Class / Patent application number | Description | Number of patent applications / Date published |
379207130 | Party identification or validation (e.g., personal identification number (PIN)) | 13 |
20080212758 | TELECOMMUNICATION AND ADVERTISING BUSINESS MODEL AND METHOD OF UTILIZING SAME - A telecommunication and advertising business model and method of utilizing same that permits users to make telephone calls for a predetermined amount of time according to the destination of the call. The telecommunication and advertising business model is controlled by an on-line database system and comprises customers, and companies that pay for advertising through a system. | 09-04-2008 |
20080253550 | Activating Private Access Points For Wireless Networking - A unique identifier is associated with a personal access point. The personal access point is distributed to an end user, who sends a text message including the identifier. Within an automated computer system, the text message is received, a billing account is associated with the personal access point on the basis of the text message, and the personal access point is activated to provide wireless access to a network. | 10-16-2008 |
20090003577 | Method and apparatus for providing customized images and ring tones - A method and apparatus which allows the mobile user to subscribe to Customized Image and Ring Tone (CIRT) service providing them access to a CIRT server to pre-define a customized image or ring tone to be played to a called party, and sends the pre-defined image or ring tone to the called party during alerting when a call is made from the mobile user is provided. The CIRT subscriber can download images or ring tones from internet web site to CIRT server, create their own via digital camera/camera phone then send them to CIRT, or choose existing ones that are available in the CIRT server. The CIRT subscriber then selects a specific image or ring tone for a specific phone number through access to the CIRT server via the Internet or a phone call. When the subscriber calls a number that is predefined with a CIRT, the call will be routed to CIRT server first and then to the called party. When the call is routed from the CIRT server to the called party, the CIRT server will allocate the predefined CIRT and send it to the called party for display/play during alerting. The subscriber also can define a default image or ring tone on the CIRT server for called numbers that are not defined or for a matching called party DN pattern. | 01-01-2009 |
20090147939 | Authenticating An Individual Using An Utterance Representation and Ambiguity Resolution Information - Systems, apparatuses, and methods for authenticating an individual. A representation of an utterance is received. A candidate record is identified from among a plurality of candidate records by comparing the representation of the utterance with stored utterance data according to a match parameter. An identity of the individual is verified by comparing received ambiguity information with stored ambiguity resolution criteria. If a candidate record is not found, a new record associated with the individual may be created. The individual may be allowed access to a secured resource. | 06-11-2009 |
20090190737 | Caller Authentication System - A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred. | 07-30-2009 |
20100008489 | SYSTEM AND METHOD FOR SCREENING INCOMING TELEPHONE CALLS - A do-not-disturb mode is entered in response to an identifier and a first authorization code is received. A call is received from a caller whereafter the caller is prompted to input a second authorization code. If the first and second authorization codes are the same, a notification is generated to notify a called party that a telephone call is being received. | 01-14-2010 |
20110026701 | METHODS AND APPARATUS FOR PROVIDING EXPANDED TELECOMMUNICATIONS SERVICE - The present invention provides flexible call processing. For example, a call processor system can receive an inbound call intended for a called party and place an outbound call to the called party. The call processing system can provide the called party with a call transfer option. | 02-03-2011 |
20130070919 | BIOMETRIC IDENTIFICATION IN COMMUNICATION - A method is provided for identifying a calling party to a called party utilizing biometric information. Biometric information of first calling party is received. If stored, a calling party profile is retrieved based on first calling party biometric information. A call is placed to a called party. The first calling party profile is provided to called party. A biometric information change from first calling party biometric information to a second calling party biometric information is automatically detected, and it is determined whether the second party biometric information is stored. If stored, a second calling party profile of second calling party is retrieved and is provided to called party. Responsive to determining that the biometric information for second calling party is not stored, the called party is notified that the second calling party is communicating and the second calling party profile is automatically created based on second calling party biometric information. | 03-21-2013 |
20130094643 | METHOD AND APPARATUS FOR HANDLING ANONYMOUS CALLS - A method and apparatus at an apparatus for handling an incoming call ( | 04-18-2013 |
20130259218 | Telephone Number Sharing Configuration - A system and a method are disclosed for providing telephone number sharing services to subscribers over public switched telephone network or data network. The disclosed system maintains a bank of reusable caller identifiers (IDs). The system receives call details of a call from a subscriber of the system. The call details include a caller identifier (ID) preference of the subscriber and a called number corresponding to the called party. The system stores the call details in a database. The system determines whether the call from the subscriber is a first call to the called number. In response to the call being the first call to the called number, the system assigns a call ID from the bank of reusable caller IDs that satisfies the reusable caller ID preference of the subscriber, and connects the call to the called number along with the caller ID. | 10-03-2013 |
20140056421 | SENDING CALLER IDENTIFICATION INFORMATION USING A JOINT SERVICES ACCOUNT - A first network device receives a message that identifies a relationship between a wireless user device and a client device, the relationship is to allow for caller identification information, for calls associated with the wireless user device, to be sent to the client device. The first network device stores the information identifying the relationship. The first network device receives caller identification information for a call associated with the wireless user device. The first network device determines to send the caller identification information to the client device, based on the information identifying the relationship stored by the first network device; and the first network device sends the caller identification information to the client device. | 02-27-2014 |
20140119527 | Determining and Denying Call Completion Based on Detection of Robocall or Unsolicited Advertisement - Unwanted calls are detected by determining all calls which are unverified by prior prompting the caller to provide data, such as “press 5 to be connected” or “say ‘proceed’” before being allowed to connect. Once connected, the called party may indicate that the call was/is unwanted and should be disconnected. Then, the call is disconnected from the called party while being maintained with the switch. The call is also recorded in embodiments of the disclosed technology, with the audio therefrom, or audio signature, being used to detect future unwanted calls. The detection of future unwanted calls may further be modified or determined based on association of called parties to each other, which, additionally, may be used to change the threshold of closeness of audio signatures between calls. | 05-01-2014 |
20150365523 | Method of Routing Voice Calls - The invention presents a method of routing voice calls. In one embodiment, the method includes the steps of a routing system receiving a request for preparing/updating a routing rule based on a Source Number and a Destination Number (DN). The routing system sends an access number to the user. A call handling system receives a call from the user to the access number, identifies the user by the user's Source Number or Caller ID, requests the Destination Number from the routing system based on the Source Number or Caller ID Routing. Then, the call handling system connects the User and the Recipient. | 12-17-2015 |