US20100099398A1 - Call management system - Google Patents

Call management system Download PDF

Info

Publication number
US20100099398A1
US20100099398A1 US12/256,070 US25607008A US2010099398A1 US 20100099398 A1 US20100099398 A1 US 20100099398A1 US 25607008 A US25607008 A US 25607008A US 2010099398 A1 US2010099398 A1 US 2010099398A1
Authority
US
United States
Prior art keywords
mobile device
mode
message
dynamic information
dnd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/256,070
Inventor
Frederic J. Bauchot
Gerard Marmigere
Joaquin Picon
Pierre Secondo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SECONDO, PIERRE, BAUCHOT, FREDERIC J., MARMIGERE, GERARD, PICON, JOAQUIN
Publication of US20100099398A1 publication Critical patent/US20100099398A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • H04B5/77
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10079Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the spatial domain, e.g. temporary shields for blindfolding the interrogator in specific directions

Definitions

  • This disclosure relates to managing incoming telephone calls and more particularly to managing incoming telephone calls to a mobile phone in which personalized and dynamic information can be provided to the caller when the phone owner is busy.
  • Mobile phones typically include a feature that allows the user to switch the phone into a silent or do not disturb mode that may for instance turn off the ringer and/or utilize a vibrate feature.
  • a silent or do not disturb mode may for instance turn off the ringer and/or utilize a vibrate feature.
  • the phone owner would like to treat different callers differently. For example, in the case of a family emergency, it would be ideal to allow a call to come through, even if the phone owner does not otherwise wish to be disturbed.
  • the caller has no sense of when the phone owner will be available to return the call.
  • the present invention relates to a system, method and program product for managing inbound calls on a mobile device set to a do not disturb (DND) mode.
  • a system for managing inbound calls on a mobile device comprising: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
  • DND do not disturb
  • a computer readable medium having a program product stored thereon for managing inbound calls on a mobile device, comprising: program code for allowing the mobile device to be set to a do not disturb (DND) mode; program code for calculating dynamic information when an inbound call is received; and program code for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
  • DND do not disturb
  • a method for managing inbound calls on a mobile device comprising: setting the mobile device to a do not disturb (DND) mode; calculating dynamic information when an inbound call is received from a caller; and broadcasting a message to the caller, wherein the message includes the dynamic information.
  • DND do not disturb
  • a method for deploying a system for managing inbound calls on a mobile device comprising: providing a computer infrastructure being operable to: allow a user to set the mobile device to a do not disturb (DND) mode; calculate dynamic information when an inbound call is received from a caller; and broadcast a message to the caller, wherein the message includes the dynamic information.
  • DND do not disturb
  • FIG. 1 depicts a mobile device and computer system having a call management system in accordance with an embodiment of the present invention.
  • FIG. 2 depicts a flow diagram of a method in accordance with an embodiment of the present invention.
  • FIG. 3 depicts a contacts list in accordance with an embodiment of the present invention.
  • a mobile device 11 having a computer system 10 that includes a call management system 18 .
  • Mobile device 11 may comprise any type of telephony device capable of receiving an inbound call 40 and transmitting a message 42 indicating that the user 38 is not available.
  • Call management system 18 is responsible for handling an inbound call 40 when the device is set to a do not disturb (DND) mode, including allowing the mobile device 11 to ring/vibrate/flash, rejecting the call, playing a default message, or playing a customized message.
  • DND do not disturb
  • the message 42 may include dynamic information 44 that is generated by dynamic information processing system 32 , described below.
  • Call management system 18 may be implemented in any fashion, e.g., as a software program product that is shown stored in memory 18 of computer system 10 , as a combination of software and hardware, etc. It is also understood that some or all of computer system 10 may be integrated or reside apart from the mobile device.
  • Call management system 18 generally includes a mode control system 20 that allows user 38 to select an answering mode. Selection and associated inputs may be done via a keyboard, voice recognition or any other technique.
  • Illustrative modes may include, e.g., normal mode, vibrate mode, flash mode, and one or more DND (do not disturb) modes 21 .
  • a first illustrative advanced DND mode 21 includes a bypass mode that places the phone into a silent mode, but allows callers to bypass the silent mode, e.g., based on a caller ID and/or a password.
  • a second illustrative DND mode 21 includes dynamic message mode in which a broadcast message 42 encompasses dynamic information 44 .
  • Dynamic information 44 may comprise any type of information that is computed dynamically when the inbound call 40 is received.
  • dynamic message mode may allow the user 38 to incorporate a time based parameter into the message 42 based on submitted inputs 23 , a time the call was received and/or a time the mobile device 11 was placed into the DND mode.
  • user 38 may supply an input 23 that reflects how long the user 38 will be unavailable, e.g., 60 minutes.
  • Dynamic Information processing system 32 would then compute a “remaining time” (based on the input value, a current time and time of the input 23 ), which would be included in the message 42 .
  • the message could state: “I will be unavailable for about another 35 minutes, please leave a message.”
  • the calculated value “35 minutes” is automatically inserted into the message 42 as dynamic information 44 using any known technology (e.g., text to voice, etc.).
  • dynamic information 44 may include location based information, e.g., calculated from a global positioning system (not shown) or other location techniques. Based on the user's location, a message 42 such as, “I am currently in Paris; please call the local office in Paris to reach me at ⁇ phone number>.” In this case, the dynamic information 44 is Paris which includes an associated phone number.
  • Message management system 22 provides the mechanism by which filters and rules 24 are associated with information in the message database 34 and contacts database 36 .
  • selected contacts from the contact database may be associated with one or more message types, filters or rules. This may include setting up contacts such that some contacts receive a customized message, some receive a default message, and some are rejected altogether. It can also be used to identify which contacts will qualify for the dynamic message mode or bypass mode. For example, family members may be given a password that allows them to cause the device 11 to ring/vibrate/flash even though the phone is set to silent mode, while non-family members are sent to voicemail.
  • Call processing system 26 is responsible for analyzing inbound calls 40 and determining how each call 40 should be handled based on a selected mode, caller ID, and/or any filters and rules 24 that apply to the caller ID.
  • Call processing system 26 includes a DND bypass system 28 that lets predefined contacts bypass a silent mode if the bypass mode is enabled. If enabled, DND bypass system 28 can prompt for and evaluate a password to determine if the predefined contact should be allowed to disturb the user 38 .
  • Call processing system 26 also includes a message selection system 30 that selects and plays the appropriate message 42 for the user based on defined filters and rules 24 . This may include incorporating dynamic information 44 in the message 42 as generated by dynamic information processing system 32 .
  • FIG. 2 depicts a flow diagram of an illustrative method of implementing the call management system 18 of FIG. 1 .
  • an inbound call is received.
  • a check is made to see if the caller is blocked, e.g., using a white list. If the caller is blocked, the call is rejected at S 3 , e.g., a phone company voice message is played or a busy signal is generated. If the caller is not blocked, a check is made at S 4 to determine if bypass mode is enabled. If bypass mode is enabled, a check is made at S 5 to determine if the caller is on the bypass list. If the caller is on the bypass list, the caller is prompted for a password at S 6 . If the password is correct at S 7 , the phone is taken out of silent mode and is rung or vibrated at S 8 .
  • FIG. 3 depicts an illustrative contacts list 50 for a set of contacts programmed into a user's phone.
  • Paula Smith includes a customized message (e.g., recorded by the user) and one rule “Allow dynamic messaging”.
  • a customized message e.g., recorded by the user
  • Paula would receive a customized message with dynamic information such as “Hey Paula, I can't talk right now. I should be available in about 20 minutes.”
  • Joe Thomas includes two defined rules, “Allow dynamic messaging” and “Allow bypass”. Thus, if dynamic messaging mode and bypass mode were enabled by the user, Joe would receive a customized message with dynamic information such as “Hey Joe, leave a message if you want. I should be available in about 20 minutes. If you would like to bypass do not disturb mode, press # and enter your password.”
  • Fred Uger includes no assigned rules, so he would receive a default message with no dynamic information.
  • groups may be defined (e.g., family, work, etc.) which may for instance be assigned default rules.
  • all family members could be configured to receive the rule “Allow bypass.”
  • FIG. 3 depicts one possible embodiment for implementing an editable contacts list 50 , and other variations are within the scope of the invention.
  • Computer system 10 may be implemented as any type of computing infrastructure.
  • Computer system 10 generally includes a processor 12 , input/output (I/O) 14 , memory 16 , and bus 17 .
  • the processor 12 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server.
  • Memory 16 may comprise any known type of data storage and/or transmission media, including magnetic media, optical media, random access memory (RAM), read-only memory (ROM), a data cache, a data object, etc.
  • RAM random access memory
  • ROM read-only memory
  • memory 16 may reside at a single physical location, comprising one or more types of data storage, or be distributed across a plurality of physical systems in various forms.
  • I/O 14 may comprise any system for exchanging information to/from an external resource.
  • External devices/resources may comprise any known type of external device, including a monitor/display, speakers, storage, another computer system, a hand-held device, keyboard, mouse, voice recognition system, speech output system, printer, facsimile, pager, etc.
  • Bus 17 provides a communication link between each of the components in the computer system 10 and likewise may comprise any known type of transmission link, including electrical, optical, wireless, etc.
  • additional components such as cache memory, communication systems, system software, etc., may be incorporated into computer system 10 .
  • Access to computer system 10 may be provided over a network such as the Internet, a local area network (LAN), a wide area network (WAN), a virtual private network (VPN), wireless, cellular, etc. Communication could occur via a direct hardwired connection (e.g., serial port), or via an addressable connection that may utilize any combination of wireline and/or wireless transmission methods. Moreover, conventional network connectivity, such as Token Ring, Ethernet, WiFi or other conventional communications standards could be used. Still yet, connectivity could be provided by conventional TCP/IP sockets-based protocol. In this instance, an Internet service provider could be used to establish interconnectivity. Further, as indicated above, communication could occur in a client-server or server-server environment.
  • LAN local area network
  • WAN wide area network
  • VPN virtual private network
  • wireless cellular
  • Communication could occur via a direct hardwired connection (e.g., serial port), or via an addressable connection that may utilize any combination of wireline and/or wireless transmission methods.
  • conventional network connectivity such as Token Ring, Ethernet, WiFi
  • a computer system 10 comprising a call management system 18 could be created, maintained and/or deployed by a service provider that offers the functions described herein for customers. That is, a service provider could offer to deploy or provide call management as described above.
  • the features may be provided as a program product stored on a computer-readable medium, which when executed, enables computer system 10 to provide a call management system 18 .
  • the computer-readable medium may include program code, which implements the processes and systems described herein. It is understood that the term “computer-readable medium” comprises one or more of any type of physical embodiment of the program code.
  • the computer-readable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as memory 16 and/or a storage system, and/or as a data signal traveling over a network (e.g., during a wired/wireless electronic distribution of the program product).
  • portable storage articles of manufacture e.g., a compact disc, a magnetic disk, a tape, etc.
  • data storage portions of a computing device such as memory 16 and/or a storage system
  • a data signal traveling over a network e.g., during a wired/wireless electronic distribution of the program product.
  • program code and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression.
  • program code can be embodied as one or more types of program products, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.
  • terms such as “component” and “system” are synonymous as used herein and represent any combination of hardware and/or software capable of performing some function(s).
  • each block in the block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Abstract

A system, method and program product for managing inbound calls on a mobile device. A system is provided that includes: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.

Description

    FIELD OF THE INVENTION
  • This disclosure relates to managing incoming telephone calls and more particularly to managing incoming telephone calls to a mobile phone in which personalized and dynamic information can be provided to the caller when the phone owner is busy.
  • BACKGROUND OF THE INVENTION
  • Mobile phones typically include a feature that allows the user to switch the phone into a silent or do not disturb mode that may for instance turn off the ringer and/or utilize a vibrate feature. However, there may be times where the phone owner would like to treat different callers differently. For example, in the case of a family emergency, it would be ideal to allow a call to come through, even if the phone owner does not otherwise wish to be disturbed.
  • Moreover, in a typical scenario where a caller is placed into voicemail, the caller has no sense of when the phone owner will be available to return the call.
  • Accordingly, a need exists for a more robust system for allowing a phone owner to manage incoming calls when the phone is in do not disturb mode.
  • SUMMARY OF THE INVENTION
  • The present invention relates to a system, method and program product for managing inbound calls on a mobile device set to a do not disturb (DND) mode. In one embodiment, there is a system for managing inbound calls on a mobile device, comprising: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
  • In a second embodiment, there is a computer readable medium having a program product stored thereon for managing inbound calls on a mobile device, comprising: program code for allowing the mobile device to be set to a do not disturb (DND) mode; program code for calculating dynamic information when an inbound call is received; and program code for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
  • In a third embodiment, there is a method for managing inbound calls on a mobile device, comprising: setting the mobile device to a do not disturb (DND) mode; calculating dynamic information when an inbound call is received from a caller; and broadcasting a message to the caller, wherein the message includes the dynamic information.
  • In a fourth embodiment, there is a method for deploying a system for managing inbound calls on a mobile device, comprising: providing a computer infrastructure being operable to: allow a user to set the mobile device to a do not disturb (DND) mode; calculate dynamic information when an inbound call is received from a caller; and broadcast a message to the caller, wherein the message includes the dynamic information.
  • The illustrative aspects of the present invention are designed to solve the problems herein described and other problems not discussed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings.
  • FIG. 1 depicts a mobile device and computer system having a call management system in accordance with an embodiment of the present invention.
  • FIG. 2 depicts a flow diagram of a method in accordance with an embodiment of the present invention.
  • FIG. 3 depicts a contacts list in accordance with an embodiment of the present invention.
  • The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Referring to FIG. 1, a mobile device 11 is depicted having a computer system 10 that includes a call management system 18. Mobile device 11 may comprise any type of telephony device capable of receiving an inbound call 40 and transmitting a message 42 indicating that the user 38 is not available. Call management system 18 is responsible for handling an inbound call 40 when the device is set to a do not disturb (DND) mode, including allowing the mobile device 11 to ring/vibrate/flash, rejecting the call, playing a default message, or playing a customized message. In the case where a message 42 is played for the caller, the message 42 may include dynamic information 44 that is generated by dynamic information processing system 32, described below. Call management system 18 may be implemented in any fashion, e.g., as a software program product that is shown stored in memory 18 of computer system 10, as a combination of software and hardware, etc. It is also understood that some or all of computer system 10 may be integrated or reside apart from the mobile device.
  • Call management system 18 generally includes a mode control system 20 that allows user 38 to select an answering mode. Selection and associated inputs may be done via a keyboard, voice recognition or any other technique. Illustrative modes may include, e.g., normal mode, vibrate mode, flash mode, and one or more DND (do not disturb) modes 21. A first illustrative advanced DND mode 21 includes a bypass mode that places the phone into a silent mode, but allows callers to bypass the silent mode, e.g., based on a caller ID and/or a password. A second illustrative DND mode 21 includes dynamic message mode in which a broadcast message 42 encompasses dynamic information 44. Dynamic information 44 may comprise any type of information that is computed dynamically when the inbound call 40 is received. For instance, dynamic message mode may allow the user 38 to incorporate a time based parameter into the message 42 based on submitted inputs 23, a time the call was received and/or a time the mobile device 11 was placed into the DND mode. For instance, user 38 may supply an input 23 that reflects how long the user 38 will be unavailable, e.g., 60 minutes. Dynamic Information processing system 32 would then compute a “remaining time” (based on the input value, a current time and time of the input 23), which would be included in the message 42. For example, if 25 minutes elapsed since the input value of 60 minutes was entered, the message could state: “I will be unavailable for about another 35 minutes, please leave a message.” In this case, the calculated value “35 minutes” is automatically inserted into the message 42 as dynamic information 44 using any known technology (e.g., text to voice, etc.).
  • Alternatively, dynamic information 44 may include location based information, e.g., calculated from a global positioning system (not shown) or other location techniques. Based on the user's location, a message 42 such as, “I am currently in Paris; please call the local office in Paris to reach me at <phone number>.” In this case, the dynamic information 44 is Paris which includes an associated phone number.
  • Message management system 22 provides the mechanism by which filters and rules 24 are associated with information in the message database 34 and contacts database 36. For instance, selected contacts from the contact database may be associated with one or more message types, filters or rules. This may include setting up contacts such that some contacts receive a customized message, some receive a default message, and some are rejected altogether. It can also be used to identify which contacts will qualify for the dynamic message mode or bypass mode. For example, family members may be given a password that allows them to cause the device 11 to ring/vibrate/flash even though the phone is set to silent mode, while non-family members are sent to voicemail.
  • Call processing system 26 is responsible for analyzing inbound calls 40 and determining how each call 40 should be handled based on a selected mode, caller ID, and/or any filters and rules 24 that apply to the caller ID. Call processing system 26 includes a DND bypass system 28 that lets predefined contacts bypass a silent mode if the bypass mode is enabled. If enabled, DND bypass system 28 can prompt for and evaluate a password to determine if the predefined contact should be allowed to disturb the user 38. Call processing system 26 also includes a message selection system 30 that selects and plays the appropriate message 42 for the user based on defined filters and rules 24. This may include incorporating dynamic information 44 in the message 42 as generated by dynamic information processing system 32.
  • FIG. 2 depicts a flow diagram of an illustrative method of implementing the call management system 18 of FIG. 1. At S1, an inbound call is received. At S2, a check is made to see if the caller is blocked, e.g., using a white list. If the caller is blocked, the call is rejected at S3, e.g., a phone company voice message is played or a busy signal is generated. If the caller is not blocked, a check is made at S4 to determine if bypass mode is enabled. If bypass mode is enabled, a check is made at S5 to determine if the caller is on the bypass list. If the caller is on the bypass list, the caller is prompted for a password at S6. If the password is correct at S7, the phone is taken out of silent mode and is rung or vibrated at S8.
  • If the caller is not on the bypass list at S5 or bypass mode is not enabled at S4, then a check is made at S9 to determine if dynamic message mode is enabled. If dynamic message mode is enabled at S9, a check is (optionally) made to see if the caller qualifies for a dynamic message at S10. If dynamic message mode is not enabled or the caller does not qualify for a dynamic message or an incorrect password was entered at S7, a default message is played for the caller at S13. If the caller does qualify for a dynamic message at S10, then dynamic information is calculated at S11 and a dynamic message is played at S12. Although not shown in FIG. 2, logic may also be implemented to determine if a caller qualifies for a customized or personal message, which may or may not include dynamic information. Thus, from the DND mode, a caller could potentially receive:
  • 1) a customized message with dynamic information,
  • 2) a customized message without dynamic information,
  • 3) a default message with dynamic information,
  • 4) a default message without dynamic information, or
  • 5) a bypass option to override silent mode.
  • FIG. 3 depicts an illustrative contacts list 50 for a set of contacts programmed into a user's phone. In this example, Paula Smith includes a customized message (e.g., recorded by the user) and one rule “Allow dynamic messaging”. Thus, if dynamic messaging mode is enabled by the user, Paula would receive a customized message with dynamic information such as “Hey Paula, I can't talk right now. I should be available in about 20 minutes.”
  • Joe Thomas includes two defined rules, “Allow dynamic messaging” and “Allow bypass”. Thus, if dynamic messaging mode and bypass mode were enabled by the user, Joe would receive a customized message with dynamic information such as “Hey Joe, leave a message if you want. I should be available in about 20 minutes. If you would like to bypass do not disturb mode, press # and enter your password.”
  • Finally, Fred Uger includes no assigned rules, so he would receive a default message with no dynamic information. As can be seen, groups may be defined (e.g., family, work, etc.) which may for instance be assigned default rules. Thus, all family members could be configured to receive the rule “Allow bypass.” Obviously, FIG. 3 depicts one possible embodiment for implementing an editable contacts list 50, and other variations are within the scope of the invention.
  • Referring again to FIG. 1, it is understood that computer system 10 may be implemented as any type of computing infrastructure. Computer system 10 generally includes a processor 12, input/output (I/O) 14, memory 16, and bus 17. The processor 12 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server. Memory 16 may comprise any known type of data storage and/or transmission media, including magnetic media, optical media, random access memory (RAM), read-only memory (ROM), a data cache, a data object, etc. Moreover, memory 16 may reside at a single physical location, comprising one or more types of data storage, or be distributed across a plurality of physical systems in various forms.
  • I/O 14 may comprise any system for exchanging information to/from an external resource. External devices/resources may comprise any known type of external device, including a monitor/display, speakers, storage, another computer system, a hand-held device, keyboard, mouse, voice recognition system, speech output system, printer, facsimile, pager, etc. Bus 17 provides a communication link between each of the components in the computer system 10 and likewise may comprise any known type of transmission link, including electrical, optical, wireless, etc. Although not shown, additional components, such as cache memory, communication systems, system software, etc., may be incorporated into computer system 10.
  • Access to computer system 10 may be provided over a network such as the Internet, a local area network (LAN), a wide area network (WAN), a virtual private network (VPN), wireless, cellular, etc. Communication could occur via a direct hardwired connection (e.g., serial port), or via an addressable connection that may utilize any combination of wireline and/or wireless transmission methods. Moreover, conventional network connectivity, such as Token Ring, Ethernet, WiFi or other conventional communications standards could be used. Still yet, connectivity could be provided by conventional TCP/IP sockets-based protocol. In this instance, an Internet service provider could be used to establish interconnectivity. Further, as indicated above, communication could occur in a client-server or server-server environment.
  • It should be appreciated that the teachings of the present invention could be offered as a business method on a subscription or fee basis. For example, a computer system 10 comprising a call management system 18 could be created, maintained and/or deployed by a service provider that offers the functions described herein for customers. That is, a service provider could offer to deploy or provide call management as described above.
  • It is understood that in addition to being implemented as a system and method, the features may be provided as a program product stored on a computer-readable medium, which when executed, enables computer system 10 to provide a call management system 18. To this extent, the computer-readable medium may include program code, which implements the processes and systems described herein. It is understood that the term “computer-readable medium” comprises one or more of any type of physical embodiment of the program code. In particular, the computer-readable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as memory 16 and/or a storage system, and/or as a data signal traveling over a network (e.g., during a wired/wireless electronic distribution of the program product).
  • As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression. To this extent, program code can be embodied as one or more types of program products, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like. Further, it is understood that terms such as “component” and “system” are synonymous as used herein and represent any combination of hardware and/or software capable of performing some function(s).
  • The block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
  • Although specific embodiments have been illustrated and described herein, those of ordinary skill in the art appreciate that any arrangement which is calculated to achieve the same purpose may be substituted for the specific embodiments shown and that the invention has other applications in other environments. This application is intended to cover any adaptations or variations of the present invention. The following claims are in no way intended to limit the scope of the invention to the specific embodiments described herein.

Claims (20)

1. A system for managing inbound calls on a mobile device, comprising:
a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode;
a system for calculating dynamic information when an inbound call is received; and
a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
2. The system of claim 1, wherein the dynamic information includes a time based parameter.
3. The system of claim 2, wherein the time based parameter is based on a time when the mobile device was set to the DND mode, a time when the inbound call was received, and a time duration inputted by a user.
4. The system of claim 1, wherein the dynamic information includes a location based parameter.
5. The system of claim 1, further comprising a message management system for assigning filters and rules to contacts associated with the mobile device.
6. The system of claim 5, wherein the call processing system selects a message for a contact based a selected mode, a caller ID and any filters and rules assigned to the contact.
7. The system of claim 1, further comprising a DND bypass system that allows a caller to bypass the DND mode and cause the mobile device to ring, flash or vibrate.
8. A computer readable medium having a program product stored thereon for managing inbound calls on a mobile device, comprising:
program code for allowing the mobile device to be set to a do not disturb (DND) mode;
program code for calculating dynamic information when an inbound call is received; and
program code for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
9. The computer readable medium of claim 8, wherein the dynamic information includes a time based parameter.
10. The computer readable medium of claim 9, wherein the time based parameter is based on a first time when the mobile device was set to the DND mode, a second time when the inbound call was received, and a time duration inputted by a user.
11. The computer readable medium of claim 8, wherein the dynamic information includes a location based parameter.
12. The computer readable medium of claim 8, further comprising program code for assigning filters and rules to contacts associated with the mobile device.
13. The computer readable medium of claim 12, wherein the program code for broadcasting a message selects the message for a contact based a selected mode, a caller ID and any filters and rules assigned to the contact.
14. The computer readable medium of claim 8, further comprising program code that allows a caller to bypass the DND mode and cause the mobile device to ring, flash or vibrate.
15. A method for managing inbound calls on a mobile device, comprising:
setting the mobile device to a do not disturb (DND) mode;
calculating dynamic information when an inbound call is received from a caller; and
broadcasting a message to the caller, wherein the message includes the dynamic information.
16. The method of claim 15, wherein the dynamic information includes a time based parameter.
17. The method of claim 16, wherein the time based parameter is based on a first time when the mobile device was set to the DND mode, a second time when the inbound call was received, and a time duration inputted by a user.
18. The method of claim 15, wherein the dynamic information includes a location based parameter.
19. The method of claim 15, further comprising program code that allows a caller to bypass the DND mode and cause the mobile device to ring, flash or vibrate.
20. A method for deploying a system for managing inbound calls on a mobile device, comprising:
providing a computer infrastructure being operable to:
allow a user to set the mobile device to a do not disturb (DND) mode;
calculate dynamic information when an inbound call is received from a caller; and
broadcast a message to the caller, wherein the message includes the dynamic information.
US12/256,070 2008-10-16 2008-10-22 Call management system Abandoned US20100099398A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP08305686 2008-10-17
EP08305686.1 2008-10-17

Publications (1)

Publication Number Publication Date
US20100099398A1 true US20100099398A1 (en) 2010-04-22

Family

ID=42108203

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/256,070 Abandoned US20100099398A1 (en) 2008-10-16 2008-10-22 Call management system
US12/267,712 Expired - Fee Related US8106776B2 (en) 2008-10-16 2008-11-10 Reading short distance emission RFID tags to locate items in a container

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/267,712 Expired - Fee Related US8106776B2 (en) 2008-10-16 2008-11-10 Reading short distance emission RFID tags to locate items in a container

Country Status (1)

Country Link
US (2) US20100099398A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100317341A1 (en) * 2009-06-16 2010-12-16 Bran Ferren Method and system for communication behavior
US20130084923A1 (en) * 2011-10-04 2013-04-04 Joseph Schuman Systems and methods for users to receive and/or reply to information affiliated with communication attempts while remaining substantially disconnected from mobile electronic device(s) and/or networks
US20160044177A1 (en) * 2014-08-06 2016-02-11 Ralph G. O'Brien Automatic personalized outgoing message delivery responsive to unanswered incoming audio / video call
US10284710B2 (en) * 2013-06-29 2019-05-07 Huawei Device (Dongguan) Co., Ltd. Call method of mobile terminal, mobile terminal control method, and related device
US10880431B2 (en) * 2016-09-30 2020-12-29 T-Mobile Usa, Inc. Sending notifications based on an active mode of operation of a mobile device
US11039008B2 (en) 2016-09-30 2021-06-15 T-Mobile Usa, Inc. Sending notifications based on a busy mode of operation of a mobile device
US11258746B1 (en) * 2019-04-18 2022-02-22 Amazon Technologies, Inc. Setting overrides

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060173750A1 (en) * 2004-12-30 2006-08-03 Naley Martin R System and method for controlling access to a local inventory storage system via a remote e-commerce application
JP5271132B2 (en) * 2009-03-25 2013-08-21 日立マクセル株式会社 Workpiece with direction discrimination function
EP2932477B1 (en) 2012-12-12 2019-04-24 Life Technologies Corporation Self-locking door and product dispensing enclosure having a self-locking door
JP5965330B2 (en) * 2013-01-24 2016-08-03 富士通フロンテック株式会社 Information acquisition device
SG11201703302XA (en) 2014-10-24 2017-05-30 Life Technologies Corp Inventory management system and method of use
US20170242980A1 (en) * 2016-02-18 2017-08-24 Q Squared Solutions Holdings LLC Electronic writable memory devices for patient sample management
WO2017173326A1 (en) * 2016-04-01 2017-10-05 Meps Real-Time, Inc. Rfid read system for verifying the contents of items in tray pockets
DE112018000705T5 (en) 2017-03-06 2019-11-14 Cummins Filtration Ip, Inc. DETECTION OF REAL FILTERS WITH A FILTER MONITORING SYSTEM
US11948028B2 (en) 2021-02-25 2024-04-02 International Business Machines Corporation Item tracking using tag-to-tag communications
US20230175842A1 (en) * 2021-12-02 2023-06-08 International Business Machines Corporation Radio frequency identification based three-dimensional metrology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6301338B1 (en) * 1996-01-08 2001-10-09 Nokia Mobile Phones Ltd. Activation of a telephone's own call answering equipment according to the number of the calling party
US20020068552A1 (en) * 2000-12-05 2002-06-06 Gerhard Siemens Hierarchical call control with selective broadcast audio messaging system
US20020128033A1 (en) * 1998-11-30 2002-09-12 Burgess Shelia Jean Communications control method and apparatus
US7010288B2 (en) * 2002-05-06 2006-03-07 Cingular Wireless Ii, Llc System and method for providing an automatic response to a telephone call

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1088031A (en) 1979-03-05 1980-10-21 Thomas J. Martin Space dividers
US6237772B1 (en) * 1998-02-24 2001-05-29 Neotech Industries, Inc. Assembly of interconnected containers and containers for use therein
US20020180588A1 (en) 2001-06-05 2002-12-05 Erickson David P. Radio frequency identification in document management
JP2005500516A (en) 2001-06-14 2005-01-06 アールエフ・コード・インコーポレーテッド Wireless identification system and protocol
US20030227385A1 (en) 2002-06-10 2003-12-11 Lancaster Cory L. Limited access article identifier and locator system and method
US7286043B2 (en) 2003-04-28 2007-10-23 Battelle Memorial Institute K1-53 System and method for inventorying multiple remote objects
US7098794B2 (en) * 2004-04-30 2006-08-29 Kimberly-Clark Worldwide, Inc. Deactivating a data tag for user privacy or tamper-evident packaging
US7088229B2 (en) 2004-06-14 2006-08-08 Oracle International Corporation Methods and systems for verifying the position and status of hierarchically arranged objects
US20060022038A1 (en) 2004-07-29 2006-02-02 Hewlin Todd G Mobile terminal finding system and method
JP2006067160A (en) 2004-08-26 2006-03-09 Fujitsu Ltd Radio tag system, radio tag access control device, radio tag access control method, radio tag access control program, and radio tag
US7768409B2 (en) * 2005-06-10 2010-08-03 American Air Liquide, Inc. Embedded RFID scanner for mobile product management
JP2009531667A (en) 2006-03-23 2009-09-03 アールファインド システムズ インコーポレイテッド Wireless asset identification and location
US7812719B2 (en) 2006-05-01 2010-10-12 Djuric Petar M RFID system and method for localizing and tracking a moving object with an RFID tag
US7504949B1 (en) * 2006-05-24 2009-03-17 Amazon Technologies, Inc. Method and apparatus for indirect asset tracking with RFID
DE102007013237A1 (en) 2007-03-15 2008-09-18 Joint Analytical Systems Gmbh storage system
US9507375B2 (en) 2007-06-05 2016-11-29 Samsung Electronics Co., Ltd. Display apparatus and method for recognizing location
US8165929B2 (en) * 2008-08-04 2012-04-24 Chudy Group, LLC Adaptive pharmaceutical product management methods and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6301338B1 (en) * 1996-01-08 2001-10-09 Nokia Mobile Phones Ltd. Activation of a telephone's own call answering equipment according to the number of the calling party
US20020128033A1 (en) * 1998-11-30 2002-09-12 Burgess Shelia Jean Communications control method and apparatus
US20020068552A1 (en) * 2000-12-05 2002-06-06 Gerhard Siemens Hierarchical call control with selective broadcast audio messaging system
US7010288B2 (en) * 2002-05-06 2006-03-07 Cingular Wireless Ii, Llc System and method for providing an automatic response to a telephone call

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100317341A1 (en) * 2009-06-16 2010-12-16 Bran Ferren Method and system for communication behavior
US9088882B2 (en) * 2009-06-16 2015-07-21 Intel Corporation Method and system for communication behavior
US20130084923A1 (en) * 2011-10-04 2013-04-04 Joseph Schuman Systems and methods for users to receive and/or reply to information affiliated with communication attempts while remaining substantially disconnected from mobile electronic device(s) and/or networks
US10869157B2 (en) * 2011-10-04 2020-12-15 Joseph Schuman Systems and methods for users to receive and/or reply to information affiliated with communication attempts while remaining substantially disconnected from mobile electronic device(s) and/or networks
US10284710B2 (en) * 2013-06-29 2019-05-07 Huawei Device (Dongguan) Co., Ltd. Call method of mobile terminal, mobile terminal control method, and related device
US11451657B2 (en) 2013-06-29 2022-09-20 Huawei Device Co., Ltd. Call method of mobile terminal, mobile terminal control method, and related device
US20160044177A1 (en) * 2014-08-06 2016-02-11 Ralph G. O'Brien Automatic personalized outgoing message delivery responsive to unanswered incoming audio / video call
WO2016022542A1 (en) * 2014-08-06 2016-02-11 O'brien Ralph Automatic personalized outgoing message delivery responsive to unanswered incoming audio / video call
US10880431B2 (en) * 2016-09-30 2020-12-29 T-Mobile Usa, Inc. Sending notifications based on an active mode of operation of a mobile device
US11039008B2 (en) 2016-09-30 2021-06-15 T-Mobile Usa, Inc. Sending notifications based on a busy mode of operation of a mobile device
US11258746B1 (en) * 2019-04-18 2022-02-22 Amazon Technologies, Inc. Setting overrides

Also Published As

Publication number Publication date
US8106776B2 (en) 2012-01-31
US20100097184A1 (en) 2010-04-22

Similar Documents

Publication Publication Date Title
US20100099398A1 (en) Call management system
US10574808B2 (en) Automatic setting of an alert mode on a wireless device
US9742909B2 (en) System and method for determining availability statuses for users
US8953762B1 (en) Telephone system, apparatus, and method for providing enhanced privacy features
US11039010B2 (en) System and method for ring suppression
KR101269950B1 (en) Pre-programmed subscriber response
KR20080024515A (en) Announcing presence information during telephone call ringback
US8666052B2 (en) Universal phone number for contacting group members
US8644457B1 (en) System and method for enforcing a recording preference
US9313631B2 (en) Method and system for intelligent call termination
US8594284B2 (en) Systems and methods for providing context-based voicemail
US20150181023A1 (en) Method and system for intelligent call termination
US20190158583A1 (en) System and method for estimating distributed consumption of a quota
US8477915B1 (en) System and method for enforcing a recording preference
US20160309032A1 (en) Enhancing call experiences through personal rules
US8605875B2 (en) Dynamic call management and display
US20080318560A1 (en) Device Method and System for Handling Incoming Calls
US8953768B2 (en) Call-handling rules
US7995719B2 (en) Coordination of a voicemail response with calendar scheduling
US8989370B1 (en) Customizable call center dialing system, method and computer program product
USRE46168E1 (en) Voice over internet protocol application development framework
US20150281440A1 (en) Interactive voice response system linked to a calendaring and availability system
JP2007336237A (en) Speech-recording control system for call center and its method
US9729710B2 (en) Prioritized ongoing communication interrupt
WO2018157389A1 (en) Method for sharing information in call, and terminal

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAUCHOT, FREDERIC J.;MARMIGERE, GERARD;PICON, JOAQUIN;AND OTHERS;SIGNING DATES FROM 20081020 TO 20081021;REEL/FRAME:021747/0740

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION