US20180248989A1 - Virtual telephony assistant - Google Patents
Virtual telephony assistant Download PDFInfo
- Publication number
- US20180248989A1 US20180248989A1 US15/963,703 US201815963703A US2018248989A1 US 20180248989 A1 US20180248989 A1 US 20180248989A1 US 201815963703 A US201815963703 A US 201815963703A US 2018248989 A1 US2018248989 A1 US 2018248989A1
- Authority
- US
- United States
- Prior art keywords
- inbound
- call
- telephony
- called party
- caller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/677—Preventing the dialling or sending of predetermined telephone numbers or selected types of telephone numbers, e.g. long distance numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
- H04M3/4365—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it based on information specified by the calling party, e.g. priority or subject
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G06F17/30—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/57—Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
Definitions
- Examples described herein are generally related to techniques for providing a virtual telephony assistant.
- Mobile telephony devices (often called smartphones) utilizing wireless communication protocols are ubiquitous. Many of these devices utilize one of the competing circuit switched cellular voice protocols (e.g., Global System for Mobile Communications (GSM) or Code Division Multiple Access (CDMA)) for telephony voice communications with other telephony endpoint devices. More recently, many of these mobile telephony devices may also utilize an Internet Protocol (IP) communication link rather than a circuit switched communication link to exchange voice data with a communications server using a Voice-over Internet Protocol (VoIP) system. The communications server mediates telephony calls between and among various endpoints. In addition, the mobile telephony device may also wirelessly connect to an IP network over one or more wireless IP interfaces and communication links.
- GSM Global System for Mobile Communications
- CDMA Code Division Multiple Access
- IP Internet Protocol
- VoIP Voice-over Internet Protocol
- the communications server mediates telephony calls between and among various endpoints.
- the mobile telephony device may also wirelessly connect to an IP network over one or more wireless
- the IP communication link may be 802.11 based such as WiFi or may be cellular based utilizing at least one of the many cellular IP air interfaces.
- 802.11 encompasses all of the 802.11 versions that currently exist and may be developed.
- Some cellular IP air interface examples include the General Packet Radio Service (GPRS), Enhanced Data for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), Long-Term Evolution (LTE), Voice-over Long-Term Evolution (VoLTE), Wideband Code Division Multiple Access (WCDMA), Universal Mobile Telecommunications System (UMTS), and High Rate Packet Data (HRPD).
- GPRS General Packet Radio Service
- EDGE Enhanced Data for GSM Evolution
- EV-DO Evolution-Data Optimized
- HSPA High Speed Packet Access
- HSDPA High Speed Downlink Packet Access
- LTE Long-Term Evolution
- VoIP Voice-over Long-Term Evolution
- WCDMA Wideband Code Division Multiple Access
- UMTS Universal Mobile Telecommunications System
- HRPD High Rate Packet Data
- Some mobile telephony devices are capable of utilizing multiple different networks depending on network access or network conditions.
- the mobile telephony device may be able to communicate with a communications server that manages and mediates telephony calls, including the media stream itself, over either a circuit switched network or an IP based network.
- the communications server may be IP based but with interfaces to cellular circuit switched networks or the public switched telephone network (PSTN) as well as Voice-over Internet Protocol (VoIP) networks. If the communications server is IP based, it may include additional intelligence that allows it intervene in the call flow as well as access other IP data networks like the Internet in general to engage in IP data sessions.
- PSTN public switched telephone network
- VoIP Voice-over Internet Protocol
- the communications server may access other IP data networks while simultaneously managing a telephony call between or among a plurality of telephony endpoint devices.
- the mobile telephony device(s) are also able to access IP data networks such as the Internet over 802.11 WiFi and/or a cellular IP data connection.
- smart speakers may even be capable of VoIP telephony.
- the smart speaker may be provisioned with its own telephone number, may be linked to the account of one or more other telephony devices (e.g., mobile phones) that have their own telephone number, or both.
- What is needed is a mechanism for accessing and leveraging the communication server's ability to intervene in the call flow and utilize IP data networks during a voice communication session.
- FIG. 1 illustrates an example block diagram for a networked environment.
- FIG. 2 illustrates a block diagram of a communications server according to an embodiment of the invention.
- FIG. 3 illustrates a block diagram of an end user mobile telephony device according to an embodiment of the invention.
- FIG. 4 illustrates an example logic flow diagram according to an embodiment of the invention.
- FIG. 5 illustrates another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 6 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 7 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 8 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 9 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 10 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 11 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 12 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 13 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 14 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 15 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 16 illustrates another example block diagram for a networked environment.
- FIG. 17 illustrates a block diagram of smart speaker according to an embodiment of the invention.
- FIG. 18 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- FIG. 19 illustrates still another example of a logic flow diagram according to an embodiment of the invention.
- the embodiments described herein disclose systems, methods, and computer program products for integrating a voice responsive telephony assistant into an existing telephony call.
- the embodiments may also describe systems, methods, and computer program products for integrating smart speakers into VolP telephony systems.
- the systems and methods of the invention may be embodied in and performed by network based communications server(s) and other related components (e.g., databases), and software instructions executed by some or all of such devices and components, as will be explained in detail below.
- the different types of networks contemplated herein include, for example, circuit switched networks, IP based cellular mobile networks, and IP data networks, such as the Internet or other IP-based networks, including wide area networks, local area networks, and combinations thereof that include both wireless (e.g., 802.11) and wireline (e.g., Ethernet) means of access.
- IP based cellular mobile networks such as the Internet or other IP-based networks, including wide area networks, local area networks, and combinations thereof that include both wireless (e.g., 802.11) and wireline (e.g., Ethernet) means of access.
- IP data networks such as the Internet or other IP-based networks, including wide area networks, local area networks, and combinations thereof that include both wireless (e.g., 802.11) and wireline (e.g., Ethernet) means of access.
- telephony endpoint is meant to generally indicate an end user physical device intended for, among other things, telephony calls to other telephony endpoints over one or more inter-connected telephony networks.
- telephony endpoints include a plain old telephone service (POTS) phones, VoIP telephones, mobile/cellular telephones, custom designed smart speakers, and software based soft-client applications executing on a computer device.
- POTS plain old telephone service
- VoIP telephones VoIP telephones
- mobile/cellular telephones mobile/cellular telephones
- custom designed smart speakers custom designed smart speakers
- software based soft-client applications executing on a computer device.
- mobile telephony device is meant to generally indicate a specific type of telephony endpoint, namely a mobile or cellular telephone such as a smartphone that may be equipped with multiple RF transceivers including an 802.11 WiFi transceiver, a cellular banded transceiver, and (optionally) a Bluetooth transceiver. Other similar RF transceivers configured to use various frequency ranges may also be implemented on the mobile telephony device as they are developed.
- a mobile telephony endpoint may further be messaging enabled meaning it includes the ability to send and receive text (SMS) or multi-media (MMS) messages using its telephone number as an address point.
- SMS send and receive text
- MMS multi-media
- many mobile telephony devices may also include other installed messaging applications, such as, for instance, Facebook, WhatsApp, Instagram, Snapchat, and the like.
- smart speaker is meant to generally indicate a specific type of telephony endpoint, namely an enhanced speaker device that may be equipped with multiple RF transceivers including an 802.11 WiFi transceiver, a cellular banded transceiver, and (optionally) a Bluetooth transceiver. Other similar RF transceivers configured to use various frequency ranges may also be implemented on the smart speaker as they are developed.
- a smart speaker endpoint may further be messaging enabled meaning it includes the ability to send and receive text (SMS) messages using its telephone number as an address point. Inbound text messages would first be converted to speech so as to be able to be played by the smart speaker. Out bound text messages are converted from speech to text before being delivered.
- SMS text
- telephony call is meant to generally indicate any intended two-way exchange of voice data between two or more telephony endpoint devices.
- the term “communications server” is intended to mean an IP based computer that, among other capabilities, mediates and manages telephony calls and messages among telephony endpoints over one or more inter-connected telephony networks.
- the communications server may also include interactive voice response (IVR) technology that allows it to interact with users through the use of voice and/or DTMF tones input via a keypad.
- IVR interactive voice response
- the IVR aspect may further include speech recognition functionality allowing the communications server to recognize keywords, commands, or instructions. Once recognized, any such commands or instructions may be carried out by the communications server or forwarded to another computer resource for execution.
- a communication link is intended to mean a physical and/or logical channel that connects two or more telephony endpoints with the IP based communications server.
- a communication link may be a signaling link, a media link, or both.
- a telephony call may be established via one or more communication links in which the IP based communications server is an endpoint for each of the communication links.
- the IP based communications server may then join one or more communication links together to establish a telephony call between or among two or more telephony endpoints.
- the IP based communications server may be hosted within an IP network accessible to the Internet.
- the communications server itself may be considered a telephony endpoint in cases where an end user is communicating with an artificial intelligence (AI) bot hosted within the communications server over a communication link as described above.
- AI artificial intelligence
- the AI bot may further be ‘present’ in a telephony call between two or more endpoints existing as a virtual assistant of sorts.
- the AI bot may be given a name and made responsive to such name when spoken by one of the end users.
- the AI bot recognizes the invocation of its name, it may be programmed to listen for commands or instructions from one or more of the end users.
- references herein to a mobile telephony device or smart speaker capable of connecting to or communicating via a mobile radio access network refer to a mobile telephony device or smart speaker equipped with a cellular transceiver for wireless communication with basestations for purposes of accessing circuit switched voice services and/or mobile IP data services.
- references herein to a mobile telephony device or smart speaker capable of connecting to or communicating via an IP data network refer to a mobile telephony device or smart speaker equipped with a transceiver for wireless communication (e.g., 802.11 WiFi) with a router or other IP data network access point.
- Certain embodiments herein describe techniques for the IP based communications server to intervene in a call flow to intelligently route or otherwise respond to an inbound call.
- FIG. 1 illustrates an exemplary networked environment 100 for implementing certain exemplary embodiments described herein.
- the networked environment 100 may include multiple distinct inter-connected networks such as, for instance, a large scale internet protocol (IP) network (e.g., the Internet) 102 , one or more IP based local area networks or wide area networks (LANs/WANs) 130 including an 802.11 wireless access point 135 , and one or more MRANs 120 accessible via a cellular basestation tower 122 .
- IP internet protocol
- LANs/WANs wide area network
- MRANs 120 accessible via a cellular basestation tower 122 .
- wireless IP based networks that do not operate over the frequency spectrum typically associated with 802.11 (e.g., WiFi) or cellular may be implemented.
- One example of such an alternate wireless IP network may be WiMAX (e.g., 802.16).
- Other examples may include, but are not limited to, networks utilizing television whitespace frequencies and other unlicensed (or yet to be licensed) frequencies, including, but not limited to, those under consideration for 5G implementations. These may include wireless networks operating within a frequency range of 100 MHz and 700 MHz, and wireless networks operating within a frequency range of 3.5 GHz and 3.7 GHz, and anything at or above 5 GHz including light-wave based transmission systems.
- the MRANs 120 and the LANs 130 each have backhaul IP connectivity to the Internet 102 that provides connectivity with a communications server 140 .
- the communications server 140 has many capabilities including: (i) an ability to manage and mediate telephony calls and messages between or among telephony endpoints, and (ii) an ability to manage and mediate IP data sessions between or among other IP enabled devices.
- the MRAN 120 (sometimes referred to as a cellular network) may come in different varieties based on the circuit switched radio transmission protocol it supports. Two such circuit switched radio transmission schemes are the Global System for Mobile Communication (GSM) and Code Division Multiple Access (CDMA). These circuit switched radio transmission schemes are incompatible with one another necessitating an intervening interface to allow communication between mobile telephony devices 110 on either network. In addition, each network may operate over multiple specific frequency ranges. Often, there may even be an intervening network such as the Public Switched Telephone Network (PSTN) (not shown) between two distinct MRANs. Each MRAN 120 may include an interface to the PSTN (not shown) such that telephony calls crossing that interface can be handled by the receiving network whether it is an MRAN 120 or the PSTN.
- PSTN Public Switched Telephone Network
- the MRAN 120 may also provide mobile telephony devices 110 with wireless IP based data access to the Internet 102 using one of the aforementioned cellular IP protocols. Moreover, MRANs 120 may utilize IP protocols like Voice-over LTE (VoLTE) to enable telephony calling over an IP protocol rather than a circuit switched protocol. Similarly, an IP access point 135 may provide wireless connectivity for a mobile telephony device 110 to the Internet 102 via access point 135 using any of the 802.11 WiFi standards and/or any other type of IP based connectivity standard.
- VoIP Voice-over LTE
- MRANs 120 include cellular networks or portions of cellular networks based on a variety of circuit switched and/or IP data protocols such as, but not limited to, Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), General Packet Radio Service (GPRS), Enhanced Data for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), High Speed Packet Data (HSPD), High Speed Downlink Packet Access (HSDPA), Long-Term Evolution (LTE), Voice-over Long-Term Evolution (VoLTE), Wideband Code Division Multiple Access (WCDMA), Universal Mobile Telecommunications System (UMTS), or High Rate Packet Data (HRPD)and/or any other existing or developed/developing cellular network IP standards.
- GSM Global System for Mobile Communications
- CDMA Code Division Multiple Access
- GPRS General Packet Radio Service
- EDGE Enhanced Data for GSM Evolution
- EDGE Enhanced Data for GSM Evolution
- EDGE Evolution-Data Optimized
- HSPD High Speed Packet Data
- a mobile telephony device 110 may make and receive telephony calls. All calls are, at some point, routed through the communications server 140 residing in an IP network 102 . Depending on location and current network conditions, the mobile telephony device 110 may communicate with the communications server 140 over (i) a WiFi IP voice/data link 116 , 118 via an IP access point 135 , (ii) a cellular IP voice/data link 114 , 117 via a basestation 122 coupled to MRAN 120 , or (iii) a circuit switched voice link 112 , 119 via basestation 122 coupled to MRAN 120 . Communications server 140 may also include a database 141 containing data on service subscribers it manages.
- the communications server 140 may also establish a secondary communication link 142 with another communication device 150 to establish the telephony call.
- the secondary communication link 142 is VoIP based with respect to the communications server 140 but may traverse other interconnected voice networks such as another MRAN, the PSTN, another VoIP network, or some combination thereof before terminating at the other communication device 150 .
- FIG. 2 illustrates a block diagram of a communications server 140 according to an embodiment of the invention.
- the communications server 140 may include one or more processors 205 coupled with a data storage component 210 comprised of a memory 215 .
- the data storage component 210 may also include telephony assistant logic 220 and command execution logic 225 .
- a VoIP communication interface 230 manages and mediates telephony calls while an IP data interface 235 manages IP data sessions with external devices or programs.
- the VoIP communication interface 230 operates in an IP mode. However, it is capable of communicating with non-IP telephony networks via other integrated or external network interfaces.
- the telephony assistant logic 220 may be comprised of computer code that when executed monitors incoming data over the VoIP communication interface 230 and the IP data interface 235 during an existing call with another party.
- the telephony assistant logic 220 monitors for a trigger event.
- a trigger event may take many forms including pattern matching to an acoustic signature or recognition of a keyword or phrase. For instance, a set of taps to the housing of the mobile telephony device 110 may create a unique acoustic signature that may be detected and interpreted as a trigger event.
- One such unique acoustic signature may be the detection of three taps within a one second period in which the taps emit a sound within a particular frequency range.
- the command execution logic 225 may be comprised of computer code that when executed recognizes the trigger event and causes the mobile telephony device 110 to enter a temporary command mode. Entering command mode initially places the mobile telephony device 110 into mute mode with respect to the ongoing telephony call with the other party. This may be performed locally on the communications server 140 or via an instruction sent to the mobile telephony device 110 from the communications server 140 . Mute mode essentially blocks audio picked up from the mobile telephony device's microphone from being passed from the communications server 140 to the other communication device 150 . Once mute mode is engaged, the mobile telephony device user may still speak into the device's microphone.
- the audio may still be digitized and sent to the communications server 140 over the telephony communication link for the existing telephony call.
- the communications server 140 being in command mode, treats the received audio differently.
- the communications server 140 parses the audio through the command execution logic 225 using natural language processing to recognize and interpret commands or instructions that may be carried out, or caused to be carried out, by the communications server 140 .
- FIG. 3 illustrates a block diagram of an end user mobile telephony device 110 according to an embodiment of the invention.
- the mobile telephony device 110 may include a variety of user interface(s) and sensors 305 such as a touchscreen display, a speaker, a microphone, a global positioning system (GPS) chip, an accelerometer, a light sensor, etc.
- the mobile telephony device 110 may also include one or more processors 310 coupled with a data storage component 320 including sensor detection logic 325 , command execution logic 330 , as well as other software applications 335 .
- the mobile telephony device 110 also comprises a cellular transceiver and a WiFi transceiver 315 for wireless communications with one or more wireless networks via wireless network access points (as shown in FIG. 1 ).
- the mobile telephony device 110 may include other wireless transceivers (not shown) like Bluetooth.
- the sensor detection logic 325 may be comprised of computer code that when executed monitors incoming audio over the microphone for a trigger event.
- a trigger event may take many forms including pattern matching to an acoustic signature or recognition of a keyword or phrase.
- the command execution logic 330 may be comprised of computer code that when executed recognizes the trigger event and causes the mobile telephony device 110 to enter a temporary command mode. Entering command mode initially places the mobile telephony device 110 into mute mode with respect to the ongoing telephony call with the other party. This may be performed locally by the mobile telephony device 110 itself. Mute mode essentially blocks audio picked up from the mobile telephony device's microphone from being passed to the other communication device 150 .
- the command execution logic 330 parses the audio using natural language processing to recognize and interpret commands or instructions that may be carried out, or caused to be carried out, by the mobile telephony device 110 .
- FIGS. 4-14 and 18-19 illustrate examples of logic flow diagrams according to an embodiment of the invention.
- the logic flows may be representative of some or all of the operations executed by one or more embodiments described herein. Further, the logic flows may performed by circuitry and one or more components discussed herein. Moreover, logic flows may be performed in conjunction with one or more other logic flows discussed herein and lists particular steps occurring in a particular order. However, embodiments are not limited in this manner and any step may occur in any order. Further, steps of the logic flows may not be dependent upon one another and as such particular steps in the logic flows may not occur.
- FIG. 4 illustrates an example logic flow diagram 400 according to an embodiment of the invention.
- a communications server 140 receives an inbound telephony call from an external originating telephony endpoint 150 intended for mobile telephony device 110 of a called party at block 402 .
- the communications server 140 may check a caller ID field included with the inbound call at decision block 404 .
- Decision block 404 may reference a pair of databases to determine the identity of the caller.
- the blacklisted database 405 may contain telephone numbers that have been flagged as undesirable to the user of mobile telephony device 110 and therefore should not be permitted to ring the mobile telephony device 110 .
- the whitelisted database 409 may contain telephone numbers that have been flagged as desirable to the user of mobile telephony device 110 and therefore should be permitted to ring the mobile telephony device 110 .
- the communications server 140 may send the inbound call to a voicemail system or a spam folder at block 406 . This process may be described in greater detail in FIG. 10 .
- the communications server 140 may check the current availability of the called party via a shared calendar application with the mobile telephony device 110 at decision block 410 . If the called party is available according to calendar information, then communications server 140 may pass the inbound call and ring the mobile telephony device 110 . If the called party is not available according to calendar information, then communications server 140 may play a custom message to the caller. This process may be described in greater detail in FIG. 5 .
- the communications server 140 may prompt the caller for a reply at decision block 416 .
- the communications server 140 may hold the inbound call before ringing the called party at block 430 .
- the communications server 140 may then answer the inbound call and prompt the caller for more information (e.g., name, purpose of call) at block 432 .
- the communications server 140 may then optionally subject the caller to a challenge type test to determine if the caller is a human or a machine. This challenge test process may be further described in FIG. 9 .
- the communications server 140 may then convert whatever response the caller made as a result of block 432 into text at block 434 .
- the communications server 140 may then package the converted text into a pop-up notification that is sent to and displayed on the mobile telephony device 110 at block 436 .
- the communications server 140 may then prompt the called party's mobile telephony device 110 for a response at decision block 438 .
- Examples of called party responses may include: send to voicemail ( FIG. 10 ), answer the call ( FIG. 11 ), reject call ( FIG. 12 ), send voice message back ( FIG. 13 ), or send text message back ( FIG. 14 ).
- FIG. 5 illustrates another example of a logic flow diagram 500 according to an embodiment of the invention.
- This logic flow diagram 500 may describe what a custom message from block 414 would be.
- the custom message that is played to the whitelisted caller may say “Hey ‘caller’, ‘called party’ is ‘calendar status’ until ‘time’”, where the fields for ‘caller’, ‘called party’, ‘calendar status’, and ‘time’ may be populated by referencing one or more databases available to the communications server 140 .
- the name of the caller may be pulled from the whitelisted database of contacts that match the caller ID for the incoming call.
- the called party is the person associated with mobile telephony device 110 being called.
- the name to use for the custom message may be suited to fit the relationship between the caller and the called party. For instance, if the caller is the son of the called party, the name of the called party for the custom message may be set to ‘dad’.
- the calendar status of the called party may be pulled from a calendar application linked to the user of the mobile telephony device 110 . The calendar status may provide a reason why the called party is currently unavailable such as, for instance, in a meeting.
- the time field for the custom message may refer to the time at which the meeting expires. Putting all the information together may yield a custom message that reads as follows: “Hey Casey, dad is in a meeting until 3:15.
- FIG. 6 illustrates still another example of a logic flow diagram 600 according to an embodiment of the invention.
- the caller has responded to decision block 426 of FIG. 4 with a reply to the custom message of the called party indicating voicemail at block 602 .
- the communications server 140 may then route the inbound call to the called party's voice mail system in block 604 before returning control of the overall process back to FIG. 4 .
- FIG. 7 illustrates still another example of a logic flow diagram 700 according to an embodiment of the invention.
- the caller has responded to decision block 426 of FIG. 4 with a reply to the custom message of the called party indicating pop-up notification at block 702 .
- the communications server 140 may then prompt the caller to speak a short voice message in block 704 .
- the communications server 140 may then convert the voice message to text in block 706 .
- the communications server 140 may then cause the text corresponding to the voice message to be sent to and displayed on the mobile telephony device 110 as a pop-up notification at block 708 before returning control of the overall process back to FIG. 4 .
- FIG. 8 illustrates still another example of a logic flow diagram 800 according to an embodiment of the invention.
- the caller has responded to decision block 426 of FIG. 4 with a reply to the custom message of the called party indicating text message notification at block 802 .
- the communications server 140 may then prompt the caller to speak a short voice message in block 804 .
- the communications server 140 may then convert the voice message to text in block 806 .
- the communications server 140 may then cause the text corresponding to the voice message to be sent to the mobile telephony device 110 as an SMS text message at block 808 before returning control of the overall process back to FIG. 4 .
- FIG. 9 illustrates still another example of a logic flow diagram 900 according to an embodiment of the invention.
- the caller has responded to block 432 of FIG. 4 with additional information that may be subjected to a challenge test to determine if the caller is a human or a machine (e.g., recording) at block 902 .
- the challenge test may be administered in decision block 904 and may involve choosing from any number of tasks that a human can understand and perform but a recording cannot. For example, a simple instruction to press any key could be performed by a human but not a recording.
- the communications server 140 may interpret the response as coming from a human caller and return control of the process to the point it was in FIG.
- control may be returned to s different point in the process of FIG. 4 .
- the inbound call will be immediately routed to a voicemail system or a spam folder of the called party.
- FIG. 10 illustrates still another example of a logic flow diagram 1000 according to an embodiment of the invention.
- the called party has responded to decision block 438 of FIG. 4 with a selection of voicemail or a timeout due to no called party response at block 1002 .
- the communications server 140 may then route the inbound call to the called party's voice mail system in block 1004 before returning control of the overall process back to FIG. 4 .
- FIG. 11 illustrates still another example of a logic flow diagram 1100 according to an embodiment of the invention.
- the called party has responded to decision block 438 of FIG. 4 with a selection to answer the inbound call at block 1102 .
- the communications server 140 may then pay a “connecting” response to the caller and/or resume the ringing function to indicate to the caller that the call is being placed at block 1104 .
- the communications server 140 may then ring the called party at block 1106 and upon connecting the call at block 1108 , return control of the overall process back to FIG. 4 .
- FIG. 12 illustrates still another example of a logic flow diagram 1200 according to an embodiment of the invention.
- the called party has responded to decision block 438 of FIG. 4 with a selection to reject the inbound call at block 1202 .
- the communications server 140 may then query the called party whether to add the caller to the blacklist database at decision block 1204 . If the called party response is determined to be yes, the communications server 140 may then add the telephone number of the caller to the blacklist database in block 1206 before terminating the call at block 1208 and returning control of the overall process back to FIG. 4 .
- FIG. 13 illustrates still another example of a logic flow diagram 1300 according to an embodiment of the invention.
- the called party has responded to decision block 438 of FIG. 4 with a selection to send a voice message back to the caller at block 1302 .
- the communications server 140 may then prompt the called party to record a short voice message at block 1304 .
- the communications server 140 may then play the called party's voice message back to the caller at block 1306 before returning control of the overall process back to FIG. 4 .
- FIG. 14 illustrates still another example of a logic flow diagram 1400 according to an embodiment of the invention.
- the called party has responded to decision block 438 of FIG. 4 with a selection to send a text message back to the caller at block 1402 .
- the communications server 140 may then prompt the called party to record a short voice message at block 1404 .
- the communications server 140 may then convert or transcribe the voice message to a text message at block 1406 .
- the communications server 140 may then send the SMS text message back to the caller at block 1408 before returning control of the overall process back to FIG. 4 .
- FIG. 15 illustrates still another example of a logic flow diagram 1500 according to an embodiment of the invention.
- the called party has been prompted to respond to a decision block 438 of FIG. 4 with a decision to add the caller to either the whitelist database or blacklist database at block 1502 .
- the communications server 140 may then add caller's telephone number (TN) to whitelist database at block 1504 before returning control of the overall process back to FIG. 4 .
- the communications server 140 may then add caller's telephone number (TN) to blacklist database at block 1508 before returning control of the overall process back to FIG. 4 .
- FIG. 16 illustrates an exemplary networked environment 1600 for implementing certain exemplary embodiments described herein.
- the networked environment 1600 is similar to that of FIG. 1 but may further include an associated smart speaker 180 that is also capable of VoIP communications and general IP data communications with communications server 140 via radio tower 122 and MRAN 120 or IP access point 135 over IP access network 130 .
- FIG. 17 illustrates a block diagram of a smart speaker device 180 according to an embodiment of the invention.
- the smart speaker device 180 may include a variety of user interface(s) and sensors 1705 such as one or more speakers, one or more microphones, a global positioning system (GPS) chip, etc.
- the smart speaker device 180 may also include one or more processors 1710 coupled with a data storage component 1725 including sensor detection logic 1730 , command execution logic 1735 , as well as other software applications 1740 .
- the smart speaker device 180 may also comprise a cellular transceiver and a WiFi transceiver 1715 for wireless communications with one or more wireless networks via wireless network access points (as shown in FIG. 1 ).
- the smart speaker device 180 may further include other wireless transceivers (not shown) like Bluetooth.
- Also included may be at least one SIM card slots 1720 adapted to receive and operate a SIM card from one or more mobile network service providers to provide access to one or more MRANs 120 as shown in FIG. 16 .
- FIG. 18 illustrates an example logic flow diagram 1800 according to an embodiment of the invention.
- the communications server 140 receives an inbound call intended for smart speaker 180 .
- the smart speaker may be telephony enabled using Voice-over Internet Protocol (VoIP) telephony protocols to make and receive calls.
- VoIP Voice-over Internet Protocol
- the smart speaker may also be associated with its own telephone number and/or be associated with one or more telephony devices known to the communications server 140 .
- the communications server 140 may then check a caller ID field included with the inbound call at decision block 1804 .
- Decision block 1804 may reference a pair of databases to determine the identity of the caller.
- the blacklisted database 1805 may contain telephone numbers that have been flagged as undesirable to the user(s) of smart speaker 180 and therefore should not be permitted to ring the smart speaker 180 .
- the whitelisted database 1809 may contain telephone numbers that have been flagged as desirable to the user of smart speaker 180 and therefore should be permitted to ring the smart speaker 180 .
- the communications server 140 may send the inbound call to a voicemail system or a spam folder at block 1806 . This process may be described in greater detail in FIG. 10 .
- the communications server 140 may then send a signal to wake up the smart speaker 180 and play an incoming call message at block 1808 .
- the incoming call message may be, for instance, something like, “Your son Shane is calling. What would you like to do?”
- the communications server 140 may then prompt the smart speaker 180 for a response at decision block 1816 . Examples of responses from a user to the smart speaker 180 may include: send to voicemail ( FIG. 10 ), answer the call ( FIG. 11 ), reject call ( FIG. 12 ), send voice message back ( FIG. 13 ), or open a channel to listen in to the caller at block 1826 .
- the communications server 140 may hold the inbound call before ringing the called party at block 1810 .
- the communications server 140 may then answer the inbound call and prompt the caller for more information (e.g., name, purpose of call) at block 1812 .
- the communications server 140 may then send a signal to wake up the smart speaker 180 and play whatever response the caller made as a result of block 1812 along with any caller ID information at block 1814 .
- the communications server 140 may then send control over to decision block 1816 to prompt the called party for a response as described above.
- FIG. 19 illustrates another example of a logic flow diagram 1900 according to an embodiment of the invention.
- a user's mobile device 110 may be used as a secondary interface to the smart speaker 180 to place telephony calls.
- the smart speaker does not necessarily include a video display or touch screen capability, it can only be used directly via voice recognition and commands.
- a user may have multiple devices linked together in an account accessible to the communications server 140 . In such cases, the communications server can accept input or commands from one device and apply the commands to another associated device.
- the user may wish to place an outbound telephony call from thee smart speaker device 180 using the mobile telephony device 110 as the interface to “dial”.
- the communications server 140 may first determine if the mobile telephony device 140 is in close proximity to the smart speaker 180 at decision block 1902 . This may be determined in a variety of ways including a GPS geolocation comparison of both devices. Another method may be to have the communications server determine if both devices are currently connected to the same IP access point 135 . If the mobile telephony device 110 and the smart speaker 180 are not in proximity of one another, the communications server 140 may not permit the mobile telephony device 110 to place a call on behalf of the smart speaker 180 .
- the communications server 140 may permit the mobile telephony device 110 to place a call on behalf of the smart speaker 180 .
- the user may then open the dialer or a contacts database on the mobile telephony device 110 at block 1904 and select a contact or dial a telephone number at block 1906 .
- the selected or dialed telephone number may then be sent to and received by the communications server 140 at block 1908 .
- the communications server 140 may then establish a telephony communication link with the smart speaker 180 at block 1910 .
- the communications server 140 may then dial the selected contact or telephone number at block 1912 .
- the communications server 140 may then connect the called party to the smart speaker 180 at block 1914 to create a telephony communication session.
- Coupled may indicate that two or more elements are in direct physical or electrical contact with each other.
- the term “coupled,” however, may also mean that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- This application is a continuation of and claims the priority filing benefit of U.S. application Ser. No. 15/802,699 filed Nov. 3, 2017, entitled “Virtual Telephony Assistant” which is related to and claims the priority filing benefit of U.S. Provisional Application 62/417,608 filed Nov. 4, 2016, entitled “Virtual Telephony Assistant”.
- Examples described herein are generally related to techniques for providing a virtual telephony assistant.
- Mobile telephony devices (often called smartphones) utilizing wireless communication protocols are ubiquitous. Many of these devices utilize one of the competing circuit switched cellular voice protocols (e.g., Global System for Mobile Communications (GSM) or Code Division Multiple Access (CDMA)) for telephony voice communications with other telephony endpoint devices. More recently, many of these mobile telephony devices may also utilize an Internet Protocol (IP) communication link rather than a circuit switched communication link to exchange voice data with a communications server using a Voice-over Internet Protocol (VoIP) system. The communications server mediates telephony calls between and among various endpoints. In addition, the mobile telephony device may also wirelessly connect to an IP network over one or more wireless IP interfaces and communication links.
- The IP communication link may be 802.11 based such as WiFi or may be cellular based utilizing at least one of the many cellular IP air interfaces. There are several cellular IP air interfaces already in existence that use specific frequency ranges that are suitable for use with the embodiments described herein. It should be noted that the term 802.11 encompasses all of the 802.11 versions that currently exist and may be developed. Some cellular IP air interface examples include the General Packet Radio Service (GPRS), Enhanced Data for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), Long-Term Evolution (LTE), Voice-over Long-Term Evolution (VoLTE), Wideband Code Division Multiple Access (WCDMA), Universal Mobile Telecommunications System (UMTS), and High Rate Packet Data (HRPD). Moreover, there are many more wireless IP air interfaces in the planning and/or experimental stages (e.g., 5G, light-wave based, etc.) that use the same and/or different frequencies that would also be suitable for use with the embodiments described herein.
- Some mobile telephony devices are capable of utilizing multiple different networks depending on network access or network conditions. For instance, the mobile telephony device may be able to communicate with a communications server that manages and mediates telephony calls, including the media stream itself, over either a circuit switched network or an IP based network. The communications server may be IP based but with interfaces to cellular circuit switched networks or the public switched telephone network (PSTN) as well as Voice-over Internet Protocol (VoIP) networks. If the communications server is IP based, it may include additional intelligence that allows it intervene in the call flow as well as access other IP data networks like the Internet in general to engage in IP data sessions. Moreover, the communications server may access other IP data networks while simultaneously managing a telephony call between or among a plurality of telephony endpoint devices. The mobile telephony device(s) are also able to access IP data networks such as the Internet over 802.11 WiFi and/or a cellular IP data connection.
- In addition, a new category of home electronic device called the smart speaker is emerging. Some smart speakers may even be capable of VoIP telephony. The smart speaker may be provisioned with its own telephone number, may be linked to the account of one or more other telephony devices (e.g., mobile phones) that have their own telephone number, or both.
- What is needed is a mechanism for accessing and leveraging the communication server's ability to intervene in the call flow and utilize IP data networks during a voice communication session.
-
FIG. 1 illustrates an example block diagram for a networked environment. -
FIG. 2 illustrates a block diagram of a communications server according to an embodiment of the invention. -
FIG. 3 illustrates a block diagram of an end user mobile telephony device according to an embodiment of the invention. -
FIG. 4 illustrates an example logic flow diagram according to an embodiment of the invention. -
FIG. 5 illustrates another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 6 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 7 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 8 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 9 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 10 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 11 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 12 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 13 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 14 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 15 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 16 illustrates another example block diagram for a networked environment. -
FIG. 17 illustrates a block diagram of smart speaker according to an embodiment of the invention. -
FIG. 18 illustrates still another example of a logic flow diagram according to an embodiment of the invention. -
FIG. 19 illustrates still another example of a logic flow diagram according to an embodiment of the invention. - The embodiments described herein disclose systems, methods, and computer program products for integrating a voice responsive telephony assistant into an existing telephony call. The embodiments may also describe systems, methods, and computer program products for integrating smart speakers into VolP telephony systems. The systems and methods of the invention may be embodied in and performed by network based communications server(s) and other related components (e.g., databases), and software instructions executed by some or all of such devices and components, as will be explained in detail below. The different types of networks contemplated herein include, for example, circuit switched networks, IP based cellular mobile networks, and IP data networks, such as the Internet or other IP-based networks, including wide area networks, local area networks, and combinations thereof that include both wireless (e.g., 802.11) and wireline (e.g., Ethernet) means of access.
- As used herein the term “telephony endpoint” is meant to generally indicate an end user physical device intended for, among other things, telephony calls to other telephony endpoints over one or more inter-connected telephony networks. Examples of telephony endpoints include a plain old telephone service (POTS) phones, VoIP telephones, mobile/cellular telephones, custom designed smart speakers, and software based soft-client applications executing on a computer device. Other examples may be understood to those of ordinary skill in the art.
- As used herein the term “mobile telephony device” is meant to generally indicate a specific type of telephony endpoint, namely a mobile or cellular telephone such as a smartphone that may be equipped with multiple RF transceivers including an 802.11 WiFi transceiver, a cellular banded transceiver, and (optionally) a Bluetooth transceiver. Other similar RF transceivers configured to use various frequency ranges may also be implemented on the mobile telephony device as they are developed. A mobile telephony endpoint may further be messaging enabled meaning it includes the ability to send and receive text (SMS) or multi-media (MMS) messages using its telephone number as an address point. In addition, many mobile telephony devices may also include other installed messaging applications, such as, for instance, Facebook, WhatsApp, Instagram, Snapchat, and the like.
- As used herein the term “smart speaker” is meant to generally indicate a specific type of telephony endpoint, namely an enhanced speaker device that may be equipped with multiple RF transceivers including an 802.11 WiFi transceiver, a cellular banded transceiver, and (optionally) a Bluetooth transceiver. Other similar RF transceivers configured to use various frequency ranges may also be implemented on the smart speaker as they are developed. A smart speaker endpoint may further be messaging enabled meaning it includes the ability to send and receive text (SMS) messages using its telephone number as an address point. Inbound text messages would first be converted to speech so as to be able to be played by the smart speaker. Out bound text messages are converted from speech to text before being delivered.
- As used herein the term “telephony call” is meant to generally indicate any intended two-way exchange of voice data between two or more telephony endpoint devices.
- As used herein, the term “communications server” is intended to mean an IP based computer that, among other capabilities, mediates and manages telephony calls and messages among telephony endpoints over one or more inter-connected telephony networks. In addition, the communications server may also include interactive voice response (IVR) technology that allows it to interact with users through the use of voice and/or DTMF tones input via a keypad. The IVR aspect may further include speech recognition functionality allowing the communications server to recognize keywords, commands, or instructions. Once recognized, any such commands or instructions may be carried out by the communications server or forwarded to another computer resource for execution.
- As used herein, the term “communication link” is intended to mean a physical and/or logical channel that connects two or more telephony endpoints with the IP based communications server. A communication link may be a signaling link, a media link, or both. In this context, a telephony call may be established via one or more communication links in which the IP based communications server is an endpoint for each of the communication links. The IP based communications server may then join one or more communication links together to establish a telephony call between or among two or more telephony endpoints. The IP based communications server may be hosted within an IP network accessible to the Internet.
- In some instances, the communications server itself may be considered a telephony endpoint in cases where an end user is communicating with an artificial intelligence (AI) bot hosted within the communications server over a communication link as described above. The AI bot may further be ‘present’ in a telephony call between two or more endpoints existing as a virtual assistant of sorts. For instance, the AI bot may be given a name and made responsive to such name when spoken by one of the end users. When the AI bot recognizes the invocation of its name, it may be programmed to listen for commands or instructions from one or more of the end users.
- References herein to a mobile telephony device or smart speaker capable of connecting to or communicating via a mobile radio access network (MRAN) refer to a mobile telephony device or smart speaker equipped with a cellular transceiver for wireless communication with basestations for purposes of accessing circuit switched voice services and/or mobile IP data services. Similarly, references herein to a mobile telephony device or smart speaker capable of connecting to or communicating via an IP data network refer to a mobile telephony device or smart speaker equipped with a transceiver for wireless communication (e.g., 802.11 WiFi) with a router or other IP data network access point.
- Certain embodiments herein describe techniques for the IP based communications server to intervene in a call flow to intelligently route or otherwise respond to an inbound call.
-
FIG. 1 illustrates an exemplarynetworked environment 100 for implementing certain exemplary embodiments described herein. Thenetworked environment 100 may include multiple distinct inter-connected networks such as, for instance, a large scale internet protocol (IP) network (e.g., the Internet) 102, one or more IP based local area networks or wide area networks (LANs/WANs) 130 including an 802.11wireless access point 135, and one or more MRANs 120 accessible via acellular basestation tower 122. - It should be noted that alternative wireless IP based networks (not shown) that do not operate over the frequency spectrum typically associated with 802.11 (e.g., WiFi) or cellular may be implemented. One example of such an alternate wireless IP network may be WiMAX (e.g., 802.16). Other examples may include, but are not limited to, networks utilizing television whitespace frequencies and other unlicensed (or yet to be licensed) frequencies, including, but not limited to, those under consideration for 5G implementations. These may include wireless networks operating within a frequency range of 100 MHz and 700 MHz, and wireless networks operating within a frequency range of 3.5 GHz and 3.7 GHz, and anything at or above 5 GHz including light-wave based transmission systems.
- The
MRANs 120 and theLANs 130 each have backhaul IP connectivity to theInternet 102 that provides connectivity with acommunications server 140. Thecommunications server 140 has many capabilities including: (i) an ability to manage and mediate telephony calls and messages between or among telephony endpoints, and (ii) an ability to manage and mediate IP data sessions between or among other IP enabled devices. - The MRAN 120 (sometimes referred to as a cellular network) may come in different varieties based on the circuit switched radio transmission protocol it supports. Two such circuit switched radio transmission schemes are the Global System for Mobile Communication (GSM) and Code Division Multiple Access (CDMA). These circuit switched radio transmission schemes are incompatible with one another necessitating an intervening interface to allow communication between
mobile telephony devices 110 on either network. In addition, each network may operate over multiple specific frequency ranges. Often, there may even be an intervening network such as the Public Switched Telephone Network (PSTN) (not shown) between two distinct MRANs. EachMRAN 120 may include an interface to the PSTN (not shown) such that telephony calls crossing that interface can be handled by the receiving network whether it is anMRAN 120 or the PSTN. - The
MRAN 120 may also providemobile telephony devices 110 with wireless IP based data access to theInternet 102 using one of the aforementioned cellular IP protocols. Moreover,MRANs 120 may utilize IP protocols like Voice-over LTE (VoLTE) to enable telephony calling over an IP protocol rather than a circuit switched protocol. Similarly, anIP access point 135 may provide wireless connectivity for amobile telephony device 110 to theInternet 102 viaaccess point 135 using any of the 802.11 WiFi standards and/or any other type of IP based connectivity standard. - In certain embodiments,
MRANs 120 include cellular networks or portions of cellular networks based on a variety of circuit switched and/or IP data protocols such as, but not limited to, Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), General Packet Radio Service (GPRS), Enhanced Data for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), High Speed Packet Data (HSPD), High Speed Downlink Packet Access (HSDPA), Long-Term Evolution (LTE), Voice-over Long-Term Evolution (VoLTE), Wideband Code Division Multiple Access (WCDMA), Universal Mobile Telecommunications System (UMTS), or High Rate Packet Data (HRPD)and/or any other existing or developed/developing cellular network IP standards. - In normal operation, a
mobile telephony device 110 may make and receive telephony calls. All calls are, at some point, routed through thecommunications server 140 residing in anIP network 102. Depending on location and current network conditions, themobile telephony device 110 may communicate with thecommunications server 140 over (i) a WiFi IP voice/data link IP access point 135, (ii) a cellular IP voice/data link basestation 122 coupled toMRAN 120, or (iii) a circuit switchedvoice link basestation 122 coupled toMRAN 120.Communications server 140 may also include adatabase 141 containing data on service subscribers it manages. - For telephony calls, the
communications server 140 may also establish asecondary communication link 142 with anothercommunication device 150 to establish the telephony call. Thesecondary communication link 142 is VoIP based with respect to thecommunications server 140 but may traverse other interconnected voice networks such as another MRAN, the PSTN, another VoIP network, or some combination thereof before terminating at theother communication device 150. -
FIG. 2 illustrates a block diagram of acommunications server 140 according to an embodiment of the invention. Thecommunications server 140 may include one ormore processors 205 coupled with adata storage component 210 comprised of amemory 215. Thedata storage component 210 may also includetelephony assistant logic 220 andcommand execution logic 225. AVoIP communication interface 230 manages and mediates telephony calls while anIP data interface 235 manages IP data sessions with external devices or programs. TheVoIP communication interface 230 operates in an IP mode. However, it is capable of communicating with non-IP telephony networks via other integrated or external network interfaces. - The
telephony assistant logic 220 may be comprised of computer code that when executed monitors incoming data over theVoIP communication interface 230 and theIP data interface 235 during an existing call with another party. Thetelephony assistant logic 220 monitors for a trigger event. A trigger event may take many forms including pattern matching to an acoustic signature or recognition of a keyword or phrase. For instance, a set of taps to the housing of themobile telephony device 110 may create a unique acoustic signature that may be detected and interpreted as a trigger event. One such unique acoustic signature may be the detection of three taps within a one second period in which the taps emit a sound within a particular frequency range. - The
command execution logic 225 may be comprised of computer code that when executed recognizes the trigger event and causes themobile telephony device 110 to enter a temporary command mode. Entering command mode initially places themobile telephony device 110 into mute mode with respect to the ongoing telephony call with the other party. This may be performed locally on thecommunications server 140 or via an instruction sent to themobile telephony device 110 from thecommunications server 140. Mute mode essentially blocks audio picked up from the mobile telephony device's microphone from being passed from thecommunications server 140 to theother communication device 150. Once mute mode is engaged, the mobile telephony device user may still speak into the device's microphone. The audio may still be digitized and sent to thecommunications server 140 over the telephony communication link for the existing telephony call. However, thecommunications server 140, being in command mode, treats the received audio differently. Thecommunications server 140 parses the audio through thecommand execution logic 225 using natural language processing to recognize and interpret commands or instructions that may be carried out, or caused to be carried out, by thecommunications server 140. -
FIG. 3 illustrates a block diagram of an end usermobile telephony device 110 according to an embodiment of the invention. Themobile telephony device 110 may include a variety of user interface(s) andsensors 305 such as a touchscreen display, a speaker, a microphone, a global positioning system (GPS) chip, an accelerometer, a light sensor, etc. Themobile telephony device 110 may also include one ormore processors 310 coupled with adata storage component 320 includingsensor detection logic 325,command execution logic 330, as well asother software applications 335. Themobile telephony device 110 also comprises a cellular transceiver and aWiFi transceiver 315 for wireless communications with one or more wireless networks via wireless network access points (as shown inFIG. 1 ). Themobile telephony device 110 may include other wireless transceivers (not shown) like Bluetooth. - The
sensor detection logic 325 may be comprised of computer code that when executed monitors incoming audio over the microphone for a trigger event. Just as above, a trigger event may take many forms including pattern matching to an acoustic signature or recognition of a keyword or phrase. Thecommand execution logic 330 may be comprised of computer code that when executed recognizes the trigger event and causes themobile telephony device 110 to enter a temporary command mode. Entering command mode initially places themobile telephony device 110 into mute mode with respect to the ongoing telephony call with the other party. This may be performed locally by themobile telephony device 110 itself. Mute mode essentially blocks audio picked up from the mobile telephony device's microphone from being passed to theother communication device 150. Once mute mode is engaged, the mobile telephony device user may still speak into the device's microphone. Thecommand execution logic 330 parses the audio using natural language processing to recognize and interpret commands or instructions that may be carried out, or caused to be carried out, by themobile telephony device 110. -
FIGS. 4-14 and 18-19 illustrate examples of logic flow diagrams according to an embodiment of the invention. The logic flows may be representative of some or all of the operations executed by one or more embodiments described herein. Further, the logic flows may performed by circuitry and one or more components discussed herein. Moreover, logic flows may be performed in conjunction with one or more other logic flows discussed herein and lists particular steps occurring in a particular order. However, embodiments are not limited in this manner and any step may occur in any order. Further, steps of the logic flows may not be dependent upon one another and as such particular steps in the logic flows may not occur. -
FIG. 4 illustrates an example logic flow diagram 400 according to an embodiment of the invention. Acommunications server 140 receives an inbound telephony call from an externaloriginating telephony endpoint 150 intended formobile telephony device 110 of a called party atblock 402. Thecommunications server 140 may check a caller ID field included with the inbound call atdecision block 404.Decision block 404 may reference a pair of databases to determine the identity of the caller. - There may be a blacklisted
database 405 and awhitelisted database 409. The blacklisteddatabase 405 may contain telephone numbers that have been flagged as undesirable to the user ofmobile telephony device 110 and therefore should not be permitted to ring themobile telephony device 110. The whitelisteddatabase 409 may contain telephone numbers that have been flagged as desirable to the user ofmobile telephony device 110 and therefore should be permitted to ring themobile telephony device 110. - If the caller ID field comes back blacklisted from the
blacklist database 405 lookup indecision block 404, then thecommunications server 140 may send the inbound call to a voicemail system or a spam folder atblock 406. This process may be described in greater detail inFIG. 10 . - If caller ID field comes back whitelisted from the
whitelist database 409 lookup indecision block 404, then thecommunications server 140 may check the current availability of the called party via a shared calendar application with themobile telephony device 110 atdecision block 410. If the called party is available according to calendar information, thencommunications server 140 may pass the inbound call and ring themobile telephony device 110. If the called party is not available according to calendar information, thencommunications server 140 may play a custom message to the caller. This process may be described in greater detail inFIG. 5 . - After a custom message is played, the
communications server 140 may prompt the caller for a reply atdecision block 416. There may be three (3) options, for example, including voicemail, a pop-up notification, or a text message. If the caller response to decision block 416 is voicemail, then control is sent to block 418 where a voicemail system takes over as further described inFIG. 6 . If the caller response to decision block 416 is pop-up notification, then control is sent to block 420 where a pop-up notification system takes over as further described inFIG. 7 . If the caller response to decision block 416 is text message, then control is sent to block 422 where an SMS text message system takes over as further described inFIG. 8 . - Returning to decision block 404, If the caller ID field is neither whitelisted nor blacklisted, the
communications server 140 may hold the inbound call before ringing the called party atblock 430. Thecommunications server 140 may then answer the inbound call and prompt the caller for more information (e.g., name, purpose of call) atblock 432. Thecommunications server 140 may then optionally subject the caller to a challenge type test to determine if the caller is a human or a machine. This challenge test process may be further described inFIG. 9 . Thecommunications server 140 may then convert whatever response the caller made as a result ofblock 432 into text atblock 434. Thecommunications server 140 may then package the converted text into a pop-up notification that is sent to and displayed on themobile telephony device 110 atblock 436. Thecommunications server 140 may then prompt the called party'smobile telephony device 110 for a response atdecision block 438. Examples of called party responses may include: send to voicemail (FIG. 10 ), answer the call (FIG. 11 ), reject call (FIG. 12 ), send voice message back (FIG. 13 ), or send text message back (FIG. 14 ). -
FIG. 5 illustrates another example of a logic flow diagram 500 according to an embodiment of the invention. This logic flow diagram 500 may describe what a custom message fromblock 414 would be. In this example, the custom message that is played to the whitelisted caller may say “Hey ‘caller’, ‘called party’ is ‘calendar status’ until ‘time’”, where the fields for ‘caller’, ‘called party’, ‘calendar status’, and ‘time’ may be populated by referencing one or more databases available to thecommunications server 140. For instance, the name of the caller may be pulled from the whitelisted database of contacts that match the caller ID for the incoming call. The called party is the person associated withmobile telephony device 110 being called. The name to use for the custom message, however, may be suited to fit the relationship between the caller and the called party. For instance, if the caller is the son of the called party, the name of the called party for the custom message may be set to ‘dad’. The calendar status of the called party may be pulled from a calendar application linked to the user of themobile telephony device 110. The calendar status may provide a reason why the called party is currently unavailable such as, for instance, in a meeting. The time field for the custom message may refer to the time at which the meeting expires. Putting all the information together may yield a custom message that reads as follows: “Hey Casey, dad is in a meeting until 3:15. Would you like to leave a voicemail, a pop-up, or a text message?” Upon a response (or a timeout) from the caller, control is returned toFIG. 4 . The foregoing example is merely illustrative. The exact content of the custom message may be altered without changing the scope of the invention. -
FIG. 6 illustrates still another example of a logic flow diagram 600 according to an embodiment of the invention. In this logic flow diagram 600, the caller has responded to decision block 426 ofFIG. 4 with a reply to the custom message of the called party indicating voicemail atblock 602. Thecommunications server 140 may then route the inbound call to the called party's voice mail system inblock 604 before returning control of the overall process back toFIG. 4 . -
FIG. 7 illustrates still another example of a logic flow diagram 700 according to an embodiment of the invention. In this logic flow diagram 700, the caller has responded to decision block 426 ofFIG. 4 with a reply to the custom message of the called party indicating pop-up notification atblock 702. Thecommunications server 140 may then prompt the caller to speak a short voice message inblock 704. Thecommunications server 140 may then convert the voice message to text inblock 706. Thecommunications server 140 may then cause the text corresponding to the voice message to be sent to and displayed on themobile telephony device 110 as a pop-up notification atblock 708 before returning control of the overall process back toFIG. 4 . -
FIG. 8 illustrates still another example of a logic flow diagram 800 according to an embodiment of the invention. In this logic flow diagram 800, the caller has responded to decision block 426 ofFIG. 4 with a reply to the custom message of the called party indicating text message notification atblock 802. Thecommunications server 140 may then prompt the caller to speak a short voice message inblock 804. Thecommunications server 140 may then convert the voice message to text inblock 806. Thecommunications server 140 may then cause the text corresponding to the voice message to be sent to themobile telephony device 110 as an SMS text message atblock 808 before returning control of the overall process back toFIG. 4 . -
FIG. 9 illustrates still another example of a logic flow diagram 900 according to an embodiment of the invention. In this logic flow diagram 900, the caller has responded to block 432 ofFIG. 4 with additional information that may be subjected to a challenge test to determine if the caller is a human or a machine (e.g., recording) atblock 902. The challenge test may be administered indecision block 904 and may involve choosing from any number of tasks that a human can understand and perform but a recording cannot. For example, a simple instruction to press any key could be performed by a human but not a recording. Upon detecting a key press, thecommunications server 140 may interpret the response as coming from a human caller and return control of the process to the point it was inFIG. 4 just prior to the challenge test. Conversely, if the caller fails the challenge test, control may be returned to s different point in the process ofFIG. 4 . In this case, the inbound call will be immediately routed to a voicemail system or a spam folder of the called party. -
FIG. 10 illustrates still another example of a logic flow diagram 1000 according to an embodiment of the invention. In this logic flow diagram 1000, the called party has responded to decision block 438 ofFIG. 4 with a selection of voicemail or a timeout due to no called party response atblock 1002. Thecommunications server 140 may then route the inbound call to the called party's voice mail system inblock 1004 before returning control of the overall process back toFIG. 4 . -
FIG. 11 illustrates still another example of a logic flow diagram 1100 according to an embodiment of the invention. In this logic flow diagram 1100, the called party has responded to decision block 438 ofFIG. 4 with a selection to answer the inbound call atblock 1102. Thecommunications server 140 may then pay a “connecting” response to the caller and/or resume the ringing function to indicate to the caller that the call is being placed atblock 1104. Thecommunications server 140 may then ring the called party atblock 1106 and upon connecting the call atblock 1108, return control of the overall process back toFIG. 4 . -
FIG. 12 illustrates still another example of a logic flow diagram 1200 according to an embodiment of the invention. In this logic flow diagram 1200, the called party has responded to decision block 438 ofFIG. 4 with a selection to reject the inbound call atblock 1202. Thecommunications server 140 may then query the called party whether to add the caller to the blacklist database atdecision block 1204. If the called party response is determined to be yes, thecommunications server 140 may then add the telephone number of the caller to the blacklist database inblock 1206 before terminating the call atblock 1208 and returning control of the overall process back toFIG. 4 . -
FIG. 13 illustrates still another example of a logic flow diagram 1300 according to an embodiment of the invention. In this logic flow diagram 1300, the called party has responded to decision block 438 ofFIG. 4 with a selection to send a voice message back to the caller atblock 1302. Thecommunications server 140 may then prompt the called party to record a short voice message atblock 1304. Thecommunications server 140 may then play the called party's voice message back to the caller atblock 1306 before returning control of the overall process back toFIG. 4 . -
FIG. 14 illustrates still another example of a logic flow diagram 1400 according to an embodiment of the invention. In this logic flow diagram 1400, the called party has responded to decision block 438 ofFIG. 4 with a selection to send a text message back to the caller atblock 1402. Thecommunications server 140 may then prompt the called party to record a short voice message atblock 1404. Thecommunications server 140 may then convert or transcribe the voice message to a text message atblock 1406. Thecommunications server 140 may then send the SMS text message back to the caller atblock 1408 before returning control of the overall process back toFIG. 4 . -
FIG. 15 illustrates still another example of a logic flow diagram 1500 according to an embodiment of the invention. In this logic flow diagram 1500, the called party has been prompted to respond to adecision block 438 ofFIG. 4 with a decision to add the caller to either the whitelist database or blacklist database atblock 1502. In response to the called party's response to add the caller to the whitelist database, thecommunications server 140 may then add caller's telephone number (TN) to whitelist database atblock 1504 before returning control of the overall process back toFIG. 4 . In response to the called party's response to add the caller to the blacklist database, thecommunications server 140 may then add caller's telephone number (TN) to blacklist database atblock 1508 before returning control of the overall process back toFIG. 4 . -
FIG. 16 illustrates an exemplarynetworked environment 1600 for implementing certain exemplary embodiments described herein. Thenetworked environment 1600 is similar to that ofFIG. 1 but may further include an associatedsmart speaker 180 that is also capable of VoIP communications and general IP data communications withcommunications server 140 viaradio tower 122 andMRAN 120 orIP access point 135 overIP access network 130. -
FIG. 17 illustrates a block diagram of asmart speaker device 180 according to an embodiment of the invention. Thesmart speaker device 180 may include a variety of user interface(s) andsensors 1705 such as one or more speakers, one or more microphones, a global positioning system (GPS) chip, etc. Thesmart speaker device 180 may also include one ormore processors 1710 coupled with adata storage component 1725 includingsensor detection logic 1730,command execution logic 1735, as well asother software applications 1740. Thesmart speaker device 180 may also comprise a cellular transceiver and aWiFi transceiver 1715 for wireless communications with one or more wireless networks via wireless network access points (as shown inFIG. 1 ). Thesmart speaker device 180 may further include other wireless transceivers (not shown) like Bluetooth. Also included may be at least oneSIM card slots 1720 adapted to receive and operate a SIM card from one or more mobile network service providers to provide access to one or more MRANs 120 as shown inFIG. 16 . -
FIG. 18 illustrates an example logic flow diagram 1800 according to an embodiment of the invention. In this logic flow diagram 1800, thecommunications server 140 receives an inbound call intended forsmart speaker 180. The smart speaker may be telephony enabled using Voice-over Internet Protocol (VoIP) telephony protocols to make and receive calls. The smart speaker may also be associated with its own telephone number and/or be associated with one or more telephony devices known to thecommunications server 140. Thecommunications server 140 may then check a caller ID field included with the inbound call atdecision block 1804.Decision block 1804 may reference a pair of databases to determine the identity of the caller. - There may be a blacklisted database 1805 and a
whitelisted database 1809. The blacklisted database 1805 may contain telephone numbers that have been flagged as undesirable to the user(s) ofsmart speaker 180 and therefore should not be permitted to ring thesmart speaker 180. The whitelisteddatabase 1809 may contain telephone numbers that have been flagged as desirable to the user ofsmart speaker 180 and therefore should be permitted to ring thesmart speaker 180. - If the caller ID field comes back blacklisted from the blacklist database 1805 lookup in
decision block 1804, then thecommunications server 140 may send the inbound call to a voicemail system or a spam folder at block 1806. This process may be described in greater detail inFIG. 10 . - If caller ID field comes back whitelisted from the
whitelist database 1809 lookup indecision block 1804, thecommunications server 140 may then send a signal to wake up thesmart speaker 180 and play an incoming call message atblock 1808. The incoming call message may be, for instance, something like, “Your son Shane is calling. What would you like to do?” Thecommunications server 140 may then prompt thesmart speaker 180 for a response atdecision block 1816. Examples of responses from a user to thesmart speaker 180 may include: send to voicemail (FIG. 10 ), answer the call (FIG. 11 ), reject call (FIG. 12 ), send voice message back (FIG. 13 ), or open a channel to listen in to the caller atblock 1826. - Returning to
decision block 1804, If the caller ID field is neither whitelisted nor blacklisted, thecommunications server 140 may hold the inbound call before ringing the called party atblock 1810. Thecommunications server 140 may then answer the inbound call and prompt the caller for more information (e.g., name, purpose of call) atblock 1812. Thecommunications server 140 may then send a signal to wake up thesmart speaker 180 and play whatever response the caller made as a result ofblock 1812 along with any caller ID information atblock 1814. Thecommunications server 140 may then send control over todecision block 1816 to prompt the called party for a response as described above. -
FIG. 19 illustrates another example of a logic flow diagram 1900 according to an embodiment of the invention. In this embodiment, a user'smobile device 110 may be used as a secondary interface to thesmart speaker 180 to place telephony calls. Because the smart speaker does not necessarily include a video display or touch screen capability, it can only be used directly via voice recognition and commands. However, a user may have multiple devices linked together in an account accessible to thecommunications server 140. In such cases, the communications server can accept input or commands from one device and apply the commands to another associated device. - In this logic flow diagram 1900, the user may wish to place an outbound telephony call from thee
smart speaker device 180 using themobile telephony device 110 as the interface to “dial”. Thecommunications server 140 may first determine if themobile telephony device 140 is in close proximity to thesmart speaker 180 atdecision block 1902. This may be determined in a variety of ways including a GPS geolocation comparison of both devices. Another method may be to have the communications server determine if both devices are currently connected to the sameIP access point 135. If themobile telephony device 110 and thesmart speaker 180 are not in proximity of one another, thecommunications server 140 may not permit themobile telephony device 110 to place a call on behalf of thesmart speaker 180. If themobile telephony device 110 and thesmart speaker 180 are in proximity of one another, thecommunications server 140 may permit themobile telephony device 110 to place a call on behalf of thesmart speaker 180. The user may then open the dialer or a contacts database on themobile telephony device 110 atblock 1904 and select a contact or dial a telephone number atblock 1906. The selected or dialed telephone number may then be sent to and received by thecommunications server 140 atblock 1908. Thecommunications server 140 may then establish a telephony communication link with thesmart speaker 180 atblock 1910. Thecommunications server 140 may then dial the selected contact or telephone number atblock 1912. Once the called party answers the telephony call, thecommunications server 140 may then connect the called party to thesmart speaker 180 atblock 1914 to create a telephony communication session. - Some examples may be described using the expression “in one example” or “an example” along with their derivatives. These terms mean that a particular feature, structure, or characteristic described in connection with the example is included in at least one example. The appearances of the phrase “in one example” in various places in the specification are not necessarily all referring to the same example.
- Some examples may be described using the expression “coupled”, “connected”, or “capable of being coupled” along with their derivatives. These terms are not necessarily intended as synonyms for each other. For example, descriptions using the terms “connected” and/or “coupled” may indicate that two or more elements are in direct physical or electrical contact with each other. The term “coupled,” however, may also mean that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other.
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/963,703 US10079926B1 (en) | 2016-11-04 | 2018-04-26 | Virtual telephony assistant |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662417608P | 2016-11-04 | 2016-11-04 | |
US15/802,699 US9986079B1 (en) | 2016-11-04 | 2017-11-03 | Virtual telephony assistant |
US15/963,703 US10079926B1 (en) | 2016-11-04 | 2018-04-26 | Virtual telephony assistant |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/802,699 Continuation US9986079B1 (en) | 2016-11-04 | 2017-11-03 | Virtual telephony assistant |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180248989A1 true US20180248989A1 (en) | 2018-08-30 |
US10079926B1 US10079926B1 (en) | 2018-09-18 |
Family
ID=62064996
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/802,699 Active US9986079B1 (en) | 2016-11-04 | 2017-11-03 | Virtual telephony assistant |
US15/963,703 Active US10079926B1 (en) | 2016-11-04 | 2018-04-26 | Virtual telephony assistant |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/802,699 Active US9986079B1 (en) | 2016-11-04 | 2017-11-03 | Virtual telephony assistant |
Country Status (1)
Country | Link |
---|---|
US (2) | US9986079B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11283913B1 (en) * | 2018-12-10 | 2022-03-22 | Amazon Technologies, Inc. | Voice-enabled communication configurations |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11102355B2 (en) * | 2018-03-22 | 2021-08-24 | CallFire, Inc. | Dynamic communication management system |
CN109067904B (en) * | 2018-08-31 | 2021-08-03 | 司振国 | Driving behavior standardization method based on white list management |
KR102607052B1 (en) | 2018-12-19 | 2023-11-29 | 삼성전자주식회사 | Electronic apparatus, controlling method of electronic apparatus and computer readadble medium |
CN109451187A (en) * | 2019-01-08 | 2019-03-08 | 北京筑梦园科技有限公司 | One kind moving vehicle method of servicing, system and server |
US11102344B1 (en) * | 2019-01-30 | 2021-08-24 | United States Automobile Association (USAA) | Systems and methods for detecting fraudulent calls using virtual assistants |
US10848619B2 (en) | 2019-03-07 | 2020-11-24 | At&T Intellectual Property I, L.P. | Communications network security for handling proxy voice calls |
US10805458B1 (en) * | 2019-09-24 | 2020-10-13 | Joseph D. Grabowski | Method and system for automatically blocking recorded robocalls |
US11483428B2 (en) | 2019-09-24 | 2022-10-25 | Joseph D. Grabowski | Method and system for automatically detecting and blocking robocalls |
US11153435B2 (en) | 2019-09-24 | 2021-10-19 | Joseph D. Grabowski | Method and system for automatically blocking robocalls |
CN114827073A (en) * | 2021-01-29 | 2022-07-29 | Zoom视频通讯公司 | Voicemail spam detection |
CN114979992B (en) * | 2021-09-17 | 2023-07-21 | 中移互联网有限公司 | Call state determining method and device |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7822188B1 (en) * | 1999-04-01 | 2010-10-26 | Callwave, Inc. | Methods and apparatus for providing expanded telecommunications service |
US20010036252A1 (en) * | 2000-03-08 | 2001-11-01 | Peter Renner | Call announcement service |
US7010113B2 (en) * | 2001-12-27 | 2006-03-07 | Sbc Properties, L.P. | Method and system for providing enhanced caller identification information including total call control for all received calls |
US6996211B2 (en) * | 2002-12-23 | 2006-02-07 | Sbc Properties, L.P. | Voice over IP method of determining caller identification |
US7644166B2 (en) * | 2003-03-03 | 2010-01-05 | Aol Llc | Source audio identifiers for digital communications |
US7295660B1 (en) * | 2003-10-23 | 2007-11-13 | Aol Llc | Telemarketer screening |
US8494504B2 (en) * | 2004-12-06 | 2013-07-23 | Callwave Communications, Llc | Methods and systems for telephony processing, including location based call transfers |
US20070071200A1 (en) * | 2005-07-05 | 2007-03-29 | Sander Brouwer | Communication protection system |
US20070127652A1 (en) * | 2005-12-01 | 2007-06-07 | Divine Abha S | Method and system for processing calls |
US8270588B2 (en) * | 2006-10-04 | 2012-09-18 | Ronald Schwartz | Method and system for incoming call management |
CA2597377C (en) * | 2007-08-15 | 2010-11-16 | Primus Telecommunications Canada Inc. | Call screening system and method |
US20090103701A1 (en) * | 2007-10-17 | 2009-04-23 | Avaya Technology Llc | Call Screening Via Observing Called-Party Behavior |
US9167088B2 (en) * | 2008-03-20 | 2015-10-20 | Steve Cha | Method and apparatus for selective silencing of telephone ringing |
GB2463105A (en) | 2008-09-05 | 2010-03-10 | Skype Ltd | Viewer activity dependent video telephone call ringing |
US8199887B2 (en) * | 2008-09-22 | 2012-06-12 | International Business Machines Corporation | Phone call management |
US8625750B2 (en) * | 2010-12-23 | 2014-01-07 | Cox Communications, Inc. | Call screening for voicemail |
US9226159B1 (en) * | 2012-03-12 | 2015-12-29 | Trend Micro Inc. | Telephone call challenge to block spam |
US9332119B1 (en) * | 2013-03-07 | 2016-05-03 | Serdar Artun Danis | Systems and methods for call destination authenticaiton and call forwarding detection |
US9386148B2 (en) * | 2013-09-23 | 2016-07-05 | Ooma, Inc. | Identifying and filtering incoming telephone calls to enhance privacy |
US9560198B2 (en) * | 2013-09-23 | 2017-01-31 | Ooma, Inc. | Identifying and filtering incoming telephone calls to enhance privacy |
US9232056B2 (en) * | 2014-04-02 | 2016-01-05 | Xiang Liu | Apparatus for blocking unwanted telephone calls and faxes |
WO2015194148A1 (en) * | 2014-06-17 | 2015-12-23 | 日本電気株式会社 | Caller identification apparatus, caller identification method, and recording medium on which caller identification program has been stored |
-
2017
- 2017-11-03 US US15/802,699 patent/US9986079B1/en active Active
-
2018
- 2018-04-26 US US15/963,703 patent/US10079926B1/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11283913B1 (en) * | 2018-12-10 | 2022-03-22 | Amazon Technologies, Inc. | Voice-enabled communication configurations |
US11856125B1 (en) | 2018-12-10 | 2023-12-26 | Amazon Technologies, Inc. | Voice-enabled communication configurations |
Also Published As
Publication number | Publication date |
---|---|
US9986079B1 (en) | 2018-05-29 |
US10079926B1 (en) | 2018-09-18 |
US20180131799A1 (en) | 2018-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9967381B1 (en) | Virtual telephony assistant | |
US10079926B1 (en) | Virtual telephony assistant | |
US9313328B2 (en) | Active call processing and notifications | |
CN105657138B (en) | Call processing method and communication terminal | |
US8285839B2 (en) | Urgent communications that overcome receiving device impediments | |
CN102917105B (en) | Call information processing method and terminal equipment | |
US10154145B1 (en) | Virtual telephony assistant | |
EP3542522B1 (en) | Incoming call management method and apparatus | |
US8548509B2 (en) | System and method of automatically generating and sending text messages | |
US20210084082A1 (en) | Extending communication services to a consumption device using a proxy device | |
KR20090132613A (en) | Pre-programmed subscriber response | |
US9570075B1 (en) | Techniques for integrating voice control into an active telephony call | |
US20080189108A1 (en) | Text messaging in a telephony network | |
MX2011001919A (en) | Method and system for scheduling phone call using sms. | |
CN104065824B (en) | Call block prompting processing method, system and mobile terminal based on mobile terminal | |
US9113336B2 (en) | Software application for intercepting phone call and text messages from specific contacts | |
US20160157206A1 (en) | Information notification method and instant notification device | |
EP3469779B1 (en) | Rcs origination forking | |
US8750848B2 (en) | System and method for limiting communications | |
US7567803B2 (en) | System and method for inhibiting features for wireless terminals | |
WO2020081614A1 (en) | Systems and method for control of telephone calls over cellular networks | |
US20080273673A1 (en) | Handling of telephone calls | |
EP3485628A1 (en) | Rcs origination forking | |
JP2013042455A (en) | Caller number notification program, gateway server, caller number notification system and notification method of caller number | |
CN107749874B (en) | Message processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: REPUBLIC WIRELESS, INC, NORTH CAROLINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KASHIMBA, JARED;RATHNAM, SAI;STIMPSON, JESSE;AND OTHERS;SIGNING DATES FROM 20171106 TO 20171107;REEL/FRAME:045650/0410 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: RELAY, INC., NORTH CAROLINA Free format text: CHANGE OF NAME;ASSIGNOR:REPUBLIC WIRELESS, INC.;REEL/FRAME:056753/0703 Effective date: 20210511 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |