This disclosure relates to managing incoming telephone calls and more particularly to managing incoming telephone calls to a mobile phone in which personalized and dynamic information can be provided to the caller when the phone owner is busy.
Mobile phones typically include a feature that allows the user to switch the phone into a silent or do not disturb mode that may for instance turn off the ringer and/or utilize a vibrate feature. However, there may be times where the phone owner would like to treat different callers differently. For example, in the case of a family emergency, it would be ideal to allow a call to come through, even if the phone owner does not otherwise wish to be disturbed.
Moreover, in a typical scenario where a caller is placed into voicemail, the caller has no sense of when the phone owner will be available to return the call.
Accordingly, a need exists for a more robust system for allowing a phone owner to manage incoming calls when the phone is in do not disturb mode.
The present invention relates to a system, method and program product for managing inbound calls on a mobile device set to a do not disturb (DND) mode. In one embodiment, there is a system for managing inbound calls on a mobile device, comprising: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
In a second embodiment, there is a computer readable medium having a program product stored thereon for managing inbound calls on a mobile device, comprising: program code for allowing the mobile device to be set to a do not disturb (DND) mode; program code for calculating dynamic information when an inbound call is received; and program code for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
In a third embodiment, there is a method for managing inbound calls on a mobile device, comprising: setting the mobile device to a do not disturb (DND) mode; calculating dynamic information when an inbound call is received from a caller; and broadcasting a message to the caller, wherein the message includes the dynamic information.
In a fourth embodiment, there is a method for deploying a system for managing inbound calls on a mobile device, comprising: providing a computer infrastructure being operable to: allow a user to set the mobile device to a do not disturb (DND) mode; calculate dynamic information when an inbound call is received from a caller; and broadcast a message to the caller, wherein the message includes the dynamic information.
The illustrative aspects of the present invention are designed to solve the problems herein described and other problems not discussed.
These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings.
The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
Referring to
Call management system 18 generally includes a mode control system 20 that allows user 38 to select an answering mode. Selection and associated inputs may be done via a keyboard, voice recognition or any other technique. Illustrative modes may include, e.g., normal mode, vibrate mode, flash mode, and one or more DND (do not disturb) modes 21. A first illustrative advanced DND mode 21 includes a bypass mode that places the phone into a silent mode, but allows callers to bypass the silent mode, e.g., based on a caller ID and/or a password. A second illustrative DND mode 21 includes dynamic message mode in which a broadcast message 42 encompasses dynamic information 44. Dynamic information 44 may comprise any type of information that is computed dynamically when the inbound call 40 is received. For instance, dynamic message mode may allow the user 38 to incorporate a time based parameter into the message 42 based on submitted inputs 23, a time the call was received and/or a time the mobile device 11 was placed into the DND mode. For instance, user 38 may supply an input 23 that reflects how long the user 38 will be unavailable, e.g., 60 minutes. Dynamic Information processing system 32 would then compute a “remaining time” (based on the input value, a current time and time of the input 23), which would be included in the message 42. For example, if 25 minutes elapsed since the input value of 60 minutes was entered, the message could state: “I will be unavailable for about another 35 minutes, please leave a message.” In this case, the calculated value “35 minutes” is automatically inserted into the message 42 as dynamic information 44 using any known technology (e.g., text to voice, etc.).
Alternatively, dynamic information 44 may include location based information, e.g., calculated from a global positioning system (not shown) or other location techniques. Based on the user's location, a message 42 such as, “I am currently in Paris; please call the local office in Paris to reach me at <phone number>.” In this case, the dynamic information 44 is Paris which includes an associated phone number.
Message management system 22 provides the mechanism by which filters and rules 24 are associated with information in the message database 34 and contacts database 36. For instance, selected contacts from the contact database may be associated with one or more message types, filters or rules. This may include setting up contacts such that some contacts receive a customized message, some receive a default message, and some are rejected altogether. It can also be used to identify which contacts will qualify for the dynamic message mode or bypass mode. For example, family members may be given a password that allows them to cause the device 11 to ring/vibrate/flash even though the phone is set to silent mode, while non-family members are sent to voicemail.
Call processing system 26 is responsible for analyzing inbound calls 40 and determining how each call 40 should be handled based on a selected mode, caller ID, and/or any filters and rules 24 that apply to the caller ID. Call processing system 26 includes a DND bypass system 28 that lets predefined contacts bypass a silent mode if the bypass mode is enabled. If enabled, DND bypass system 28 can prompt for and evaluate a password to determine if the predefined contact should be allowed to disturb the user 38. Call processing system 26 also includes a message selection system 30 that selects and plays the appropriate message 42 for the user based on defined filters and rules 24. This may include incorporating dynamic information 44 in the message 42 as generated by dynamic information processing system 32.
If the caller is not on the bypass list at S5 or bypass mode is not enabled at S4, then a check is made at S9 to determine if dynamic message mode is enabled. If dynamic message mode is enabled at S9, a check is (optionally) made to see if the caller qualifies for a dynamic message at S10. If dynamic message mode is not enabled or the caller does not qualify for a dynamic message or an incorrect password was entered at S7, a default message is played for the caller at S13. If the caller does qualify for a dynamic message at S10, then dynamic information is calculated at S11 and a dynamic message is played at S12. Although not shown in
1) a customized message with dynamic information,
2) a customized message without dynamic information,
3) a default message with dynamic information,
4) a default message without dynamic information, or
5) a bypass option to override silent mode.
Joe Thomas includes two defined rules, “Allow dynamic messaging” and “Allow bypass”. Thus, if dynamic messaging mode and bypass mode were enabled by the user, Joe would receive a customized message with dynamic information such as “Hey Joe, leave a message if you want. I should be available in about 20 minutes. If you would like to bypass do not disturb mode, press # and enter your password.”
Finally, Fred Uger includes no assigned rules, so he would receive a default message with no dynamic information. As can be seen, groups may be defined (e.g., family, work, etc.) which may for instance be assigned default rules. Thus, all family members could be configured to receive the rule “Allow bypass.” Obviously,
Referring again to
I/O 14 may comprise any system for exchanging information to/from an external resource. External devices/resources may comprise any known type of external device, including a monitor/display, speakers, storage, another computer system, a hand-held device, keyboard, mouse, voice recognition system, speech output system, printer, facsimile, pager, etc. Bus 17 provides a communication link between each of the components in the computer system 10 and likewise may comprise any known type of transmission link, including electrical, optical, wireless, etc. Although not shown, additional components, such as cache memory, communication systems, system software, etc., may be incorporated into computer system 10.
Access to computer system 10 may be provided over a network such as the Internet, a local area network (LAN), a wide area network (WAN), a virtual private network (VPN), wireless, cellular, etc. Communication could occur via a direct hardwired connection (e.g., serial port), or via an addressable connection that may utilize any combination of wireline and/or wireless transmission methods. Moreover, conventional network connectivity, such as Token Ring, Ethernet, WiFi or other conventional communications standards could be used. Still yet, connectivity could be provided by conventional TCP/IP sockets-based protocol. In this instance, an Internet service provider could be used to establish interconnectivity. Further, as indicated above, communication could occur in a client-server or server-server environment.
It should be appreciated that the teachings of the present invention could be offered as a business method on a subscription or fee basis. For example, a computer system 10 comprising a call management system 18 could be created, maintained and/or deployed by a service provider that offers the functions described herein for customers. That is, a service provider could offer to deploy or provide call management as described above.
It is understood that in addition to being implemented as a system and method, the features may be provided as a program product stored on a computer-readable medium, which when executed, enables computer system 10 to provide a call management system 18. To this extent, the computer-readable medium may include program code, which implements the processes and systems described herein. It is understood that the term “computer-readable medium” comprises one or more of any type of physical embodiment of the program code. In particular, the computer-readable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as memory 16 and/or a storage system, and/or as a data signal traveling over a network (e.g., during a wired/wireless electronic distribution of the program product).
As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression. To this extent, program code can be embodied as one or more types of program products, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like. Further, it is understood that terms such as “component” and “system” are synonymous as used herein and represent any combination of hardware and/or software capable of performing some function(s).
The block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Although specific embodiments have been illustrated and described herein, those of ordinary skill in the art appreciate that any arrangement which is calculated to achieve the same purpose may be substituted for the specific embodiments shown and that the invention has other applications in other environments. This application is intended to cover any adaptations or variations of the present invention. The following claims are in no way intended to limit the scope of the invention to the specific embodiments described herein.
Number | Date | Country | Kind |
---|---|---|---|
08305686.1 | Oct 2008 | EP | regional |