceiver. The wireless transceiver is configured to communicate with a beacon using a BLE communications protocol, receive a beacon identifier from the beacon, send a check in request to the beacon, and receive token differences from the beacon. The processors are configured to recreate a custom token based on the stored generic token and the received token differences. The beacon is configured to forward the check in request to a server. The server is configured to verify the user device and create the custom token and the token differences between the custom and generic tokens for return to the user device via the beacon.
Telecommunication call management and monitoring system with voiceprint verification
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Telecommunication call management and monitoring system with voiceprint verification
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Systems and methods for reusing generic tokens using Bluetooth® low energy (BLE) beacons
Systems and methods for reusing generic tokens using a Bluetooth low energy (BLE) beacon. The systems and methods include a user device including a wireless transceiver, a memory for storing a generic token, and one or more processors coupled to the memory and the wireless transceiver. The wireless transceiver is configured to communicate with a beacon using a BLE communications protocol, receive a beacon identifier from the beacon, send a check in request to the beacon, and receive token differences from the beacon. The processors are configured to recreate a custom token based on the stored generic token and the received token differences. The beacon is configured to forward the check in request to a server. The server is configured to verify the user device and create the custom token and the token differences between the custom and generic tokens for return to the user device via the beacon.