Access Restricting Patents (Class 379/93.02)
  • Patent number: 8731156
    Abstract: Methods, systems, and products are disclosed for operating an electronically activated mechanism. In an exemplary embodiment, the method comprises receiving, via a first communications network, a first electronic communication directed to remotely activating the mechanism. The first electronic communication may include at least one of a telephone call, a telephone call containing data, and a data message. The method further comprises determining whether a party from whom the first electronic communication is received is authorized to remotely activate the mechanism. When it is determined that the party from whom the first electronic communication is received is authorized to remotely activate the electronically activated mechanism, a second electronic communication is provided via a second communications network. The second electronic communication is directed to activating the electronically activated mechanism. The first and second communications networks may each include a wireless network.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: May 20, 2014
    Assignee: Open Invention Network, LLC
    Inventors: Isaac D. M. White, James Dickens
  • Publication number: 20140133638
    Abstract: Techniques for providing for a seamless call transfer in a virtual desktop environment are supported. An apparatus may be capable of requesting access to a remote computer system for registration with a call manager, determining whether a call associated with the apparatus is active, automatically initiating suspension of the call in response to determining that the call is active and requesting registration of a telephone associated with the call, and resuming the suspended call. The seamless call transfer system may result in a more favorable calling experience during authentication with a virtual desktop environment and registration with a call manager.
    Type: Application
    Filed: November 14, 2012
    Publication date: May 15, 2014
    Inventors: Debanjan Biswas, Nagendra Kunuturi, Vijayendra Shetty, Sharadandu Konuthula, Michelle Concannon
  • Patent number: 8712022
    Abstract: A method includes determining whether an incoming call to a first destination is authorized at a switch of a communication network. The method includes, in response to determining that the incoming call is not authorized, determining whether the incoming call is a facsimile call, routing the incoming call to the first destination when the incoming call is not the facsimile call, and routing the incoming call to the first destination when the incoming call is the facsimile call.
    Type: Grant
    Filed: February 22, 2013
    Date of Patent: April 29, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Kenneth Robert Stroud, Paul A. Raccio
  • Publication number: 20140112458
    Abstract: During voice communication between multiple telecommunications devices, a shareable application facilitates concurrent sharing of data and processes between the devices. The application may be configured to monitor the voice communication and execute a predetermined function upon detecting a predetermined condition in the voice communication. The application may further facilitate sharing of functionality and user interface displays during the voice communication. In some implementations, a server computing device on a communications network may facilitate functions of shareable applications on one or more telecommunications devices.
    Type: Application
    Filed: December 23, 2013
    Publication date: April 24, 2014
    Applicant: T-Mobile USA, Inc.
    Inventors: Winston Wang, Adam Holt, Jean-Luc Bouthemy, Michael Kemery
  • Patent number: 8699060
    Abstract: In the case of transmitting an image data, a controller causes a re-destination storage to store an identification number of a destination. Thereafter, when a user presses a re-destination key long, a display controlling section causes a display device to display a confirmation screen to let the user confirm whether or not to delete the identification number stored as a re-destination. If the user depresses an OK key, a re-destination deleting section deletes the identification number stored in the re-destination storage.
    Type: Grant
    Filed: November 16, 2010
    Date of Patent: April 15, 2014
    Assignee: Kyocera Mita Corporation
    Inventor: Hiroshi Furutani
  • Patent number: 8699679
    Abstract: A system for accessing scheduling information. In one illustrative embodiment, a user can log into a phone system by entering their extension number and passcode, which allows the phone to assume their profile. The user then enters the credentials required to access their PC based calendar information, which is stored by a server application. The server application can look up the scheduling information that is stored in the user's PC based calendar application on a message server. The information can then be provided to the phone by the server application where it is displayed. Application programming interfaces can facilitate communications between the phone and the server application and the server application and the message server. Other information located on the message server can also be retrieved through the server application and is not limited to scheduling information.
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: April 15, 2014
    Assignee: Mitel Networks Corporation
    Inventors: Peter Francis Couse, Ron Wellard
  • Publication number: 20140086397
    Abstract: An approach is provided to manage phone calls. The approach is implemented by an information handling system, such as a smart phone. A requestor sends a contact request to another device over a network. If the request is accepted, the requestor receives a token with the token including usage parameters controlling the requestor's ability to contact the recipient by telephone. When the requestor requests to make a call to the recipient, the call is only placed upon successful determination made by comparing the usage parameters included in the token to a set of current call data. If a successful determination is made, the call is placed to the recipient without revealing the recipient's telephone number. However, if the request is denied, the system prevents the requestor for placing a call to the recipient.
    Type: Application
    Filed: September 27, 2012
    Publication date: March 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barbara Febonio, Sandro Piccinini, Stefano Sidoti
  • Patent number: 8634318
    Abstract: A communication system providing a multimedia service that informs a calling terminal that a communication sent from the calling terminal to a called terminal is undesired by the called terminal.
    Type: Grant
    Filed: October 6, 2009
    Date of Patent: January 21, 2014
    Assignee: NEC Corporation
    Inventors: Shingo Shiga, Toshiyuki Tamura
  • Patent number: 8635278
    Abstract: A method and computer program product for managing interruptions including defining an interruption control initiation trigger and defining an interruption control release trigger. An interruption control period is initiated based upon, at least in part, the interruption control initiation trigger. The interruption control period is terminated based upon, at least in part, the interruption control release trigger.
    Type: Grant
    Filed: October 15, 2007
    Date of Patent: January 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: Edith Helen Stern, Barry E. Willner, Patrick Joseph O'Sullivan, Robert Cameron Weir
  • Patent number: 8625761
    Abstract: A user authentication method is applied to a user authentication apparatus for authentication using a unique ID that is information unique to a communication apparatus. The method includes acquiring a user ID as information identifying a user, and detecting a unique ID corresponding to the user ID from a user ID list. The method also includes making a call with a predetermined number of rings to a communication apparatus having the unique ID. Additionally, the method includes receiving a callback made by a communication apparatus after a predetermined number of rings of the call in response to the call. In addition, the method includes determining whether a unique ID of the communication apparatus having made the callback matches the unique ID of the communication apparatus to which the call has been made, and determining, if there is a match, that a user having the user ID is an authorized user.
    Type: Grant
    Filed: July 6, 2007
    Date of Patent: January 7, 2014
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventors: Haruhiko Fujii, Tetsuya Nakagawa
  • Patent number: 8625755
    Abstract: A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to receive from a first communication device (CD) a telephone number of a second CD, submit a verification code to the second CD, submit a request to the first CD for the verification code, receive the verification code from the first CD, provide the first CD access to update in whole or in part a second contact book of the second CD stored in a contact book account, receive from the first CD one or more entries of a first contact book of the first CD, merge the one or more entries of the first contact book with one or more entries of the second contact book, thereby generating an updated second contact book, and store the updated second contact book in the contact book account. Additional embodiments are disclosed.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: January 7, 2014
    Assignee: AT&T Intellectual Property I, LP
    Inventors: William Stanley Robbins, R. Tyler Wallis, Anup D. Karnalkar
  • Publication number: 20140003590
    Abstract: A telephone number corresponding to an incoming telephone call may be utilized to obtain information associated with the incoming call. If it is determined that the telephone number does not match records stored on the device on which the call is received, a request may be sent from the receiving device to an external device to obtain information associated with the incoming call. The request may be directed to a remote contacts application, another device listed in a data store of the receiving device, or to the calling device itself. When a response is received, the information may be displayed or otherwise utilized by the receiving device.
    Type: Application
    Filed: June 27, 2012
    Publication date: January 2, 2014
    Applicant: APPLE INC.
    Inventors: Swapnil Dave, Devrim Varoglu
  • Patent number: 8619951
    Abstract: A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service representative are monitored. At least one tone from a telephone keypad of the customer is detected. The at least one tone represents sensitive data for the customer. An audio output channel directed to the customer service representative is prevented from outputting a detectable tone from the telephone keypad of the customer. An indicator is provided to the customer service representative when detection of the at least one tone occurs.
    Type: Grant
    Filed: December 6, 2010
    Date of Patent: December 31, 2013
    Assignee: Kombea Corporation
    Inventors: Ronnie D. Johansen, Kolby M. Olsen
  • Patent number: 8620532
    Abstract: Systems and methods for providing passive crowd-sourced alternate route recommendations. In one embodiment, locations of users of a number of mobile location-aware devices are tracked over time. Upon receiving a request, users of mobile location-aware devices that have traveled from a desired start location to a desired stop location are identified. Location histories for the identified users are analyzed to determine one or more different routes taken from the desired start location to the desired stop location. The one or more different routes, or a select subset thereof, are then returned to the requestor as recommended alternate routes.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: December 31, 2013
    Assignee: Waldeck Technology, LLC
    Inventors: Scott Curtis, Eric P. Halber, Gregory M. Evans, Steven L. Petersen
  • Publication number: 20130329874
    Abstract: Systems and methods for initiating a telephone call on a communication device receive, into a computerized device, an instruction to connect a communication device to a communication receiver using a call-in string comprising a call-in number and a pass code. The call-in string is parsed to separate the call-in number and the pass code, using the computerized device. A pause indicator is identified in the call-in string, using the computerized device. The pause indicator is formatted to a type-specific format appropriate for the type of communication device, using the computerized device. The call-in number is transmitted from the computerized device to the communication receiver. A pause is executed, using the computerized device, according to the pause indicator formatted for a specific type of device. The pass code is transmitted from the computerized device to the communication receiver.
    Type: Application
    Filed: June 8, 2012
    Publication date: December 12, 2013
    Applicant: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Lisa Seacat Deluca, Lydia M. Do
  • Publication number: 20130331134
    Abstract: To reduce the call cost for user messages of a few tens of bytes through a mobile telephone network (3), and to avoid having to set up a call channel as is necessary for transmitting data of several thousands of bytes, spare fields in signaling messages are used to convey the user messages, a call then taking place via signaling messages, and without a dedicated call channel being set up.
    Type: Application
    Filed: August 14, 2013
    Publication date: December 12, 2013
    Applicant: DRNC Holdings, Inc.
    Inventors: Bruno Tisserand, Luc Davit
  • Patent number: 8605629
    Abstract: A network device may include a lawful interception module, a routing module, and a multicast distribution table. The lawful interception module may receive a lawful interception request for a subscriber, may inform the routing module about the subscriber, and may provide, to the routing module, a tap interface corresponding to the subscriber. The routing module may receive a multicast join request from the subscriber, and may insert, when the multicast join request is received, the tap interface in the multicast distribution table, as a forwarding interface.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: December 10, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Akhil S, Abhay Mehta, Andrzej Szyszko
  • Patent number: 8582734
    Abstract: An account administration system and method with security function are provided. The system comprises an identification unit, an issue unit, a portable communication device, and a identification device, wherein after the issue unit receiving the request massage from the portable communication device, a user password will be generated from the issue unit, and the user password will be sent to the portable communication device and the identification unit, thus, user can input the user password to the identification device received from the portable communication device, furthermore, according to the user account used, the identification procedure of the identification unit will exam to be passed for the identification device, such that the online access with the identification unit will be achieved.
    Type: Grant
    Filed: March 20, 2007
    Date of Patent: November 12, 2013
    Assignees: Shooter Digital Co., Ltd.
    Inventors: Gigi Chen, Ko Li Chao, Chuen-Tai Wu
  • Patent number: 8576996
    Abstract: An in-progress call can be manipulated such that user devices in proximity to the in-progress call, but not initially part of the call, are enabled to join the in-progress call. Determining that a user device is in proximity to an in-progress call may include detection, by the user device, of an in-progress call. Alternatively, or in addition, a communication device involved in the in-progress call may detect a user device and query the user device as to whether it has permissions to join the in-progress call and, if so, whether it wants to join the in-progress call.
    Type: Grant
    Filed: December 13, 2010
    Date of Patent: November 5, 2013
    Inventor: Gordon R. Brunson
  • Patent number: 8578452
    Abstract: The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device.
    Type: Grant
    Filed: April 27, 2011
    Date of Patent: November 5, 2013
    Assignee: Gemalto SA
    Inventor: HongQian Karen Lu
  • Patent number: 8548132
    Abstract: The invention is directed to techniques for initiating lawful intercept of packets associated with subscriber sessions on a network device of a service provider network based on identification triggers. A law enforcement agency may send an intercept request for a subscriber to an administration device of the service provider network. The administration device may then configure one or more identification triggers for the subscriber based on the intercept request. The techniques described herein initiate lawful intercept when one or more subscriber sessions on a network device match the one or more identification triggers. The techniques described herein include configuring trigger rules that include identification triggers for subscribers on a network device via a command line interface (CLI) of the network device. In addition, the techniques described herein include configuring identification triggers in a subscriber profile on an authentication device connected to a network device.
    Type: Grant
    Filed: January 28, 2010
    Date of Patent: October 1, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Margaret Zielinski, Paul Raison
  • Publication number: 20130251125
    Abstract: An embodiment of the invention is used with a conference calling system that includes a plurality of client phones, and a conference call center. Passcodes are entered into a list contained in a given client phone, wherein all listed passcodes are associated with a specified phone number that can be used to establish a connection between the given client phone and the conference call center. The specified phone number is used at the given client phone to access the passcode list. A passcode is selected from the list for transmission from the given client phone to the conference call center, over the phone connection established using the specified phone number. In response to receiving the selected passcode at the conference call center, the conference call center is operated to connect the given client phone into a conference call with one or more other client phones.
    Type: Application
    Filed: March 21, 2012
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 8532271
    Abstract: A cybercrime detecting and preventing method and system includes a website, an interface dynamic web page, a search program, and a database. When a network user inputs a “telephone number code” and “authorization code” of a network server using an internet accessing device, the user is also required to input a “source identification code.” When access to a network receiver or server is requested, a “telephone number code and authorization code” set is input to the website for comparison with “telephone number codes” and “authorization codes” stored in the database. If the input “telephone number code and authorization code” set does not match the stored “telephone number code and authorization code” set, the “source identification code” is transmitted to a computer to be analyzed and determine the location of the cybercriminal and relay information on the cybercrime to an appropriate public security organization.
    Type: Grant
    Filed: January 19, 2010
    Date of Patent: September 10, 2013
    Inventor: Chung-Yu Lin
  • Patent number: 8504729
    Abstract: An open Information Services network architecture is disclosed which enables multiple business entities to assume specialized roles of access provider, service provider, and service retailer. The disclosed technology provides instant plug-and-play service, decouples access and service networks and provides seamless (single step) access enabling customers to maintain a service account regardless of location. The benefits of the disclosed technology, among others, include: Multi-level and multi-service registration; Broker Services providing customers with a choice of provider; Security Services relating to distribution; Revenue Assurance services, Gentle Reminder/Gentle Touch; Revenue Assurance services pertaining to usage integrity verification upon registration; mobile services derived from G-ISN; and claim benefits pertaining to LNP services derived from G-ISN.
    Type: Grant
    Filed: February 23, 2009
    Date of Patent: August 6, 2013
    Assignee: Degage Limited Liability Company
    Inventor: David A. Pezzutti
  • Patent number: 8503631
    Abstract: Methods, systems, and products are disclosed for locking and unlocking a lock. A lock service manager module stores in memory, and a processor communicates with the memory. The lock service manager module includes executable code for receiving a communication from a calling telephone number. A database is queried for at least one of i) a called telephone number and ii) a calling telephone number. The database stores telephone numbers of subscribers to a lock service. The lock service allows remote locking and unlocking of the lock. If the query is successful, the communication is processed.
    Type: Grant
    Filed: April 22, 2005
    Date of Patent: August 6, 2013
    Assignee: Open Invention Network LLC
    Inventors: Isaac D. M. White, James Dickens
  • Publication number: 20130195261
    Abstract: A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to receive from a first communication device (CD) a telephone number of a second CD, submit a verification code to the second CD, submit a request to the first CD for the verification code, receive the verification code from the first CD, provide the first CD access to update in whole or in part a second contact book of the second CD stored in a contact book account, receive from the first CD one or more entries of a first contact book of the first CD, merge the one or more entries of the first contact book with one or more entries of the second contact book, thereby generating an updated second contact book, and store the updated second contact book in the contact book account. Additional embodiments are disclosed.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 1, 2013
    Applicant: AT&T Intellectual Property I, LP
    Inventor: AT&T Intellectual Property I, LP
  • Patent number: 8498392
    Abstract: A method for establishing a communication channel (17) between a predetermined number of selected devices (3;5). Each of the devices has its own identity. The establishing of the communication channel is done by a pairing via a server (1). Said devices have a pairing operational mode and a communication operational mode.
    Type: Grant
    Filed: January 17, 2011
    Date of Patent: July 30, 2013
    Assignee: Koninklijke Philips N.V.
    Inventor: Andrew Jonathan Miles Wishart
  • Patent number: 8489889
    Abstract: A computing device receives a command to restrict access to encrypted data. The computing device generates a new record that can access the encrypted data. The computing device encrypts the record information for the new record using a public key of a trusted entity. The computing device prevents access to the encrypted data for a previously generated record or records.
    Type: Grant
    Filed: September 17, 2010
    Date of Patent: July 16, 2013
    Assignee: Symantec Corporation
    Inventors: Vincent E. Moscaritolo, Jonathan D. Callas
  • Patent number: 8477916
    Abstract: Methods and systems of authorizing a user of a first packet-based communication network to access a second packet-based communication network are disclosed. A call setup request is received from a user terminal of the user at a first network element of the first packet-based communication network, the authorization request comprising a first user identity. Responsive to the call setup request, a request is transmitted to create a second user identity from the first network element to a second network element of the second packet-based communication network. The second network element creates the second user identity for use in the second packet-based communication network. The second user identity is derivable from the first user identity according to a predetermined rule. The second user identity is stored in the second packet-based communication network for use with establishing a call associated with the call setup request over the second packet-based communication network.
    Type: Grant
    Filed: April 19, 2012
    Date of Patent: July 2, 2013
    Assignee: Microsoft Corporation
    Inventors: Jonathan David Rosenberg, Andres Kutt
  • Publication number: 20130156174
    Abstract: A system for introducing telephone number related information, a method for introducing telephone number related information and a program product using the system and method are disclosed. An electronic communication device transmits a telephone number to a remote system for introducing telephone number related information when dialing or receiving a call, and the system searches the telephone number related information from a database stored in the system and provides the information to the electronic communication device, such that the electronic communication device can display the related information corresponding to the telephone number to let users know about the telephone number related information before receiving or dialing a call.
    Type: Application
    Filed: February 24, 2012
    Publication date: June 20, 2013
    Inventors: CHIEN-FU KUO, JHENG-HUAN SONG, SHENG-FENG CHENG, CHEN-HAO SU
  • Patent number: 8433045
    Abstract: A computer telephony system allows a user to control different communications terminals at different times via a second system, external to the computer telephony system. The computer telephony system comprises a plurality of communications terminals each of which has an identifier. The computer telephony system further comprises means for generating a key and for recording internally a mapping linking the key and the identifier of a first communications terminal and means for changing the mapping, on a request by the user, so as to link the key with a second communications terminal. In operation, the key is provided to a second system, external to the computer telephony system and accessible by the user.
    Type: Grant
    Filed: February 27, 2007
    Date of Patent: April 30, 2013
    Assignee: British Telecommunications Public Limited Company
    Inventor: Laurance J Booton
  • Publication number: 20130101099
    Abstract: Method and system for authenticating a telecommunication session request provides the steps of receiving the telecommunication session request, sending an authentication trigger request, receiving at least one authentication character encoded by a DTMF tone that is not capable of being generated via a keypad stroke and performing an authentication operation upon the at least one received authentication character. In one embodiment of the invention, the at least one authentication character is a string of authentication characters. The string may further include a first non-numeric DTMF tone (indicative of the beginning of the string of authentication characters), one or more alpha-numeric DTMF tones and a second non-numeric DTMF tone (indicative of the end of the string of authentication characters). Additional information may also be appended to the at least one authentication character during the receiving step (i.e., callerID information or a destination number for the telecommunication session).
    Type: Application
    Filed: November 24, 2009
    Publication date: April 25, 2013
    Inventor: Tomasz Sarnowski
  • Patent number: 8428230
    Abstract: A communication apparatus that enables to appropriately perform IP filtering even when communication via a network is performed by a user inputting a destination phone number. An IP filter permits or rejects communication on the basis of a set IP address. An input unit inputs a phone number. An acquisition unit acquires an IP address corresponding to the phone number inputted by the input unit from a server connected to the network. A setting unit sets the IP filter so that communication using the IP address acquired by the acquisition unit is permitted.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: April 23, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Hidenori Yokokura
  • Patent number: 8422650
    Abstract: A user of a first packet-based communication network is authorized to access a second packet-based communication network. In at least some embodiments, an authorization request is received from a user terminal of the user at a first network element of the first packet-based communication network, the authorization request comprising a first user identity. Responsive to the authorization request, a request is transmitted to create a second user identity from the first network element to a second network element of the second packet-based communication network. The second network element creates the second user identity for use in the second packet-based communication network, the second user identity being derivable from the first user identity according to a predetermined rule. The second user identity in the second packet-based communication network is stored for use with subsequent communication events over the second packet-based communication network.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: April 16, 2013
    Assignee: Microsoft Corporation
    Inventor: Andres Kütt
  • Publication number: 20130089191
    Abstract: A connection is established in a communications network responsive to receiving a Dual Tone Multi-Frequency (DTMF) signal at a port having an assigned sequence associated therewith. A dialed sequence corresponding to the received DTMF signal is identified. If the dialed sequence is associated with a request for a specified service, first and second fields of a packet-switched signaling protocol message are populated with the assigned sequence associated with the port. The populated packet-switched signaling protocol message is transmitted over a packet-switched network to request the specified service, and a connection is established to provide the specified service through the port. Related systems and devices are also discussed.
    Type: Application
    Filed: November 27, 2012
    Publication date: April 11, 2013
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: AT&T Intellectual Property I, L.P.
  • Publication number: 20130083908
    Abstract: A redundant Session Initiation Protocol (SIP) call center system has two data centers each having a first and a second SIP server cooperating as a first SIP-server high availability (HA) pair, a set of SW applications executable at each data center, and a plurality of agent stations each comprising a SIP telephone and a computerized appliance executing a desktop application at each agent station. The HA pairs operate as SIP server peers, the agent SIP phones are configured to maintain simultaneous registration with both SIP server peers, and Agent Desktop applications log in to only one SIP server peer, wherein the SIP Server peers collaborate to deliver calls to individual agent SIP phones via the SIP server peer where the agent is logged in, and wherein, upon failure of either data center agent's desktop applications log in to the other data center, allowing the associated agent to continue working.
    Type: Application
    Filed: September 18, 2012
    Publication date: April 4, 2013
    Inventors: Victor Kolesov, Bernard Bretherton, Galina Kovalenko
  • Publication number: 20130077774
    Abstract: Smart phone computer app. The method may include, if a number of an incoming phone call or incoming text message is not temporally allowed, not allowing for notification of the incoming phone call or incoming text according to a normal notification routine and generating a notification of the incoming call or incoming text according to a password-protected masked notification routine of the smart phone, wherein the password-protected masked notification routine of the smart phone includes adding an indication of the incoming phone call or incoming text message to a password-protected phone log or message log of the smart phone and precludes immediately displaying the incoming phone call or incoming text message information on a display of the smart phone, and further precludes adding an indication of the incoming phone call or incoming text message to a default phone log or message log of the smart phone.
    Type: Application
    Filed: September 25, 2011
    Publication date: March 28, 2013
    Applicant: INGENUITY SALES & SERVICES, LLC
    Inventor: Peter J. Lynch, III
  • Patent number: 8406393
    Abstract: A system includes a switch responsive to a control module. The control module that determines whether an incoming telephone call from a telephone number to a telephone line is a facsimile call or a voice call and whether facsimile calls are authorized to be routed to the telephone line. When the incoming telephone call is a voice call, the control module instructs a switch to route the incoming telephone call to the telephone line. When the incoming telephone call is a voice call, the control module instructs the switch to route the incoming telephone call to the telephone line when facsimile calls are authorized, and to deny routing the incoming telephone call to the telephone line when facsimile calls are not authorized.
    Type: Grant
    Filed: December 11, 2009
    Date of Patent: March 26, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Kenneth Robert Stroud, Paul A. Raccio
  • Patent number: 8406392
    Abstract: A method and system for authenticating a telephone number. The method includes receiving a user-inputted telephone number over a communication channel. The method includes providing a security code to a user over the communication channel. The method includes initiating a voice telephone call session to the user-inputted telephone number. The method includes prompting the user over the voice telephone call session. The method includes responsive to receiving the security code from the user over the voice telephone call session, authenticating the user-inputted telephone number.
    Type: Grant
    Filed: August 13, 2008
    Date of Patent: March 26, 2013
    Assignee: Sky Castle Global Limited
    Inventor: Edwin Tan
  • Patent number: 8386572
    Abstract: A system and method for circumventing a do-not-disturb status of an instant messaging user including defining a trusted user. A do-not-disturb status of an instant messaging user is identified. The trusted user is allowed to circumvent the do-not-disturb status of the instant messaging user.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: February 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: Gary Denner, Cynthia E. Barber-Mingo, Ruthie D. Lyle, Patrick Joseph O'Sullivan, Mary Ellen Zurko
  • Patent number: 8379813
    Abstract: Method and apparatus for authorizing a calling card telephone call are described. In one example, a telephone calling card includes a planar body having a memory system, an input circuit, a controller, and a display. The memory system is configured to store key code information. The input circuit is configured to receive a personal identification number (PIN). The controller is configured to derive a key code from the key code information using the PIN. The display is configured to present the key code. The user may then use the key code for purposes of authorizing a call made using a calling card. The key code may change from time-to-time as the user uses the calling card. Since the user's PIN is not entered into a telephone by the user, the calling card is less susceptible to unauthorized and/or fraudulent use by third parties.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: February 19, 2013
    Assignee: Vonage Network LLC
    Inventors: Donald J. Weber, Daniel T. Smires
  • Patent number: 8374320
    Abstract: When changes occur in an environment of the service user terminal, a network operator terminal acquires hashed environment information indicative of the changes from the service user terminal. The network operator terminal sends the hashed environment information to an environment management authority terminal. The environment management authority terminal calculates an evaluation value based on the hashed environment information and transmits the evaluation value to a network operator terminal. The network operator terminal transmits status change information to the service provider terminal. The service provider terminal updates information about the user information previously stored and decides whether to provide the service to the service user terminal based on the updated information.
    Type: Grant
    Filed: May 3, 2006
    Date of Patent: February 12, 2013
    Assignee: Fujitsu Limited
    Inventors: Masato Suzuki, Akihiro Inomata
  • Publication number: 20130010940
    Abstract: A method for providing communication control functionality at a remotely located site using a distributed feature architecture which provides communication features and data records to an Enhanced Network User (ENU). The ENU connects to a Distributed Feature Network (DFN) in order to gain access to communications features contained in the DFN. Based on the type of communication requested, one or more feature boxes are created in order to implement the requested communication.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: AT&T Corp.
    Inventors: Eric Cheung, Mark Jeffery Foladare, Shelley B. Goldman, James Christopher Ramming
  • Publication number: 20130003950
    Abstract: A device may obtain calling security parameters, may communicate the calling security parameters to a network device, and may receive, from the network device, a calling parameters identifier associated with the calling security parameters. The device may communicate the calling parameters identifier to a called device, may receive a called parameters identifier from the called device, and may communicate the called parameters identifier to the network device. The device may receive called security parameters from the network device, may create a security key based on the calling security parameters and the called security parameters, and may communicate with the called device using the security key.
    Type: Application
    Filed: March 5, 2012
    Publication date: January 3, 2013
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: Kwai Yeung LEE, William C. KING, Priscilla LAU
  • Patent number: 8346095
    Abstract: A method for providing access to a passive optical network for services to homes or businesses from two or more telecommunications service providers and a billing means is described. A first service provider connects to a point of presence at one side of passive optical network. The provider transmits the appropriate services through this network to an authorization receiver. The authorization receiver is used to receive a periodic authorization code from the network provider to enable the appropriate services from the service provider to be transmitted to a subscriber at a home or business. The authorization receiver enables an optical fiber path to be established for the services to flow to and from the home or business.
    Type: Grant
    Filed: December 7, 2009
    Date of Patent: January 1, 2013
    Assignee: CenturyLink Intellectual Property LLC
    Inventors: James Lloyd McNaughton, Randall Lee Markway
  • Patent number: 8345837
    Abstract: A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device.
    Type: Grant
    Filed: May 6, 2008
    Date of Patent: January 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Patent number: 8340259
    Abstract: An approach provides fraud detection in support of data communication services. A list of single-event attributes (e.g., hot or cold attributes) is generated and includes a network address of an end user host originating a data call or a calling party identification (e.g., Automatic Number Identification (ANI) or an originating Calling Line Identification (CLI)) for network access, wherein entries of the list specify values of the hot attributes. An attribute value associated with the data call is compared with the entries. A fraud alert is generated if the attribute value matches one of the entries.
    Type: Grant
    Filed: December 8, 2009
    Date of Patent: December 25, 2012
    Assignee: Verizon Business Global LLC
    Inventors: Saralyn M. Mahone, Matthew J. Gilbert, Thomas E. Stepp, Arthur L. Springer, John Hans Van Arkel
  • Publication number: 20120307992
    Abstract: Methods, apparatus, and computer program products provide dynamic replacement communication identification (ID) service. A request is received from a user for dynamic replacement communication ID from a current location of the user. The user requesting dynamic replacement communication ID is authenticated. A user profile of the user requesting dynamic replacement communication ID is retrieved. A current profile of the current location is replaced with the user profile of the user.
    Type: Application
    Filed: August 17, 2012
    Publication date: December 6, 2012
    Applicant: AT&T Delaware Intellectual Property, Inc.
    Inventors: Michael S. Denny, Hong Nguyen
  • Publication number: 20120307991
    Abstract: A method and apparatus of a device that converts a telephone number based on the location of a telephone is described. The device receives the telephone number, where telephone number is to be used to place a telephone call on the device. The device further determines if the telephone number is suitable to place the telephone call based on a content of the telephone number and a location of the device. If the telephone number is not suitable to place the telephone call, the device converts the telephone number to a telephone number suitable to be used to place the telephone call.
    Type: Application
    Filed: September 2, 2011
    Publication date: December 6, 2012
    Inventors: Joshua H. Schaffer, Jeremy Thomas Brown
  • Patent number: 8325889
    Abstract: A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: December 4, 2012
    Assignee: mobileAxept AS
    Inventors: Lars Sigve Bilstad, Ole Vidar Hestås, Atle Hedløy