H04M1/56

IN-VEHICLE HANDSFREE APPARATUS AND DATA TRANSFER METHOD
20210126998 · 2021-04-29 ·

An in-vehicle navigation apparatus with a handsfree function establishes a Bluetooth communication link with a cellular phone. When receiving from the cellular phone outgoing call history data and incoming call history data, which were stored in the cellular phone before establishing the Bluetooth communication link, the in-vehicle navigation apparatus stores, in a work memory, the received outgoing call history data and the received incoming call history data, equally to, of the navigation apparatus itself, outgoing call history data and incoming call history data. An outgoing call operation then becomes possible using outgoing call history data and incoming call history data, which are stored in the work memory.

Robocall detection

Calls initiated from disconnected phone numbers and calls initiated from phone numbers that initiate calls to disconnected numbers can be indicative of robocalls. Disconnected numbers and phone numbers that have initiated calls to disconnected numbers are identified and assigned a robocall score that indicates a likelihood that a call initiated from that number is a robocall. A communication network that subscribes to a robocall detection service can request a robocall score associated with an originating number associated with a received call, and then handle the call according to the robocall score.

DIALING METHOD AND MOBILE TERMINAL
20210099566 · 2021-04-01 · ·

A dialing method and a mobile terminal are provided. The dialing method includes: receiving a first input by a user; displaying a preset dialing control area in response to the first input, and displaying a pre-copied first phone number in a phone number input area of the dialing control area; receiving a second input by the user on the dialing control area; and dialing the first phone number in response to the second input.

System and method for identifying and handling unwanted callers using a call answering system
10992803 · 2021-04-27 · ·

A method and system for identifying an unwanted caller using a call answering system. The method comprises receiving, by a call records server, information about callers from a plurality of telephony devices and one or more phone number data sources, classifying, by the call records server, one or more of the callers as either wanted or unwanted callers based on the received information, and storing, by the call records server, the received information and the classification of the one or more of the callers into a directory. The method further comprises identifying, by a call answering server, that a call from a given caller from a phone number to a receiving telephony device is from an unwanted caller by searching the directory, and handling, by the call answering server, the call from the given caller according to one or more preferences of the user, the one or more preferences including rejecting the call from the receiving telephony device, playing a recorded message, and disposing of the call.

Voice communication method

An electronic device is disclosed. The electronic device includes one or more processors and memory storing one or more programs configured to be executed by the one or more processors. The one or more programs include instructions for receiving, from an external device associated with a contact, a request to establish a full-duplex live audio communication session between the electronic device and the external device; determining whether the contact is on a list; and in response to a determination that the contact is on the list, establishing the full-duplex live audio communication session between the electronic device and the external device, where the live audio communication session is established without receiving a user input that acknowledges the request.

Voice communication method

An electronic device is disclosed. The electronic device includes one or more processors and memory storing one or more programs configured to be executed by the one or more processors. The one or more programs include instructions for receiving, from an external device associated with a contact, a request to establish a full-duplex live audio communication session between the electronic device and the external device; determining whether the contact is on a list; and in response to a determination that the contact is on the list, establishing the full-duplex live audio communication session between the electronic device and the external device, where the live audio communication session is established without receiving a user input that acknowledges the request.

Caller identification trust
10992799 · 2021-04-27 · ·

Disclosed are example methods, systems, and devices for allowing caller computing devices to authenticate calls via a service provider computing system. Users may opt to have entities register to contact the user with a positive ID, icon, or other notification on the user's computing device transmitted by the service provider computing system. A caller computing device may use a unique security token of the user to activate the notification on the user's device. The user device may be used to exert control over the security token via a service provider client application running on the user device. The caller computing device may initiate authentication via an API call to the service provider computing system. The caller computing device is able to have items (text, images, documents, etc.) delivered to the user computing device if authenticated.

Signature based communication authentication

One embodiment provides a method, including: detecting, using an application of an information handling device, an incoming call from another device, the incoming call being associated with an identifying message signed with a user-specific signature; determining, using a processor, whether the user-specific signature is associated with a valid signature; and accepting, responsive to determining that the user-specific signature is associated with a valid signature, the call. Other aspects are described and claimed.

Independent notification system for authentication

When a customer service representative (CSR) calls a customer, the customer may be able to authenticate himself or herself by providing the CSR with personal identifying information. However, the CSR may be unable to provide information to authenticate himself or herself to the customer. Thus, this patent document describes authentication techniques that can allow the CSR to authenticate himself or herself to the customer. For example, before or during a call that the second person (e.g., CSR) initiates to call a first person (e.g., customer), a notification message may be sent to the first person's user device. The content of notification message displayed on the user device may provide information to the first person which can allow the first person to determine whether the second person is trustworthy.

Methods and systems for authenticating a user on a call

Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.