Emergency call back for remote workers
First Claim
1. A system comprising:
- a microprocessor; and
a computer readable medium, coupled with the microprocessor and comprising microprocessor readable and executable instructions that cause the microprocessor to execute;
a communication manager that receives a fingerprint in a first Transmission Communication Protocol (TCP) SYN message, wherein the fingerprint is based on a hardware identifier of a first communication endpoint and wherein the hardware identifier of the first communication endpoint is based on at least one of a Media Access Control (MAC) address, a circuit board identifier, a boot up identifier, a hardware serial number, and a Virtual Local Area Network Identifier (VLAN ID);
receives a request for an emergency call from the first communication endpoint, wherein the first communication endpoint is on a first network, and wherein the request for the emergency call comprises the fingerprint;
establishes the emergency call with a second communication endpoint, wherein the second communication endpoint is on a second network;
receives a request for an emergency call back from the second communication endpoint, wherein the request for the emergency call back comprises the fingerprint and wherein the request for the emergency call back is based on a disconnection of the first communication endpoint from the established emergency call; and
routes the request for the emergency call back received from the second communication endpoint on the second network to the first communication endpoint on the first network based on the fingerprint received in the request for the emergency call back.
17 Assignments
0 Petitions
Accused Products
Abstract
A fingerprint is received from a communication endpoint. The fingerprint is based on a hardware identifier of the communication endpoint. For example the fingerprint may be based on a Media Access Control (MAC) address of the communication endpoint. A request for an emergency call from the communication endpoint is received that also includes the fingerprint. For instance, a user may initiate a 911 call from the communication endpoint. The emergency call is established. After the emergency call is disconnected, a request for an emergency call back is received. For example, if the emergency call prematurely disconnected, the emergency call back is initiated. The request for the emergency call back is routed to the communication endpoint based on the fingerprint to ensure that the emergency call is properly completed.
-
Citations
20 Claims
-
1. A system comprising:
-
a microprocessor; and a computer readable medium, coupled with the microprocessor and comprising microprocessor readable and executable instructions that cause the microprocessor to execute; a communication manager that receives a fingerprint in a first Transmission Communication Protocol (TCP) SYN message, wherein the fingerprint is based on a hardware identifier of a first communication endpoint and wherein the hardware identifier of the first communication endpoint is based on at least one of a Media Access Control (MAC) address, a circuit board identifier, a boot up identifier, a hardware serial number, and a Virtual Local Area Network Identifier (VLAN ID);
receives a request for an emergency call from the first communication endpoint, wherein the first communication endpoint is on a first network, and wherein the request for the emergency call comprises the fingerprint;
establishes the emergency call with a second communication endpoint, wherein the second communication endpoint is on a second network;
receives a request for an emergency call back from the second communication endpoint, wherein the request for the emergency call back comprises the fingerprint and wherein the request for the emergency call back is based on a disconnection of the first communication endpoint from the established emergency call; and
routes the request for the emergency call back received from the second communication endpoint on the second network to the first communication endpoint on the first network based on the fingerprint received in the request for the emergency call back. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving, by a processor, in a first Transmission Communication Protocol (TCP) SYN message, a fingerprint, wherein the fingerprint is based on a hardware identifier of a first communication endpoint and wherein the hardware identifier of the first communication endpoint is based on at least one of a Media Access Control (MAC) address, a circuit board identifier, a boot up identifier, a hardware serial number, and a Virtual Local Area Network Identifier (VLAN ID); receiving, by the processor, a request for an emergency call from the first communication endpoint, wherein the first communication endpoint is on a first network and wherein the request for the emergency call comprises the fingerprint; establishing, by the processor, the emergency call with a second communication endpoint, wherein the second communication endpoint is on a second network; receiving, by the processor, a request for an emergency call back from the second communication endpoint, wherein the request for the emergency call back comprises the fingerprint and wherein the request for the emergency call back is based on a disconnection of the first communication endpoint from the established emergency call; and routing, by the processor, the request for the emergency call back received from the second communication endpoint on the second network to the first communication endpoint on the first network based on the fingerprint received in the request for the emergency call back. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification