Patent classifications
H04M2203/554
APPARATUS AND METHOD FOR ACCESSING CONTACT LISTS ON AN ELECTRONIC DEVICE THAT IS UNAVAILABLE OR UNUSABLE
An apparatus, method, and non-transitory computer readable medium are provided for accessing data on a phone that is inaccessible. The apparatus includes a memory configured to store a plurality of contact profiles in a contact list corresponding to an inaccessible device, and a processor coupled to the memory. The apparatus receives, from an unknown device over a voice connection, an access identifier corresponding to the inaccessible device and a contact identifier associated with a contact profile of the plurality of contact profiles; identifies the contact list based on matching the access identifier with the inaccessible device; determines a contact device of the contact profile in the contact list corresponding to the contact identifier; and connects, over the voice connection, the unknown device to the contact device corresponding to the contact profile.
Device migration
Personalization data such as settings and/or state is migrated across devices including mobile phones. Device personalizations are pushed to a cloud service or other mechanism for backup and subsequent transmission to other devices. The personalization data can later be employed to configure one or more other devices in the same manner as a first device.
SERVER FOR FACILITATING ELECTRONIC COMMUNICATION AMONG USERS IN A NETWORK INCLUDING PROFESSIONAL ACQUAINTANCES
A method of forming unique, private, personal, virtual social networks on a social network system that includes a database storing data relating to corresponding user entities. The method includes: a first user entity sending an invitation to a second user entity, recording in the database the second user entity as a direct contact of the first user entity and determining that third user entities, directly connected to the second user entity, are indirect contacts. A unique, personal, social network formed from direct and indirect contacts is thereby created for each user entity. Each user entity is able to control privacy of its data with respect to other user entities depending on the connection factor to that other entity and/or that other entity's attributes. Each user entity is able to take the role of provider or participant in applications where the provider provides an item or service to the participant.
Techniques for correlating engagement of attendees of an online conference to content of the online conference
Disclosed are various embodiments for correlating the measured engagement of attendees to an online conference with the content of the online conference. In one implementation, a timeline is displayed in a user interface for at least a portion of the online conference. The timeline correlates the engagement of the attendees with the content of the online conference based on compiling values measured for engagement parameters of the respective attendees at defined time intervals during the online conference. Input is received identifying a point or interval of the timeline of the online conference. In response to receiving the input, content of the online conference associated with the point or interval is identified and displayed. Alternatively or in addition to displaying content, multiple, different ones of the engagement parameters for the point or interval are identified and have the respective values displayed.
DYNAMIC COLLABORATION IN SOCIAL NETWORKING ENVIRONMENT
A method and system for facilitating collaboration between two groups without impairing or affecting the structure of the two groups is provided.
ELECTRONIC DEVICE AND METHOD FOR SYNCHRONIZING CALL LOGS
A plurality of electronic devices can share a single phone number with each other. One of the electronic devices includes a display, a communication circuit, a processor operatively connected to the display and the communication circuit, and a memory operatively connected to the processor and configured to store a plurality of call logs. The memory stores instructions causing, when executed, the processor to receive a call request via the phone number, to transmit a first call log associated with a missed call to a server in response to a stopped reception of the call request, to receive a first response signal regarding transmission of the first call log from the server, to store the first call log in the memory, based on the first response signal, to receive a push signal from the server, and to update the first call log stored in the memory, based on the push signal.
MOBILE COMPUTING DEVICE FOR FACILITATING ELECTRONIC COMMUNICATION AMONG USERS IN A NETWORK INCLUDING PROFESSIONAL ACQUAINTANCES
A method of forming unique, private, personal, virtual social networks on a social network system that includes a database storing data relating to corresponding user entities. The method includes: a first user entity sending an invitation to a second user entity, recording in the database the second user entity as a direct contact of the first user entity and determining that third user entities, directly connected to the second user entity, are indirect contacts. A unique, personal, social network formed from direct and indirect contacts is thereby created for each user entity. Each user entity is able to control privacy of its data with respect to other user entities depending on the connection factor to that other entity and/or that other entity's attributes. Each user entity is able to take the role of provider or participant in applications where the provider provides an item or service to the participant.
Apparatus and method for accessing contact lists on an electronic device that is unavailable or unusable
An apparatus, method, and non-transitory computer readable medium are provided for accessing data on a phone that is inaccessible. The apparatus includes a memory configured to store a plurality of contact profiles in a contact list corresponding to an inaccessible device, and a processor coupled to the memory. The apparatus receives, from an unknown device over a voice connection, an access identifier corresponding to the inaccessible device and a contact identifier associated with a contact profile of the plurality of contact profiles; identifies the contact list based on matching the access identifier with the inaccessible device; determines a contact device of the contact profile in the contact list corresponding to the contact identifier; and connects, over the voice connection, the unknown device to the contact device corresponding to the contact profile.
Use of Identity Data Associated with a Device for Directing Communications to Another Device
Methods and systems for using and/or storing identity data associated with a device to direct communications to another device are described herein. A server may store identity data, such as subscriber identity module (SIM) data, associated with a device or user. The SIM data may be used to authenticate and/or register the device or user with a mobile network. Using the SIM data, other devices may use the capabilities of the first device. The server may receive, from another device, a request to access one or more capabilities of the first device. Based on the request, the server may send a request to register the SIM data with a mobile network. After registration of the SIM data with the mobile network, the server may be used to direct communications to the other device.
COMPUTING DEVICE FOR PROVIDING DIALOGUES SERVICES
Disclosed is a computer program executable by one or more processors and stored in a computer-readable storage medium, the computer program causing the one or more processors to perform one or more operations below, the operations including: an operation of receiving first voice data from a first user terminal and receiving second voice data from a second user terminal; an operation of generating integrated voice data based on the first voice data and the second voice data; and an operation of generating the integrated voice data as a conversation record by using a voice recognition model.