ELECTRONIC SYSTEM AND METHOD FOR SCREENING INCOMING COMMUNICATIONS
First Claim
Patent Images
1. A system for screening incoming communications comprising:
- a. a processor configured to connect to a telephone land line, a local user device, and a remote server; and
b. computer executable instructions readable by the processor and configured to;
i. receive a communication via the telephone land line;
ii. identify a sender of the communication;
iii. access a database of unauthorized or authorized senders;
iv. determine if the sender is unauthorized, authorized, or unknown; and
1. if the sender is authorized, then present the communication as an authorized communication on the local user device;
2. if the sender is unauthorized, then;
a. not present the communication on the local user device;
orb. present the communication as an unauthorized communication on the local user device; and
3. if the sender is unknown, then;
a. not present the communication on the local user device;
orb. present the communication as an unknown communication on the local user device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates generally to electronic systems and methods for screening incoming phone calls and more particularly to a system and method of hosting a cloud synced database of authorized or unauthorized callers, phone numbers, or numbers associated with unauthorized merchant identification numbers which is a solution to robo-calling and telemarketers.
38 Citations
20 Claims
-
1. A system for screening incoming communications comprising:
-
a. a processor configured to connect to a telephone land line, a local user device, and a remote server; and b. computer executable instructions readable by the processor and configured to; i. receive a communication via the telephone land line; ii. identify a sender of the communication; iii. access a database of unauthorized or authorized senders; iv. determine if the sender is unauthorized, authorized, or unknown; and 1. if the sender is authorized, then present the communication as an authorized communication on the local user device; 2. if the sender is unauthorized, then; a. not present the communication on the local user device;
orb. present the communication as an unauthorized communication on the local user device; and 3. if the sender is unknown, then; a. not present the communication on the local user device;
orb. present the communication as an unknown communication on the local user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for screening incoming communications comprising:
-
a. a user device comprising a processor; and b. computer executable instructions readable by the processor and configured to; i. receive a communication; ii. identify a sender of the communication; iii. access a database of unauthorized or authorized senders; iv. determine if the sender is unauthorized, authorized, or unknown; and 1. if the sender is authorized, then present the communication as an authorized communication on a user device; 2. if the sender is unauthorized, then; a. not present the communication on the user device;
orb. present the communication as an unauthorized communication on the user device; and 3. if the sender is unknown, then; a. not present the communication on the user device;
orb. present the communication as an unknown communication on the user device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented method for screening incoming communications comprising:
-
a. receiving a communication; b. identifying a sender of the communication; c. accessing a database of unauthorized or authorized senders; d. determining if the sender is unauthorized, authorized, or unknown; and e. if the sender is authorized, then presenting the communication as an authorized communication on a user device; f. if the sender is unauthorized, then; i. not presenting the communication on the user device;
orii. presenting the communication as an unauthorized communication on the user device; and g. if the sender is unknown, then; i. not presenting the communication on the user device;
orii. presenting the communication as an unknown communication on the user device. - View Dependent Claims (18, 19, 20)
-
Specification