H04M19/045

MANAGING CONNECTIONS OF A USER DEVICE

Systems, methods, and computer-readable medium are provided for managing connections of user devices. For example, two source devices may be configured to maintain a data stream with one another. The data stream may enable the two source devices to identify one or more connections between each other and at least a third device. In response to receiving an event that indicates content to be provided to the third device, the data stream may be used by the source devices to configure their network connections with the third device.

Processing Method and Processing Device for Communication Information of Terminal and Terminal
20170195482 · 2017-07-06 ·

A processing method for communication information of a terminal, a processing device for communication information of a terminal, and a terminal are provided. The terminal includes a first system and a second system. The processing method for communication information includes: acquiring information of an initiator of communication information when the communication information is received; and processing the communication information in the first system or the second system according to attribute information of the information of the initiator.

Managing connections of a user device

Systems, methods, and computer-readable medium are provided for managing connections of user devices. For example, two source devices may be configured to maintain a data stream with one another. The data stream may enable the two source devices to identify one or more connections between each other and at least a third device. In response to receiving an event that indicates content to be provided to the third device, the data stream may be used by the source devices to configure their network connections with the third device.

METHOD AND DEVICE FOR PRESENTING PUSH NOTIFICATIONS
20170126826 · 2017-05-04 ·

A method for presenting push notifications in a terminal device configured with a notification bar may include: determining, when a push notification is received, whether the notification bar contains a target push notification, the target push notification being a previously received message with a message content as same as that of the currently received push notification; updating a push time of the target push notification to the push time of the currently received push notification in response to derterming that the notification bar has contained the target push notification; and presenting the updated push time of the target push notification in the notification bar.

MANAGING CONNECTIONS OF A USER DEVICE

Systems, methods, and computer-readable medium are provided for managing connections of user devices. For example, two source devices may be configured to maintain a data stream with one another. The data stream may enable the two source devices to identify one or more connections between each other and at least a third device. In response to receiving an event that indicates content to be provided to the third device, the data stream may be used by the source devices to configure their network connections with the third device.

VENUE OWNER-CONTROLLABLE PER-VENUE SERVICE CONFIGURATION

There are provided measures for venue owner-controllable per-venue service configuration. Such measures could comprise configuring a per-venue service model of services of a network operator for terminal devices of subscribers of the network operator on the basis of an input by a venue owner of a venue, the per-venue service model including at least one configurable parameter for defining a venue-based service for terminal devices of subscribers residing in a specified venue area of the venue, and controlling provision of services of the network operator to terminal devices or subscribers of terminal devices in accordance with the per-venue service model depending on applicability thereof for the service provision.

QUIET HOURS FOR NOTIFICATIONS

In some implementations, a computing device can be configured to automatically turn off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.

Call Notification Apparatus and Method
20250193317 · 2025-06-12 ·

Apparatuses, methods, computer programs and systems for notifying calls, for example voice calls, to a user in such a manner as to avoid disturbing the user when they are asleep. For example, there is disclosed a system including a user terminal and a notification device. The user terminal may be configured to enable selection of one or more preferential contacts, to receive a call request, to transmit to the notification device a notification of the call request if the call request is from a preferential contact and to refrain from transmitting to the notification device a notification of the call request if the call request is from a number or contact which is other than a preferential contact.

Quiet hours for notifications

In some implementations, a computing device can be configured to automatically turn off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.