Patent classifications
H04M3/44
CONTACT LIST RECONCILIATION AND PERMISSIONING
Techniques for using validated communications identifiers of a user's communications profile to resolve entries in another user's contact list are described. When a user imports a contact list, the contact list may include multiple entities related to the same person. The system may identify one of the entries in the contact list that corresponds to a validated communications identifier stored in another user's communications profile. The system may identify other validated communications identifiers in the other user's communications profile and cross-reference them against the entries of the contact list. If the system determines the contact list includes entries for the different validated communications identifiers of the other user, the system may consolidate the entries into a single entry associated with the other user.
CONTACT LIST RECONCILIATION AND PERMISSIONING
Techniques for using validated communications identifiers of a user's communications profile to resolve entries in another user's contact list are described. When a user imports a contact list, the contact list may include multiple entities related to the same person. The system may identify one of the entries in the contact list that corresponds to a validated communications identifier stored in another user's communications profile. The system may identify other validated communications identifiers in the other user's communications profile and cross-reference them against the entries of the contact list. If the system determines the contact list includes entries for the different validated communications identifiers of the other user, the system may consolidate the entries into a single entry associated with the other user.
Global Dialing Format
Described herein is at least one non-transitory computer-readable medium comprising instructions to direct at least one processor to utilize a global dialing format. The at least one processor is directed to retrieve a phone number stored on a communication device. The retrieved phone number is converted to the global dialing format by a reformatting sequence or a manual intervention sequence and the reformatted phone number thereby obtained is saved to a global contacts list on the communication device. A local phone number is retrieved from the reformatted phone number when a user selects the reformatted phone number for dialing. The local phone number is in a destination country. A call logic sequence is initiated to assemble the dialing protocol necessary to complete the phone call. An authentication sequence is executed to confirm that the local phone number is an actual phone number in the destination country. The authentication sequence results in an authenticated local phone number which is concatenated with the dialing protocol assembled by the call logic sequence. A concatenated phone number is obtained. The retrieved phone number is saved to a call log in the global dialing format. The concatenated phone number is called.
Global Dialing Format
Described herein is at least one non-transitory computer-readable medium comprising instructions to direct at least one processor to utilize a global dialing format. The at least one processor is directed to retrieve a phone number stored on a communication device. The retrieved phone number is converted to the global dialing format by a reformatting sequence or a manual intervention sequence and the reformatted phone number thereby obtained is saved to a global contacts list on the communication device. A local phone number is retrieved from the reformatted phone number when a user selects the reformatted phone number for dialing. The local phone number is in a destination country. A call logic sequence is initiated to assemble the dialing protocol necessary to complete the phone call. An authentication sequence is executed to confirm that the local phone number is an actual phone number in the destination country. The authentication sequence results in an authenticated local phone number which is concatenated with the dialing protocol assembled by the call logic sequence. A concatenated phone number is obtained. The retrieved phone number is saved to a call log in the global dialing format. The concatenated phone number is called.
Contact list reconciliation and permissioning
Techniques for using validated communications identifiers of a user's communications profile to resolve entries in another user's contact list are described. When a user imports a contact list, the contact list may include multiple entities related to the same person. The system may identify one of the entries in the contact list that corresponds to a validated communications identifier stored in another user's communications profile. The system may identify other validated communications identifiers in the other user's communications profile and cross-reference them against the entries of the contact list. If the system determines the contact list includes entries for the different validated communications identifiers of the other user, the system may consolidate the entries into a single entry associated with the other user.
Contact list reconciliation and permissioning
Techniques for using validated communications identifiers of a user's communications profile to resolve entries in another user's contact list are described. When a user imports a contact list, the contact list may include multiple entities related to the same person. The system may identify one of the entries in the contact list that corresponds to a validated communications identifier stored in another user's communications profile. The system may identify other validated communications identifiers in the other user's communications profile and cross-reference them against the entries of the contact list. If the system determines the contact list includes entries for the different validated communications identifiers of the other user, the system may consolidate the entries into a single entry associated with the other user.
Contact list reconciliation and permissioning
Techniques for using validated communications identifiers of a user's communications profile to resolve entries in another user's contact list are described. When a user imports a contact list, the contact list may include multiple entities related to the same person. The system may identify one of the entries in the contact list that corresponds to a validated communications identifier stored in another user's communications profile. The system may identify other validated communications identifiers in the other user's communications profile and cross-reference them against the entries of the contact list. If the system determines the contact list includes entries for the different validated communications identifiers of the other user, the system may consolidate the entries into a single entry associated with the other user.
Contact list reconciliation and permissioning
Techniques for using validated communications identifiers of a user's communications profile to resolve entries in another user's contact list are described. When a user imports a contact list, the contact list may include multiple entities related to the same person. The system may identify one of the entries in the contact list that corresponds to a validated communications identifier stored in another user's communications profile. The system may identify other validated communications identifiers in the other user's communications profile and cross-reference them against the entries of the contact list. If the system determines the contact list includes entries for the different validated communications identifiers of the other user, the system may consolidate the entries into a single entry associated with the other user.
EMERGENCY MANAGEMENT METHOD COMPRISING A DEVICE FOR EMERGENCY CALLS
An emergency management method comprising a device (1) for emergency calls and a central management information centre (30); said method comprises the steps of: recognizing a danger situation on the basis of processing of the signals provided by at least one movement sensor (13) and by a GPS module (11), positioned in said device (1); said step of recognizing a state of danger comprises the steps of: verifying a variation of the position obtained by said GPS module (11), verifying that the value of said at least one movement sensor (13) has exceeded a predefined limit; entering a state of attention if said checks are positive; said method, having recognized said state of attention, comprises the steps of: activating a timer for a first time; and if the position obtained by said GPS module (11) has not varied within said first time, and the value of said at least one movement sensor (13) is below a given predefined sensitivity threshold, within said first time, said method enters a state of alarm; said method in said state of alarm comprises the steps of: making a connection between said device (1) and said central information system (30); sending to said central information system (30) the data relative to identification of the owner of said device (1) and the position obtained by said GPS module (11); transferring the data relative to identification of the owner of said device (1) and the position obtained by said GPS module (11) from said central information system (30) to a private or public operator.
EMERGENCY MANAGEMENT METHOD COMPRISING A DEVICE FOR EMERGENCY CALLS
An emergency management method comprising a device (1) for emergency calls and a central management information centre (30); said method comprises the steps of: recognizing a danger situation on the basis of processing of the signals provided by at least one movement sensor (13) and by a GPS module (11), positioned in said device (1); said step of recognizing a state of danger comprises the steps of: verifying a variation of the position obtained by said GPS module (11), verifying that the value of said at least one movement sensor (13) has exceeded a predefined limit; entering a state of attention if said checks are positive; said method, having recognized said state of attention, comprises the steps of: activating a timer for a first time; and if the position obtained by said GPS module (11) has not varied within said first time, and the value of said at least one movement sensor (13) is below a given predefined sensitivity threshold, within said first time, said method enters a state of alarm; said method in said state of alarm comprises the steps of: making a connection between said device (1) and said central information system (30); sending to said central information system (30) the data relative to identification of the owner of said device (1) and the position obtained by said GPS module (11); transferring the data relative to identification of the owner of said device (1) and the position obtained by said GPS module (11) from said central information system (30) to a private or public operator.