WO2012135869A2 - Application for communication control in cell phones - Google Patents

Application for communication control in cell phones Download PDF

Info

Publication number
WO2012135869A2
WO2012135869A2 PCT/US2012/031920 US2012031920W WO2012135869A2 WO 2012135869 A2 WO2012135869 A2 WO 2012135869A2 US 2012031920 W US2012031920 W US 2012031920W WO 2012135869 A2 WO2012135869 A2 WO 2012135869A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
filter
messages
message
application
Prior art date
Application number
PCT/US2012/031920
Other languages
French (fr)
Other versions
WO2012135869A3 (en
Inventor
William Blackburn
Brandon CLARK
Kenneth Lynch
Charles GARCIA
Original Assignee
Jjscb, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jjscb, Llc filed Critical Jjscb, Llc
Publication of WO2012135869A2 publication Critical patent/WO2012135869A2/en
Publication of WO2012135869A3 publication Critical patent/WO2012135869A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications

Definitions

  • This invention relates to an application for use in mobile devices to improve the control of the mobile device's communication system. More specifically, the present invention relates to a control system application to assist in the prevention of initiating unwanted calls and sending unwanted text and e-mail messages, among other communication functions.
  • Unintentionally initiating calls or initiating calls against better judgment is another issue with smart phone usage. Dialing particular contacts can be harmful if they were not intended, such as dialing your boss's cellular phone number late at night, or calling an estranged contact at an inconvenient time. Many smart phones allow a user to place a call simply by selecting a certain contact. Some phones contain a locking mechanism to prevent accidental phone calls. However, even with this locking mechanism, phone calls and other communications are often inadvertently placed when users forget to turn on the applicable locking function. In addition, phone calls are often placed by accident while a user is navigating through on-screen commands.
  • a communication control application which may help to prevent smart phone users from sending regrettable text or email messages and initiating unwanted phone calls.
  • the communication control application comprises a method for providing a secondary security confirmation for sending communications for users of a mobile device, the method comprising: providing a user with a software application which interfaces with a smart phone device; having said user carry said smart phone ;said user engaging certain filters for messages sent from said smart phone device through said software application; said software application providing a secondary security confirmation prompt for a user for messages identified by said engaged filter; and said software application preventing the sending of messages identified by said engaged filter unless said user accents to said secondary security confirmation prompt.
  • the filter identifies messages by contacts chosen by said user. In another, the filter identifies messages by the content of said messages. In yet another, the filter identifies messages by a time period chosen by said user. In still another the filter identifies all messages sent by the smartphone.
  • FIG. 1 provides a representation of the physical structure of a smart phone system and its components.
  • FIG. 2 provides a flowchart detailing the process of the message control system.
  • FIG. 3 provides an embodiment of a screenshot of the message setting options on the main screen.
  • FIG. 4 provides an example of a screenshot of controls for time settings if the hour range option is enabled.
  • FIG. 5 provides an example of a screenshot of controls for contacts settings if the specific contacts setting is enabled.
  • the disclosed mobile device application assists in preventing smart phone users from sending regrettable text or email messages and initiating unwanted phone calls.
  • the disclosed application provides an extra layer of control between the user commands to initiate a communication and the user commands to complete a communication.
  • messages may refer to e-mail communications, text messages, tweets, telephone call or other types of communications means which can be received or sent by a cellular phone.
  • the communication control application is associated with a "piece" of closely cooperating hardware, a mobile device.
  • a mobile device which is capable of connecting to a network (e.g., a cellular network, the internet, a local area network (LAN), or any other network known to those of ordinary skill in the art which is capable of using network protocols) and rendering multimedia formats, in addition to being enabled to be programmed for running an additional application is contemplated.
  • a network e.g., a cellular network, the internet, a local area network (LAN), or any other network known to those of ordinary skill in the art which is capable of using network protocols
  • the mobile device will include computing resources in the form of a processor, an associated processor RAM-unit for loading and running applications, such as a JAVA Applet, and, in some embodiments, a Flash ROM in order to run multiple program applications.
  • contemplated mobile devices include, but are not limited to, mobile cellular phones, personal digital assistants (PDAs), smartphones, MP3 players, handheld media players (e.g., an iTouchTM), BluetoothTM or other mobile devices known to those of ordinary skill in the art.
  • PDAs personal digital assistants
  • smartphones smartphones
  • MP3 players e.g., an iTouchTM
  • BluetoothTM e.g., BluetoothTM
  • a "smartphone,” as that term is used herein, is interpreted broadly to include a simple, but programmable, and in so far as a little bit "smart" phone.
  • contemplated programming for the mobile device includes, but is not limited to JAVA programming, the AndroidTM operating system, iPhone OSTM, or other mobile device programming system known to
  • the mobile device contains send/receive functionality in order to exchange digital information.
  • Preferred communication modalities include wireless communication, like IR, however cable-based alternatives may also be implemented as these alternatives generally provide a cheaper interface without a sender and receiver circuit, antennae, etc., and without encryption, decryption, and user authentication software modules which can be required with wireless communication modalities.
  • FIG. 1 An embodiment of one contemplated mobile device is provided in FIG. 1.
  • this embodiment of a mobile device (12) generally includes a user input mechanism (14), which in this embodiment is comprised of a touchscreen, a camera and voice communication means (16) known to those of ordinary skill in the art which allows for the sending and receiving of voice communications.
  • the user input mechanism (14) may include a greater or lesser number of elements known to those of ordinary skill in the art for communicating with a mobile device, including, for example, a keyboard, or other device used for typing.
  • the RAM unit of the mobile device (12) is loaded with a
  • JAVA Applet (or other comparable application software which is commonly referred to as an "app” or an “application”), which implements most of the steps of the intentional method as they will be described in more detail herein.
  • the JAVA applet comprises a program which allows for the addition of another layer of control (start/stop) for communications received by and generated from the mobile device (12).
  • the JAVA applet will include the following.
  • a user interface This user interface will generally contain a main menu listing to, among other things, control the message and control settings of the communication control application disclosed herein. This provides the user easy access to and control of the communication control application of the mobile device.
  • FIG. 3 provides an embodiment of the user interface.
  • a user is presented with one or more filters (36) which the user has the option of enabling; i.e., turning on or off. When a given filter (36) is enabled, it results in heightened scrutiny and security for that communication function.
  • Contemplated filters (36) include, but are not limited to, the global setting filter, the profanity filter, the hour range filter, the specific contacts filter, the contacts/range filter and the all contacts filter. Notably, each of the filters is independent of each other. If one filter is turned on by a user, its functionality will be active, while other filters may be in the off, inactive position. Conversely, when an individual filter is in the off position, that specific filter (36) will not be applied, though other filters (36) in the on position may be.
  • the global settings filter provides a secondary security layer for all messages sent from the mobile device (12). For example, if the global setting filter is on, every attempt to send a message prompts the user for a secondary confirmation prior to sending message. The message will not be sent until the user ascents to this secondary confirmation. When the global filter is in the off setting, this secondary confirmation will no longer be engaged; a message will be sent from the mobile device (12) after the first send command.
  • the profanity filter provides a control mechanism for the content, or words, of messages.
  • the communication control system will check the content of messages for profanity prior to sending the messages.
  • words will be categorized as profanity by an applicable dictionary, database or other resource means known to those of ordinary skill in the art. If a message includes any words from an associated profanity dictionary, or similar control data source, a secondary security confirmation will be activated and the user will be prompted to confirm whether or not to send the message.
  • the communication control system may include a user customizable dictionary that allows the user to identify words or phrases that trigger a confirmation prompt by the profanity trigger.
  • the user customizable dictionary may be particularly well adapted for the screening of slang, abbreviations, acronyms or other tenns that might not otherwise be identified in a typical dictionary or database. It is contemplated that the user customizable dictionary may be preconfigured and edited by the user at any time, and may include any words or phrases the user wishes.
  • the hour range filter is the hour range filter.
  • the user receives a secondary security confirmation prompt for all messages sent during user specified hours during the day. Accordingly, the secondary security confirmation in this filter is triggered temporally; i.e., by a specified time range.
  • the hour range filter further includes user selectable settings hour range settings for the implementation of the hour range filter.
  • the filter may provide various user selectable settings for various times of day and days of the week. In one embodiment it is contemplated that there may be separate weekday and weekend filters.
  • FIG. 4 provides an example of additional settings related to the hour range filter.
  • the user may choose an hour range for which the filter is to be applied. Though not shown, it is understood that selections for various time ranges and related days of the week may be provided such that the user may enable the filter, for example, every night between 10 p.m. and 6 a.m. Similarly, the user may enable the filter, for example, to apply on a recurring basis each weekend or other time period.
  • Yet another contemplated filter is the specific contacts filter. When engaged, this filter allows a user to select contacts for which the filter is to be applied. Once contacts are selected for filtering, every message to the selected contacts triggers the confirmation prompt, no matter the time of day. Contacts from a stored contact list may be individually selected for filtering, as demonstrated in the interface embodiment depicted in FIG. 5. As shown in FIG. 5, in this interface embodiment, when the specific contact filter is selected to be applied, each of the user's saved contacts is presented such that the user may selectively apply the filter to each chosen contact. For each contact for which the filter is to be applied, any message sent to the selected contact triggers a secondary security confirmation prompt to be presented to the user. It is also contemplated that groups of contacts can be chosen with this filter. For example, a user could chose to provide a secondary security confirmation for all co-workers and contacts associated with the user's business.
  • Yet another contemplated filter (36) is the contacts/range filter.
  • the contacts/range filter When this filter is engaged, a user may choose specific contacts for which a confirmation prompt will be provided only during specified time periods.
  • the contacts/range filter is an example of a combination filter in which multiple queries are made to determine whether or not to apply the filter. In use, this filter will provide a secondary security confirmation prompt, when engaged, for certain identified contacts during certain identified periods. For example, a user could set this filter to engage a secondary security confirmation prompt for his or her co-workers between the hours of 10 p.m. and 5 a.m.
  • Another contemplated combination filter would be a filter that, when engaged, provides a secondary security confirmation prompt only when a message to a specified contact (or set of contacts) includes profanity. Any combination of any number of filters (36) may be provided and the examples given herein are not intended to be limiting in any manner.
  • Another contemplated filter is the all contacts filter. If activated, this filter triggers a secondary security confirmation prompt anytime a message is to be sent to any of the stored contacts in a user's address book. Conversely, the all contacts filter may also be structured to be applied such that a confirmation prompt is triggered anytime a message is to be sent to any contact not stored in the user's address book.
  • filters may be incorporated into or provided by the communication control system application described herein.
  • a user may enable a confirmation prompt for any message in which an autocorrect function has been used.
  • Such a filter may help prevent users from sending messages where the phone has automatically corrected a word in the message which the user has not noticed. As such, this filter may prevent mistakes in communication caused by autocorrect features.
  • FIG. 2 and this description is focused on an example of a method of implementing a communication control system in which the communication control system 10 is adapted for controlling the message services of a smartphone, it should be understood that the communication control system may be adapted for controlling any type of communication service from any mobile device, as will be recognized by one having ordinary skill in the art in light of the disclosures herein.
  • a user will start the application.
  • the user will engage with the user interface and enable the user's desired filters, turning the desired filtered into the "on" mode.
  • the user inputs a message into the mobile device and commands the mobile device to send the message (20).
  • the application determines whether or not a filter has been enabled that is applicable to the message; e.g., if the profanity filter is turned on, the application determines whether or not the message contains profanity.
  • the next steps depend on whether the one or more user selected filters engaged at the time the message is sent identify the message as one which requires the presentation of a confirmation prompt to the user.
  • the next step (30) is providing a confirmation prompt asking the user to confirm the message should be sent.
  • the secondary security confirmation prompt will be comprised of a question such as, "Are you sure?", "Do you want to send this message?” or some other secondary security confirmation prompt that forces a user to instruct the mobile device to send the message for a second time.
  • the confirmation prompt may require a more complex response, such as a password or other challenge response. The addition of a confirmation step may help to prevent the instance of unintentional or otherwise regrettable communications.
  • step (32) the application receives the user's command to send or not send the message.
  • step (34) the communication control system either sends or refrains from sending the message based on the user's command received in step (32) in response to the secondary security confirmation.
  • step (24) if the message is identified as not requiring the presentation of a confirmation prompt as indicated in step (24) (i.e., the engaged filter does not recognized the message as qualifying for a secondary security confirmation) then the message will simply be sent without a secondary security prompt according to the normal modality for the mobile device, as illustrated in step (28). In such case, no secondary security confirmation prompt is provided and the completion of the communication is unimpeded by a secondary prompt.
  • the communication control system is adapted to apply one or more filters to identify messages, or other communication requests, for which the user would like to apply a higher level of scrutiny before initiating and/or completing.
  • the examples provided herein are merely representative examples of such filters and the methods of implementing them. It is understood that additional filters may be incorporated into the communication control system.
  • the communication control system application described herein may be further adapted to prevent the mobile device system functionality from interfering with the intended communication.
  • a user may be composing an SMS message, or other text message methodology loiown to those of ordinary skill in the art, when the system receives an SMS message.
  • the receipt of a message will disrupt the composition of a message.
  • the receipt of a message may trigger a conformation prompt for any communication being composed at the time of receipt of the incoming message.
  • a filter (36) may apply when a user is writing a text message to contact A, receives a text message from contact B and mistakenly continues to write the text message meant for contact A to contact B.
  • versions of the communication control system application described herein may be functionality adapted, not just to confirm the intention of the user to complete a communication, but to actually prevent certain communications from being made.
  • a user may lock out certain contacts during certain time periods such that no communications can be made to (and, in certain embodiments, no communications can be received from) the contact during the specified time period.
  • the controls provided may additionally prevent the user from adjusting the settings for a locked out contact during the lock out period.
  • the communication control system application may provide a plurality of user selected commands to personalize the operation of the system.
  • the system is inserted between the user's messaging and communication commands and the operation of the communication functions by the mobile device. Accordingly, the communication control system application may monitor and limit the operation of the communication systems in the associated mobile device.
  • the communication control system application described herein provides numerous benefits and advantages directed to the user, offering the user customizable control of communications on their mobile device.
  • Advantages of the communication control system application include, but are not limited to: preventing users from sending regrettable messages, allowing users to edit their settings for particular contacts, allowing users to edit their settings for certain times of day, allowing users to edit their settings depending on the content of the message, providing control mechanisms for helping to prevent automatic system functions from interfering with intended communications, providing functionality to prospectively lock out certain types of communications.

Abstract

A communication control application for a mobile device which assists in the prevention of sending regrettable messages and initiating unwanted phone calls by providing an extra layer of control between the commands to initiate and complete certain communications identified by the user.

Description

APPLICATION FOR COMMUNICATION CONTROL IN CELL PHONES
CROSS REFERENCE TO RELATED APPLICATION(S)
[001] This application claims the benefit of United States Provisional Patent
Application Serial No.: 61/471,037, filed April 1, 2011, the entire disclosure of which is incorporated herein by reference.
BACKGROUND
1. FIELD OF THE INVENTION
[002] This invention relates to an application for use in mobile devices to improve the control of the mobile device's communication system. More specifically, the present invention relates to a control system application to assist in the prevention of initiating unwanted calls and sending unwanted text and e-mail messages, among other communication functions.
2. DESCRIPTION OF THE RELATED ART
[003] An increasing number of people rely on smart phones or other mobile devices to conduct personal and professional business, communicating through a variety of ways including voice calls and messages, text messages, and e-mail. Anyone familiar with smart phones and mobile devices is aware of the frequency in which errors may occur. Since smart phones are small and portable, and thus have a touch screen or smaller keyboard to type with, it is common for users to make mistakes both in initiating communication and in the content of their messages. Further, due to the mobile nature of smart phones, users often send messages while on the go and do not have the time (or attention) to catch mistakes they might have made. In addition, with the sensitivity of the touch screen on many of these mobile devices, it is common for users to send inadvertent calls, text messages or other communications while the phone is stored in a purse or pocket if the device is not properly locked before storage.
[004] Many smart phones attempt to solve user errors in messages by providing a spell check function or auto correct capability. These tools assist the user in correcting their mistakes before the message is sent. However, there are many times where these tools either do not function properly or they are overlooked by the user, and the user may send a message containing mistakes. Sometimes an error may be critical, and not correcting such an error may be detrimental, especially in a business setting. This is particularly true if the message accidentally contains profanity or other similarly offensive language.
[005] Unintentionally initiating calls or initiating calls against better judgment is another issue with smart phone usage. Dialing particular contacts can be harmful if they were not intended, such as dialing your boss's cellular phone number late at night, or calling an estranged contact at an inconvenient time. Many smart phones allow a user to place a call simply by selecting a certain contact. Some phones contain a locking mechanism to prevent accidental phone calls. However, even with this locking mechanism, phone calls and other communications are often inadvertently placed when users forget to turn on the applicable locking function. In addition, phone calls are often placed by accident while a user is navigating through on-screen commands.
[006] Accordingly, a need exists for a mobile device application that prompts the user depending on mistakes in the content of the message, the person the message is being sent to, or depending on the time of day as described and claimed herein.
SUMMARY
[007] Because of these and other problems with the art, described herein, among other things, is a communication control application which may help to prevent smart phone users from sending regrettable text or email messages and initiating unwanted phone calls.
[008] In one embodiment, the communication control application comprises a method for providing a secondary security confirmation for sending communications for users of a mobile device, the method comprising: providing a user with a software application which interfaces with a smart phone device; having said user carry said smart phone ;said user engaging certain filters for messages sent from said smart phone device through said software application; said software application providing a secondary security confirmation prompt for a user for messages identified by said engaged filter; and said software application preventing the sending of messages identified by said engaged filter unless said user accents to said secondary security confirmation prompt.
[009] In one embodiment, the filter identifies messages by contacts chosen by said user. In another, the filter identifies messages by the content of said messages. In yet another, the filter identifies messages by a time period chosen by said user. In still another the filter identifies all messages sent by the smartphone.
BRIEF DESCRIPTION OF THE DRAWINGS
[010] FIG. 1 provides a representation of the physical structure of a smart phone system and its components.
[Oi l] FIG. 2 provides a flowchart detailing the process of the message control system.
[012] FIG. 3 provides an embodiment of a screenshot of the message setting options on the main screen.
[013] FIG. 4 provides an example of a screenshot of controls for time settings if the hour range option is enabled.
[014] FIG. 5 provides an example of a screenshot of controls for contacts settings if the specific contacts setting is enabled.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[015] In adding an additional checking step to chosen mobile phone communications prior to the sending of these communications, the disclosed mobile device application assists in preventing smart phone users from sending regrettable text or email messages and initiating unwanted phone calls. In its essence, the disclosed application provides an extra layer of control between the user commands to initiate a communication and the user commands to complete a communication. For purposes of clarity, when used herein, the term "messages" may refer to e-mail communications, text messages, tweets, telephone call or other types of communications means which can be received or sent by a cellular phone.
[016] In one embodiment, the communication control application is associated with a "piece" of closely cooperating hardware, a mobile device. Generally, any mobile device which is capable of connecting to a network (e.g., a cellular network, the internet, a local area network (LAN), or any other network known to those of ordinary skill in the art which is capable of using network protocols) and rendering multimedia formats, in addition to being enabled to be programmed for running an additional application is contemplated.
[017] Generally, the mobile device will include computing resources in the form of a processor, an associated processor RAM-unit for loading and running applications, such as a JAVA Applet, and, in some embodiments, a Flash ROM in order to run multiple program applications. Accordingly, contemplated mobile devices include, but are not limited to, mobile cellular phones, personal digital assistants (PDAs), smartphones, MP3 players, handheld media players (e.g., an iTouch™), Bluetooth™ or other mobile devices known to those of ordinary skill in the art. A "smartphone," as that term is used herein, is interpreted broadly to include a simple, but programmable, and in so far as a little bit "smart" phone. Further, contemplated programming for the mobile device includes, but is not limited to JAVA programming, the Android™ operating system, iPhone OS™, or other mobile device programming system known to those of ordinary skill in the art.
[018] In general, the mobile device contains send/receive functionality in order to exchange digital information. Preferred communication modalities include wireless communication, like IR, however cable-based alternatives may also be implemented as these alternatives generally provide a cheaper interface without a sender and receiver circuit, antennae, etc., and without encryption, decryption, and user authentication software modules which can be required with wireless communication modalities.
[019] An embodiment of one contemplated mobile device is provided in FIG. 1. As depicted, this embodiment of a mobile device (12) generally includes a user input mechanism (14), which in this embodiment is comprised of a touchscreen, a camera and voice communication means (16) known to those of ordinary skill in the art which allows for the sending and receiving of voice communications. It is contemplated that in other embodiments the user input mechanism (14) may include a greater or lesser number of elements known to those of ordinary skill in the art for communicating with a mobile device, including, for example, a keyboard, or other device used for typing.
[020] In one embodiment, the RAM unit of the mobile device (12) is loaded with a
JAVA Applet (or other comparable application software which is commonly referred to as an "app" or an "application"), which implements most of the steps of the intentional method as they will be described in more detail herein. In general, the JAVA applet comprises a program which allows for the addition of another layer of control (start/stop) for communications received by and generated from the mobile device (12).
[021] In certain embodiments, the JAVA applet will include the following. First, a user interface. This user interface will generally contain a main menu listing to, among other things, control the message and control settings of the communication control application disclosed herein. This provides the user easy access to and control of the communication control application of the mobile device. FIG. 3 provides an embodiment of the user interface. In this embodiment of the user interface (10) a user is presented with one or more filters (36) which the user has the option of enabling; i.e., turning on or off. When a given filter (36) is enabled, it results in heightened scrutiny and security for that communication function. Contemplated filters (36) include, but are not limited to, the global setting filter, the profanity filter, the hour range filter, the specific contacts filter, the contacts/range filter and the all contacts filter. Notably, each of the filters is independent of each other. If one filter is turned on by a user, its functionality will be active, while other filters may be in the off, inactive position. Conversely, when an individual filter is in the off position, that specific filter (36) will not be applied, though other filters (36) in the on position may be.
[022] The global settings filter provides a secondary security layer for all messages sent from the mobile device (12). For example, if the global setting filter is on, every attempt to send a message prompts the user for a secondary confirmation prior to sending message. The message will not be sent until the user ascents to this secondary confirmation. When the global filter is in the off setting, this secondary confirmation will no longer be engaged; a message will be sent from the mobile device (12) after the first send command.
[023] The profanity filter provides a control mechanism for the content, or words, of messages. When the profanity filter is selected by the user to be applied, the communication control system will check the content of messages for profanity prior to sending the messages. Generally words will be categorized as profanity by an applicable dictionary, database or other resource means known to those of ordinary skill in the art. If a message includes any words from an associated profanity dictionary, or similar control data source, a secondary security confirmation will be activated and the user will be prompted to confirm whether or not to send the message. It is contemplated that, in one embodiment, the communication control system may include a user customizable dictionary that allows the user to identify words or phrases that trigger a confirmation prompt by the profanity trigger. The user customizable dictionary may be particularly well adapted for the screening of slang, abbreviations, acronyms or other tenns that might not otherwise be identified in a typical dictionary or database. It is contemplated that the user customizable dictionary may be preconfigured and edited by the user at any time, and may include any words or phrases the user wishes.
[024] Another contemplated filter is the hour range filter. When the hour range filter is enabled, the user receives a secondary security confirmation prompt for all messages sent during user specified hours during the day. Accordingly, the secondary security confirmation in this filter is triggered temporally; i.e., by a specified time range. Thus, rather than a simple on/off enabling logic associated with the global setting and profanity filters, the hour range filter further includes user selectable settings hour range settings for the implementation of the hour range filter. For example, the filter may provide various user selectable settings for various times of day and days of the week. In one embodiment it is contemplated that there may be separate weekday and weekend filters. FIG. 4 provides an example of additional settings related to the hour range filter. In the example provided, the user may choose an hour range for which the filter is to be applied. Though not shown, it is understood that selections for various time ranges and related days of the week may be provided such that the user may enable the filter, for example, every night between 10 p.m. and 6 a.m. Similarly, the user may enable the filter, for example, to apply on a recurring basis each weekend or other time period.
[025] Yet another contemplated filter is the specific contacts filter. When engaged, this filter allows a user to select contacts for which the filter is to be applied. Once contacts are selected for filtering, every message to the selected contacts triggers the confirmation prompt, no matter the time of day. Contacts from a stored contact list may be individually selected for filtering, as demonstrated in the interface embodiment depicted in FIG. 5. As shown in FIG. 5, in this interface embodiment, when the specific contact filter is selected to be applied, each of the user's saved contacts is presented such that the user may selectively apply the filter to each chosen contact. For each contact for which the filter is to be applied, any message sent to the selected contact triggers a secondary security confirmation prompt to be presented to the user. It is also contemplated that groups of contacts can be chosen with this filter. For example, a user could chose to provide a secondary security confirmation for all co-workers and contacts associated with the user's business.
[026] Yet another contemplated filter (36) is the contacts/range filter. When this filter is engaged, a user may choose specific contacts for which a confirmation prompt will be provided only during specified time periods. Though not shown, the contacts/range filter is an example of a combination filter in which multiple queries are made to determine whether or not to apply the filter. In use, this filter will provide a secondary security confirmation prompt, when engaged, for certain identified contacts during certain identified periods. For example, a user could set this filter to engage a secondary security confirmation prompt for his or her co-workers between the hours of 10 p.m. and 5 a.m. Another contemplated combination filter would be a filter that, when engaged, provides a secondary security confirmation prompt only when a message to a specified contact (or set of contacts) includes profanity. Any combination of any number of filters (36) may be provided and the examples given herein are not intended to be limiting in any manner.
[027] Another contemplated filter is the all contacts filter. If activated, this filter triggers a secondary security confirmation prompt anytime a message is to be sent to any of the stored contacts in a user's address book. Conversely, the all contacts filter may also be structured to be applied such that a confirmation prompt is triggered anytime a message is to be sent to any contact not stored in the user's address book.
[028] As stated above, although not shown in FIG. 3, there are any number of other filters (36) that may be incorporated into or provided by the communication control system application described herein. For instance, a user may enable a confirmation prompt for any message in which an autocorrect function has been used. Such a filter may help prevent users from sending messages where the phone has automatically corrected a word in the message which the user has not noticed. As such, this filter may prevent mistakes in communication caused by autocorrect features.
[029] In general, the workflow between mobile device (12) and the disclosed application, in certain embodiments, will proceed as follows. As a preliminary matter, while FIG. 2 and this description is focused on an example of a method of implementing a communication control system in which the communication control system 10 is adapted for controlling the message services of a smartphone, it should be understood that the communication control system may be adapted for controlling any type of communication service from any mobile device, as will be recognized by one having ordinary skill in the art in light of the disclosures herein.
[030] In a first step, a user will start the application. In a second step, the user will engage with the user interface and enable the user's desired filters, turning the desired filtered into the "on" mode. In a third step, the user inputs a message into the mobile device and commands the mobile device to send the message (20). In a fourth step (22), the application determines whether or not a filter has been enabled that is applicable to the message; e.g., if the profanity filter is turned on, the application determines whether or not the message contains profanity. [031] As shown in FIG. 2, the next steps depend on whether the one or more user selected filters engaged at the time the message is sent identify the message as one which requires the presentation of a confirmation prompt to the user. If the message is identified as requiring the presentation of a confirmation prompt as indicated in step (24), the next step (30) is providing a confirmation prompt asking the user to confirm the message should be sent. In one embodiment, the secondary security confirmation prompt will be comprised of a question such as, "Are you sure?", "Do you want to send this message?" or some other secondary security confirmation prompt that forces a user to instruct the mobile device to send the message for a second time. For example, in one embodiment, the confirmation prompt may require a more complex response, such as a password or other challenge response. The addition of a confirmation step may help to prevent the instance of unintentional or otherwise regrettable communications. Notably, it is contemplated that in alternative embodiments any type of message security confirmation that prompts a user to confirm with the mobile device (12) that the message should be sent may be used. In the next step (32), the application receives the user's command to send or not send the message. In the last step in this course, step (34), the communication control system either sends or refrains from sending the message based on the user's command received in step (32) in response to the secondary security confirmation.
[032] Going back to step (22) in FIG. 2, if the message is identified as not requiring the presentation of a confirmation prompt as indicated in step (24) (i.e., the engaged filter does not recognized the message as qualifying for a secondary security confirmation) then the message will simply be sent without a secondary security prompt according to the normal modality for the mobile device, as illustrated in step (28). In such case, no secondary security confirmation prompt is provided and the completion of the communication is unimpeded by a secondary prompt. [033] As described above, the communication control system is adapted to apply one or more filters to identify messages, or other communication requests, for which the user would like to apply a higher level of scrutiny before initiating and/or completing. The examples provided herein are merely representative examples of such filters and the methods of implementing them. It is understood that additional filters may be incorporated into the communication control system.
[034] The communication control system application described herein may be further adapted to prevent the mobile device system functionality from interfering with the intended communication. For example, a user may be composing an SMS message, or other text message methodology loiown to those of ordinary skill in the art, when the system receives an SMS message. In some mobile devices, the receipt of a message will disrupt the composition of a message. Accordingly, in one embodiment of the communication control system application, the receipt of a message may trigger a conformation prompt for any communication being composed at the time of receipt of the incoming message. Accordingly, a filter (36) may apply when a user is writing a text message to contact A, receives a text message from contact B and mistakenly continues to write the text message meant for contact A to contact B.
[035] In addition to the functions described above it is further contemplated that versions of the communication control system application described herein may be functionality adapted, not just to confirm the intention of the user to complete a communication, but to actually prevent certain communications from being made. For example, a user may lock out certain contacts during certain time periods such that no communications can be made to (and, in certain embodiments, no communications can be received from) the contact during the specified time period. The controls provided may additionally prevent the user from adjusting the settings for a locked out contact during the lock out period.
[036] It should be noted that various changes and modifications to the presently preferred embodiments described herein will be apparent to those skilled in the art. Such changes and modifications may be made without departing from the spirit and scope of the present invention and without diminishing its attendant advantages.
[037] For example, the communication control system application may provide a plurality of user selected commands to personalize the operation of the system. In use, the system is inserted between the user's messaging and communication commands and the operation of the communication functions by the mobile device. Accordingly, the communication control system application may monitor and limit the operation of the communication systems in the associated mobile device.
[038] In sum, the communication control system application described herein provides numerous benefits and advantages directed to the user, offering the user customizable control of communications on their mobile device. Advantages of the communication control system application include, but are not limited to: preventing users from sending regrettable messages, allowing users to edit their settings for particular contacts, allowing users to edit their settings for certain times of day, allowing users to edit their settings depending on the content of the message, providing control mechanisms for helping to prevent automatic system functions from interfering with intended communications, providing functionality to prospectively lock out certain types of communications.
[039] While the invention has been disclosed in conjunction with a description of certain embodiments, including those that are currently believed to be the preferred embodiments, the detailed description is intended to be illustrative and should not be understood to limit the scope of the present disclosure. As would be understood by one of ordinary skill in the art, embodiments other than those described in detail herein are encompassed by the present invention. Modifications and variations of the described embodiments may be made without departing from the spirit and scope of the invention.

Claims

1. A method for providing a secondary security confirmation for sending communications for users of a mobile device, the method comprising:
providing a user with a sof ware application which interfaces with a smart phone device; having said user carry said smart phone;
said user engaging certain filters for messages sent from said smart phone device through said software application;
said software application providing a secondary security confirmation prompt for a user for messages identified by said engaged filter; and
said software application preventing the sending of messages identified by said engaged filter unless said user accents to said secondary security confirmation prompt.
2. The method of claim 1, wherein said filter identifies messages by contacts chosen by said user.
3. The method of claim 1, wherein said filter identifies messages by the content of said messages.
4. The method of claim 1, wherein said filter identifies messages by a time period chosen by said user.
5. The method of claim 1, wherein said filter identifies all messages sent by the smartphone.
PCT/US2012/031920 2011-04-01 2012-04-02 Application for communication control in cell phones WO2012135869A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161471037P 2011-04-01 2011-04-01
US61/471,037 2011-04-01

Publications (2)

Publication Number Publication Date
WO2012135869A2 true WO2012135869A2 (en) 2012-10-04
WO2012135869A3 WO2012135869A3 (en) 2012-12-27

Family

ID=46932446

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/031920 WO2012135869A2 (en) 2011-04-01 2012-04-02 Application for communication control in cell phones

Country Status (1)

Country Link
WO (1) WO2012135869A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016051310A1 (en) * 2014-10-01 2016-04-07 Shoket Latief An electronic messaging system and method
US10402048B1 (en) 2015-10-08 2019-09-03 Colossus Mobile Applications LLC System and method for preventing undesirable communications from smart devices
WO2019204038A1 (en) * 2018-04-20 2019-10-24 Microsoft Technology Licensing, Llc Customized controls for handling commmunication content

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050135681A1 (en) * 2003-12-22 2005-06-23 Schirmer Andrew L. Methods and systems for preventing inadvertent transmission of electronic messages
US20090210504A1 (en) * 2008-02-14 2009-08-20 Gary Stephen Shuster Erroneous addressing prevention for electronic messaging
US20090260062A1 (en) * 2008-04-15 2009-10-15 International Business Machines Corporation Real-time online communications management
US20100274860A1 (en) * 2009-04-24 2010-10-28 International Business Machines Corporation Checking destination email addresses against historical address information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050135681A1 (en) * 2003-12-22 2005-06-23 Schirmer Andrew L. Methods and systems for preventing inadvertent transmission of electronic messages
US20090210504A1 (en) * 2008-02-14 2009-08-20 Gary Stephen Shuster Erroneous addressing prevention for electronic messaging
US20090260062A1 (en) * 2008-04-15 2009-10-15 International Business Machines Corporation Real-time online communications management
US20100274860A1 (en) * 2009-04-24 2010-10-28 International Business Machines Corporation Checking destination email addresses against historical address information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016051310A1 (en) * 2014-10-01 2016-04-07 Shoket Latief An electronic messaging system and method
US10402048B1 (en) 2015-10-08 2019-09-03 Colossus Mobile Applications LLC System and method for preventing undesirable communications from smart devices
WO2019204038A1 (en) * 2018-04-20 2019-10-24 Microsoft Technology Licensing, Llc Customized controls for handling commmunication content

Also Published As

Publication number Publication date
WO2012135869A3 (en) 2012-12-27

Similar Documents

Publication Publication Date Title
US9262604B2 (en) Method and system for locking an electronic device
US11963082B2 (en) Scheduling for focus without distraction
US8145200B2 (en) Method and apparatus for configuring unique profile settings for multiple services
US9307089B2 (en) Conference call systems and methods
US8913099B2 (en) Systems and methods to manage video chat contacts
US8566599B2 (en) System and method for controlling access to a portable device
US20090093242A1 (en) System and method for account setup for mobile devices, such as an e-mail account setup
WO2010011257A1 (en) Wireless mobile device with privacy groups that independently control access to resident application programs
CN101584195A (en) Portable communication having accidental key press filtering
WO2016145706A1 (en) Method and device for implementing user mode switching on smart terminal, and smart terminal
US20150195703A1 (en) Control of a mobile device
US9635169B2 (en) Method for managing data traffic of software and portable electronic apparatus using the same
US20080026729A1 (en) Method and apparatus for configuring unique profile settings for multiple services
WO2012135869A2 (en) Application for communication control in cell phones
US9668138B2 (en) Differentiated access for mobile device
US10154136B1 (en) Call block policy using validated identities and selected attribute sharing
CA2802274C (en) Method and system for locking an electronic device
JP2007295176A (en) Portable communication terminal, method for controlling mail transmission/reception functions thereof, program, and recording medium
WO2017096980A1 (en) Method for realizing anti-interference mode in mobile communication terminal and mobile communication terminal with anti-interference mode
WO2020042009A1 (en) Access control barring method and apparatus
US20180276413A1 (en) Communication device with selectively shared access modes and incoming communication
CN101901110A (en) Method for prompting application program entry by dial plate, system and mobile terminal thereof
US9609103B2 (en) Systems and methods for managing communication
CA2776179A1 (en) Systems and methods to manage video chat contacts
CN102340578A (en) Mobile terminal and starting-up method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12764534

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12764534

Country of ref document: EP

Kind code of ref document: A2