Patent classifications
H04M1/57
SYSTEM AND METHOD FOR USING PUBLIC REGISTRY TO ENHANCE CALLER INFORMATION AND DETERMINE CALL HANDLING FOR CALLED PARTIES
Systems and methods are provided for using a registry to assure parties receiving a communication, such as an incoming phone call, that the party sending the communication, such as the caller is, who it appears to be. In some embodiments the registry is a publicly accessible database which stores communication identifiers such as telephone numbers for parties in association with other data including data provided by the parties or others. The other data may include the name of the party associated with the identifier, a cryptographic public key used by the party as part of a public/private key pair, data representing the intent of the party in sending a communication, and parameters set by parties to be satisfied to receive communications or in determining how such communications should be handled. The system may provide the data representing the party's specific intention in that call or other communication to the party receiving the communication.
SYSTEM AND METHOD FOR USING PUBLIC REGISTRY TO ENHANCE CALLER INFORMATION AND DETERMINE CALL HANDLING FOR CALLED PARTIES
Systems and methods are provided for using a registry to assure parties receiving a communication, such as an incoming phone call, that the party sending the communication, such as the caller is, who it appears to be. In some embodiments the registry is a publicly accessible database which stores communication identifiers such as telephone numbers for parties in association with other data including data provided by the parties or others. The other data may include the name of the party associated with the identifier, a cryptographic public key used by the party as part of a public/private key pair, data representing the intent of the party in sending a communication, and parameters set by parties to be satisfied to receive communications or in determining how such communications should be handled. The system may provide the data representing the party's specific intention in that call or other communication to the party receiving the communication.
ENTERPRISE TELEPHONY INTERCONNECT SERVICE
In various embodiments, a mobile device connected to a cellular network performs a credential exchange with a telephone not connected to an Internet Protocol (IP) network. The mobile device relays, via the cellular network, registration information between the telephone and a telephony interconnect service, based in part on the credential exchange. The mobile device receives an indication of a telephone call associated with a user of the mobile device. The mobile device proxies, via the cellular network, the telephone call between the telephony interconnect service and the telephone.
Blocking unsolicited calls from CallerID-spoofing autodialing devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
Blocking unsolicited calls from CallerID-spoofing autodialing devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
Generating a screening interface for communications
Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.
METHOD AND SYSTEM FOR PROVIDING CALLER INFORMATION
Methods and systems of providing caller information are provided. Exemplary systems and methods provide location information for audio files including the caller information. The location information can be used to retrieve the audio information, which can be played on a call recipient's device, and/or a translation of the audio information, which can be displayed on the call recipient's device.
Mobile terminal and incoming screen display method thereof
Disclosed are a mobile terminal, and an incoming screen display method thereof. The mobile terminal comprises: a communication unit configured to perform a communication with a transmitting terminal and/or a community server; and a controller configured to download a sender's content by requesting search for the sender's content from the community server when a call request is received from the transmitting terminal, and configured to display the downloaded content.
Mobile terminal and controlling method thereof
A mobile terminal and controlling method thereof are disclosed, by which image data of a counterpart having triggered an event can be displayed. The present invention may include a display unit configured to display information, a wireless communication unit configured to communicate with an external server that stores first image data and to communicate with a counterpart terminal, a memory to store a second image data, and a controller, in response to an event triggered by the counterpart terminal, to extract an image data related to a counterpart from one of the first image data and the second image data, and the controller to output the extracted image data on a portion of the display unit to notify an occurrence of the event.
Adding additional information to caller ID information
A device may receive a first query from a terminating device. The first query may be based on the terminating device having received, from a calling party device, a request to establish a connection with a called party device. The first query may be based on information associated with the calling party device. The device may send, to a caller information device, a second query based on the first query. The device may receive, from the caller information device, caller information based on the second query. The device may compare the caller information to a criterion. The device may modify the caller information, to create modified caller information, when the caller information satisfies the criterion. The device may send the modified caller information to the terminating device for forwarding to another device to support determining how to handle, for the called party device, the request to establish the connection.