SECURE CALLER IDENTIFICATION USING A PROFILE
1 Assignment
0 Petitions
Accused Products
Abstract
A first login information for a first user is received. A first user profile associated with the first login information for the first user is received. A call from the first user placed to a second user is intercepted. If the first login information verifies the identity of the first user is determined. Responsive to determining the first login information verifies the first user, the first user profile is transmitted to the second user causing the call from the first user placed to the second user to be forwarded to the second user.
8 Citations
20 Claims
-
1-7. -7. (canceled)
-
8. A computer program product for providing a secure caller identification using a caller'"'"'s profile, the computer program product comprising:
-
one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to receive a first login information for a first user; program instructions to receive a first user profile associated with the first login information for the first user; program instructions to intercept a call from the first user placed to a second user; program instructions to determine if the first login information verifies the first user; and program instructions to, in response to determining the first login information verifies the first user, transmit the first user profile to the second user and cause the call from the first user placed to the second user to be forwarded to the second user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system for providing a secure caller identification using a caller'"'"'s profile, the computer system comprising:
-
one or more computer processors; one or more computer readable storage media; program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising; program instructions to receive a first login information for a first user; program instructions to receive a first user profile associated with the first login information for the first user; program instructions to intercept a call from the first user placed to a second user; program instructions to determine if the first login information verifies the first user; and program instructions to, in response to determining the first login information verifies the first user, transmit the first user profile to the second user and cause the call from the first user placed to the second user to be forwarded to the second user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification