Smartphones are increasingly becoming an important communication tool. In addition to voice communications, they allow texting, e-mail, web browsing, photography, video recording, music listening, navigation, calendars, address books, notifications, voice recognition, games and thousands of other applications. This year marks the first time that more people have access to the interne through smartphones and tablet computers than with desktop and laptop computers.
Because of the growing success of the smartphones, traditional landline telephone use is on the decline. The downside is that people are becoming more and more dependent on just one device—their smartphone. Thus, when a user's smartphone is lost, stolen, misplaced, has dead batteries, or is inconveniently located, for example, during an emergency, a huge inconvenience can occur.
The present disclosure describes systems and methods of operating a secondary cellular telephone. In one embodiment, a user purchases a service plan or subscription from a carrier or provider of a cellular telephone network which includes activation of at least a primary and a secondary cellular telephone. This subscription plan associates, in one embodiment, the secondary cellular telephone with the subscriber ID account information of the primary cellular telephone on the same carrier network. In addition, the user can provide permission to the carrier that, under certain conditions, all incoming calls to the primary cellular telephone number are automatically forwarded to the secondary cellular telephone, and/or all outgoing calls made from the secondary cellular telephone are “spoofed” so that the caller ID on the phone of the call receiving party (when calls are made using the secondary cellular telephone) indicates the same phone number and identity as that of the primary cellular telephone. This permission can be provided in the process of signing up or setting up of the subscription plan for communication services through the carrier's cellular telephone network. To trigger the described forwarding/spoofing operation, in one embodiment, the secondary phone could simply be turned on, perform the cellular registration process and connect to the network, thereby signaling the network that forwarding or spoofing or both forwarding and spoofing should be implemented. In another embodiment, the secondary cellular telephone can transmit explicit instructions as to when the cellular telephone network should implement the forwarding and/or spoofing operations.
In one embodiment, the secondary cellular telephone can be provided a unique permanent phone number at the time the user purchases a subscription plan with a carrier or other service provider. However, since the secondary cellular telephone may be used sporadically, a carrier may not want to tie up a single telephone number. Thus, in another embodiment, the carrier or provider of the cellular telephone network can assign a telephone number on demand; for example, each time the secondary cellular telephone registers and connects with the cellular telephone network, a telephone number is assigned, and the assigned telephone number can be different each time the secondary cellular telephone registers and connects with the cellular telephone network. In another embodiment, the secondary cellular telephone number could remain for a fixed period of time set by the carrier or the user (e.g., 24 hours). Since all calls appear to be made from or to the user's the primary cellular telephone number, there would be no concern about the secondary cellular telephone having a phone number that changes on occasion as the new number, in such an embodiment, would be transparent to the user and the recipient of any outgoing calls.
In another embodiment, the forwarding operation of incoming calls can include allowing both the primary and the secondary cellular telephones to ring at the same time during an incoming call. This simultaneous ringing might be useful if the primary cellular telephone is misplaced rather than stolen, or for other user preferences. In another embodiment, the secondary cellular telephone can be programmed to offer delayed ringing, in which the primary cellular telephone rings for a given number of rings (e.g., two rings), before the secondary cellular telephone rings. In yet another embodiment, the cellular telephone network can be configured to offer a delayed ringing capability by first ringing the primary cellular telephone for a given number of rings, before ringing the secondary cellular telephone (alone or simultaneously with the primary cellular telephone).
In one embodiment, the secondary cellular telephone is either integrated into a vehicle, such as an automobile, or is an add-on option of the vehicle or can be added as a plug-in capability of the vehicle. The secondary cellular telephone, when integrated into the vehicle, can be integrated into the vehicle at a factory location where the automobile is manufactured and assembled; in this case, when the original buyer first receives the vehicle, it already includes the secondary cellular telephone as a factory installed feature. The secondary cellular telephone, when added as an add-on option of the vehicle, can be added into the vehicle by a vehicle dealer at the time of purchase and/or delivery of the vehicle or be added afterwards by a dealer or service/repair facility. When the secondary cellular telephone is integrated into the vehicle or is an add-on option, the secondary cellular telephone uses one or more speakers built into the automobile and one or more microphones built into the vehicle so the secondary cellular telephone can operate in a hands-free manner. For example, the same speakers used in the vehicle for music and/or radio playback are used by the secondary cellular telephone, and the microphones used for the vehicle's speech recognition system (e.g. for voice control of the radio or navigation system) are also used by the secondary cellular telephone. Moreover, when the secondary cellular telephone is integrated into or is an add-on option, it uses input interfaces of the vehicle such as one or more buttons on the steering wheel or console or dashboard or a touch panel interface of the vehicle. In the case of a plug-in secondary cellular telephone, the secondary cellular telephone may include its own speakers and microphone.
In one embodiment, the secondary telephone can be operated by using the standard controls on the vehicle such as a talk button on the steering wheel or an icon on a touch screen. The user can press a button (a talk button on the steering wheel) to activate the secondary cellular telephone which causes it to register onto the cellular telephone network described herein to otherwise operate as a secondary cellular telephone as described herein. The secondary cellular telephone, when integrated or as an add-on option, can use the vehicle's address book (which contains phone numbers of people or places to call) and can use other features provided by the vehicle such as speech recognition systems that are built into vehicles (to recognize names, places, commands to be performed, etc.).
In one embodiment, the secondary cellular telephone that is part of a vehicle can be configured to be used separately by multiple different users, and each of the users can select their corresponding phone number of their primary cellular telephone to configure the secondary cellular telephone to use their corresponding phone number for spoofing and call forwarding as described herein. Each user can separately configure the secondary cellular telephone by, in one embodiment, entering their password or by speaking in the vehicle. For example, a husband can activate the secondary cellular telephone by entering his password into a touch screen interface in the vehicle so that it spoofs the husband's primary cellular telephone and call forwards from the husband's primary cellular telephone, and when the wife drives the vehicle and needs to activate the secondary cellular telephone, the wife enters her password so that it uses her primary cellular telephone number when spoofing and call forwards calls made to her primary cellular telephone number.
The secondary phone can also have a “find my phone” feature, to identify the location of the primary phone, allow a text message to be sent to the primary phone and/or allow remotely erasing data on the primary phone. Various embodiments illustrating the above mentioned features are described herein.
The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
Various embodiments and aspects of the inventions will be described with reference to details discussed below, and the accompanying drawings will illustrate the various embodiments. The following description and drawings are illustrative of the invention and are not to be construed as limiting the invention. Numerous specific details are described to provide a thorough understanding of various embodiments of the present invention. However, in certain instances, well-known or conventional details are not described in order to provide a concise discussion of embodiments of the present inventions.
Reference in the specification to “one embodiment” or “an embodiment” or “another embodiment” means that a particular feature, structure, or characteristic described in conjunction with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification do not necessarily all refer to the same embodiment. The processes depicted in the figures that follow are performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, etc.), software, or a combination of both. Although the processes are described below in terms of some sequential operations, it should be appreciated that some of the operations described can be performed in a different order. Moreover, some operations can be performed in parallel rather than sequentially.
During the cellular registration process, the secondary cellular telephone 102 transmits its identification information to the cellular network server 108. The registration process can include the cellular network server 108 verifying the subscription ID account information for the secondary cellular telephone from subscriber account database(s) 110. The cellular network server 108 queries its subscriber account database(s) 110 to recognize the account information associated with the secondary cellular telephone 102 and the primary cellular telephone 104. Once the cellular network server 108 successfully verifies the authenticity of the secondary cellular telephone 102, the cellular network server 108 transmits a registration accept message and allows the secondary cellular telephone to connect with the cellular telephone network 112. In one embodiment, the registration process (in which the secondary cellular telephone is authenticated and connected to the carrier's cellular telephone network) can be used to automatically (without any user interaction) invoke a set of services such as spoofing or forwarding or both spoofing and forwarding. During this process the cellular network server 108 can also assign a telephone number to the secondary cellular telephone 102, if one is not currently assigned.
In one embodiment, the secondary cellular telephone number can be different from the primary cellular telephone number. In one embodiment, the secondary cellular telephone number can be assigned to the secondary cellular telephone 102 when the user purchases a plan to operate the secondary cellular telephone 102 from the provider or carrier of the cellular telephone network 112. In another embodiment, the secondary cellular telephone number can be permanently assigned to the secondary cellular telephone 102. In another embodiment, the secondary cellular telephone number can be temporarily assigned by the cellular network server 108 for a predetermined period of time. In another embodiment, the temporarily assigned secondary cellular telephone number can be randomly assigned (e.g., from a list of available numbers) by the cellular network server 108. In yet another embodiment, the secondary cellular telephone number can be dynamically assigned each time the cellular network server 108 performs a cellular registration of the secondary cellular telephone.
After successful connection with the cellular telephone network 112, incoming calls at the primary cellular telephone number can be forwarded to the secondary cellular telephone 102 and/or outgoing calls made from the secondary cellular telephone 102 can be spoofed to display the primary cellular telephone number at the caller ID of the call receiving party. In doing so, the call receiving party would not know if the call was initiated using the primary cellular telephone 104 or the secondary cellular telephone 102. These aspects of the present invention are explained in detail while describing
In one embodiment, the cellular registration of the secondary cellular telephone 102, and the connection with the cellular telephone network 112 can be allowed due to a legal contract between the user and the provider or carrier of the cellular telephone network 112. This can be required to comply with government regulations. In one embodiment, information of such an agreement can be stored in the subscriber ID account information (e.g., in database tables). This information can comprise the validity or status of such a contract, the minimum subscriber plan information required for the agreement to remain in effect (e.g., minimum of two cellular telephones are required to activate the agreement), whether call forwarding/spoofing is active, etc. In one embodiment, the subscriber ID account information comprises a ‘spoofing allowed’ flag which indicates that a valid agreement between the user and the provider of the cellular telephone network exists, and that the subscriber has provided permission to allow the secondary telephone to spoof the primary telephone by causing the carrier's cellular telephone network to display the primary telephone's phone number (or other identifier of the primary telephone) as the caller ID of the secondary telephone when the secondary telephone is used to make a telephone call.
In one embodiment, the cellular telephone network's call forwarding configuration can be governed based on an instruction transmitted by the secondary cellular telephone, as shown in block 308. Thus, depending on the instruction transmitted by the secondary cellular telephone (either upon initial connection to the cellular telephone network or at a later time while the connection still exists), the cellular telephone network can apply any of the call forwarding configurations described herein.
The cellular telephone network, in another embodiment, can also be configured to spoof outgoing calls from the secondary cellular telephone with the primary cellular telephone number. This configuration, in one embodiment, can be a result derived, directly or indirectly, from the cellular registration process of the secondary cellular telephone. During spoofing an outgoing call from the secondary cellular telephone displays the primary cellular telephone number on the caller ID of a call receiving party. Thus, the call receiving party would not know if the call was placed from the primary or the secondary cellular telephone.
Alternatively, in another embodiment, the secondary cellular telephone can transmit an instruction to the cellular telephone network to spoof outgoing calls, as shown in block 308. In one embodiment, such an instruction can be transmitted each time an outgoing call is placed from the secondary cellular telephone, providing ad-hoc spoofing. Thus, the user can, each time, choose when to spoof the outgoing call with the primary cellular telephone number and when not to spoof the outgoing call. In another embodiment, the spoofing instruction can be transmitted by the secondary cellular telephone during the cellular registration process. In another embodiment, the forwarding and/or spoofing instruction can be transmitted by the secondary cellular telephone before connecting with the cellular telephone network (thus, after successful cellular registration). In an alternative embodiment, the spoofing instruction transmitted by the secondary cellular telephone can be valid for a predetermined period of time (e.g., two hours) during which the cellular telephone network would allow spoofing the secondary cellular telephone with the primary cellular telephone number for the predetermined period of time.
In other embodiments, any of the above described call forwarding embodiments or the spoofing embodiments by the secondary cellular telephone can also be transmitted by the primary cellular telephone.
Referring back to
In various other embodiments, during placement of an outgoing call from the secondary cellular telephone, the cellular network server can be configured to automatically spoof all the secondary cellular telephone outgoing calls with the primary cellular telephone number, or the secondary cellular telephone can instruct the cellular network server when to spoof outgoing calls (block 412) as discussed above in connection with
At block 420 the cellular network server receives a request to place an outgoing call by the secondary cellular telephone. At block 422, depending on the configuration, the cellular network server can spoof the caller ID of the secondary cellular telephone using the primary cellular telephone number. As described above, in one embodiment, such an instruction can be transmitted by the secondary cellular telephone directly or indirectly during the placement of a call. Corresponding server configurations regarding spoofing the calls as described in connection with
Referring back to
As illustrated in
The volatile memory 1010 and/or non-volatile memory 1002 can store data and/or programs for execution by the computer system 1000. The bus(es) 1001 may be connected to each other through various bridges, controllers, and/or adapters as is well known in the art. The processing unit 1004 can retrieve instruction(s) from the volatile memory 1006 and/or the nonvolatile memory 1002, and execute the instructions to perform operations as described above. The processing unit 1004 may also receive instructions from the primary or the secondary cellular telephones via the cellular telephone network, which can further trigger processing operations utilizing any of the above described components. Bus(es) 1001 interconnects the above components together and also interconnects those components to other input output devices (e.g., NIC (Network Interface Card), a cursor control (e.g., mouse, touchscreen, touchpad, etc.), a keyboard, etc.), and (e.g., Bluetooth, WiFi, Infrared, cellular telephony, GPS, etc.).
The techniques shown in the figures can be implemented using computer program instructions (computer code) and data stored and executed on one or more electronic systems (e.g., computer systems, etc.). Such electronic systems store and communicate (internally and/or with other electronic systems over a network) code and data using machine-readable media, such as machine-readable non-transitory storage media (e.g., magnetic disks; optical disks; random access memory; dynamic random access memory; read only memory; flash memory devices; phase-change memory). In addition, such electronic systems typically include a set of one or more processors coupled to one or more other components, such as one or more storage devices, user input/output devices (e.g., a keyboard, a touchscreen, and/or a display), and network connections. The coupling of the set of processors and other components is typically through one or more busses and bridges (also termed as bus controllers). The storage device and signals carrying the network traffic respectively represent one or more machine-readable storage media and machine-readable communication media. Thus, the storage device of a given electronic device typically stores code and/or data for execution on the set of one or more processors of that electronic device.
It should be apparent from this description that aspects of the present invention may be embodied, at least in part, in software. That is, the techniques may be carried out in a computer system or other computer system in response to its processor, such as a microprocessor, executing sequences of instructions contained in memory, such as a ROM, DRAM, mass storage, or a remote storage device. In various embodiments, hardware circuitry may be used in combination with software instructions to implement the present invention. Thus, the techniques are not limited to any specific combination of hardware circuitry and software nor to any particular source for the instructions executed by the computer system. In addition, throughout this description, various functions and operations are described as being performed by or caused by software code to simplify description. However, those skilled in the art will recognize what is meant by such expressions is that the functions result from execution of the code by a processor.
Numerous other embodiments and aspects of the secondary cellular telephone are described herein. For example, a user can also have more than one the secondary cellular telephone. For example, a backup phone could be kept in an automobile, while another kept in a bathroom of a home. Each secondary cellular telephone could operate as described above.
In one embodiment described above, the secondary cellular telephone can be integrated into or an add-on option of a vehicle, such as an automobile.
In addition to functioning as a backup or emergency phone, the secondary cellular telephone can be used as an alternative to a large full-featured smartphone. For example, an embodiment of the secondary cellular telephone can be a small, waterproof secondary cellular telephone that can be used during sports, when a large smartphone might be inconvenient to carry or is subject to damage. As non-limiting examples, various aspects and features of the secondary cellular telephone are discussed in provisional Application No. 61/792,536, filed Mar. 15, 2013, which is incorporated in here by reference.
For example, in one embodiment, the secondary cellular telephone can be substantially cylindrical in shape. Yet, other embodiments can include a screw-on mechanism and an O-ring gasket to attach the front surface of the secondary cellular telephone with a back surface; the O-ring gasket provides a good seal against water. Such an embodiment can be waterproof. In one embodiment, the secondary cellular telephone can have an internal frame that defines a substantially cylindrical shape in at least one cross sectional volume through the frame inside the secondary cellular telephone, and a screw-on mechanism can be implemented in that portion of the frame; the secondary cellular telephone can have an external cylindrical shape or can have a different external shape (e.g., rectangular) but still use such a screw-on mechanism. A secondary cellular telephone which uses a screw on mechanism can include (1) a front portion which includes a display on a front surface and includes at least one first screw thread along a first cylindrical wall; and (2) a second portion having a back surface, the second portion having at least a second screw thread along a second cylindrical wall. The second screw thread is designed and sized to match the first screw thread such that the second screw thread matingly screws into the first screw thread. The first screw thread can be a first helical or spiral ridge along the first cylindrical wall and the second screw thread can be a second helical or spiral ridge along the second cylindrical wall. The secondary cellular telephone can also include an O-ring gasket disposed between the first portion and the second portion to seal the joint between these portions and can also be of a water barrier material in one or more regions or surfaces or other joints in order to make the cellular telephone waterproof.
Numerous other embodiments can include other functionality (individually or a combination thereof), such as, being able to communicate with other electronic systems in a low powered mode using a Personal Area Network technology device (e.g., Bluetooth), or having a headset jack to transmit audible sound signals from the cellular telephone device, or having a camera and integrated flash system, Bluetooth, WiFi, near field communication, etc.
In one embodiment the secondary cellular telephone can be a small cylindrical device with a diameter between 2 and 2.5 inches, and a depth (thickness) of 0.2 and 0.5 inches. This embodiment allows the secondary cellular telephone to be comfortably carried in the smallest pant pockets or purse, or worn on the body by attaching it to a wrist strap, armband, lanyard, clip or fastener, yet have a touchscreen large enough to provide a virtual keyboard that allows typing with the same (or almost the same) speed, accuracy, and comfort of smartphones. In one embodiment, the secondary cellular telephone can have a touchscreen display capable of receiving and processing touch inputs where the touch screen display has an exposed diameter between 1.6 inches and 2.2 inches. In one embodiment, the touchscreen display can have a virtual keyboard, including virtual alpha-numeric keys and virtual special keys. In one embodiment, the virtual alpha-numeric keys can have a length between 0.2 inches and 0.27 inches, and width between 0.14 and 0.19 inches. In one embodiment, the virtual alpha-numeric keys can have a horizontal key pitch between 0.18 inches and 0.23 inches and a virtual key pitch between 0.24 inches and 0.36 inches.
In another embodiment, the secondary cellular telephone can also comprise a battery monitoring system, which can monitor the state of the power capacity of a battery in the cellular telephone. The battery monitoring system, upon determining a prescribed state of the power capacity of the battery, and can automatically set the cellular telephone into an active mode (where the cellular transceiver is powered up and the cellular telephone can communicate over a cellular telephone network), and send a notification about the state of the battery to a designated destination using the cellular telephone network, and then return to a low powered mode, or optionally, turn off the secondary cellular telephone after transmission of the notification message.
While the invention has been described in terms of several embodiments, those skilled in the art will recognize that the invention is not limited to the embodiments described, can be practiced with modification and alteration within the spirit and scope of the appended claims. The description is thus to be regarded as illustrative instead of limiting.
This application claims the benefit, including the benefit of the filing dates, of the following U.S. Provisional Patent Applications: 61/842,277 (filed Jul. 2, 2013); 61/792,536 (filed Mar. 15, 2013); and 61/842,901 (filed Jul. 3, 2013); and all three of these provisional patent applications are incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
61842277 | Jul 2013 | US | |
61792536 | Mar 2013 | US | |
61842901 | Jul 2013 | US |