SYSTEMS AND METHODS FOR CALLER IDENTIFICATION CUSTOMIZATION AND REMOTE MANAGEMENT OF COMMUNICATION DEVICES
First Claim
1. A method for managing a communication device, comprising:
- receiving a communication call including shared secret data;
verifying the shared secret; and
performing a communication device function associated with the verified shared secret.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, devices, systems and computer program products are described for implementing on a communication device customized caller ID and remote functional management of a communication device via shared secret exchange between calling and called parties. Customized caller ID provides for a calling party to identify themself regardless of the device they are using to place to call. In addition, other remote functional management, such as call priority tagging, provides for the calling party to prioritize the call or otherwise customize a call ID message to the called party. By exchanging shared secrets amongst the calling and called parties, the customized caller ID method and remote functional management are secure, thereby eliminating the likelihood of unauthorized tampering by unknown parties. Shared secret exchange also provides for authorized callers to remotely access and manage the communication device, such as, for example, to remotely lock down or place the communication device in an off state.
63 Citations
48 Claims
-
1. A method for managing a communication device, comprising:
-
receiving a communication call including shared secret data; verifying the shared secret; and performing a communication device function associated with the verified shared secret. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
12. A computer readable medium tangibly storing a sequence of instructions that, when executed, cause a computer device to perform the actions of:
-
receiving a communication call including shared secret data; verifying the shared secret; and performing a communication device function based on the verification of the shared secret. - View Dependent Claims (11)
-
-
13. At least one processor configured to perform the actions of:
-
receiving a communication call including shared secret data; verifying the shared secret; and performing a communication device function based on the verification of the shared secret.
-
-
14. A communication device, comprising:
-
a means for receiving a communication call having a shared secret; a means for verifying the shared secret; and a means for performing a communication device function associated with the verified shared secret.
-
-
15. A method for caller identification on a communication device, comprising:
-
receiving a communication call including shared secret data; accessing a database to determine a contact associated with the shared secret; and providing an output signal that identifies the contact associated with the shared secret. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A communication device, comprising:
-
a personal information manager that includes one or more databases that associate shared secrets with shared secret information; a call manager module including shared secret recognition logic operable to recognize a shared secret in a communication call and access at least one database to determine shared secret information associated with the shared secret and shared secret function logic operable for performing a communication device function based on at least one of the shared secret and shared secret information. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. A communication device, comprising:
-
a means for storing shared secrets and associated shared secret information; a means for recognizing a shared secret in a communication call; a means for accessing the means for storing to determine shared secret information associated with the shared secret; and a means for performing a communication device function based on at least one of the shared secret and shared secret information.
-
-
32. A communication device, comprising:
-
a contact database that associates a contact with a shared secret; and a call manager module including shared secret recognition logic operable to recognize a shared secret in a communication call and access the contact database to determine a contact associated with the shared secret and caller identification logic operable to provide an output signal that identifies the contact associated with the shared secret as the calling party. - View Dependent Claims (33, 34, 35)
-
-
36. A method for providing communication device management at a network device, comprising:
-
receiving, at a network device, a communication call request including a calling device identification number and a shared secret; and communicating a call request to a called party that includes the calling device identification number and the shared secret. - View Dependent Claims (37, 38, 39, 40)
-
-
41. A computer readable medium tangibly storing a sequence of instructions that, when executed, cause a computer device to perform the actions of:
-
receiving, at a network device, a communication call request including a calling device identification number and a shared secret; and communicating a call request to a called party that includes the calling device identification number and the shared secret.
-
-
42. At least one processor configured to perform the actions of:
-
receiving, at a network device, a communication call request including a calling device identification number and a shared secret; and communicating a call request to a called party that includes the calling device identification number and the shared secret.
-
-
43. A method for identifying a caller identification in a communication network, comprising:
-
receiving, at a network device, a communication call request including a calling device identification number and a shared secret; referencing a client database to determine a caller identification associated with the shared secret; and communicating a call request to a called party that includes the caller identification associated with the shared secret. - View Dependent Claims (44, 45)
-
-
46. A network device comprising a shared secret forwarding module that includes shared secret recognition logic operable for recognizing a shared secret in a communication call request and shared secret forwarding logic operable to communicate the shared secret to a called party associated with the communication call request.
-
47. A network device, comprising:
-
a client database that associates shared secrets with caller identification; a shared secret module that includes shared secret recognition logic operable to recognize a shared secret in a call request and reference the client database to determine a caller identification associated with the shared secret; and a communications module operable to communicate to a called party the call request that includes the caller identification associated with the shared secret.
-
-
48. A network device, comprising:
-
a means for receiving a communication call request including a calling device identification number and a shared secret; and a means for communicating a call request to a called party that includes the calling device identification number and the shared secret.
-
Specification