H04M1/575

Generating a screening interface for communications

Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.

Mobile terminal and incoming screen display method thereof
09723141 · 2017-08-01 · ·

Disclosed are a mobile terminal, and an incoming screen display method thereof. The mobile terminal comprises: a communication unit configured to perform a communication with a transmitting terminal and/or a community server; and a controller configured to download a sender's content by requesting search for the sender's content from the community server when a call request is received from the transmitting terminal, and configured to display the downloaded content.

METHOD OF DISPLAYING AN EVENT IN A MOBILE TERMINAL AND MOBILE TERMINAL IMPLEMENTING THE SAME
20170272920 · 2017-09-21 ·

A method of, and a mobile terminal configured for, efficiently displaying an event indication in the form of a pop-up box during idle mode of a mobile terminal is provided. Upon occurrence of a second event in idle mode, it is determined whether an event pop-up box indicating an occurrence of a first event of the same type as the second event exists. When the event pop-up box indicating the occurrence of the first event exists, the event pop-up box is updated with information indicating the occurrence of the second event and displayed on a display.

Dialer with real-time reverse look-up including social data
11399093 · 2022-07-26 · ·

Methods and systems that include, by a client computing device of a first user of a social-networking system, receiving from the first user an identifier associated with an intended recipient to which outgoing communication is to be initiated, wherein the identifier is received via a user interface of an application, identifying, based on the intended recipient, social information relevant to the first user, and displaying, in the user interface, the social information that is relevant to the first user. The identifier may include a phone number or an email address of the intended recipient. The social information may include a name of the intended recipient, and/or a social-network profile of the intended recipient. The intended recipient may be a second user of the social-networking system, and the social information may be identified based on how many degrees of separation there are between the first user and the second user.

USER INTERFACES FOR PRESENTING INDICATIONS OF INCOMING CALLS

In some embodiments, an electronic device displays an incoming call user interface in response to receiving an indication of an incoming call. In some embodiments, the incoming call user interface is displayed overlaid on a respective user interface that is optionally associated with an application other than the application associated with the incoming call.

Method and apparatus for processing contact information using a wireless terminal
11363129 · 2022-06-14 · ·

A method for processing contact information includes displaying a list of contacts on a display of a wireless terminal, determining a first contact from the list of contacts in response to a selection of a user, obtaining a web log address and an online shop address of the first contact, obtaining, from a network service, a first content corresponding to the web log address and the online shop address of the first contact, and displaying the first content on a first area of the display, where the first content is dynamically updated.

Identifying, screening, and blocking of calls from problematic telecommunications carriers and number blocks
11363139 · 2022-06-14 · ·

A method and systems for identifying communicators as wanted or unwanted based on communications from such communicators, the method comprising determining communications from phone numbers as being unwanted by analyzing communication content features of communications associated with unwanted communicators, identifying telecommunications carriers that acquired the phone numbers, computing scores for the telecommunications carriers based on an amount of the determined unwanted communications from the phone numbers are unwanted, intercepting an inbound communication from a given phone number, identifying the given phone number is associated with a given one of the telecommunications carriers, and configuring handling of communications from the phone number based on a score of the given telecommunications carrier.

Protecting user data during audio interactions

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

AUTHENTICATED CALLING VOICEMAIL INTEGRATION

Various arrangements for providing authenticated caller information for voicemail are presented herein. A terminating telephony service provider system can receive a request to connect a telephone call, the request comprising a session initiation protocol (SIP) identity header. The terminating telephony service provider system can perform a verification based on the SIP identity header. A voicemail may be created based on audio received from the calling party via the telephone call. SIP header information can be stored and mapped to the voicemail. The terminating telephony service provider system can then output, to a called party user equipment (UE), an indication of the voicemail with an indication of the verification based on the SIP identity header.

System, method, and apparatus for virtualizing digital assistants
11337061 · 2022-05-17 · ·

A system and method for providing anonymous communications from a user to a called party includes obtaining a dedicated phone number and creating a user account for the user and assigning the dedicated phone number to the user account. A provider account is created for a digital assistant using the dedicated phone number and the digital assistant is preprogrammed with the user account. The digital assistant is also preprogrammed with a skill for recognizing a specific utterance (e.g. “Call”). Connectivity is provided between the digital assistant and the Internet, for example, using a wireless access point. The digital assistant listens for the specific utterance and, upon recognizing the specific utterance followed by an identification of the called party, the digital assistant initiates a voice call through the Internet to the called party.