H04M2215/0108

Display of person based information including person notes
09596308 · 2017-03-14 · ·

Among other disclosures, a method may include collecting historical communication data and personal data relating to a portion of a plurality of communications, a sender of one or more of the communications or one or more recipients of the communications. The method may include generating a profile based on the collected historical communication data and personal data. The method may include receiving user input and incorporating the user input into the profile. The method may include presenting the profile including the user input in response to user behavior.

Display of information in electronic communications
09591086 · 2017-03-07 · ·

Among other disclosures, a method may include collecting historical communication data and personal data relating to a portion of a plurality of communications, a sender of one or more of the communications or one or more recipients of the communications. The method may include depositing the collected data into a repository of historical communication data and personal data. The method may include customizing an electronic communication based on one or more items in the repository, in response to user behavior.

Method and apparatus for over-the-air activation of neighborhood cordless services

A method for providing local cordless service comprises the steps of receiving subscriber neighborhood zone selection input so that a mobile telephone equipped subscriber may place or receive calls for a fixed rate, for example, per month without having to pay radio frequency air time charges any time they are located within their selected subscribed-to zones. If the subscribed-to zones are adjacent to one another and the mobile subscriber roans from one zone to another, the subscriber may continue their fee call uninterrupted and without paying air time charges. However, when the subscriber roans outside their subscribed-to zones they may be switched from the present local cordless services t conventional personal communications services and pay air time charges. However for an active call. No air-time charges are incurred as the user transitions between the cellular/DPCS environment and the local cordless service environment.

System and Method of deterring unsolicited telephone calls
20250385971 · 2025-12-18 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.

System and method of deterring unsolicited telephone calls
12549671 · 2026-02-10 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.