Wireless data exchange
First Claim
Patent Images
1. A method for automatically sending and receiving contact information between a first user of a first wireless device and a second user of a second wireless device, the method comprising:
- detecting, using an application executed by the first wireless device, a communication event occurring in the first wireless device, the communication event relating to a communication between the first user of the first wireless device and the second user of the second wireless device;
obtaining, using the application executed by the first wireless device, caller identification information related to the second wireless device in response to the detection of the communication event;
triggering, in response to the detection of the communication event, the application executed by the first wireless device to prompt the first user using the first communication device, the prompt requesting permission from the first user to send the contact information related to the first user that is stored in a memory of the first wireless device to the second wireless device, wherein the permission is requested after the occurrence of the communication event; and
retrieving, using the application executed by the first wireless device, the contact information related to the first user that is stored in the memory of the first wireless device; and
causing the sending of, using the application executed by the first wireless device, the first user contact information retrieved from the memory of the first wireless device to the second wireless device over a wireless network after permission is obtained from the first user, the causing the sending of the first user contact information includes the use of the obtained caller identification information related to the second wireless device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system of exchanging and managing information includes a mobile device configured to automatically insert, exchange and update a caller'"'"'s contact information into a user'"'"'s phonebook. The phonebook can reside on either the UICC card, SIM, USIM, Mega SIM, any other smart card or an integrated chip, on the mobile device or on a remote server. The automatic insert and/or automatic exchange mechanism is triggered when a call is made between two people on mobile phones or other devices.
113 Citations
6 Claims
-
1. A method for automatically sending and receiving contact information between a first user of a first wireless device and a second user of a second wireless device, the method comprising:
-
detecting, using an application executed by the first wireless device, a communication event occurring in the first wireless device, the communication event relating to a communication between the first user of the first wireless device and the second user of the second wireless device; obtaining, using the application executed by the first wireless device, caller identification information related to the second wireless device in response to the detection of the communication event; triggering, in response to the detection of the communication event, the application executed by the first wireless device to prompt the first user using the first communication device, the prompt requesting permission from the first user to send the contact information related to the first user that is stored in a memory of the first wireless device to the second wireless device, wherein the permission is requested after the occurrence of the communication event; and retrieving, using the application executed by the first wireless device, the contact information related to the first user that is stored in the memory of the first wireless device; and causing the sending of, using the application executed by the first wireless device, the first user contact information retrieved from the memory of the first wireless device to the second wireless device over a wireless network after permission is obtained from the first user, the causing the sending of the first user contact information includes the use of the obtained caller identification information related to the second wireless device. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification