H04M1/275

Methods and apparatus for providing access to emergency service providers
11388574 · 2022-07-12 · ·

A method and apparatus of communication via a hand held device that includes receiving an indication at the device to initiate an emergency call via a wireless network; determining whether the device is configured with a subscriber identity module (SIM) card, wherein the SIM card includes a plurality of numbers; and sequentially calling the plurality of numbers stored on the SIM card based on the determination that the device is configured with the SIM card. Further, the method and apparatus include detecting an emergency indication; connecting to a wireless network; and establishing a communication with one or more emergency service providers based at least in part on detecting the emergency indication, wherein the communication is established via the wireless network.

PERSONNEL CONTACT HISTORY RECORDING METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT
20220094774 · 2022-03-24 ·

A personnel contact history recording method executable by an electronic device, comprising: scanning surrounding devices via Bluetooth by a preset time interval; requesting a device name and an IMSI of the scanned device, when at least one device is scanned, and generating a surrounding phone list according to the scanned devices; comparing the surrounding phone list with a daily list to determine whether the devices recording in the surrounding phone list are recorded in the daily list; and, if at least one device recording in the surrounding phone list is recorded in the daily list, sending a warning message to the electronic device and a server.

PERSONNEL CONTACT HISTORY RECORDING METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT
20220094774 · 2022-03-24 ·

A personnel contact history recording method executable by an electronic device, comprising: scanning surrounding devices via Bluetooth by a preset time interval; requesting a device name and an IMSI of the scanned device, when at least one device is scanned, and generating a surrounding phone list according to the scanned devices; comparing the surrounding phone list with a daily list to determine whether the devices recording in the surrounding phone list are recorded in the daily list; and, if at least one device recording in the surrounding phone list is recorded in the daily list, sending a warning message to the electronic device and a server.

System and Method for Using a Secondary Device to Access Information Stored Remotely
20210051225 · 2021-02-18 · ·

A system and method allows for access to the contacts of one person on a second person's device, without affecting the content on the second person's device. The contact information, and other information that is stored on a first person's device, can be temporarily downloaded onto a second person's device for making calls or accessing the other information, thereby allowing for contact with someone. Upon logging out of the system on the second device, the information from the first person is deleted. This allows the first person to contact others when the first person's phone is not available for some reason. The system also allows for the downloading of more content and virtual access to the lost/stolen telephone to be able to locate the phone, control the phone or destroy the information on the phone.

System and Method for Using a Secondary Device to Access Information Stored Remotely
20210051225 · 2021-02-18 · ·

A system and method allows for access to the contacts of one person on a second person's device, without affecting the content on the second person's device. The contact information, and other information that is stored on a first person's device, can be temporarily downloaded onto a second person's device for making calls or accessing the other information, thereby allowing for contact with someone. Upon logging out of the system on the second device, the information from the first person is deleted. This allows the first person to contact others when the first person's phone is not available for some reason. The system also allows for the downloading of more content and virtual access to the lost/stolen telephone to be able to locate the phone, control the phone or destroy the information on the phone.

System and method for using a secondary device to access information stored remotely
10868902 · 2020-12-15 · ·

A system and method allows for access to the contacts of one person on a second person's device, without affecting the content on the second person's device. The contact information, and other information that is stored on a first person's device, can be temporarily downloaded onto a second person's device for making calls or accessing the other information, thereby allowing for contact with someone. Upon logging out of the system on the second device, the information from the first person is deleted. This allows the first person to contact others when the first person's phone is not available for some reason. The system also allows for the downloading of more content and virtual access to the lost/stolen telephone to be able to locate the phone, control the phone or destroy the information on the phone.

System and method for using a secondary device to access information stored remotely
10868902 · 2020-12-15 · ·

A system and method allows for access to the contacts of one person on a second person's device, without affecting the content on the second person's device. The contact information, and other information that is stored on a first person's device, can be temporarily downloaded onto a second person's device for making calls or accessing the other information, thereby allowing for contact with someone. Upon logging out of the system on the second device, the information from the first person is deleted. This allows the first person to contact others when the first person's phone is not available for some reason. The system also allows for the downloading of more content and virtual access to the lost/stolen telephone to be able to locate the phone, control the phone or destroy the information on the phone.

Method and system for automatically saving unknown number in mobile phone
10547720 · 2020-01-28 · ·

A method for automatically saving an unknown number in a mobile phone includes comparing a telephone number being answered or dialed with numbers in an address book, and determines whether the telephone number is an unknown number. If yes, conversation content is monitored, and keywords of the conversation content are extracted after the call is successfully connected. After the call ends, a user is prompted whether to save, if yes, the keywords are arranged in order for the user to select.

Method and system for automatically saving unknown number in mobile phone
10547720 · 2020-01-28 · ·

A method for automatically saving an unknown number in a mobile phone includes comparing a telephone number being answered or dialed with numbers in an address book, and determines whether the telephone number is an unknown number. If yes, conversation content is monitored, and keywords of the conversation content are extracted after the call is successfully connected. After the call ends, a user is prompted whether to save, if yes, the keywords are arranged in order for the user to select.

System and Method for Using a Secondary Device to Access Information Stored Remotely
20190320052 · 2019-10-17 · ·

A system and method allows for access to the contacts of one person on a second person's device, without affecting the content on the second person's device. The contact information, and other information that is stored on a first person's device, can be temporarily downloaded onto a second person's device for making calls or accessing the other information, thereby allowing for contact with someone. Upon logging out of the system on the second device, the information from the first person is deleted. This allows the first person to contact others when the first person's phone is not available for some reason. The system also allows for the downloading of more content and virtual access to the lost/stolen telephone to be able to locate the phone, control the phone or destroy the information on the phone.