AUTOMATED CALLER IDENTIFIER FROM CONTACT LISTS OF A USER'S CONTACTS
First Claim
1. A method performed on at least one computing device executing an identifier application, the method comprising:
- receiving a message from a sender;
searching, in response to the receiving, a contact list of a user for information that identifies the sender of the received message; and
sending, in response to the searching not finding the information that identifies the sender of the received message, another message requesting the information that identifies the sender of the received message from a contact list of a contact listed in the contact list of the user.
3 Assignments
0 Petitions
Accused Products
Abstract
When a call or message is received from an unidentified sender on the user'"'"'s communication device, the caller identifier application launches a text-based messaging application and causes it to send an “invisible” text-based message to the user'"'"'s contacts. The message includes the metadata (e.g., telephone number) associated with the call or message that the user received. The invisible message is a short message whose headers are programmed in a particular manner so that the receiving mobile phone acknowledges the receipt of the message and the receiving mobile phone displays no behavior perceptible by the user. When the invisible message is received by the corresponding caller identifier application on one of the user'"'"'s contact'"'"'s mobile phone, the application searches the contact'"'"'s contact list maintained in his or hers contact application. If the metadata provided to the contact'"'"'s mobile phone is located in the contact list, the contact details (e.g. Name) or the contact card, if available, is sent back to the user'"'"'s mobile phone in a second invisible message. Upon receiving the second invisible message, the caller identifier application causes some or all of the contact details to be displayed on the user'"'"'s mobile phone or otherwise presented to the user in any appropriate manner.
21 Citations
20 Claims
-
1. A method performed on at least one computing device executing an identifier application, the method comprising:
-
receiving a message from a sender; searching, in response to the receiving, a contact list of a user for information that identifies the sender of the received message; and sending, in response to the searching not finding the information that identifies the sender of the received message, another message requesting the information that identifies the sender of the received message from a contact list of a contact listed in the contact list of the user. - View Dependent Claims (2, 3, 4, 5, 7)
-
-
6. The method of claim where the at least one computing device comprises at least one server of a service provider.
-
8. At least one memory device storing computer-executable instructions that, when executed by at least one computing device comprising an identifier application, cause the at least one computing device and the identifier application to perform actions comprising:
-
receiving a message from a sender; searching, in response to the receiving, a contact list of a user for information that identifies the sender; and sending, in response to the searching not finding the information, another message requesting the information from a contact list of a contact listed in the contact list of the User. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising at least one computing device and an identifier application together configured for performing actions comprising:
-
receiving a message from a sender; searching, in response to the receiving, a contact list of a user for information that identifies the sender of the received message; and sending, in response to the searching not finding the information that identifies the sender of the received message, another message requesting the information that identifies the sender of the received message from a contact list of a contact listed in the contact list of the user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification