Electronic system and method for screening incoming communications
First Claim
Patent Images
1. A system for screening incoming communications comprising:
- a processor configured to sync screening functions and settings across a plurality of devices and connect to a telephone land line, a local user device, and a remote server; and
computer executable instructions readable by the processor and configured to;
receive an incoming communication via the telephone land line;
identify a sender of the communication;
access a database of unauthorized or authorized senders;
determine if the sender is unauthorized, authorized, or unknown; and
if the sender is authorized, then present the communication as an authorized communication on the local user device;
if the sender is unauthorized, then;
not present the communication on the local user device;
orpresent the communication as an unauthorized communication on the local user device; and
if the sender is unknown, then;
not present the communication on the local user device;
orpresent the communication as an unknown communication on the local user device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates generally to electronic systems and methods for screening incoming phone calls and more particularly to a system and method of hosting a cloud synced database of authorized or unauthorized callers, phone numbers, or numbers associated with unauthorized merchant identification numbers which is a solution to robo-calling and telemarketers.
-
Citations
20 Claims
-
1. A system for screening incoming communications comprising:
-
a processor configured to sync screening functions and settings across a plurality of devices and connect to a telephone land line, a local user device, and a remote server; and computer executable instructions readable by the processor and configured to; receive an incoming communication via the telephone land line; identify a sender of the communication; access a database of unauthorized or authorized senders; determine if the sender is unauthorized, authorized, or unknown; and if the sender is authorized, then present the communication as an authorized communication on the local user device; if the sender is unauthorized, then; not present the communication on the local user device;
orpresent the communication as an unauthorized communication on the local user device; and if the sender is unknown, then; not present the communication on the local user device;
orpresent the communication as an unknown communication on the local user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for screening incoming communications comprising:
-
a user device comprising a processor; and computer executable instructions readable by the processor and configured to; sync screening functions and settings across a plurality of devices; receive an incoming communication; identify a sender of the communication; access a database of unauthorized or authorized senders; determine if the sender is unauthorized, authorized, or unknown; and
if the sender is authorized, then present the communication as an authorized communication on a user device;if the sender is unauthorized, then; not present the communication on the user device;
orpresent the communication as an unauthorized communication on the user device; and if the sender is unknown, then; not present the communication on the user device;
orpresent the communication as an unknown communication on the user device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented method for screening incoming communications comprising:
-
sync screening functions and settings across a plurality of devices; receiving an incoming communication via the telephone land line; identifying a sender of the communication; accessing a database of unauthorized or authorized senders; determining if the sender is unauthorized, authorized, or unknown; and if the sender is authorized, then presenting the communication as an authorized communication on a user device; if the sender is unauthorized, then; not presenting the communication on the user device;
orpresenting the communication as an unauthorized communication on the user device; and if the sender is unknown, then; not presenting the communication on the user device;
orpresenting the communication as an unknown communication on the user device. - View Dependent Claims (18, 19, 20)
-
Specification