Abstract:
Mobile devices, systems and methods are described with a plurality of virtual machines, wherein each virtual machine executes a separate virtual interface, or guest operating system. Each guest operating system corresponds to a different virtual device having its own contact list, applications, and so on. A virtual “device” can be controlled by an employer or service provider, and is a secure space that provides authenticated applications that are walled off from another virtual device. A host operating system provides a hardware abstraction layer. A proxy server on the host operating system receives an incoming signal from a remote device on the external network, and routes the incoming signal to one of the first and second virtual machines based on a call context. A method and computer program product for providing a plurality of virtual interfaces on a mobile device are also disclosed.
Abstract:
Ring tones and other alerts are processed based on social networks. A person's contact information, as an example, may be associated with a social network. Each different social network may also have its own custom ringtone or other alert. Calls, texts, and other electronic messages may thus processed with the alert of the social network.
Abstract:
Mobile devices, systems and methods are described with a plurality of virtual machines, wherein each virtual machine executes a separate virtual interface, or guest operating system. Each guest operating system corresponds to a different virtual device having its own contact list, applications, and so on. A virtual “device” can be controlled by an employer or service provider, and is a secure space that provides authenticated applications that are walled off from another virtual device. A host operating system provides a hardware abstraction layer. A proxy server on the host operating system receives an incoming signal from a remote device on the external network, and routes the incoming signal to one of the first and second virtual machines based on a call context. A method and computer program product for providing a plurality of virtual interfaces on a mobile device are also disclosed.
Abstract:
Ring tones and other alerts are processed based on social networks. A person's contact information, as an example, may be associated with a social network. Each different social network may also have its own custom ringtone or other alert. Calls, texts, and other electronic messages may thus processed with the alert of the social network.
Abstract:
Customer communications can be controlled in accordance with customized rules. An initial menu includes options to modify an existing rule or create a new rule for controlling customer communications. An initial selection criteria menu includes options to indicate whether the new customized rule will be built using a preexisting template or starting from initial blank rule criteria. A list of preexisting templates for creating new customized rules can be provided, and input to populate a selected template can be accepted. Initial blank rule criteria for creating new customized rules can also be provided, including initial criteria and rule conditions for selected initial criteria. Communications are processed in accordance with the stored new customized rule.
Abstract:
A method includes sending, from a base unit, provisioning information to a communication device. The provisioning information causes the communication device to establish a wireless communication connection with a wireless access point. The method includes identifying one or more other communication devices causing interference with the wireless communication connection. The method includes sending information to the communication device. The information includes instructions to disable the one or more other communication devices.
Abstract:
Methods and apparatus for a telephone customer to configure telephone service for multiple users at a single location associated with the customer. The location has at least two telephones, at least two phone numbers and a voice mail box. The telephone customer is visually provided an option to assign one of the phone numbers to one of the telephones. The telephone customer is visually provided an option to assign each of the multiple users exclusive access to at least one of the telephone numbers via their account identifier. The telephone customer is visually provided the option to, for each of the multiple users, allow access or deny access via their account identifier to the voicemail box.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, at a base station, communicating with a mobile phone where the base station comprises a premises wireless access point, at the base station, communicating with a mobile communication system by way of a broadband connection, and instructing a landline phone communicatively coupled to the base station to communicate with a remote end user device via the mobile communication system utilizing identification information of the mobile phone and responsive to communications between the base station and the mobile phone. Other embodiments are disclosed.
Abstract:
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, an authentication system can have a controller element that receives from a communication device by way of a packet-switched network an authentication request comprising a first identification (ID) of a virtual gateway and a second ID of the communication device. The virtual gateway and at least one network element of the packet-switched network can be provisioned to have a physical association with each other such that other network elements of the packet-switched network deny services to the virtual gateway when the virtual gateway attempts to operate outside of said physical association. From said physical association and the aforementioned IDs the controller element can authenticate the communication device. Additional embodiments are disclosed.
Abstract:
Methods and computer-readable media for providing a recommendation and for rerouting calls are disclosed. For example, a method detects updated status information regarding a contact of a user and determines whether the updated status information signifies an event of interest. When the updated information is determined to signify an event of interest, the method provides to a device of the user a recommendation that the user should communicate with the contact. The recommendation includes an indication of the event of interest.