Management of mobile device communication sessions to reduce user distraction
DCFirst Claim
1. A method implemented in a computer system for managing communications comprising:
- determining a set of mobile device context identifiers, each of the set of mobile device context identifiers corresponding to a range of potential sensor information regarding the mobile device, wherein management by the computer system of requests for communication corresponding to the mobile device is defined in terms of a previously received mobile device context identifier without processing specific sensor information on which the context previously received mobile device context identifier is based;
obtaining selection of a mobile device context identifier of the set of mobile device context identifiers and selection of a mobile device availability for the selected mobile device context identifier;
associating the selected mobile device context identifier with the selected mobile device availability;
storing the association as a mobile device profile;
independent of a request for initiation of communication including the mobile device, receiving a first mobile device context identifier corresponding to one of the determined set of mobile device context identifiers, the first mobile device context identifier corresponding to a defined range of sensor information gathered regarding the mobile device;
independent of processing specific sensor information on which the first mobile device context identifier is based, determining a mobile device availability based on the received first mobile device context identifier, and the stored mobile device profile, wherein the mobile device availability corresponds to the management defined in terms of the received first mobile device context identifier;
receiving a request for initiation of communication including the mobile device and a third party device; and
without requesting a mobile device context identifier;
implementing a risk mitigation technique in accordance with the management defined in terms of the received first mobile device context identifier and based at least in part on the determined mobile device availability, wherein the risk mitigation technique includes at least initially preventing communication including the mobile device and the third party device, and wherein the risk mitigation technique is implemented without causing a modification of at least one of communication reception functionality and a power state of the mobile device.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
Systems, methods and interfaces are disclosed for managing communications associated with a mobile communication device. Mobile communication devices process environmental inputs and transmit mobile communication device context information to a communication management system. The context information may, for example, reflect the motion and/or geographic location of the mobile device, and may reflect the risk associated with using the device to handle a call or other communications session. The communication management system uses the context information, optionally in combination with communication device profiles, to determine how to manage incoming and/or ongoing calls or other communication sessions. Mobile device users may also be inhibited from initiating communication sessions.
139 Citations
20 Claims
-
1. A method implemented in a computer system for managing communications comprising:
-
determining a set of mobile device context identifiers, each of the set of mobile device context identifiers corresponding to a range of potential sensor information regarding the mobile device, wherein management by the computer system of requests for communication corresponding to the mobile device is defined in terms of a previously received mobile device context identifier without processing specific sensor information on which the context previously received mobile device context identifier is based; obtaining selection of a mobile device context identifier of the set of mobile device context identifiers and selection of a mobile device availability for the selected mobile device context identifier; associating the selected mobile device context identifier with the selected mobile device availability; storing the association as a mobile device profile; independent of a request for initiation of communication including the mobile device, receiving a first mobile device context identifier corresponding to one of the determined set of mobile device context identifiers, the first mobile device context identifier corresponding to a defined range of sensor information gathered regarding the mobile device; independent of processing specific sensor information on which the first mobile device context identifier is based, determining a mobile device availability based on the received first mobile device context identifier, and the stored mobile device profile, wherein the mobile device availability corresponds to the management defined in terms of the received first mobile device context identifier; receiving a request for initiation of communication including the mobile device and a third party device; and without requesting a mobile device context identifier; implementing a risk mitigation technique in accordance with the management defined in terms of the received first mobile device context identifier and based at least in part on the determined mobile device availability, wherein the risk mitigation technique includes at least initially preventing communication including the mobile device and the third party device, and wherein the risk mitigation technique is implemented without causing a modification of at least one of communication reception functionality and a power state of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method implemented in a computer system for managing communications comprising:
-
establishing a mobile device context identifier for use in indicating whether a mobile device is located within at least one geospatial zone, wherein the at least one geospatial zone is defined by a centroid and a non-circular boundary, and wherein management by the computer system of requests for communication including the mobile device is defined as a function of reception of the mobile device context identifier independent of a specific location of the mobile device within the at least one geospatial zone; obtaining a selection of one or more user identities corresponding to third parties who may attempt communication with the mobile device; associating a mobile device availability with the selected one or more user identities and with the mobile device context identifier; independent of a request for initiation of communication including the mobile device, receiving the mobile device context identifier indicating whether the mobile device is within the at least one geospatial zone, wherein receiving the mobile device context identifier occurs only if a change in mobile device context state has occurred; receiving a request for initiation of communication including the mobile device and a communicating party; independent of processing the specific location of the mobile device within the at least one geospatial zone on which the mobile device context identifier is based, determining a mobile device availability of the mobile device based on an identity of the communicating party and on the received mobile device context identifier indicating whether the mobile device is within the at least one geospatial zone, wherein the mobile device availability corresponds to the management defined in terms of the received mobile device context state; and without requesting an additional context identifier of the mobile device, implementing a risk mitigation technique in accordance with the management defined in terms of the received mobile device context identifier, wherein the risk mitigation technique includes at least initially preventing communication including the mobile device and the communicating party, and wherein the risk mitigation technique is implemented without causing a modification of at least one of communication reception functionality and a power state of the mobile device. - View Dependent Claims (9, 10, 11)
-
-
12. A method implemented in a computer system for managing communications with a mobile device comprising:
-
obtaining a user selection of a context identifier corresponding to a range of sensor information, wherein management by the computer system of requests for communication including the mobile device is defined in terms of a received context identifier without processing specific sensor information; obtaining a user selection of at least one identity corresponding to a third party who may attempt communication with the mobile device; obtaining a user selection of a mobile device availability to be associated with the selected identity and the selected context identifier; independent of a request for initiation of communication including the mobile device, receiving the context identifier corresponding to the range of sensor information, wherein receiving the context identifier occurs only if the mobile device determines a change in context state has occurred; receiving a request from the selected at least one identity for communication with the mobile device; and without requesting a context identifier of the mobile device; independent of processing specific sensor information on which the received context identifier is based, determining a mobile device availability of the mobile device based on the at least one identity and the received context identifier, wherein the mobile device availability corresponds to the management defined in terms of the received context identifier; and implementing a risk mitigation technique in accordance with the management defined in terms of the received context identifier, wherein the risk mitigation technique includes at least initially preventing the request from being transmitted to the mobile device, and wherein said implementing does not cause a modification of at least one of communication reception functionality and a power state of the mobile device. - View Dependent Claims (13, 14, 15)
-
-
16. A system for managing communications, the system comprising:
one or more computing devices configured to; associate a selected mobile device context identifier corresponding to a range of sensor information with a selected mobile device availability, wherein the selected mobile device context identifier is reflective of processing specific sensor information within an environment of the mobile device; independent of a request for initiation of communication including the mobile device, receive a mobile device context identifier, wherein management by the system of requests for communication including the mobile device is defined in terms of the received mobile device context identifier without processing specific sensor information on which the received mobile device context identifier is based; independent of processing the specific sensor information on which the received mobile device context identifier is based, determine a mobile device availability based at least in part on a determination of whether the received mobile device context identifier matches the selected mobile device context identifier, wherein the mobile device availability corresponds to the management defined in terms of the received mobile device context identifier; receive a request for initiation of communication including the mobile device and a third party device; and without request of a context identifier of the mobile device, and without a modification of at least one of communication reception functionality and a power state of the mobile device, implement a risk mitigation technique in accordance with the management defined in terms of the received mobile device context identifier and based at least in part on the determined mobile device availability, wherein the risk mitigation technique includes at least initially preventing the request for initiation of communication including the mobile device and the third party device. - View Dependent Claims (17, 18, 19, 20)
Specification