摘要:
Systems and methods for augmenting an appliance device with an intelligent personal assistant. Exemplary methods include: receiving, by the appliance device, an identifier for a called party; initiating a voice call using the received identifier; monitoring audio of the voice call; determining the monitored audio includes a predetermined wake word; beginning communications with the intelligent personal assistant, the communications including at least a portion of the monitored audio, the portion of the monitored audio comprising a request for the intelligent personal assistant; receiving a result from the intelligent personal assistant, the result being responsive to the request; receiving indicia that the voice call is over from at least one of the called party and a calling party; and terminating the voice call using the indicia.
摘要:
Cloud-based assistive services for use in telecommunications and on premise devices are disclosed herein. An example method includes: operating in a monitoring state to actively monitor for a first predetermined action, receiving an audio stream based on communications between a first party and a second party, identifying the first predetermined action, establishing one- or two-way communications with any of the first party or the second party in response to the first predetermined action, determining a request for the intelligent personal assistant service in the one- or two-way communications, generating a result by the intelligent personal assistant service, the result being responsive to the request, providing the result to any of the first party and the second party, receiving a second predetermined action from any of the first party and the second party, and returning the intelligent personal assistant service to the monitoring state based on the second predetermined action.
摘要:
Systems and methods for securing access to user data stored in a networked location are described herein. A first user device may generate data that a user may desire to keep private. The generated data may be transmitted to, and stored at, a networked location, which then makes it vulnerable to malicious attack or exposure to unintended recipients. To protect the user data stored at the networked location, a recursive data file signature is generated for each stored data file. In order to access the stored data file, the user needs to provide the data file signature. In addition, every time the user data is accessed by the user, the data file signature is changed. In this way, the exposed data file signature will no longer be valid if an unauthorized entity tries to access the user data.
摘要:
A method for bandwidth sharing is provided. The method may include getting a list of neighboring communications hubs, the neighboring communications hubs being disposed in respective neighboring residences. The neighboring communications hubs may be communicatively coupled to the first communications hub using a first broadband data network provisioned by an Internet Service Provider (ISP), and the neighboring residences may be within a same predetermined geographic region as the first residence or within a predetermined temporal distance on a data network from the first residence. The method determines if a data requirement exceeds bandwidth available to the first communications hub and provides a request for data to a neighboring communications hub. The request corresponds to the data requirement. The method then receives data responsive to the request from the neighboring communications hub.
摘要:
Methods and systems for alternate network utilization are provided. Exemplary methods include: broadcasting by a hub an unsolicited announcement over a network to a plurality of devices coupled to a router, the unsolicited announcement being configured to cause at least some of the plurality of devices to store in a table a link-layer address of the hub as a link-layer address of the router; receiving by the hub a data packet from a device of the plurality of devices; and selectively directing by the hub the received packet to a first broadband network or a second broadband network using predetermined criteria.
摘要:
An exemplary VoIP service provides call participants cues to indicate that an enhanced service is being employed. When calling, the standard dial tone may be replaced with a distinctive dial tone or sound that indicates to the call participant that enhanced service is active (e.g., a service active sound). In some embodiments, the person called by the VoIP user hears a viral sound that indicates that an enhanced telephone service is being used. Furthermore, communication audio cues may be provided during the communication to provide further information to the call participants.
摘要:
A method for filtering a telephone call is provided. The method may comprise receiving from a caller the telephone call directed to a communication device associated with an intended call recipient. The received telephone call may be scored based on predetermined scoring criteria to create a score indicative of a desirability of the telephone call. Furthermore, the method may comprise comparing the score to a predetermined threshold score. Based on the comparison, the method may further comprise selectively classifying the telephone call as an unwanted telephone call. Furthermore, the method may comprise selectively rejecting the unwanted telephone call.
摘要:
Methods of establishing secure communication channels in peer-to-peer environments are provided that eliminate role conflicts between peers by determining which peer will act as a client and which the peer will act as a server in a secure connection handshake. In one embodiment, an attribute of the handshake messages are used in a tiebreaker process to determine which peer assumes the role of the server. In another embodiment, the attribute may be used to compute a wait period for each peer, or the wait period may be based on a random time period, and the peers cancel their request and resent requests after waiting their respective time periods.
摘要:
Systems and methods for providing personalized reversed 911 services are provided. In accordance with exemplary embodiments, a 911 call indication is received. This 911 call indication triggers a review of at least one reverse 911 profile associated with media gateway device initiating the 911 call. One or more call treatments to be performed based on the reverse 911 profiles are determined. Instructions for performing the one or more call treatments may then be generated and forwarded to one or more appropriate components.
摘要:
A method for end point data communications anonymization for a local communications hub is provided. The method commences with receiving a first request addressed to a server from a computing device. The method further includes selecting a first remote communications hub from a plurality of remote communications hubs. The method continues with modifying the first request to generate a first modified request and sending the first modified request to the first remote communications hub. The first remote communications hub modifies the first modified request to produce a second modified request and forwards the second modified request to the server. The method further includes receiving a first response to the second modified request from the server, modifying the received first response to produce a first modified response, modifying the first modified response to produce a second modified response, and providing the second modified response to the computing device.