EP3891715A1 - Sprachaktivierung eines alarms über ein kommunikationsnetzwerk - Google Patents

Sprachaktivierung eines alarms über ein kommunikationsnetzwerk

Info

Publication number
EP3891715A1
EP3891715A1 EP19831784.4A EP19831784A EP3891715A1 EP 3891715 A1 EP3891715 A1 EP 3891715A1 EP 19831784 A EP19831784 A EP 19831784A EP 3891715 A1 EP3891715 A1 EP 3891715A1
Authority
EP
European Patent Office
Prior art keywords
user
voice data
alarm device
server
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP19831784.4A
Other languages
English (en)
French (fr)
Inventor
Bruno MENON
Jonathan DEMAN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
Orange SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orange SA filed Critical Orange SA
Publication of EP3891715A1 publication Critical patent/EP3891715A1/de
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0469Presence detectors to detect unsafe condition, e.g. infrared sensor, microphone
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/005Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/12Manually actuated calamity alarm transmitting arrangements emergency non-personal manually actuated alarm, activators, e.g. details of alarm push buttons mounted on an infrastructure
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/08Speech classification or search
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/08Speech classification or search
    • G10L2015/088Word spotting
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command

Definitions

  • the present invention relates generally to the field of assistance to people and more particularly to the activation of an alarm by them, in the event of problems occurring at their home.
  • telecommunications devices in which a calling user uses a specific device to initiate telephone dialing corresponding to a particular interlocutor in order to alert him of an incident affecting the user.
  • These devices are used within the framework of a fixed or mobile telephone network by elderly or disabled people, installed at home, to alert emergency services (EMS, firefighters ). They come in the form of an object with a single button that is worn on the person, or in the form of a well-marked button on a fixed or portable telephone keypad.
  • these devices require a connection to a fixed or mobile type network, which requires the user to pay a relatively expensive subscription to be able to communicate via such a network.
  • Another disadvantage of this type of network is that it can be easily deactivated by a malicious person. Indeed, in the case where it is the fixed telephone network, it suffices for the malicious person to cut the wires connecting the user's telephone to this network. In the case of a 3G, 4G or 5G type mobile telephone network, the ill-intentioned person may simply compel the user to hand over his phone, tablet or the like.
  • the malicious person can cut the power, which has the effect of deactivating this network. The malicious person can also physically prevent the user from using the means of communication, via this network, which are available to him. Thus, the user can no longer use his device.
  • One of the aims of the invention is to remedy the drawbacks of the aforementioned state of the art.
  • an object of the present invention relates to an alarm activation method, characterized in that it comprises the following, at the level of an alarm device connected to a communication network and arranged nearby of a user:
  • the received voice data corresponding to recorded voice data transmitting to a server, via the communication network, textual information known to the server, in order to require assistance to the user, the textual information being not representative of the voice data generated by the user.
  • Such an alarm activation method has the advantage of being simple to implement by a user. Indeed, the latter does not have to worry about carrying a device for activating an alarm such as a medallion, badge, bracelet, etc., which greatly simplifies its use.
  • the alarm activation method according to the invention is much more secure and much less intrusive than existing alarm activation methods, since it is textual information which is transmitted to a server, and not directly the words spoken by the user. Furthermore, such textual information advantageously does not reveal either the words spoken by the user, or the reasons for which the user activated the alarm.
  • the communication network is a low-speed network.
  • a low-speed communication network rather than a high-speed communication network, such as the Internet, eliminates the need for the user to have a modem or router and greatly simplifies the configuration of the alarm activation process.
  • the compared voice data is of audio type.
  • the voice data generated by the user is thus directly compared with the previously recorded voice data and there is no need to apply a voice recognition process to the generated voice data.
  • Such an embodiment is therefore inexpensive in computing resources.
  • the compared voice data are of textual type.
  • the generated voice data are transcribed in text form before being compared with recorded voice data, which have also been transcribed in text form.
  • Such an embodiment makes it possible to generate a keyword representative of the reasons for which the user has triggered the alarm (a fire, theft, an attack, discomfort, etc.) key being capable of being transmitted to the server, without disclosing the voice print of the user.
  • the voice data correspond to a keyword.
  • the user just has to pronounce a keyword to activate the alarm, which simplifies the implementation of the alarm activation process as much as possible by non-technophile or fragile persons. , such as for example elderly people.
  • a keyword is a word commonly used in an emergency, such as for example “help”, “help”, “fire”, “thief”, “SOS”, etc. .
  • the text information is an identifier of the alarm device.
  • the identifier of the alarm device does not allow it to be exploited by a third party fraudulently, since it is independent of any word capable of being spoken by the user or of all personal identifier allowing contact with the user.
  • the biometric data of the user are thus advantageously made secret and protected.
  • the text information is an identifier of the alarm device which is coupled to a text transcription of the keyword implemented by the alarm device.
  • the server since the text transcription of the keyword spoken by the user is transmitted to the server by being associated with the identifier of the alarm device, the server is able to warn a third party as competent as possible to quickly provide assistance to the user.
  • the server will be able to inform a person of the user's knowledge, for example a relative, that he must call the fire department .
  • the security of information transmitted to the server remains high since no really personal information is transmitted, such as the user's voiceprint.
  • the text information has been recorded in the server in association with a plurality of contacts from which to request assistance from the user.
  • Such an embodiment has the advantage of avoiding the user to manipulate a communication terminal (ex: telephone, tablet, computer) to ask for help and to have to look for whom to contact for assistance. Indeed, these operations are advantageously deported to the server, in which the association between the identifier of the alarm device and a plurality of user contacts is recorded.
  • a communication terminal ex: telephone, tablet, computer
  • the contacts are classified in a given order.
  • Such an embodiment has the advantage of making it possible to contact one person at a time, in a predefined order, preferably in accordance with the wishes of the user. For example, contacts will be ranked from highest priority to least priority to contact.
  • the contact classified first is a user communication identifier.
  • Such an embodiment advantageously makes it possible to check whether the alarm device has not been activated by error by the user in order to send help unnecessarily, and, in any event, to quickly come into contact with the user after activation of the alarm device.
  • the invention also relates to an alarm device arranged near a user, characterized in that it is connected to a communication network, the alarm device comprising a processor which is configured to implement the following :
  • the received voice data corresponding to recorded voice data transmitting to a server, via the communication network, textual information known to the server, in order to require assistance to the user, the textual information being not representative of the voice data generated by the user.
  • Such an alarm device is in particular capable of implementing the above-mentioned alarm activation method.
  • the invention also relates to a computer program comprising instructions for implementing the alarm activation method according to the invention, according to any one of the particular embodiments described above, when the program is executed by a processor.
  • This program can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form, or in any other desirable form.
  • the invention also relates to a recording medium or information medium readable by a computer, and comprising instructions of a computer program as mentioned above.
  • the recording medium can be any entity or device capable of storing the program.
  • the support may include a storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or else a magnetic recording means, for example a USB key or a hard disk.
  • the recording medium can be a transmissible medium such as an electrical or optical signal, which can be routed via an electrical or optical cable, by radio or by other means.
  • the program according to the invention can in particular be downloaded from a network of the Internet type.
  • the recording medium can be an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the aforementioned alarm activation method.
  • FIG 1 is a schematic and general view of an architecture in which the alarm activation method is implemented in a particular embodiment of the invention
  • FIG 2 shows an alarm device in a particular embodiment of the invention
  • FIGs 3A and 3B represent the main actions implemented in the alarm activation method according to a particular embodiment of the invention.
  • FIG. 1 represents an environment in which the alarm activation method according to the invention is implemented.
  • an AL alarm device configured for: • receive DV voice data generated by a UT user
  • SER server configured for:
  • a communication server SC configured for:
  • the alarm device AL is installed in the home of the user UT, preferably in a room where the user UT is frequently found.
  • the AL alarm device is functional when the user UT is a few meters from the user.
  • the alarm device AL and the server SER communicate with each other via a data communication network, for example a low-speed network RCBD, such as dedicated to the Internet of Things (loT, in English " Internet of Things ”).
  • a data communication network for example a low-speed network RCBD, such as dedicated to the Internet of Things (loT, in English " Internet of Things ”).
  • a communication network is eg LoRa Network ®, ® SIGFOX, Qowisio ®, etc.
  • the data communication network can be an x-DSL, fiber, or cellular type network (for example according to the 2G standard (GSM, GPRS, EDGE), 3G (UMTS), 4G (LTE), LTE -A, LTE-M, WCDMA, CDMA2000, HSPA, 5G, or their variants or evolutions, another type of radio network (eg WiFi® or Bluetooth®), an IP (Internet Protocol) network, a combination of several of these networks, etc.
  • the SER server and the communication server SC communicate with each other via any type of communication network (not shown), for example an IP type network, a x-DSL, fiber or even 3G type,
  • the SER and SC servers can also communicate via a wireless local area network, in particular of the WiFi or PLC type (abbreviation of "carrier current online”).
  • the communication server SC is suitable for establishing communication with the contacts in the LC list via any type of network corresponding to the identifiers of these contacts. If, for example, contact 1 is associated with a fixed telephone number, the server SC is configured to contain a communication interface with a switched network. If, for example, contact 1 is also associated with a mobile telephone number, the server SC is configured to contain a communication interface with a mobile telephone network. If, for example, contact 2 is associated with an instant messaging or electronic mail identifier, the server SC is configured to contain a communication interface with a computer network, such as an Internet network.
  • a computer network such as an Internet network.
  • FIG. 2 shows the simplified structure of the AL alarm device suitable for implementing the alarm activation method which will be described below.
  • Such an AL alarm device includes:
  • MIC microphones for example of the multi-directional type, configured to listen to the voice data DV generated by the user UT
  • a REC module for receiving the detected DV voice data, a memory MEM1 suitable for storing voice data previously recorded by the user UT,
  • connection interface IC which is adapted to communicate, via the communication network RCBD, with the server SER of FIG. 1.
  • the AL alarm device operates on battery.
  • the alarm device AL is electrically supplied and contains a battery, which in the event of a power cut, is adapted to have a autonomy of approximately 1 hour, for example.
  • Such an alarm device thus has a very simple structure. As a result, the alarm device is inexpensive to manufacture and therefore to market.
  • the actions executed by the alarm activation method are implemented by instructions from a PG computer program.
  • the alarm device AL has the conventional architecture of a computer and in particular comprises a memory MEM2, a processing unit UT, equipped for example with a processor PROC, and controlled by the stored computer program PG in MEM2 memory.
  • the computer program PG includes instructions for implementing the actions of the alarm activation method which will be described below, when the program is executed by the processor PROC, according to any one of the particular modes of realization of the invention.
  • the code instructions of the computer program PG are for example loaded into a RAM memory (not shown) before being executed by the processor PROC.
  • the processor processor of the processing unit UT implements in particular the actions of the alarm activation method, according to the instructions of the computer program PG.
  • the user UT connects in S10 to the server SER, via a communication terminal TC, so as to create an account.
  • the communication terminal TC is for example a mobile telephone, a smartphone (“smart telephone”), a tablet, a portable computer, a personal computer of the PC type, etc.
  • the communication terminal TC connects to the SER server via any type of appropriate communication network.
  • the user UT connects via an access link to the SER server, the said link having been communicated during the purchase of the alarm device AL.
  • the connection to the SER server can also be established via a dedicated application previously downloaded to the TC terminal.
  • the SER server sends an online registration form F1.
  • Communication identifier ID u of the user UT for example telephone number (s) and / or email address (es) of the user UT,
  • - IT textual information for example a word in everyday language, a series of numbers and / or letters chosen by the user UT, or even the identifier ID a! the AL alarm device, such an identifier being affixed for example to the AL alarm device,
  • Such an LC list contains N contacts well known to the user UT and who, preferably, are close enough to his home to quickly intervene at his home, in the event of an alarm activation of the AL alarm device.
  • This could be, for example, close neighbors, a family member of the UT user, or even a service center, the attending physician of the UT user, etc.
  • the user For each of the N contacts "contact 1", “contact 2”, ..., “contact N”, the user associates a name, an address, a privileged communication identifier (mobile phone number, landline number, email address, instant messaging address, etc.), as well as a reachability time range.
  • a privileged communication identifier mobile phone number, landline number, email address, instant messaging address, etc.
  • the N contacts are classified in order of priority to contact, the first contact "contact 1" of the LC list being the one who will be contacted first, the second contact “contact 2" of the LC list being the one who will be contacted second if it is impossible to reach the contact "contact 1" or if the latter refuses / is unable to help the UT user, etc.
  • the first "contact 1" is the user UT and is therefore associated with one or more communication identifier (s) of the user UT.
  • the user UT will be contacted first so as to check whether the alarm device AL has not been activated by error by the user UT, this in order to '' avoid sending unnecessary help, and, in any case, quickly contacting the user UT after activation of the alarm device AL.
  • the communication terminal TC transmits the completed registration form F1 to the server SER.
  • the server SER records in a correspondence table TAB the information entered in the registration form F1, which ends the procedure for registering the user UT in the alarm activation service offered by the SER server.
  • the user UT switches on in S20 the alarm device AL, using for example a key provided for this purpose.
  • the alarm device AL starts listening after the activation of the MIC microphones.
  • Keywords DV are words of everyday language which express a state of distress, for example "Help”, “Help”, “Fire”, “SOS”, etc ...
  • these keywords are detected by the microphone (s) MIC, received by the reception module REC, analyzed by the voice analyzer AV, then recorded in the memory MEM1.
  • the keywords are recorded in S23 in the memory MEM1, directly in an audio format.
  • the keywords analyzed by the voice analyzer AV are transcribed in text form by the voice recognition module RV.
  • the keywords thus transcribed in textual form are then recorded in S23 in the memory MEM1.
  • the alarm device AL is then operational. In order to ensure its proper functioning, a test can be carried out, the UT user pronouncing one of the registered keywords.
  • the user UT being close to the alarm device AL whose microphone (s) are activated, it generates voice data DV.
  • voice data DV is for example a keyword of the type "Help", “Help”, “Fire”, etc. which are detected by the MIC microphone (s) of the AL alarm device.
  • the receiver REC of the alarm device AL receives the keyword spoken by the user UT.
  • the keyword received is directly compared in S33 with the keywords previously recorded in S23 in audio format in the memory MEM1.
  • the alarm device AL includes a voice recognition module RV, in S320, the latter transcribes the keyword received in text format.
  • the process is terminated alarm activation, the alarm device AL then waiting for detection of new voice data generated by the user UT.
  • the alarm device AL via its communication interface IC, transmits in S34 to the server SER, via the communication network RCBD, the textual information IT recorded in S14 by the server SER, in order to request assistance from the UT user.
  • this is the identifier ID A L of the alarm device AL.
  • no information clearly describing the reasons for which the UT user has triggered an alarm, is transmitted, which makes the alarm activation method particularly secure since it preserves disclosure to third parties. "sensitive" personal data of the user.
  • the textual information IT transmitted in S34 to the server SER is the identifier ID A L of the alarm device coupled to the word -key received as transcribed in text form in S320.
  • the server SER receives the identifier ID A L possibly coupled with the keyword retranscribed in textual form, and identifies, in its correspondence table TAB, the coordinates of the user UT, as well as the list of contacts LC.
  • the server SER transmits the list LC to the communication server SC of FIG. 1.
  • the SER server could first transmit the first contact "contact 1" from the LC list, and at the request of the server SC, transmit the second contact "contact 2", and so on.
  • the communication server SC establishes a communication with the user UT, using one of the communication identifiers IDut of the user UT mentioned in the LC list.
  • the communication server SC establishes a communication with one of the contacts of the list LC, preferably the first contact "contact 1" of the list LC, using one of the communication identifiers of contact "contact 1" mentioned in the LC list. For example, if such a communication identifier is a telephone number associated with contact "contact 1", the server SC telephones contact "contact 1" and plays an audio message of the type: "Mr. UT who lives at "15 rue des piping, BOULOGNE", activated its AL alarm system. If you agree to intervene at his home, type 1, otherwise hang up. "
  • the communication server SC establishes a new communication with the contact “contact 2” mentioned in the list LC, and so on, until a contact from the list LC replied that he agreed to assist the UT user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Acoustics & Sound (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Multimedia (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)
EP19831784.4A 2018-12-04 2019-11-18 Sprachaktivierung eines alarms über ein kommunikationsnetzwerk Pending EP3891715A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1872283A FR3089334A1 (fr) 2018-12-04 2018-12-04 Activation d’alarme via un réseau de communication bas-débit
PCT/FR2019/052737 WO2020115380A1 (fr) 2018-12-04 2019-11-18 Activation vocale d'alarme via un reseau de communication

Publications (1)

Publication Number Publication Date
EP3891715A1 true EP3891715A1 (de) 2021-10-13

Family

ID=66542334

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19831784.4A Pending EP3891715A1 (de) 2018-12-04 2019-11-18 Sprachaktivierung eines alarms über ein kommunikationsnetzwerk

Country Status (4)

Country Link
US (1) US20220130224A1 (de)
EP (1) EP3891715A1 (de)
FR (1) FR3089334A1 (de)
WO (1) WO2020115380A1 (de)

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999006979A1 (de) * 1997-08-01 1999-02-11 Siemens Aktiengesellschaft Notfall-überwachungssystem für wohnungen
US6631179B1 (en) * 1998-06-10 2003-10-07 Henry Sifuentes Voice and motion activated telephone
US6628200B1 (en) * 2002-09-12 2003-09-30 Chi-Hung Lin Movable anti-theft device for mobile telephones
EP1603116A1 (de) * 2003-02-19 2005-12-07 Matsushita Electric Industrial Co., Ltd. Spracherkennungsanordnung und -verfahren
US7212111B2 (en) * 2003-12-30 2007-05-01 Motorola, Inc. Method and system for use in emergency notification and determining location
US20060028337A1 (en) * 2004-08-09 2006-02-09 Li Qi P Voice-operated remote control for TV and electronic systems
US9820658B2 (en) * 2006-06-30 2017-11-21 Bao Q. Tran Systems and methods for providing interoperability among healthcare devices
US20070057798A1 (en) * 2005-09-09 2007-03-15 Li Joy Y Vocalife line: a voice-operated device and system for saving lives in medical emergency
US11985566B2 (en) * 2010-06-29 2024-05-14 Malcolm Wade Pipes Automatic emergency call activation and notification system and method
US9070282B2 (en) * 2009-01-30 2015-06-30 Altorr Corp. Smartphone control of electrical devices
FR2968815B1 (fr) * 2010-12-14 2014-05-16 Philippe Albert Andre Griffe Systeme d'appel de secours par reconnaissance vocale sur reseau de microphones
EP2900362A1 (de) * 2012-09-28 2015-08-05 Promethera Biosciences S.A. Bewegliche vorrichtung zur herstellung und verteilung medizinischer produkte auf zellbasis
WO2014155152A1 (de) * 2013-03-27 2014-10-02 Gerwert Matthias Sprachgesteuerte alarmanlage für den häuslichen bereich
US9843916B2 (en) * 2015-05-22 2017-12-12 Nebulys Technologies, Inc. Systems and methods for automatic emergency contact routing
US9717101B1 (en) * 2016-01-22 2017-07-25 Andrew D. Burnham Emergency response system and method for elderly individuals using mobile device
US10079030B2 (en) * 2016-08-09 2018-09-18 Qualcomm Incorporated System and method to provide an alert using microphone activation
US10264121B2 (en) * 2017-08-30 2019-04-16 T-Mobile Usa, Inc. Message transcription for emergency call prioritization

Also Published As

Publication number Publication date
FR3089334A1 (fr) 2020-06-05
WO2020115380A1 (fr) 2020-06-11
US20220130224A1 (en) 2022-04-28

Similar Documents

Publication Publication Date Title
EP1247589B1 (de) System und Verfahren zum Zugriff auf Informationen und/oder Daten im Internet
EP1180301B1 (de) Lokales kombiniertes telefon- und alarmsystem
FR2961990A1 (fr) Procede et dispositif d'authentification d'un appelant
FR2881867A1 (fr) Procede de transmission de marques de fin de parole dans un systeme de reconnaissance de la parole
EP3891715A1 (de) Sprachaktivierung eines alarms über ein kommunikationsnetzwerk
FR3069991A1 (fr) Procede de creation et de participation a une conference audio ou video
FR2888706A1 (fr) Procede de mise en relation interpersonelle
FR3057984A1 (fr) Procede et systeme d'appel automatique de secours d'urgence lors de la detection d'une personne en situation de detresse
FR2886753A1 (fr) Dispositif et procede pour attester de la presence d'un individu dans un endroit donne a un instant donne
FR3086478A1 (fr) Gestion du fonctionnement d'une telecommande lors de la reception d'un appel telephonique.
EP3769504B1 (de) Verfahren zur verwaltung der unterstützung einer person als reaktion auf das aussenden eines alarms
FR2926178A1 (fr) Procede de notification de l'environnement d'un utilisateur afin d'aider au choix d'une ressource media
FR3042373A1 (fr) Aide a l'etablissement d'une communication telephonique par provision d'informations sur l'utilisateur appelant
EP1989845B1 (de) Verwaltung einer kommunikation zwischen einem telekommunikationssystem und einem server
FR2693061A1 (fr) Appareil de télécommunication tel qu'un télécopieur.
WO2006100384A1 (fr) Procede et dispositif d’appairage radio dynamique entre un peripherique et un point d’acces a un reseau partage
FR2961991A1 (fr) Procede et dispositif de communication entre systemes de communication
FR3089083A1 (fr) Procédé et dispositif d’affichage de données de communication
FR2818070A1 (fr) Procede de reglage d'un telephone mobile reglable selon ce procede
FR3036909A1 (fr) Procede et installation de communication telephonique et systemes correspondants
FR2988200A1 (fr) Procede d'alerte au moyen d'un terminal mobile
WO2003088170A2 (fr) Procede, et equipement, d'etablissement consensuel d'une liaison de communication
FR2911423A1 (fr) Alarme de detresse individuelle
FR3029725A1 (fr) Procede d'etablissement d'une liaison telephonique entre un premier dispositif de communication et un deuxieme dispositif de communication, et serveur associe
FR2961992A1 (fr) Procede et dispositif de communication instantanee

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20210621

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20240112