Indoor positioning techniques using beacons

    公开(公告)号:US11096008B1

    公开(公告)日:2021-08-17

    申请号:US17101150

    申请日:2020-11-23

    发明人: Dayne Batten

    摘要: Techniques are disclosed for determining a location of a mobile device within an area of interest. One example computing system includes a processor configured to: obtain location information for areas of interest from a first device, the location information comprising signal strength readings associated with signal sources; receive a location request from a second device, the location request comprising signal strength readings associated with a current position of the second device; determine, using a machine learning model, the current position corresponds to a fingerprint within a location map, wherein the machine learning model is trained to: (i) generate the location map comprising fingerprints based on the location information; and (ii) determine a location based on a probability that a position matches a fingerprint in the location map; and determine that the current position corresponds to the fingerprint; and generate display information that includes the location of the fingerprint.

    Dynamic geofencing techniques for GPS enabled communication devices

    公开(公告)号:US10812932B1

    公开(公告)日:2020-10-20

    申请号:US16783254

    申请日:2020-02-06

    IPC分类号: H04W24/00 H04W4/021 H04W4/02

    摘要: Techniques are disclosed for managing a spontaneously created geofenced area among a plurality of communication devices communicable with a communication server. The communication server receives, from a location enabled first communication device, an instruction to create a geofence around itself. Upon receiving location data from the first and a location enabled second communication devices, the communication server compares the location data of the first and second communication devices to determine how close they are to one another. When the first and second communication devices are within a predetermined distance of one another, the communication server creates a geofence around the first communication device. The communication server will then periodically poll and receiving updated location data for the first and second communication devices. The communication server then recalculates the geofence boundary based on the location of the first communication device. The communication server also notifies the first communication device any time the second communication device ventures beyond the boundary of the geofence.

    Techniques for responding to inbound voice messages in a communication system

    公开(公告)号:US10594868B1

    公开(公告)日:2020-03-17

    申请号:US16668697

    申请日:2019-10-30

    摘要: Techniques are disclosed for responding to a pre-recorded inbound voice message in a communication system that includes communication devices and a communication server. In a first communication device, a pre-recorded inbound voice message is received from a sender communication device via a communication server. A reply mode is set for a response voice message from a plurality of reply modes. The response voice message is recorded and a reply mode flag is inserted into a message header. The response voice message is then sent to the communication server where it determines the reply mode. When the reply mode is reply to all, the response voice message is sent to the sender communication device and other recipient communication devices. When the reply mode is reply to sender, a direct channel communication link is established between the first communication device and the sender communication device and the response voice message is sent directly to the sender communication device.

    Anti-spoofing techniques for outbound telephone calls

    公开(公告)号:US10412217B1

    公开(公告)日:2019-09-10

    申请号:US16381555

    申请日:2019-04-11

    发明人: Gregory Stephens

    摘要: Techniques are disclosed for verifying a caller ID field of an outbound telephone call. A termination service provider call server receives a call request from a calling endpoint that includes a called endpoint telephone number, and a caller ID telephone number. The termination service provider call server determines a calling endpoint telephone number assigned to the calling endpoint and creates an “in use” message comprising the calling endpoint telephone number and a timestamp of when the call request was received. The “in use” message is forwarded to an active call database before forwarding the call request to an inbound carrier call server servicing the called endpoint telephone number. The inbound carrier call server receives the call request intended and sends a query to the active call database to determine whether the caller ID telephone number in the call request is currently in use. The active call database sets the status of telephone numbers contained in all received “in use” messages to in use. It then determines whether the caller ID telephone number received in the query from the inbound carrier call server corresponds to a telephone number that is currently in use. If the caller ID telephone number does not correspond to a telephone number that is currently in use, the active call database returns a fail message to the inbound carrier call server. If the caller ID telephone number does correspond to a telephone number that is currently in use but the timestamps for the call request and the query differ by more than a predetermined duration, it returns a fail message to the inbound carrier call server. If the timestamps for the call request and the query are within the predetermined duration, it returns a pass message to the inbound carrier call server. The inbound carrier call server either routes or does not route the call request to the called endpoint depending on the query results.

    VIRTUAL TELEPHONY ASSISTANT
    8.
    发明申请

    公开(公告)号:US20180248989A1

    公开(公告)日:2018-08-30

    申请号:US15963703

    申请日:2018-04-26

    摘要: Examples are disclosed for screening an inbound telephony call to a called party. At a communications server, an inbound telephony call intended for a called party's telephone number is received and checked against a whitelist database and a blacklist database. When the caller ID of the inbound call matches a telephone number contained in the blacklist database, the communications server automatically routes the call to a voicemail system or spam folder associated with the called party's telephone number. When the caller ID of the inbound call matches a telephone number contained in the whitelist database, the communications server determines whether the called party is available to receive the call. Otherwise, when the caller ID of the inbound call does not match a telephone number contained in either the whitelist database or the blacklist database, the communications server prompts the caller for additional information.