Advanced telephone management
First Claim
1. A method for securing telephone communications, the method comprising:
- receiving a telephone input at a first mobile device, the telephone input identifying a second mobile device, wherein the second mobile device includes a plurality of different types of audio output circuitry;
connecting a telephone call between the first mobile device and the second mobile device, the telephone call including transmission of a first audio data stream from the first mobile device to the second mobile device, the telephone call also including transmission of a second audio stream from the second mobile device to the first mobile device;
receiving a security input at a user interface of the first mobile device; and
permitting the first audio stream to be output at the second device via a permitted type of audio output circuitry of the second mobile device while preventing the first audio stream from being output at the second mobile device via an excluded type of audio output circuitry of the second mobile device in response to receipt of the security input at the first mobile device, the excluded set of audio output modules being a subset of the plurality of different types of audio output circuitry of the second mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for providing telephone management are provided. Information may be stored in memory of a first mobile device. Such stored information may concerns a plurality of other mobile devices. A telephone call may be connected between the first mobile device and a second mobile device. A request may be received from a user of the first mobile device concerning manipulating data concerning the telephone call with the second mobile device. Information regarding the second mobile device may be identified and matched to the stored information. Such a match may indicate that the second mobile device is enabled for manipulation of telephone call data during telephone calls. As such, the telephone call data may be manipulated during the telephone call in accordance with the user request.
-
Citations
20 Claims
-
1. A method for securing telephone communications, the method comprising:
-
receiving a telephone input at a first mobile device, the telephone input identifying a second mobile device, wherein the second mobile device includes a plurality of different types of audio output circuitry; connecting a telephone call between the first mobile device and the second mobile device, the telephone call including transmission of a first audio data stream from the first mobile device to the second mobile device, the telephone call also including transmission of a second audio stream from the second mobile device to the first mobile device; receiving a security input at a user interface of the first mobile device; and permitting the first audio stream to be output at the second device via a permitted type of audio output circuitry of the second mobile device while preventing the first audio stream from being output at the second mobile device via an excluded type of audio output circuitry of the second mobile device in response to receipt of the security input at the first mobile device, the excluded set of audio output modules being a subset of the plurality of different types of audio output circuitry of the second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for securing telephone communications, the system comprising:
-
a microphone; an input interface; a communication transceiver to form a telephone call connection with a second mobile device, wherein the second mobile device includes a plurality of different types of audio output circuitry; and a processor coupled to a memory and to the microphone and to the input interface and to the communication transceiver, wherein execution of instructions stored in the memory by the processor; receives a telephone input identifying the second mobile device, connects the telephone call between the communication transceiver and the second mobile device, the telephone call including transmission of a first audio data stream from the microphone to the second mobile device, the telephone call also including transmission of a second audio stream from the second mobile device to the communication transceiver, receives a security input at the input interface, and permits the first audio stream to be output at the second device via a permitted type of audio output circuitry of the second mobile device while preventing the first audio stream from being output at the second mobile device via an excluded type of audio output circuitry of the second mobile device in response to receipt of the security input at the input interface, the excluded set of audio output modules being a subset of the plurality of different types of audio output circuitry of the second mobile device. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium, having embodied thereon a program executable by a processor to perform a method for securing telephone communications, the method comprising:
-
receiving a telephone input at a first mobile device, the telephone input identifying a second mobile device, wherein the second mobile device includes a plurality of different types of audio output circuitry; connecting a telephone call between the first mobile device and the second mobile device, the telephone call including transmission of a first audio data stream from the first mobile device to the second mobile device, the telephone call also including transmission of a second audio stream from the second mobile device to the first mobile device; receiving a security input at a user interface of the first mobile device; and permitting the first audio stream to be output at the second device via a permitted type of audio output circuitry of the second mobile device while preventing the first audio stream from being output at the second mobile device via an excluded type of audio output circuitry of the second mobile device in response to receipt of the security input at the first mobile device, the excluded set of audio output modules being a subset of the plurality of different types of audio output circuitry of the second mobile device.
-
Specification