H04M1/2757

Method and apparatus for processing contact information using a wireless terminal
11363129 · 2022-06-14 · ·

A method for processing contact information includes displaying a list of contacts on a display of a wireless terminal, determining a first contact from the list of contacts in response to a selection of a user, obtaining a web log address and an online shop address of the first contact, obtaining, from a network service, a first content corresponding to the web log address and the online shop address of the first contact, and displaying the first content on a first area of the display, where the first content is dynamically updated.

Method and apparatus for processing contact information using a wireless terminal
11363129 · 2022-06-14 · ·

A method for processing contact information includes displaying a list of contacts on a display of a wireless terminal, determining a first contact from the list of contacts in response to a selection of a user, obtaining a web log address and an online shop address of the first contact, obtaining, from a network service, a first content corresponding to the web log address and the online shop address of the first contact, and displaying the first content on a first area of the display, where the first content is dynamically updated.

Apparatus for Mobile Communications having Variable Dimensions
20220182474 · 2022-06-09 ·

An apparatus for communications which can be configured with different dimensions and performance so as to suit different circumstances of use. The apparatus consists of a typical device for wireless communications, such as a smartphone, which can be aggregated with a bigger device offering better fruition of images and videos and better characteristics in terms of battery life, memories, cameras, and the like. The data necessary for the operation of the apparatus and the data of interest for the user are synchronized automatically as aggregation occurs.

Announcing new users of an electronic communications system to existing users

Announcing new users of an electronic communications system includes receiving an indication of a new user of an electronic communications system. The new user has an identifier for the electronic communications system. Existing users of the electronic communications system that are known to the new user are identified. The identified existing users are sent a message notifying the identified existing users of the identifier of the new user. The identified existing users may be enabled to add the identifier of the new user to participant lists used by the identified existing users. The new user may be enabled to add identifiers of the identified existing users to a participant list of the electronic communications system used by the new user.

Announcing new users of an electronic communications system to existing users

Announcing new users of an electronic communications system includes receiving an indication of a new user of an electronic communications system. The new user has an identifier for the electronic communications system. Existing users of the electronic communications system that are known to the new user are identified. The identified existing users are sent a message notifying the identified existing users of the identifier of the new user. The identified existing users may be enabled to add the identifier of the new user to participant lists used by the identified existing users. The new user may be enabled to add identifiers of the identified existing users to a participant list of the electronic communications system used by the new user.

Communication terminal and method of providing unified interface to the same

A communication terminal and a method of providing a unified natural language interface to the same are disclosed. The method includes: determining, when text information containing many characters is created, whether the text information conforms to one of preset grammatical constraints; extracting, when the text information conforms to one of the grammatical constraints, tokens of one or more of characters from the text information, and extracting, when the text information does not conform to one of the grammatical constraints, one or more characters having an attribute probability higher than a reference probability as a token; and analyzing the extracted tokens to determine a function to handle the extracted tokens, and executing the determined function based on the extracted tokens.

TRANSFERRING, OBTAINING, STORING AND USING TELEPHONE NUMBERS
20220174141 · 2022-06-02 ·

First telephone device creates a key for symmetric-key cryptography and encrypts the telephone number of the first telephone device using symmetric-key cryptography and the key. The key and the encrypted version of the telephone number of the first telephone device are transferred to a second telephone device. The second telephone device saves the key to memory and also saves to the memory at least one of (i) the encrypted version of the telephone number of the first telephone device and (ii) a decrypted plain text version of the telephone number of the first telephone device. The second telephone device is arranged such that a plain text version of the telephone number of the first telephone device is not displayed by the second telephone device.

TRANSFERRING, OBTAINING, STORING AND USING TELEPHONE NUMBERS
20220174141 · 2022-06-02 ·

First telephone device creates a key for symmetric-key cryptography and encrypts the telephone number of the first telephone device using symmetric-key cryptography and the key. The key and the encrypted version of the telephone number of the first telephone device are transferred to a second telephone device. The second telephone device saves the key to memory and also saves to the memory at least one of (i) the encrypted version of the telephone number of the first telephone device and (ii) a decrypted plain text version of the telephone number of the first telephone device. The second telephone device is arranged such that a plain text version of the telephone number of the first telephone device is not displayed by the second telephone device.

Electronic business card privacy protection system prevents displaying user account information
11337060 · 2022-05-17 · ·

Example communication methods and devices are described to reduce possibility that account information of a contact corresponding to an electronic business card is leaked. One example method includes receiving a first electronic business card sent by a second terminal. The first electronic business card is an electronic business card of a user corresponding to a client of a third terminal or a client of the second terminal. A first identifier used to identify an account of a user corresponding to the first electronic business card is displayed based on the first electronic business card. Displaying the first user account is skipped.

Electronic business card privacy protection system prevents displaying user account information
11337060 · 2022-05-17 · ·

Example communication methods and devices are described to reduce possibility that account information of a contact corresponding to an electronic business card is leaked. One example method includes receiving a first electronic business card sent by a second terminal. The first electronic business card is an electronic business card of a user corresponding to a client of a third terminal or a client of the second terminal. A first identifier used to identify an account of a user corresponding to the first electronic business card is displayed based on the first electronic business card. Displaying the first user account is skipped.