Patent classifications
H04M1/57
A METHOD AND APPARATUS FOR MANAGING A PREFERENCE SETTING FOR TRUST LEVEL INFORMATION OF CALLER IDENTITY IN A WIRELESS ACCESSS SYSTEM
The present invention relates to a wireless access system, and more particularly, to methods and apparatus for managing a preference setting for trust level information of caller identity. One of embodiments of the present application comprises steps of transmitting preference setting information of a user of the ME to the network, the preference setting information indicating whether or not the trust level information for an incoming call from a caller is to be delivered; and receiving a call message including the caller identifier of the caller, the call message being configured based on the preference information, wherein the call message further includes the trust level information when the preference setting information indicates the trust level information is to be delivered, or the call message dose not includes the trust level information when the preference setting information indicates the trust level information is not to be delivered.
PORTABLE TERMINAL DEVICE, INCOMING CALL SCREEN DISPLAY METHOD, AND PROGRAM
Incoming call signal reception means receives an incoming call signal including a caller number, caller information, and ring type information. Image generation means generates, based on the incoming call signal, a caller information image including at least a portion of the caller information as character information. Telephone dictionary registering means registers the caller number, caller text information, and the caller information image in a telephone dictionary. Incoming call screen display means receives the caller number and acquires the registered caller text information and the caller information image corresponding to the received caller number from the telephone dictionary. Incoming call screen display means displays an incoming call screen including the caller text information and the caller information image.
Handheld electronic device having improved phone call log, and associated method
An improved handheld electronic device and an associated method provide an improved call log that presents information relating to logged phone calls in a collapsed manner, meaning that for each phone number having a call stored in the memory of the device, only the most recent in time call is listed on the call log. An improved handheld electronic device and an associated method also provide a call history for any phone call from the improved call log that is selected by the user. The call history includes a listing of all of the calls stored by the device that are associated with the selected call log call.
System and method to silence other devices in response to an incoming audible communication
A user's set top box detects the ringing of a telephone, mobile device or other type of audible notification of an incoming contact and, in response, sends a command causing a current audio level of the television programming or other media currently being played to decrease such that the audible notification can be heard by the user. A device silencing manager on the set top box may detect the audible notification occurring by the sound waves of the audible notification from the mobile device picked up by a microphone of the receiving device. Additionally or alternatively, a device silencing manager on the set top box may wirelessly receive, either directly or indirectly from the mobile device, an electronic notification of the audible notification.
Information provided to parent regarding a called for child protection
The present disclosure describes a system, method, and computer readable medium for providing information of a calling party to an alert party, wherein the calling party is in communication with the receiving party in a communications network. The method includes receiving a message from a calling party to a receiving party and performing a lookup of information relating to the calling party in a database, wherein the lookup is based on an identifier associated with the message, Thereafter, an alert is sent to the alert party if the calling party information is unavailable in a contact list of the receiving party.
Portable electronic device and method of controlling notifications
A method of controlling a portable electronic device includes, in response to receipt of selection of an option to enter a do not disturb mode at the portable electronic device, suppressing notifications for the communications received at the portable electronic device while in the do not disturb mode. The method also includes, in response to exiting the do not disturb mode, discontinuing suppressing notifications for new communications received at the portable electronic device, providing an option to view the communications received at the portable electronic device while in the do not disturb mode and, in response to receipt of selection of the option to view the communications received while in the do not disturb mode, displaying a consolidated list of the communications received at the portable electronic device while in the do not disturb mode. The consolidated list includes a plurality of electronic communication types.
Portable electronic device and method of controlling notifications
A method of controlling a portable electronic device includes, in response to receipt of selection of an option to enter a do not disturb mode at the portable electronic device, suppressing notifications for the communications received at the portable electronic device while in the do not disturb mode. The method also includes, in response to exiting the do not disturb mode, discontinuing suppressing notifications for new communications received at the portable electronic device, providing an option to view the communications received at the portable electronic device while in the do not disturb mode and, in response to receipt of selection of the option to view the communications received while in the do not disturb mode, displaying a consolidated list of the communications received at the portable electronic device while in the do not disturb mode. The consolidated list includes a plurality of electronic communication types.
Managing display of private information
In one example, a method includes receiving a first indication of an incoming communication and determining that the incoming communication includes private information. The method may also include outputting, for display at a wearable computing device, a second indication of the incoming communication, wherein the indication includes non-private information. The method may also include determining, based on motion data generated by the wearable computing device, that a user of the wearable computing device is likely viewing the wearable computing device. The method may also include outputting, for display at the wearable computing device, an indication of the private information.
Managing display of private information
In one example, a method includes receiving a first indication of an incoming communication and determining that the incoming communication includes private information. The method may also include outputting, for display at a wearable computing device, a second indication of the incoming communication, wherein the indication includes non-private information. The method may also include determining, based on motion data generated by the wearable computing device, that a user of the wearable computing device is likely viewing the wearable computing device. The method may also include outputting, for display at the wearable computing device, an indication of the private information.
Automated verification of a telephone number
A system and method for automatically verifying a telephone number proffered by a user of an application. During registration or installation of the application, client software is installed on the user's mobile device (e.g., a smart phone, a tablet computer). One of a pool of telephone numbers for outgoing calls is selected, and a call is initiated to the proffered number by the system. The software executing on the user's device detects the incoming call, extracts caller identification data (i.e., the originating telephone number), formats a data communication (e.g., an http request) to include the data, and sends it to the system. The system receives the data communication and compares the data with the originating number. If they match, the user's telephone number is verified. The outgoing call from the system may be canceled before it rings at the device if the data communication is received in time.