Patent application number | Description | Published |
20090022305 | PHONE CALL MUTE NOTIFICATION - A phone call mute notification applies an aural effect to the user's speech, other parties' speech, non-speech, or combinations thereof. The phone call mute notification does not render speech unintelligible and may provide a constant indication that the phone call mute function is active. Furthermore, the phone call mute notification does not serve as a distraction to the user, because the aural effect may be applied to speech itself rather than drawing the attention of the user away from the speech. | 01-22-2009 |
20090279677 | METHOD AND SYSTEM TO PREVENT UNINTENDED USERS FROM ACCESSING A RE-ROUTED COMMUNICATION - A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device. Upon receipt, the user of the alternate telecommunication device may then decrypt and access the secured communication. | 11-12-2009 |
20090279680 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL BASED ON MUTUAL CONTACTS OF A CONTACT LIST - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, scan of other alternate telecommunication devices is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If an alternate telecommunication device is available to receive the communication, then the communication is rerouted to the preferred alternate telecommunication device based on the alternate telecommunication device being a mutual contact of the contact list of the caller telecommunication device and the mapping profile of the intended receiving telecommunication device. | 11-12-2009 |
20090280785 | METHOD AND SYSTEM FOR PERFORMING PROXIMITY BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device. | 11-12-2009 |
20090280787 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL THROUGH A THIRD PARTY DEVICE - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a host carrier initiated query of third party priority of contacts routing preferences of the intended receiving wireless telecommunication device is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If third party routing preferences of the intended receiving wireless telecommunication device have previously been established, then the call is rerouted through one or more alternate telecommunication devices to the intended receiving wireless telecommunication device. The priority of contacts is stored with the host carrier. | 11-12-2009 |
20090280817 | METHOD AND SYSTEM FOR PERFORMING RECIPIENT BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if another wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device based on preferences internal to the intended receiving wireless device. These preferences may be stored on the intended receiving wireless device or remotely stored on the host carrier network. | 11-12-2009 |
20090280818 | METHOD AND SYSTEM FOR PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an outgoing voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a caller initiated short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from an other proximate telecommunication device indicating that the proximate telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the proximate telecommunication device based on preferences internal to the caller telecommunication device. These preferences may be stored on the caller telecommunication device or remotely stored on the host carrier network. | 11-12-2009 |
20100287600 | Assigning User Requests of Different Types or Protocols to a User by Trust Association Interceptors - A Universal TAI handles multiple identifications by means of an internal lookup table. When authenticating and authorizing requests, from a pre-registered customer, that are serviced by an application server, a reverse proxy security server receives requests of different protocols and associates user identification information of a single user with different formats based on the types and protocols of the requests. The Universal TAI determines a fundamental identification of the user from a lookup table, substitutes the fundamental identification into the requests of different protocols for the same user principal, and passes the request with the fundamental identification to the application server. | 11-11-2010 |
20110023019 | Monitoring File Access of Java Processes - A mechanism for monitoring file accesses by a process running in a Virtual Machine. File access information associated with a monitored process selected in a first view in a debugging interface is obtained from a file activity log and displayed as selectable file access events in a second view of the debugging interface, wherein each file access event represents a read or write operation performed on a file at a particular point in time by the monitoring process. An initial content of a file associated with the selected file access event and revisions made to the file by the monitored process within a defined period of time is retrieved from the file activity log upon detecting user selection of a file access event in the second view. The revisions are applied to the initial content of the file and displayed in a third view in the debugging interface. | 01-27-2011 |
20110060591 | ISSUING ALERTS TO CONTENTS OF INTEREST OF A CONFERENCE - A method, system, and computer program product for issuing an alert in response to detecting a content of interest in a conference. A listening logic comprising multiple conference engines monitors speakers, topics, and words spoken during a conference. A speech-to-text engine monitors the conference and records a transcription. A word emphasis engine monitors the transcription for key words. A voice identification engine monitors the live conversation and the recorded transcript, in real time, for a particular individual to begin speaking. An outline engine may create an outline of transcription. The listening device may issue an alert upon detecting a content of interest in the conference. The listening device may additionally display an outline or a selected portion of the transcript regarding a particular content of interest to inform a user of the listening device of a portion of content of the conference that may have been missed. | 03-10-2011 |
20120003931 | Method for Dynamic Changes to a User Profile Based on External Service Integration - The different illustrative embodiments provide a method, system, and program product for dynamic changes to a user profile based on external service integration. The method, system and program product comprise establishing a direct two-way communication between a first mobile device and a second mobile device when a first mobile device direct transceiver and a second mobile device direct transceiver are within a range of each other. A number of data is gathered from a number of internal sources or a number of external sources. An analysis of the number of data to determine a modification to a first list stored in the first device is performed. A modified first list is generated based on the analysis. The modified first list is automatically sent from the first mobile device to the number of second devices responsive to establishing the direct two-way communication between the first mobile device and a number of second devices. | 01-05-2012 |
20120003965 | Method for Information Sharing After Proximity Connection Has Ended - The different illustrative embodiments provide a method, system, and computer program product for sharing a list passed in a shared direct communication environment after a direct communication has ended among mobile devices. A profile associated with the first mobile device in a storage of a server computer is accessed by an indirect transceiver in the second mobile device responsive to a second mobile device acquiring an information that is responsive to a list previously received from a first mobile device and responsive to the information being acquired during a time when there is no direct communication between the first mobile device and the second mobile device. A contact information is retrieved, and the information is sent to a location specified by the contact information. | 01-05-2012 |
20120004954 | Crowd-Sourced Shopping List Augmentation - A method for receiving shopping recommendations is provided. In response to adding, by a client device, an item to a current shopping list of a customer, the client device sends the current shopping list with the added item to a server device for a shopping recommendation. In response to receiving, from the server device, a recommendation for a new item not found in the current shopping list of the customer, the client device displays the recommendation for the new item in the current shopping list of the customer. It is also determined whether a purchase incentive is associated with the new item recommended by the server device. In response to determining that a purchase incentive is associated with the new item recommended by the server device, the client device displays the purchase incentive with the new item recommended by the server in the current shopping list of the customer. | 01-05-2012 |
20120143596 | Voice Communication Management - A method, a computer program product, and an apparatus for managing a voice communication are provided. In one illustrative embodiment, an audio phrase produced by a first user is identified in the voice communication between the first user and a second user. A determination is made whether the audio phrase is present in a policy which prohibits the transmission of the set of undesired audio phrases. Responsive to a determination that the audio phrase is present in the policy which prohibits the transmission of the set of undesired audio phrases, a communication of the audio phrase is modified. | 06-07-2012 |
20120143728 | Managing Transmission of Information - A method, a computer program product, and an apparatus for managing transmission of information are provided. A determination is made as to whether a pattern in a set of patterns is present in the information to be transmitted by a first user. Responsive to a determination that the pattern in the set of patterns is present in the information to be transmitted, the information is inhibited from being transmitted by the first user. A request is sent to a mobile device of a second user for an approval of the information to be transmitted. Responsive to receiving the approval of the information to be transmitted from the second user, the information is transmitted. | 06-07-2012 |
20130023273 | PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A caller telecommunication device transmits a call to an intended receiving wireless telecommunication device. In response, the caller telecommunication device transmits an instruction to a first proximate telecommunication device, wherein the instruction directs the first proximate telecommunication device to determine if the first proximate telecommunication device is within a predefined proximity of the intended receiving wireless telecommunication device. The predefined proximity is a distance within which the intended receiving wireless telecommunication device and other wireless telecommunication device can directly communicate by local signals. The caller communication device re-routes the call to the first proximate telecommunication device if the first proximate telecommunication device is within the predefined proximity of the intended receiving wireless telecommunication device. | 01-24-2013 |
20130086001 | AUTOMATIC FILE VERSION VERIFICATION WITHIN ELECTRONIC MAIL - A method can include determining metadata for a file responsive to initiating an operation on the file stored within a client system and determining a storage location within a file repository of a master version of the file from the metadata. The method also can include determining, from the storage location, whether the master version of the file is more recent than the file stored within the client system using a processor of the client system. | 04-04-2013 |