Patent classifications
H04M3/42136
Custom mobile telecommunication device configuration management
A method of managing a custom configuration manifest, comprising: collecting by an application configuration selections about a user equipment (UE) that are dynamically configured to create the custom configuration manifest; processing by a server the configuration selections and dynamically configuring the configuration selections to create the manifest; transmitting by the server the manifest to both the UE and a database with a plurality of custom configuration manifests; receiving by a custom configuration manifest handling application authorization through one or more authorization options, but not authentication credentials, to allow the manifest handling application to install preferred applications on the UE; installing by the manifest handling application the preferred applications on the UE without providing the authentication credentials; and customizing by the manifest handling application the UE based on the manifest.
Devices, systems and methods for controlling permitted settings on a vehicle
Devices, systems, and methods are disclosed for altering permitted settings of a vehicle according to a driver identified through short range wireless communication. The vehicle captures a unique identifier from a wireless communication device of the driver of the vehicle. This unique identifier is used to reference a database to determine the identity of the driver as well as settings for the driver created by a controlling authority. The controlling authority may be, for instance, a parent or employer of the driver. The settings may limit certain devices within the vehicle and/or the vehicle itself. Speed control settings, radio settings, wireless communication device settings, and various other settings are all possible to limit distractions to the driver. Further, the settings may be influenced by the number or identities of passengers within the vehicle.
Location-Based Security Rules
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user's access request.
Provision of alert messages to customers of an establishment
Customer management for an establishment involves operating a server that hosts system software and interacts with various computing devices over internet and wireless network gateway connections. The server communicates with devices at the establishment and customer computing devices in real-time, providing system performance updates, text messaging communications to the customer regarding table availability and marketing information and synchronizing the information communicated within the system. A computer user interface at the establishment communicates with the server and allows an establishment host to capture and transmit customer information to the server and make of the server processing requests that can include sending text message alert notifications to a customer mobile device informing of an available table and providing marketing messages. A secondary device, operated by a waiter of the establishment, communicates with the computing devices of the system and can receive communications, such as customer attention requests, from the customer mobile device.
System and method for handling undesired communication at a mobile device
An approach for handling undesired communication at a mobile device is disclosed. A call scoring platform detects a request for delivery of a communication from an originator to a recipient. The call scoring platform then collects data feeds from data sources associated with the communication, the originator, the recipient, or a combination thereof and based on the data feeds, a score is computed for the communication, the originator, or a combination thereof. Further, based on the computed score filtering and/or blocking of delivery of the communication to the recipient is initiated. In addition, the call scoring platform creates a personal scoring system for one or more users wherein the users may assign scores for an incoming communication.
Network based personal number blocking
Systems, devices, and techniques described herein are directed to network based personal number blocking. In particular, the systems, devices, and techniques can be implemented in networks including user equipment (UE) associated with native numbers and alias numbers, and can include blocking native numbers or alias numbers. Further, users can access a user profile or an application via a UE to assign personal number blocking (PNB) preferences to the various native numbers and alias numbers. Indications of such PNB can be transmitted from a UE to a network device to update a user profile in a central repository or database. If a user activates another UE or otherwise associates additional native numbers or alias numbers, the PNB can be seamlessly applied to the new device or numbers.
Intelligent call screening
A computer receives an incoming call by a cognitive computing service. The computer determines, by the cognitive computing service (CCS), caller details that the incoming call is not within intended recipient preferences, based on comparing the caller details to call log information database and call information database, wherein the call log information database and call information database comprises previous caller details. The computer references, by the CCS, additional caller details from the call log information database and call information database relating to the caller details. The computer determines whether an intended recipient of the incoming call would reject the incoming call and based on the computer determination that the intended recipient of the incoming call would reject the incoming call the computer rejects the incoming call.
AUTOMATIC RESPONSES TO INCOMING CALLS BASED ON USER ACTIVITY
An automatic response service supported on an application server that interoperates with an IMS (IP Multimedia Subsystem) core network is configured to dynamically generate responses to unanswered incoming telephone calls to a user's computing devices that are customized for the calling party based on monitored activities of the user, device capabilities and state, and related context. The automatic response service can monitor the user's interactions across a range of computing devices to identify a device with which the is actively engaged. Data from device registrations with the IMS core network can indicate current device capabilities and device state such as peripheral device configuration and network connectivity. Along with call data such as caller ID, the monitored user activities and device information enable the service to automatically respond to incoming calls on behalf of the user with information that is meaningful and contextually-relevant to the calling party.
Methods and systems for obtaining profile information from individuals using automation
Methods and systems obtain profile information from individuals using automation to select and provide the questions that are given to the individual. The answers the individuals provide to the questions can then be used to generate the profile information. Subsequent questions are selected and presented according to analysis of the previous answers. The exchange of the questions and answers occurs over a communications network and may take the form of emails, web page interfaces, wireless data messages, or verbal communication over a voiced call. The answers are analyzed to determine certain characteristics, such as the personality type, mood, and gender of the individual. The subsequent questions are selected based on the characteristics that are found from the answers to facilitate the information exchange between the automated system and the individual.
Method for communication between electronic devices through interaction of users with objects
The method of the present invention refers to digital link. The method (101) identifies the user interaction (103) with a specific object (100). According to this interaction, the method (101) identifies characteristics or data on the specific object (100) which allow the method (101) to extract personal information and associate it with an output message (for example, a predefined text, audio message to be recorded, etc.) that will be sent to the target contact/user (102) (which can be another person, a group of people, a system/service, or objects in general). Since the contact target (102) is identified, a smart device associated with the method (101) triggers a preset action for the connection with the contact target (102). The method (101) allows the reception of target responses contact (102) enabling the user (103) to maintain communication with the target user (102).