H04M3/42127

METHOD, ELECTRONIC DEVICE AND STORAGE MEDIUM FOR REMOTE DAMAGE ASSESSMENT OF VEHICLE
20230038645 · 2023-02-09 ·

A method for remote damage assessment of a vehicle is provided. The present disclosure relates to the technical field of artificial intelligence, in particular to the technical field of image and text recognition. An implementation solution is: performing data collection on a target vehicle to determine damage information of the target vehicle; obtaining call content of an insurance claiming call for the target vehicle, and extracting accident-related information from the call content, wherein the accident-related information includes named entities in the call content and a relationship between the named entities; and determining a first fraud probability corresponding to the target vehicle at least based on the damage information and the accident-related information.

Call routing using call forwarding options in telephony networks
11546741 · 2023-01-03 · ·

In some embodiments, a method receives a call from a caller device that is initiated via a first communication channel and directed to first contact information for a recipient's device. The call is forwarded using a call forwarding option to the computing device. Second contact information for the recipient's device is retrieved where the second contact information different from the first contact information used in the call. The method initiates a communication to the recipient's device using the second contact information via a second communication channel that is different from the first communication channel. The communication avoids triggering the call forwarding option for the recipient's device. The call is connected between the caller device and the recipient's device upon initiating the communication where the computing device is in a call path of the call and performs a call feature for the call.

SYSTEM AND METHOD FOR PERSONALIZING THE LANGUAGE ASSOCIATED WITH OUTBOUND CALLS

An approach is described for facilitating an outbound call from a calling party and a called party by displaying specific information on the communication device of the called party. The displayed specific information is based on a communication characteristic of the called party, where the communication characteristic includes a language characteristic of the called party. Based on language characteristic of the called party, customized display content is provided to the communications device of the called party, on or prior to the called party being alerted to the requested communication. The customized display content improves the answer rate and the conversion rate of the outbound call.

Systems and methods for contextual communication between devices

An artificial intelligence (AI) model, using logistic regression and gradient boosting tree, may determine a priority score for a user. The priority score may be associated with a likelihood of redemption of investment funds of the user by the user. Based on the priority score for the user, a server may prioritize transmission of a communication message to the user via one of a plurality of communication channels. The communication message may describe why the user should continue with their investment funds without redemption.

SYSTEMS AND METHODS FOR MOBILE TRACKING, COMMUNICATIONS AND ALERTING
20220377505 · 2022-11-24 ·

A mobile device that can optionally communicate with a server, the mobile device including latitude/longitude determining capabilities, a display, a data communication system and a power source. The mobile device can be used to communicate, provide location information, track an individual, as well as allow alerting, such in a case of an emergency. This location information could be accompanied with one or more of video information, audio information, multimedia information, and pictures taken by the mobile device. The mobile devices also allow inner-communicability among the devices such as text messaging, chat, voice communications, and the like. The capabilities of the mobile device can also be used to determine if the device has traversed a geo-fence, or defined electronic perimeter, with the crossing of the perimeter capable of triggering special functionality such as the turning on of the mobile device, or smart phone, sending an alert, altering functionality, or the like.

Personal-call and feature control system and method for controlling telephones, providing extended features for such telephones and routing of media-rich calls
09787829 · 2017-10-10 ·

A Personal-CFC system and method is described for controlling a multiplicity of telephones, for providing extended feature sets globally to all such telephones and for routing of media-rich calls between such telephones and multimedia equipment. The Personal-CFC is a software program that is easily embedded in various devices and it requires no hardware. For example, a mobile Personal-CFC system can be incorporated into a PDA or PC. The end user can use the Personal-CFC system to control other telephones, such as conference telephones, that do not belong to the end user.

Multi-device call notification silencing

A connection manager manages connections for associated user devices by determining whether an incoming connection has been answered at a user device, and if so then generating and transmitting silencing commands to associated user devices using first and second wireless communication modes, with one mode being faster. Connections can comprise phone calls, and modes can comprise push and Bluetooth® messaging. The connection manager can instruct device outputs to provide connection alerts, limited to visual alerts when an associated user device is active, listen for associated user device communications, and instruct device outputs to stop providing alerts when a silencing command is received. Further, a connection manager can receive a signal regarding a headset status, route an outside connection from a phone to the headset when the headset is active or to another device when the headset is not active, detect a change in headset status, and reroute the connection accordingly.

Method for interacting with a group of individuals as a single contact

A method for establishing a group of individuals as a single contact entity eligible for contact services within a contact center includes the steps (a) identifying a group and each group member according to existing group rules and member profiles; (b) identifying and quantifying the unifying aspects of the members in the group; (c) aggregating the contact information for each group member relative to communications channels common to the group members and to the contact center; and (d) establishing one or more temporary and or permanent group channels between the contact center and the group members.

VIRTUAL PBX BASED ON FEATURE SERVER MODULES
20170257252 · 2017-09-07 ·

In one embodiment, an internet telephony apparatus includes a network interface, connectable to a communication network, for sending and receiving internet telephony signals over the communication network. The apparatus further includes a telephone interface, connectable to an analog telephone device, for sending telephone control signals to the telephone device and receiving telephone control signals entered through a keypad of the telephone device. The apparatus further includes a controller operably coupled between the network interface and the telephone interface, the controller implementing a private internet telephony feature server for directing telephone calls, intended for the telephone device, received as internet telephony signals over the network interface and managing telephone services on behalf of the telephone device based on the telephone control signals received from the telephone device over the telephone interface.

Remote access control

A system that allows a user to access a secured area by confirming location of the user near the secured area and receipt of an access word by the system. A user in possession of a mobile device may be detected at the entrance to a secured location. The system can select a question asking for a passcode corresponding to certain access to the secured location. The question can be spoken to a user through a loudspeaker at the secured location. The user's spoken response can be processed by the system, for example using keyword spotting, to determine if the proper access word is included. If it is, the system can grant access to the secured area.