Automated caller identifier from contact lists of a user's contacts
First Claim
1. A method performed on a computing device, the method comprising:
- effectively expanding, by the computing device, a first contact list that comprises contacts to include at least a portion of at least one of the contacts'"'"' contact lists, where the first contact list is associated with a user of the computing device, where the effectively expanding is based on;
sending, by the computing device in response to receiving a first message from a first device, a second message to a second device that is associated with the at least one of the contacts, where the second message comprises a request for identity information that identifies a sender of the first message; and
receiving, by the computing device in response to the sending, the requested identity information.
2 Assignments
0 Petitions
Accused Products
Abstract
When a call or message is received from an unidentified sender on the user'"'"'s communication device, the caller identifier application launches a text-based messaging application and causes it to send an “invisible” text-based message to the user'"'"'s contacts. The message includes the metadata (e.g., telephone number) associated with the call or message that the user received. The invisible message is a short message whose headers are programmed in a particular manner so that the receiving mobile phone acknowledges the receipt of the message and the receiving mobile phone displays no behavior perceptible by the user. When the invisible message is received by the corresponding caller identifier application on one of the user'"'"'s contact'"'"'s mobile phone, the application searches the contact'"'"'s contact list maintained in his or hers contact application. If the metadata provided to the contact'"'"'s mobile phone is located in the contact list, the contact details (e.g. Name) or the contact card, if available, is sent back to the user'"'"'s mobile phone in a second invisible message. Upon receiving the second invisible message, the caller identifier application causes some or all of the contact details to be displayed on the user'"'"'s mobile phone or otherwise presented to the user in any appropriate manner.
11 Citations
20 Claims
-
1. A method performed on a computing device, the method comprising:
effectively expanding, by the computing device, a first contact list that comprises contacts to include at least a portion of at least one of the contacts'"'"' contact lists, where the first contact list is associated with a user of the computing device, where the effectively expanding is based on; sending, by the computing device in response to receiving a first message from a first device, a second message to a second device that is associated with the at least one of the contacts, where the second message comprises a request for identity information that identifies a sender of the first message; and receiving, by the computing device in response to the sending, the requested identity information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A computing device comprising:
-
a processor; memory coupled to the processor; and an identifier application via which the computing device is configured to effectively expand a first contact list that comprises contacts to include at least a portion of at least one of the contacts'"'"' contact lists, where the first contact list is associated with a user of the computing device, where the first contact list is effectively expanding based on; sending, in response to receiving a first message from a first device, a second message to a second device that is associated with the at least one of the contacts, where the second message comprises a request for identity information that identifies a sender of the first message; and receiving, in response to the sending, the requested identity information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one memory device that comprises computer-executable instructions that, based on execution by a processor of a computing device, configure the computing device to perform actions comprising:
effectively expanding, by the computing device, a first contact list that comprises contacts to include at least a portion of at least one of the contacts'"'"' contact lists, where the first contact list is associated with a user of the computing device, where the effectively expanding is based on; sending, by the computing device in response to receiving a first message from a first device, a second message to a second device that is associated with the at least one of the contacts, where the second message comprises a request for identity information that identifies a sender of the first message; and receiving, by the computing device in response to the sending, the requested identity information. - View Dependent Claims (16, 17, 18, 19, 20)
Specification