SECURE CALLER IDENTIFICATION USING A PROFILE
First Claim
Patent Images
1. A method for providing a secure caller identification using a caller'"'"'s profile, the method comprising:
- receiving, by one or more computer processors, a first login information for a first user;
receiving, by one or more computer processors, a first user profile associated with the first login information for the first user;
intercepting, by one or more computer processors, a call from the first user placed to a second user;
determining, by one or more computer processors, if the first login information verifies the first user; and
responsive to determining the first login information verifies the first user, transmitting, by one or more computer processors, the first user profile to the second user and causing the call from the first user placed to the second user to be forwarded to the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
A first login information for a first user is received. A first user profile associated with the first login information for the first user is received. A call from the first user placed to a second user is intercepted. If the first login information verifies the identity of the first user is determined. Responsive to determining the first login information verifies the first user, the first user profile is transmitted to the second user causing the call from the first user placed to the second user to be forwarded to the second user.
-
Citations
7 Claims
-
1. A method for providing a secure caller identification using a caller'"'"'s profile, the method comprising:
-
receiving, by one or more computer processors, a first login information for a first user; receiving, by one or more computer processors, a first user profile associated with the first login information for the first user; intercepting, by one or more computer processors, a call from the first user placed to a second user; determining, by one or more computer processors, if the first login information verifies the first user; and responsive to determining the first login information verifies the first user, transmitting, by one or more computer processors, the first user profile to the second user and causing the call from the first user placed to the second user to be forwarded to the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification