H04M3/4365

Systems and methods of live streaming emergency dispatch data to first responders

Systems, devices, and methods including: capturing, by a capture device, an audio and corresponding location metadata associated with an emergency call; refining the location metadata to provide a refined location metadata; correlating, by the capture device, the refined location metadata of the emergency call with a geofenced location of the computing devices of one or more first responders (FRs); screening, by the capture device or the computing device, the emergency call data; transmitting, by the capture device, a first signal to the one or more computing devices based on the correlation, the transmitted signal including a portion of the captured audio and corresponding location metadata; receiving, by the capture device, an accept signal from the one or more computing devices of one or more FRs; transmitting, by the capture device, a second signal to the one or more computing devices based on the received accept signal.

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
20180007194 · 2018-01-04 · ·

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.

METHODS AND APPARATUS TO MANAGE MESSAGING WITH URGENCY INDICATION VIA A NETWORK-BASED PORTAL
20180014169 · 2018-01-11 ·

A computer-implemented system and method to manage the communication of a user are disclosed. In one embodiment, when a person tries to electronically convey a message to the user, the status of the user, the identity of the person, and the urgency of the message can be identified. The access priority of the person can be determined based on the person's identity. Then, the message can be managed using one or more rules and in view of the status of the user, the access priority of the person and the urgency of the message.

Machine learning dataset generation using a natural language processing technique

A server can receive a plurality of records at a databases such that each record is associated with a phone call and includes at least one request generated based on a transcript of the phone call. The server can generate a training dataset based on the plurality of records. The server can further train a binary classification model using the training dataset. Next, the server can receive a live transcript of a phone call in progress. The server can generate at least one live request based on the live transcript using a natural language processing module of the server. The server can provide the at least one live request to the binary classification model as input to generate a prediction. Lastly, the server can transmit the prediction to an entity receiving the phone call in progress. The prediction can cause a transfer of the call to a chatbot.

Spam telephone call reducer
11711464 · 2023-07-25 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spam telephone call reducer are disclosed. In one aspect, a method includes the actions of receiving first telephone call data that reflects telephone calls received by a first user and second telephone call data that reflects telephone calls received by a second user. The actions further include comparing the first telephone call data and the second telephone call data. The actions further include determining that the first user received more spam telephone calls than the second user. The actions further include determining a first characteristic of the first user and a second characteristic of the second user. The actions further include determining an action that increases a similarity of the first characteristic to the second characteristic. The actions further include performing the action on the first characteristic.

SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING UNDESIRED CALLS
20180013881 · 2018-01-11 ·

A system is provided for thwarting the undesired incoming calls and eliminating the impact of robocalls, tollfree pumping, political spam, data collection bots, and other phone fraud forms. The system has a spam detection unit with a plurality of spam type modules and each spam type module is configured to detect a different type of spam.

SUBJECT LINE FOR INCOMING CALLS WITHIN WIRELESS COMMUNICATION NETWORK SERVICES
20180013887 · 2018-01-11 ·

Calls, e.g., voice calls (telephone calls) and video calls, made within a wireless communication network include a subject line that may or may not be included with an identification of the party making the call. Thus, when a user within the wireless communication network receives a call on a mobile device, prior to answering the call, a subject of the call is displayed to the user or audibly provided to the user. The subject of a call may be automatically provided to the user. In embodiments, a prompt may be required from the user in order to display or hear the subject of the incoming call.

Call content management for mobile devices

One example method of operation may include identifying a plurality of mobile device telephone numbers associated with a plurality of mobile devices, forwarding the plurality of mobile device telephone numbers to a content delivery device, hashing the plurality of mobile device telephone numbers, storing the hashed plurality of mobile device telephone numbers in the content delivery device, identifying a scheduled call campaign to the plurality of mobile devices, forwarding call content associated with schedule call campaign to the plurality of mobile devices prior to calling the plurality of mobile devices, and responsive to receiving confirmation that the content was successfully forwarded to the plurality of mobile devices, initiating a calling device to begin calling the plurality of mobile devices.

System and method for authenticating called parties of individuals within a controlled environment
11563734 · 2023-01-24 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
20230231843 · 2023-07-20 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.