This application claims the benefit of U.S. Provisional Application No. 61/822,726 filed May 13, 2013.
The present invention is related to the field of caller identification and identification of message senders; commonly described as “caller ID services” in this document. More specifically, the present invention pertains to a method that enables the identification of unwanted callers or message senders with restricted communication devices or applications.
For the purpose of this document, an “unwanted” caller or message sender shall be defined as a personal or commercial contact, that a user wants to avoid or prefers to have no interaction with, via a incoming or outgoing phone call or messaging for reasons of personal preference or privacy.
For the purpose of this document, a “restricted communication device or application” is a device or application, which do not expose APIs (Application Program Interface) for programmatically accessing its call and message stack, either in real time (as calls or messages arrive or as calls are dialed or messages are sent), or by accessing the call or message history/log. Additional restrictions are imposed where a communications device limits the user to the device's default caller ID service at time of a call or message event. At the time of writing one example of such a “restricted device” is Apple's iPhone. One example of such a “restricted application” commonly described as “Instant Messaging application” or “IM application”, is WhatsApp for iOS.
The majority of related art in the field services relies on communication devices' or applications' ability to expose details of an incoming call or message for providing additional caller ID and caller information services, however such methods fail in restricted environments as described in the immediately preceding paragraph.
Further shortcomings of related art is caused by dependencies on the communication device or application's ability to replace or multitask the default caller ID service with its own user interface, again such methods fail in restricted environments as described above.
Other related art for providing caller ID identifications requires network components such as switches, routers or other additional devices to which calls and messages are diverted prior or in parallel to being delivered to the designated receivers. Such methods fail where accessing additional components are technically inaccessible.
Instead this present invention utilizes the comminations devices' default caller ID service. Caller ID service rely on a phone number being transmitted together with each call or message. If the transmitted number matches a record in the device contacts list (frequently referred to as address book), the device's default caller ID service replaces the number with the name of the contact. This allows a user to recognize contacts without remembering their individual phone numbers. However, if no match for a transmitted phone number can be found in the user's contact list, no name can be shown and the actual transmitted number is shown instead. At this point the user may a) answer the call or message to find what it is about or b) ignore the call or message and possibly research the number manually.
While researching the number, users frequently find that there are numbers, especially from the 800-service area code, which are used by telemarketers, robo calls, or in some cases, identity thieves and phone scam artist. Given the information about unwanted callers is available, this present invention comprises a method of providing this information to the user's device, so that unwanted callers and message senders can be recognized automatically and notified timely as such to the user (for example “Spam”), including but not limited to cases where the user has not stored them previously in their address book and the device or application has call and message log restrictions.
The following is intended to be a brief summary of the invention and is not intended to limit the scope of the invention.
A method of enabling incoming and outgoing unwanted caller notifications and incoming and outgoing unwanted message sender notification, by storing and updating a database of unwanted caller and unwanted message sender information in the memory of a communication device, which is shared by the device's default caller ID service.
The method of above for communication devices and applications where call and message events and logs cannot be accessed programmatically or where it's default caller ID service cannot be replaced.
The method of above, wherein the database of unwanted caller and unwanted message sender information is stored and updated as a separate, synchronized address book or similar groups of contacts on the communication device.
The method of above, wherein the database of unwanted caller and unwanted message sender information utilizes phone numbers, email-addresses or social network user names as unique contact identifiers.
The method of above, wherein the database of unwanted caller and unwanted message sender information is continuously adjusted as per the communication device user's contact, schedule or location preferences.
Both
Another similar embodiment of the method for enabling unwanted caller/message sender notifications uses alternative parameters such as email addresses or social network account ID's as unique identifiers for its unwanted contact information database. Independently of the identifier being used, the method enables unwanted caller and message sender notifications by providing additional context from an unwanted caller/message sender information address book stored on the device.
Continuing with
Continuing with
Number | Name | Date | Kind |
---|---|---|---|
6253075 | Beghtol et al. | Jun 2001 | B1 |
7620160 | Tidwell et al. | Nov 2009 | B2 |
8605879 | Wellard | Dec 2013 | B2 |
9100476 | Devitt et al. | Aug 2015 | B1 |
9106739 | Devitt et al. | Aug 2015 | B1 |
20040224675 | Puskoor et al. | Nov 2004 | A1 |
20070064920 | Ruckart | Mar 2007 | A1 |
20070201650 | Mastro | Aug 2007 | A1 |
20090136013 | Kuykendall | May 2009 | A1 |
20090157732 | Hao et al. | Jun 2009 | A1 |
20090298489 | Chitturi et al. | Dec 2009 | A1 |
20100056117 | Wolfman et al. | Mar 2010 | A1 |
20100074420 | Bauchot | Mar 2010 | A1 |
20100198854 | Chitturi et al. | Aug 2010 | A1 |
20100203874 | Scott et al. | Aug 2010 | A1 |
20110014900 | Gottfried | Jan 2011 | A1 |
20120276877 | Balannik et al. | Nov 2012 | A1 |
20130170635 | Kirkpatrick | Jul 2013 | A1 |
20140128047 | Edwards et al. | May 2014 | A1 |
20140199975 | Lou et al. | Jul 2014 | A1 |
Entry |
---|
“Avoid Spam Calls with Truecaller,” Trueman, True Software Scandinavia AB, Jun. 2, 2010, 4 pages. |
“Truecaller 2.0 for Android is Finally Released! Woohoo!,” Trueman, True Software Scandinavia AB, Oct. 19, 2010, 4 pages. |
Number | Date | Country | |
---|---|---|---|
20150334230 A1 | Nov 2015 | US | |
20180183927 A9 | Jun 2018 | US |
Number | Date | Country | |
---|---|---|---|
61822726 | May 2013 | US |