H04M3/54

Automatically accessing an internet session using transferred network login information
11490219 · 2022-11-01 · ·

Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.

Routing communications by scanning visible codes
11259140 · 2022-02-22 · ·

Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.

Routing of communications

Methods, systems, and products enable a healthcare facility or server to process incoming communications. When a communication is received, the time and a recipient's address may be compared to a schedule of procedures. The recipient's address may be associated with a patient or with medical personnel, such as a physician or nurse. If the time and/or the recipient's address correspond to an entry in the schedule of procedures, then an alternate destination may be chosen for the communication.

Routing of communications

Methods, systems, and products enable a healthcare facility or server to process incoming communications. When a communication is received, the time and a recipient's address may be compared to a schedule of procedures. The recipient's address may be associated with a patient or with medical personnel, such as a physician or nurse. If the time and/or the recipient's address correspond to an entry in the schedule of procedures, then an alternate destination may be chosen for the communication.

Visual interfaces for telephone calls
09826096 · 2017-11-21 · ·

Incoming calls are received from audio capable devices. A call processing server receives an incoming call from an audio-capable device to a destination number, and detects availability for an ancillary source device linked to the audio-capable device. A set of data is provided to the ancillary source device. The set of data specifies graphical menu options for functions supported by the call processing server. The ancillary source device provides an indication of a selection of one of the graphical menu options. In response to the indication, a call transfer for the incoming call is implemented.

Electronic device and call-forwarding control method thereof
09787843 · 2017-10-10 · ·

A method and an electronic device for controlling call-forwarding of the electronic device corresponding to first call address information is provided. The electronic device includes transmitting, to at least one of a server or a second electronic device corresponding to second call address information, a call-forwarding request to forward, to the electronic device, at least one of incoming calls or messages addressed to the second call address information of the second electronic device; and providing the at least one of the requested incoming calls or messages addressed to the second call address information.

Realtime, Interactive and Geographically Defined Computerized Personal Identification and Matching Methods

In general, the invention relates to a method of interactive and live computerized matching in which a first user has a personal data device including a wireless communication system. A network is configured to include a server programmed with a personal characteristic database and a database searching algorithm, and a wireless communication system that is capable of communicating with the user's personal data device. The first user is allowed to log on through the wireless communication system to the network using his or her personal data device, and communicates to and stores in the database personal data defining his or her characteristics and those for his or her ideal match. Either the secure network automatically identifies the first users precise geographic location, or the user himself otherwise indicates and stores in the database of the network an identifying address that indicates his current specific geographic location. The user then instructs the database searching algorithm to search for and identify other users on to the network near the same geographic location to facilitate a match.

Vehicle Communication System
20170289356 · 2017-10-05 ·

A vehicle communication system including a data communication module (DCM) that, upon detecting that a user's mobile telephone is not present onboard a vehicle, is configured to instruct a telecommunications server to forward calls made to the user's mobile telephone to the DCM of the vehicle. The DCM is further configured to instruct the telecommunications server to connect a telephone call that has been initiated by the user at the vehicle using the DCM of the vehicle.

Vehicle Communication System
20170289356 · 2017-10-05 ·

A vehicle communication system including a data communication module (DCM) that, upon detecting that a user's mobile telephone is not present onboard a vehicle, is configured to instruct a telecommunications server to forward calls made to the user's mobile telephone to the DCM of the vehicle. The DCM is further configured to instruct the telecommunications server to connect a telephone call that has been initiated by the user at the vehicle using the DCM of the vehicle.

Distribution of ephemeral extension to communication sessions

To allow more non-enterprise communication endpoints to communicate without having to allocate an extension for every non-enterprise communication endpoint, a request is received to communicate with an enterprise communication system from a non-enterprise communication endpoint. A temporary password is associated with a dynamic communication address (e.g., from a group of dynamic extensions). The temporary password and the dynamic communication address are sent to the non-enterprise communication endpoint. The non-enterprise communication endpoint registers with the communication system using the temporary password and the dynamic communication address. A communication session is established between the non-enterprise communication endpoint and an enterprise communication endpoint using the dynamic communication address. The temporary password is then disassociated from the dynamic communication address, thus freeing up the dynamic communication address for use with another non-enterprise communication endpoint.