WO2015089275A1 - Method of prioritizing communications transmitted to a computing device - Google Patents

Method of prioritizing communications transmitted to a computing device Download PDF

Info

Publication number
WO2015089275A1
WO2015089275A1 PCT/US2014/069723 US2014069723W WO2015089275A1 WO 2015089275 A1 WO2015089275 A1 WO 2015089275A1 US 2014069723 W US2014069723 W US 2014069723W WO 2015089275 A1 WO2015089275 A1 WO 2015089275A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
user
priority
incoming
computing device
Prior art date
Application number
PCT/US2014/069723
Other languages
French (fr)
Inventor
Charles J. LUETHKE
Original Assignee
Luethke Charles J
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luethke Charles J filed Critical Luethke Charles J
Publication of WO2015089275A1 publication Critical patent/WO2015089275A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]

Definitions

  • aspects of the systems and methods described herein provide the user with the ability to manage communications being transmitted to a computing device. For example, during a time period selected by a user, the user can separate more important communications away from less important communications. More important communications can be directly brought to the attention of the user and appear on a priority interface on the computing device. For example, the user can be provided with both immediate audible and visual notification of the more important communications. Less important communications can be indirectly brought to the attention of the user. For example, the less important communications can be directed to a nonpriority interface on the computing device without notification to the user. In this regard, the user can view the less important communications on the nonpriority interface when the user has time. In time, the less important communications can be automatically transferred to the priority interface, so as to bring them to the attention of the user. This provides the user with immediate knowledge of more important communications, while allowing the user to decide when the less important communications will be reviewed.
  • the ability to manage communications being transmitted to a computing device can be beneficial to a user in many scenarios .
  • an individual at the meeting may desire to only receive communications from the president of the company, but still retain the ability to review all other incoming communications at a later time.
  • the methods described herein enable the user to segregate more important communications from less important communications, while still retaining the ability to review less important communications at a later time. It also enables the user to disregard the less important communications altogether, until the less important communications are brought to the attention of the user .
  • an individual may wish to receive all incoming communications, except for a select few persons with whom the individual does not desire to speak with during a certain period of time.
  • the ability to manage these communications provides the user with the ability to filter out the less important communications from whom the user does not wish to directly communicate at a certain time period, while still retaining the ability to review the less important communications at a later time.
  • the systems and methods described herein can also provide practical benefits for the computing device itself. Providing the user with the ability to prioritize communications minimizes the amount of communications and notifications being directly transmitted to the user. Additionally, providing the user with the ability to focus on more important communications minimizes the amount of time the user must spend on the computing device to filter through less important communications. This can help to preserve the battery life of the computing device.
  • aspects of the systems and methods disclosed herein can also provide a user of a computing device with the ability to manage incoming communications on one or more other computing devices that operate on the same network as the computing device of the user.
  • a parent may seek to prioritize incoming communications to the computing device of a child.
  • the systems and methods described herein enable the parent to remotely manage the child's computing device and segregate more important communications from less important communications during periods of time selected by the parent.
  • a parent may seek to block incoming calls to the computing device of the child, except for emergency calls from the parent. Additionally, a parent can conceal the nonpriority interface from the child so that the child has no knowledge of who may be attempting to communicate with the child during school hours. This can deter a child from trying to return a communication to an individual who is prohibited from communicating with the child during school hours.
  • a setting can also be implemented so that a parent can receive a notification each time that the settings on the child's computing device are changed. This can notify the parent of any attempts by the child attempting to override the settings put in place by the parent .
  • One aspect of the present technology provides a method that includes receiving a selection of communications, wherein the selection identifies particular communications as priority communications or nonpriority communications during a given time period.
  • An incoming communication is received and a determination is made whether the incoming communication is a priority communication or a nonpriority communication based on the received selection.
  • the incoming communication is provided to a priority interface if it is determined to be a priority communication.
  • a selection of one of a passive mode, restrictive mode, and standard mode is received.
  • the incoming communication is provided to a nonpriority interface if the incoming communication is determined not to be a priority communication .
  • the given time period is a first time period and the nonpriority communication is provided to the priority interface after a second time period.
  • the first time period and the second time period are the same time period.
  • the first time period and the second time period are different time periods .
  • a system for prioritizing incoming communications.
  • the system can include memory and one or more processors coupled to the memory.
  • the one or more processors may be being configured to receive a selection of communications that can identify particular communications as priority communications or nonpriority communications during a given time period.
  • the processors can receive an incoming communication and a determination can be made whether the incoming communication is a priority communication or a nonpriority communication based on the received selection.
  • the processor may be further configured to provide the incoming communication to a priority interface if the communication is determined to be a priority communication .
  • the one or more processors are configured to receive a selection of one of a passive mode, restrictive mode, and standard mode.
  • the one or more processors are configured to provide the incoming communication to a nonpriority interface when it is determined not to be a priority communication.
  • the given time period is a first time period and the processors are configured to provide the nonpriority communication to the priority interface after a second time period.
  • the first time period and the second time period are the same time period.
  • the first time period and the second time period are different time periods .
  • a method includes receiving user input for handling incoming communications received at a computing device; receiving an incoming communication at one or more processors of a computing device; determining, using the one or more processors, whether the incoming communication is a priority communication or a non-priority communication based upon the user's input; providing the incoming communication to a priority interface of the communication device when the one or more processors determines that the incoming communication is a priority communication; and providing the incoming communication to a non-priority interface of the communication device when the one or more processors determines that the incoming communication is a non-priority communication .
  • the user input may include selection of a mode.
  • the mode may further include one of: a restrictive mode, a passive mode, or a standard mode.
  • the restrictive mode may permit communications from pre-selected individuals or groups of individuals for a preselected time.
  • the passive mode may block communications from pre-selected individuals or groups of individuals for a pre-selected time.
  • the standard mode may provide all incoming communications to the priority interface .
  • the user input specifies at least one of a type of message, a time period, and one or more senders . Additionally, the method may further include comparing a time of the incoming message to the user input. The user input may identify a first time period for a first sender, and a second different time period for a second sender.
  • the type of message includes at least one of a voicemail, a text message, a social media message, and an e-mail message.
  • the step of determining whether the incoming communication is a priority communication further includes determining an identity of the sender of the incoming communication; and comparing the identity of the sender to the user input.
  • receiving user input for handling communications received at the computing device further includes providing instructions for managing incoming communications on a secondary computing device, wherein the instructions include limiting particular incoming communications .
  • the non- priority interface on the secondary computing device may be concealed for predetermined time periods.
  • a first user may also be notified when a user of the secondary computing device attempts to access the concealed non-priority interface .
  • the priority interface provides a notification of the communication immediately .
  • the non-priority communications may be forwarded to the priority interface after a predetermined time.
  • the non-priority interface may also disable notifications for received non-priority communications .
  • a system in accordance with another aspect of the present disclosure, includes an input interface; at least one memory; a receiver; one or more processors; a priority interface; and a non-priority interface.
  • the at least one memory may store settings provided by a user through the input interface. The settings may identify at least one communication as a priority communication or a non-priority communication.
  • the receiver may receive at least one incoming communication.
  • the one or more processors may be communicatively coupled to the at least one memory and the receiver. The one or more processors may be programmed to determine whether the at least one incoming communication is a priority communication or a non-priority communication based on the stored settings .
  • the priority interface may be adapted to display the at least one incoming communication when the one or more processors determines that the at least one incoming message is a priority communication.
  • the non- priority interface may be adapted to display the at least one incoming communication when the one or more processors determines that the at least one incoming message is a non- priority communication.
  • the one or more processors may be further configured to temporarily store the incoming communication when the one or more processors determine that the incoming communication is a non-priority communication.
  • a non-transitory computer readable medium on which instructions are stored the instructions, when executed by one or more processors cause the one or more processors to perform a method that includes receiving user input for handling incoming communications received at a computing device; receiving an incoming communication at one or more processors of a computing device; determining whether the incoming communication is a priority communication or a non-priority communication based upon the user's input; providing the incoming communication to a priority interface of the communication device when the one or more processors determines that the incoming communication is a priority communication; and providing the incoming communication to a non-priority interface of the communication device when the one or more processors determines that the incoming communication is a non-priority communication.
  • FIG. 1 is a functional diagram of an example system in accordance with an aspect of the disclosure.
  • FIG. 2 is a pictorial diagram of the example system of FIG . 1.
  • FIG. 3 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 4 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 5 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 6 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 7A illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 7B illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 8 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 9 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 10 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 11 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 12 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 13 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 14 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
  • FIG. 15 is a flow diagram in accordance with aspects of the disclosure.
  • FIG. 16 is a flow diagram in accordance with aspects of the disclosure.
  • FIG. 17 is a flow diagram in accordance with aspects of the disclosure.
  • FIG. 18 is a flow diagram in accordance with aspects of the disclosure.
  • FIG. 19 is a flow diagram in accordance with aspects of the disclosure.
  • FIG. 20 is a flow diagram in accordance with aspects of the disclosure.
  • aspects of the technology discussed here employ a method of prioritizing incoming communications received on a computing device and displaying those communications to the user.
  • aspects of the disclosure may be used to provide the user of the computing device with greater control over when individuals or contacts may directly communicate with the user, how these individuals may communicate with the user, and how those communications are reviewed by the user.
  • the user may determine that during a preselected time period, the user only wishes to directly receive communications from a selected individual or group of individuals, e.g., a priority communication. If desired, the user may further specify what type of communication the user would like to receive from the individual during that preselected time period, such as a voice mail, text message, social media message, e-mail message, etc.
  • a priority communication may be transmitted to a priority interface.
  • the user may see, hear, and/or otherwise be notified (e.g., by vibration) of an incoming priority communication and view information regarding the priority communication on the priority interface .
  • Any other incoming communication received during this preselected time period can be identified as a nonpriority communication that the user of the computing device does not wish to directly receive during the preselected time period.
  • a nonpriority communication is denied access to the priority interface and can be instead transmitted to a nonpriority interface during the preselected time period, so as to separate the nonpriority communications from the priority communications .
  • Nonpriority communications can be later transmitted to the priority interface at a preselected time.
  • a user may select and place the computing device into one of three modes : a restrictive mode, a passive mode, or a standard mode. These modes provide the user with different alternatives for deciding what communications are priority communications and those that are nonpriority communications .
  • the processor can access a database of prestored contacts and incorporate the prestored contacts into a selection menu.
  • the prestored contacts or prestored groups of contacts may be retrieved from local or remote storage.
  • the prestored contacts may have been stored, for example, on the computing device as part of the preliminary set-up for the prioritization process.
  • the prestored contacts may also be retrieved from a remote server. It is to be appreciated that the prestored contact list or address book may include contacts name(s), associated telephone number (s), e-mail address (es), physical address (es) or other information related to the particular contact .
  • the user can provide input as to what constitutes a priority communication or nonpriority communication.
  • the user can identify one or more contacts or groups of contacts on the selection menu and the corresponding time periods the respective contact or groups of contacts may directly or directly communicate with the user.
  • a user can identify priority communications, such as preselected contacts or individuals that the user would like to directly communicate with during a preselected period of time.
  • nonpriority communications such as communications from preselected contacts or individuals that the user does not wish to directly communicate with during a preselected period of time.
  • the user can identify the specific type of communication that a user would like to receive or not receive from a preselected contact during a preselected time period. For example, in the restrictive mode, the user may choose to only receive texts messages, or may further limit communications by selecting to only receive text messages, from a preselected contact during a preselected time period (i.e., priority communications). The user may therefore choose not to receive any other types of communications (e.g., voice mail, incoming phone call, email, video chat, social media message) from one or more contact during the preselected time period (i.e., nonpriority communications) .
  • any other types of communications e.g., voice mail, incoming phone call, email, video chat, social media message
  • the processor determines whether the communication is a priority communication or a nonpriority communication, based upon the user's input. For example, the processor will determine the mode the user has selected and whether the incoming communication is received from a preselected contact during a preselected time.
  • the incoming communication received from a preselected contact during a preselected time will be identified as a priority communication. However, when the incoming communication is not received from a preselected contact during a preselected time, the communication will be identified as a nonpriority communication .
  • the incoming communication received from a preselected contact during a preselected time will be identified as a nonpriority communication.
  • the communication will be identified as a priority communication .
  • incoming communications identified by the processor as a priority communication will be directly transmitted to the user for immediate receipt and review of the incoming communication.
  • incoming priority communications will be transmitted to a priority interface that allows the user to immediately view or receive the communication as it is being transmitted.
  • an incoming text message identified as a priority communication will be provided with access to a priority interface and the user will be able to immediately receive and view the incoming text message.
  • Related notifications concerning the text message including audible notifications and the like, will also be directly communicated to the user.
  • incoming communications identified by a processor as a nonpriority communication will not be directly transmitted to the user for immediate receipt and review.
  • a nonpriority communication will be denied access to the priority interface and transmitted to a nonpriority interface of the computing device.
  • the nonpriority communication can also be stored in a database.
  • the computing device will provide no immediate related notifications, including audible notifications, concerning the incoming nonpriority communications so that the user is not disturbed by nonpriority communications .
  • the user will have no knowledge that a nonpriority communication has been received by the computing device, unless the user decides to view the nonpriority interface or if the nonpriority communication is eventually transmitted to the priority interface .
  • each of the nonpriority communications that appear on the nonpriority interface can eventually be provided with access to the priority interface.
  • the user can select a specific time or time period when all nonpriority communications that appear on the nonpriority interface will be automatically transmitted to the user.
  • certain nonpriority communications can be converted to a priority communication and provided with access to the priority interface. For example, as will be explained in further detail herein, when the current time falls within a preselected time period that a communication from a preselected individual is a priority communication, a nonpriority communication from the same preselected individual can be converted to a priority communication.
  • one computing device in the network can be used to manage and prioritize incoming communications on other computing devices in the network.
  • a primary computing device can communicate with a secondary computing device through a network server.
  • the primary computing device can transmit instructions concerning how incoming communications are managed on the secondary computing device .
  • a user of a primary computing device seeks to manage a secondary computing device in the network
  • the user may select a menu that identifies all other computing devices on the network.
  • the user can select a secondary computing device to manage. Once the secondary computing device has been selected, the steps for prioritizing incoming communications are identical to those previously discussed herein .
  • the user of the primary computing device may select and place the secondary computing device into one of three modes: a restrictive mode, a passive mode, or a standard mode.
  • the processor can access a database of prestored contacts for the secondary computing device and provide a corresponding selection menu.
  • the prestored contacts may be stored and retrieved from local storage or remotely stored.
  • the selection menu viewed by the user provides different options for the user to select depending on what mode has been selected.
  • the user of the primary computing device identifies the contacts from the prestored contacts whom the user would like the owner of the secondary computing device to directly communicate with during a preselected time period.
  • the selection menu allows the user to identify certain individuals from the prestored contacts of the secondary computing device that the user does not wish to directly communicate with during a preselected period of time.
  • no selection menu need be provided, as all communications can be identified as priority communications.
  • a processor in the network can determine whether the communication is a priority communication or a nonpriority communication, as in the previous example. Access to the priority interface of the computing device is further determined by a processor in the computing device or remote server or the like .
  • FIGS. 1 and 2 illustrate an example system 100 in which the features described above may be implemented.
  • system 100 can include computing devices, as well as a storage system.
  • Each of the computing devices may contain one or more processors, memory, and other components generally found in general purpose computing devices.
  • the 100 can be any known processor, such as a commercially available CPU.
  • the processor can be customized for a particular use, such as an ASIC or other hardware-based processor.
  • Memory of the computing devices stores information accessible by one or more processors, including instructions that can be executed by the one or more processors.
  • Memory may further include data 110 that is capable of being retrieved, manipulated, or stored by the processor.
  • the memory can be any nontransitory type capable of storing information accessible by the processor, such as a hard- drive, memory card, ROM, RAM, DVD, CD-ROM, write-capable, and read-only memories.
  • 104 can be any set of instructions to be executed directly, such as machine code, or indirectly, such as scripts, by the one or more processors. Accordingly, the terms
  • instructions can be used interchangeably herein.
  • the instructions can be stored in object code format for direct processing by the processor, or in any other computing device language, including scripts or collections of independent source code modules that are interpreted on demand or compiled in advance. Functions, methods, and routines of the instructions are explained in more detail below.
  • Instructions can be executed by the one or more processors to, for example, without limitation, prioritize incoming communications or provide messages to one or more client computing devices 114, 130, 132,134 in the network 112.
  • Communications module 109 can be implemented in the system to allow for communication between or among the client computing devices 114, 130, 132, and 134 in the network. For example, when client computing device 114 controls prioritization settings on another computing device, such as computing device 130, communications module 109 can access user contact information of computing device 114 and transmit a message to computing device 114 alerting computing device 114 of any changes being made on client computing device 130.
  • Data 110 can be stored, retrieved, or manipulated by the one or more processors 104 in accordance with the user's instructions 108.
  • the data can be stored in computer registers in a relational database, as a table having several different fields and records, or XML documents, including RSS, Atom, SOAP, and XHMTL .
  • the data can also be formatted in any computing device-readable format such as, but not limited to, binary values, ASCII or Unicode.
  • the data can comprise any information sufficient to identify the relevant information, such as numbers, descriptive text, proprietary codes, pointers, references to data stored in other memories such as at other network locations, or information that is used by a function to calculate the relevant data.
  • computing device of FIG. 1 illustrates each of one or more processors, memory, and other elements of computing devices 102 as being within the same block, these components may comprise multiple processors, computers, computing devices, or memories that may or may not be stored within the same physical housing.
  • memory can be a solid-state drive or other storage media located in a housing separate from that of computing device 102.
  • references to a processor, computer, computing device, or memory will be understood to also include multiple processors, computers, computing devices, or memories that may or may not operate in parallel.
  • computing device 102 may include a single server computing device or a load-balanced server farm.
  • various functions described herein may be described as operating on a single computing device having a single processor, various aspects of the subject matter described herein can be implemented by a plurality of computing devices, for example, the communication of information over a network 112.
  • the client computing devices 114, 130, 132, 134 can be positioned at nodes of a network 112 and capable of direct and indirect communication with other nodes of network 112.
  • FIGS. 1-2 although only a few computing devices are illustrated, it should be appreciated that a conventional system can be expanded to include numerous connected computing devices, with each different computing device being positioned at a different node of the network 112.
  • Various protocols and systems can be used to interconnect the network 112 and intervening nodes described herein, so that the network can be part of the Internet, World Wide Web, specific intranets, wide area networks, or local networks.
  • the network can further utilize standard communication protocols, such as Ethernet, Wi-Fi, and HTTP, protocols that are proprietary to one or more companies, and various combinations of the foregoing.
  • Each of the client computing devices may be configured similarly to the server computing devices 102, with a processor, memory, and instructions as described above.
  • Each computing device 114, 130, 132, 134 can be a personal computing device intended for use by a user 150, 160, 162, 164 and have all of the components typically used in connection with a personal computing device such as a central processing unit (CPU), memory (e.g., RAM and internal hard drives) storing data and instructions, a display such as displays 124, 126, 128, 129 (e.g., a monitor having a screen, a touch-screen, a projector, a television, or other device that is operable to display information), and the user's input device 121 (e.g., a mouse, keyboard, touch-screen, or microphone ) .
  • CPU central processing unit
  • memory e.g., RAM and internal hard drives
  • a display such as displays 124, 126, 128, 129 (e.g., a monitor having a screen,
  • computing devices 114, 130, 132, 134 may each comprise a full-sized personal computing device, they may alternatively comprise mobile computing devices capable of wirelessly exchanging data with a server over a network such as the Internet or a wireless telephone service provider network.
  • computing device 114 may be a mobile phone or a device such as a wireless-enabled PDA, a tablet PC, laptop computer, or a netbook that is capable of obtaining information via the Internet.
  • Prioritization module 121 can prioritize incoming communications. For example, prioritization module 121 can provide the interfaces for the prioritization selections to be made by user, including, for example, the selection of mode and an identification of individuals who may directly or indirectly communicate with user during a predetermined time period. Prioritization module can additionally provide the parameters for handling received communications and filter the information provided to the user, including, for example managing display and notifications of the incoming communications .
  • the computing device may further include an internal time clock 125 for determining time.
  • the time clock 125 may be used to determine the time an incoming communication is transmitted to the computing device 114.
  • the time clock 125 may be used to determine the current time.
  • computing device 114 may include an address book or a list of contacts 123.
  • the contact information may include contacts name(s), associated telephone number (s), e-mail address (es), physical address (es) or other information related to the particular contact.
  • contact information can be stored in storage system 136 or in memory 106 of server computer 102.
  • storage system 136 can be any type of computerized storage capable of storing information accessible by one or more of server computing devices 102, such as a hard-drive, memory card, ROM, RAM, DVD, CD-ROM, write-capable , and read-only memories.
  • storage system 136 may include a distributed storage system where data is stored on a plurality of different storage devices which may be physically located at the same or different geographic locations.
  • Storage system 136 may be connected to the computing devices via the network 112 as shown in FIG. 1 and/or may be directly connected or incorporated into any of the computing devices 102, 114, 130, 132, and 134.
  • a user may request to prioritize incoming communications to a computing device.
  • the user 150 may request to prioritize and directly receive incoming communications to the computing device 114 from certain preselected contacts during a preselected period of time, while requesting that all other incoming communications be stored for later review by the user.
  • the user may request that incoming communications to the computing device 114 from certain preselected contacts during a preselected period of time be stored for later review by the user, while requesting to prioritize and directly receive all other incoming communications.
  • an incoming communication may be any form of communication, such as a telephone call, a text message, a voicemail message, an e-mail, a social media message, and any other mode of communication from the selected contact.
  • computing device 114 may be a mobile device, tablet, desktop, laptop, etc.
  • FIGS. 3 and 4 illustrate example (or screenshot) interfaces, for example, which may be provided by the prioritization module number on a client device 114.
  • main menu 170 appears on display 124 of computing device 114.
  • Selection of device mode icon 172 can permit the user 150 to initiate prioritization of incoming communications. It is to be appreciated that selection of icon 172 may be a means for accessing and manipulating the parameters of the operating system of computing device 114. In another example, the user 150 may initiate an application that concurrently runs on computing device 114.
  • computing device 114 may prompt the user 150 to identify the prioritization mode in which to place the phone. For example, in the example 180 shown in FIG. 4, a prioritization menu 182 is shown on display 124, which prompts the user 150 to select among the prioritization modes: restrictive mode, passive mode, or standard mode.
  • the restrictive mode may be selected if, for example, the user 150 does not want to be disturbed for a preselected period of time, such as when going to dinner, and the user only desires to receive communications from select individuals.
  • a preselected period of time such as when going to dinner
  • the restrictive mode only communications from certain preselected contacts during a preselected period of time will be directly transmitted to the user 150 and viewed on a main or priority interface. All other incoming communications that are transmitted during the preselected period of time are denied access to the priority interface and can be stored for review by the user 150 at a later time.
  • the passive mode may be selected if, for example, the user 150 would like to receive a majority of all incoming communications, but does not want to be disturbed by select individuals for a certain period of time.
  • the passive mode communications from select individuals for a preselected period of time will be prohibited from directly reaching the user 150 and denied access to the priority interface. All other incoming communications during this preselected period of time will be directly transmitted to the user 150 and the priority interface.
  • the standard mode may be selected when the user
  • the user 150 does not wish to prioritize any incoming communications or wishes to clear all previous instructions provided by the user for either the restrictive mode or the passive mode.
  • the user 150 can directly receive all incoming communications in the passive mode.
  • the computing device can provide additional prompts to request further instructions from the user 150.
  • the desired mode e.g., restrictive, passive, or standard mode
  • the computing device may prompt the user 150 to identify those contacts from whom the user 150 desires to directly receive incoming communications during a preselected time period. For example, upon selection of the mode, computing device 114 may access a list of the contacts of the user 150, for example, from its memory or from a remote location.
  • the contacts 123 can include the contact name(s), associated telephone number (s), e-mail address (es), physical address (es) or other information related to the particular contact.
  • the list of contacts may also be stored on one or more different subscriber identification module (SIM) cards.
  • SIM subscriber identification module
  • SIM cards Information regarding certain groups of individuals may be stored on the SIM cards, such that, for example, a user may opt to have one SIM Card for work contacts, a separate SIM card for friends, and yet another SIM card for family. This allows the user with another way in which to store and access information.
  • the list of contacts may be provided to the user
  • a selection menu can list each of the contacts from the address book of the user 150. Additionally, for each contact, the selection menu can provide the user 150 with the ability to indicate the time period in which the preselected contact may directly communicate with the user 150, based upon the selected mode.
  • While a list of all contacts is shown in the example of FIG. 5, in other examples a list may not be displayed.
  • the user can begin typing a contact name or other information, and processors can access the list to display matching or corresponding contacts.
  • the user can enter input restricting communications from particular phone numbers/e-mail addresses not on the contact list, or from any source not identified on the contact list.
  • FIG. 5 illustrates an example 202 of a selection interface for the restrictive mode.
  • selection menu 200A allows the user 150 to select from among the listed contacts those contacts who may directly communicate with the user 150 during a preselected period of time.
  • contacts have been incorporated into selection menu 200A shown on display 124 of computing device 114.
  • the user 150 has determined that the user would only like to directly receive communications from contacts identified as "Mom" and "Work" during the time period 6:00 p.m. to 8:00 p.m. (e.g., a priority communication) .
  • "Mom" is an example of a preselected contact, and 6:00 p.m. to 8:00 p.m.
  • a preselected time period is an example of a preselected time period.
  • the user 150 also inherently selects a second preselected time period for the preselected contact (i.e., "Mom"). For example, during a second preselected time period from 8:01 p.m. to 5:59 p.m. the next day, the user 150 has determined that the user 150 does not want to receive incoming communications from "Mom" and "Work.” Thus, such communications will be nonpriority communications .
  • FIG. 6 illustrates an example 204 of a selection interface for the passive mode.
  • the selection menu prompts the user 150 to identify those contacts from whom the user 150 does not wish to directly receive incoming communications during a preselected time period.
  • computing device 114 may access the list of contacts from the address book of the user 150 and the contacts may be incorporated into a selection menu that will appear on display 124.
  • selection menu 200B incorporates and lists each of the contacts from the address book of the user 150.
  • Selection menu 200B further allows the user 150 to select from among the listed contacts those contacts who are not permitted to communicate with the user 150 during a preselected period of time, e.g., nonpriority communications.
  • the user 150 has determined that the user 150 does not wish to be disturbed and does not want to receive a communication from a contact identified as "Noelle" during work hours.
  • the user 150 has selected "Noelle" on selection menu 200B and has further preselected a time period to restrict incoming communications from "Noelle" during the preselected time period 9:00 a.m. to 5:00 p.m. (e.g., a nonpriority communication) .
  • the user By the user's selection of a preselected time period in the passive mode to deny preselected contacts direct access to the user and the priority interface, the user also inherently selects a second preselected time period for preselected contacts. For example, during a second preselected time period from 5:01 p.m. to 8:59 a.m. the next day, the user 150 has determined that the user 150 would like to receive incoming communications from "Noelle.” Thus, such communications will be identified as nonpriority communications .
  • the computer may prompt the user to confirm that all previous selections made in either restrictive mode or passive mode should be cleared or stored. For example, user 150 may desire to directly receive all incoming communications to the computing device .
  • processor 116 of computing device 114 will be described as performing various steps in the process, but it is to be appreciated that any processor in the network may be utilized .
  • processors can determine whether the user will directly receive the incoming communication. For example, based upon the selected mode, processor 116 can determine whether the incoming communication is a priority communication that is to be directly received by the user 150 or a nonpriority communication that can be reviewed by the user 150 at another time. For example, processor 116 can determine if the communication is from a preselected contact and, if so, (a) what time it is received and (b) whether the incoming communication is being transmitted at a time period that the preselected contact is either allowed or prohibited to directly communicate with user 150.
  • a processor can determine whether the incoming communication is from a preselected contact.
  • the incoming communication is from a contact who has not been preselected by the user in the restrictive mode, the incoming communication is determined to be a nonpriority communication .
  • processor 116 can proceed to determine the time of the incoming communication. For example, processor 116 can determine at what time the incoming communication from the preselected time was transmitted to computing device 114. In one example, at the time the incoming communication is transmitted, a corresponding time stamp may accompany the incoming communication and processor 116 can obtain the time information from the time stamp. [ 0107 ] After determining the time at which the incoming communication was transmitted, the time of the incoming communication may be compared to the preselected time period for the preselected contact. For example, processor 116 may compare the time of the incoming communication obtained from clock 125 to the preselected time period in which the selected contact is permitted to directly communicate with the user 150. In one aspect, processor 116 may review the user 150 's input 126 concerning the selected contact and the corresponding preselected time periods in which the selected contact may directly communicate with the user 150.
  • the communication is identified by the processor as a priority communication. For example, assume the user 150 has made the selections illustrated in FIG. 5. If the incoming communication, such as a text message, is from a contact named "Mom" and it is transmitted at 5:30 p.m., the incoming communication will be identified by processor 116 as a priority communication.
  • the communication is identified by processor 116 as a nonpriority communication.
  • the incoming communication such as a text message
  • the message is transmitted at 4:00 p.m.
  • the incoming communication will be identified by processor 116 as a nonpriority communication. This is because "Joe” is not a "preselected” contact and is therefore a contact with whom the user 150 does not want to communicate while in the restrictive mode.
  • Computing device 114 may be able to directly communicate with a third party application to allow the transfer of information, for example, to identify priority and nonpriority communications.
  • a third party application For example, when a social media application receives an incoming communication or social media message from an individual, the social media application can be designed to transmit the time and contact information of the social media message to processor 116 of computing device 114. Processor 116 can then use this information to prioritize the communication as a priority communication or a nonpriority communication, as previously discussed .
  • a third party application can be designed to prioritize incoming communications on its own platform. For example, after the computing device transmits the user's input 126 to a third party application, the third party application can be designed to prioritize incoming communications on the third party application itself. Thus, all third party applications that can communicate with processor 116 can likewise prioritize information on their own interfaces. This provides the user the ability to control the prioritization of incoming communication through all modes of communication, including third party applications .
  • processor 116 can first determine whether the incoming communication is from a preselected contact.
  • processor 116 can carry out the same steps described in the restrictive mode to determine whether the time the incoming communication is transmitted to computing device 114 falls within the preselected time designated by the user 150. For example, after determining that the incoming communication is from a preselected contact, processor 116 can determine at what time the incoming communication is being transmitted to computing device 114.
  • the time of the incoming communication can be compared to the preselected time period for the preselected contact. For example, as previously discussed, processor 116 may compare the time of the incoming communication to the preselected time period in which the selected contact is permitted to directly communicate with the user 150.
  • the processor determines that the time in which the incoming communication from the preselected contact is transmitted to computing device 114 falls within the preselected time period for that contact, the communication is identified by the processor as a nonpriority communication. This is because in the passive mode, the user 150 desires to permit all incoming communications, except for those communications from a preselected contact during a preselected period of time (i.e., nonpriority communications) . For example, assume the user 150 has made the selections illustrated in example 200B of FIG. 6. If the incoming communication, such as a text message, is from a contact named "Noelle" and it is transmitted at 4:30 p.m., the incoming communication is from a preselected contact during a preselected time period.
  • the communication will be identified by processor 116 as a nonpriority communication.
  • processor 116 determines that the time the incoming communication from the preselected contact is transmitted to the computing device is not within the preselected time period, the communication is identified by processor 116 as a priority communication. In one example, assume the user 150 has made the selections illustrated in FIG. 6. If the incoming communication, such as a text message, is from a contact named "Joe" and the message is transmitted at 9:00 a.m. (or at any time), the incoming communication will be identified by processor 116 as a priority communication. (3) STANDARD MODE
  • a priority communication can be a communication that a user would like to receive and a nonpriority communication is a communication that a user does not wish to receive.
  • a user classified a communication as either a priority communication or a nonpriority communication based upon a preselected time period and an individually selected contact .
  • Additional criteria from the previous examples may also be included to further classify a communication as a priority communication or a nonpriority communication. For example, in each of the prior examples, all types of incoming communications as a whole from a specific preselected contact are permitted or denied access to the priority interface. For example, if a user selected to receive an incoming communication from a specific preselected contact at a preselected time (i.e., a priority communication), the user effectively selected to receive all types of incoming communications from the preselected contact, including, without limitation, telephone calls, voicemail messages, text messages, and social media messages.
  • the user 150 may instead choose to select the specific type of communication the user 150 would like to either directly or indirectly receive from a preselected contact at a preselected time.
  • computing device 114 may provide another selection menu 200C on display 124, such as shown in FIG. 7A.
  • the selection menu 200C can enable the user 150 to specify what type of communication the user 150 would like to receive during a given time period.
  • FIG. 7A if computing device 114 is in the restrictive mode, the user 150 may only wish to receive text messages and voice mails from a contact named "Mom" during the time period 3:00 p.m. to 5:00 p.m.
  • processor 160 would identify priority communications that will be directly transmitted to the priority interface of computing device 114. All other types of communications received from "Mom" during this time period are nonpriority communications. Thus, any telephone calls, social media messages, e-mails, etc., that are received from "Mom” during this preselected time period will be identified by processor 116 as nonpriority communications that are denied access to the priority interface and indirectly transmitted to the user 150. Additionally, any incoming communications from any other contacts would also be identified by a processor as a nonpriority communication.
  • the user 150 can make similar selections in the passive mode.
  • the user 150 would select to restrict email, social media, video chat and phone calls, as shown in FIG. 7B .
  • incoming voice mails and text messages from "Mom” will be identified as priority communications.
  • All other communications will be considered nonpriority communications, including phone calls, emails, social media, video chats, and any other selected mode of communication (not shown) from "Mom" between 3:00 p.m. to 5:00 p.m.
  • These nonpriority communications will be denied access to the priority interface and routed to the nonpriority interface .
  • the user may use voice commands to provide computing device 114 with the user's prioritization selections.
  • the user 150 may be able to use a series of voice prompts to initiate a routine that prioritizes incoming communications and to set the desired selections.
  • the user may be able to identify the mode, the contact, and the time of the restriction. For example, the user may say "mode” (to initiate prioritization); “restrictive” (to identify the selected mode); “Mom” (to identify the preselected contact), and "5:00 p.m. to 8:00 p.m.” (to identify the preselected time period) .
  • the user may input information from another computing device on the network 112, such as an iPad, personal computer, etc.
  • the user may incorporate preset settings that can automatically place the computing device 114 into a selected mode.
  • the user 150 can place the phone into a "work setting” and preset the computing device to restrict or allow incoming communications, based on whomever the user would like to communicate with during the work day.
  • a child may desire to have a "school setting,” where incoming communications are automatically restricted during the school week.
  • the school setting may automatically restrict all incoming calls during the day, except for selected emergency contacts. At the conclusion of the school day, the restrictions can be lifted.
  • the preset settings may work in tandem with the selected modes. For example, a user may be able to use preset settings, while also manually placing the phone into a desired mode and making the desired selections .
  • the computing device 114 can continue to process, prioritize, and display incoming communications, based upon whether a communication is a priority communication or a nonpriority communication, as previously discussed herein.
  • priority communications may be transmitted to a priority interface shown on display 124, and the user 150 can directly receive notice of the incoming communication .
  • FIG. 8 illustrates an example priority interface 190.
  • the priority interface is the main menu 192 (see also FIG. 3) and the priority communication is a text message.
  • a notification 194 may appear adjacent a related icon 196 on the main menu 192 to advise the user 150 that a priority communication, such as a text message, has been received.
  • a similar notification may also appear with regard to an icon for a third party application, such as social media and the like.
  • a priority interface can include an interface specific to a particular mode of communication. For example, if the user 150 desires to view a listing of all text messages, the user 150 can select icon 196 (FIG. 8) to access such a listing.
  • FIG. 9 illustrates another example priority interface 190A, where the interface also identifies stored text messages.
  • the interface also identifies stored text messages. For example, in the restrictive mode, using the user 150 's input illustrated in FIG. 5, a text message received from a contact named "Mom" during the preselected time period (i.e., 5:00 p.m. to 8:00 p.m.) will appear on the listing. Additional text messages that were not initially identified as priority communications may also appear on the priority interface if, for example, a predetermined amount of time has passed. For example, while the text message from "Jen" was received last week, notification of the message may be pushed to the priority interface 190A after several days or one week.
  • priority interface can be a notification interface (not shown) that provides an itemized listing of all incoming types of communications.
  • Priority interface can also be a pop-up or push notification to the user 150 on display 124 of computing device 114.
  • the user can also receive an audible notification of an incoming priority communication.
  • an audible notification can include a ringtone, a vibration, or the like, that can be heard by the user 150 when the priority communication is transmitted to computing device 114.
  • Providing the user 150 with the ability to only receive notifications of priority communications during a preselected period of time provides the user 150 with the opportunity to prioritize those communications that are important to receive (i.e., priority communications) and to disregard all other communications (i.e., nonpriority communications) during the preselected period of time.
  • the nonpriority communication is indirectly transmitted to the user 150.
  • the nonpriority communication is denied access to the priority interface and the user 150 is provided with no immediate knowledge of the incoming communication.
  • the computing device will provide no audible or visual notice of the incoming nonpriority communication, as it is being transmitted to computing device 114.
  • FIG. 10 illustrates an example 218 of a nonpriority interface 220 on the computing device 114.
  • nonpriority interface 220 can provide a listing of all nonpriority communications that have been received by computing device 114.
  • text messages from "Joe” at 5:00 a.m. and "Mom" at 10:00 a.m. are nonpriority communications. These text messages have been denied access to the priority interface and were instead provided access to nonpriority interface 220.
  • a text message from "Noelle" at 9:00 a.m. is a nonpriority communication. This is because the user 150 has specifically identified what constitutes a nonpriority communication.
  • the nonpriority interface 220 can be any interface that includes an identification of one or more nonpriority communications. Should the user 150 choose to view the nonpriority interface, the user 150 can access each of the identified nonpriority communications that are displayed on the nonpriority interface 220.
  • the user 150 may additionally access the nonpriority interface at any time.
  • the user 150 may access the prioritization menu 182, as illustrated in FIG. 4, and request access to nonpriority interface 220 by selecting an icon 256.
  • the priority interface is the main menu 192 of computing device 114 (as illustrated in FIG. 3)
  • the priority interface 190 may further include an icon (not shown) which can provide direct access to the nonpriority interface 220 upon a user request.
  • the user 150 can opt to view nonpriority communication on the nonpriority interface 220 at any desired time, while the nonpriority communication is itemized on the nonpriority interface 220.
  • Nonpriority communications can also be stored in a database.
  • nonpriority communications can be locally stored within the memory 118 of computing device 114 or in remote storage .
  • Nonpriority communications can be automatically transmitted to the user 150 at a preselected time.
  • the user 150 can select to have nonpriority communications identified on the nonpriority interface 220 automatically transmitted to the priority interface at the conclusion of a preselected time. This can help to ensure that the user 150 will be able to review the nonpriority communications, even if the user 150 does not want to take the time to view them on the nonpriority interface 220.
  • the user 150 may request to designate a time when all nonpriority communications appearing on the nonpriority interface 220 and stored in a database should be forwarded to the priority interface.
  • the user 150 can request to automatically forward nonpriority communications identified on the nonpriority menu.
  • the user 150 may initiate the request by selecting an icon 250 on the prioritization menu 182 (FIG. 4) .
  • computing device 114 may prompt the user 150 to indicate a time when nonpriority communications on the nonpriority interface can be automatically transmitted to the priority interface.
  • auto-forwarding interface 224 on computing device 114 can provide the user 150 with options from which to determine when nonpriority communications may be automatically transmitted to the priority interface.
  • the user 150 can make a selection as to when nonpriority communications can be forwarded to the priority interface.
  • an auto-forwarding interface 224 of computing device 114 can provide the user 150 with one or more options for controlling the transfer of the nonpriority communication to the priority interface.
  • the user 150 may select to have nonpriority communications forwarded at a designated time interval, such as, for example, every five hours.
  • computing device 114 may provide the user with the option to forward nonpriority communications at one or more times each day, for example, at 8:00 p.m. (not shown) .
  • the user 150 can select to override the settings of the restrictive or passive mode and forward all nonpriority communications to the priority interface on demand at any given time.
  • the user 150 may select icon 226 to initiate a request for all nonpriority communications on nonpriority interface to be forwarded to the priority interface.
  • the prior auto-forwarding selections made by the user (such as forwarding nonpriority communications every five hours) can remain in place even after the user 150 has selected to forward nonpriority communications on demand.
  • processor 114 can then continue to forward nonpriority communications every five hours from when the user last transmitted the nonpriority communications .
  • a nonpriority communication may also be transmitted and provided access to a priority interface when the nonpriority communication is converted to a priority communication .
  • nonpriority communication In the restrictive mode, only one type of nonpriority communication can be converted to a priority communication.
  • This type of nonpriority communication occurs when a communication is transmitted from a preselected contact, but not during the time preselected by the user to access the priority interface. Put another way, it is a communication that occurs when a preselected contact attempts to communicate with the user 150 during a time period outside of the permissible and preselected time period designated by the user.
  • this nonpriority communication can become a priority communication when the current time eventually falls within the preselected time period that a communication from the preselected contact is permitted to access the priority interface. Thus, only certain nonpriority communications are eligible for conversion to a priority communication .
  • the user By virtue of the user selecting a preselected time period that the incoming communication is a nonpriority communication, the user also inherently selects a second preselected time period that the communication would be considered a priority communication.
  • the second preselected time period can be the time period of the day that does not encompass the original preselected time period.
  • the nonpriority communication can be converted to a priority communication .
  • FIG. 6 illustrates the selections of a user of the computing device in the passive mode.
  • the user has determined that communications from "Noelle" between 9:00 a.m. to 5:00 p.m. are nonpriority communications.
  • "Noelle" is a preselected contact and the predetermined time period is 9:00 a.m. to 5 p.m.
  • the user 150's selection the user has also inherently selected a second predetermined time period for "Noelle.” Specifically, the user has identified a second preselected time period of 5:01 p.m. to 8:59 a.m.
  • processor 116 may first determine whether the contact sending the communication is among the preselected contacts identified by the user in the restrictive mode.
  • processor 116 can determine the current time and then compare the current time to the preselected time period in which the preselected contact may directly contact the user 150. When the current time falls within the preselected time period, the nonpriority communication may be converted to a priority communication. The nonpriority communication can then be transmitted and provided access to the priority interface.
  • nonpriority communication is denied access to priority interface.
  • the steps of (a) obtaining the current time and (b) comparing the current time to the preselected time can be continually repeated.
  • the processor can wait a predetermined period of time, such as every hour, to repeat the process steps of determining whether the current time falls within a preselected time period.
  • the predetermined period of time can be selected by the user or preset by the processor.
  • one computing device in the network can control the mode and prioritization settings of another computing device in the network.
  • computing devices 114, 130, 132, 134 are located at nodes of network 112, each of the computing devices 130, 132, and 134 having the same or similar features previously discussed with regard to computing device 114.
  • a family may operate each of the computing devices 114 through network 112 and a parent operating one computing device may desire to manage the incoming communications of another computing device operated by another member of the family in the network.
  • the user 150 will be referred to as the parent user 150
  • the child user 160 will be referred to as a child user.
  • the parent user 150 may desire the ability to prevent the child user 160 from receiving a communication from one or more selected contacts during a preselected time period, such as while the child user 160 is in school, studying, sleeping, etc.
  • the parent user 150 may instead desire to prevent all contacts from communicating with the child user 160 during a preselected time period, such as during school hours, except for family members.
  • additional features may be desired to provide the parent user 150 with greater control over the incoming communications to the computing device 130 of the child user 160.
  • the parent user 150 of computing device 114 may request to prioritize incoming communications being transmitted to another computing device 130 operated by the child user 160.
  • the parent user 150 can make the request by selecting an icon 174 (FIG. 3) on main menu 192 of computing device 114 of the parent user 150.
  • computing device 114 may prompt the user to select the computing device in the network to operate. For example, a processor in computing device 114 (or any processor in the network) may determine what other client devices are operating on the network 112. By way of one example 300, a selection interface 302, as shown in FIG. 12, may appear on display 124 of computing device 114 of the parent user 150. Selection interface 302 may identify all computing devices operating on the network 112 and request the parent user 150 to select one.
  • the parent user 150 may be prompted to identify the prioritization mode in which to place computing device 130 of the child user 160. For example, through network 112, the parent user 150 may request to place the computing device 130 of the child user 160 into restrictive mode, passive mode, or standard mode.
  • the user 150 can view an interface 306 (which is similar to the interface used to control the computing device of the user 150) and make the appropriate selection.
  • the contacts of the child user 160 can be incorporated into a selection menu (not shown) similar to those shown in FIGS. 5-6.
  • the parent user 150 can select a contact (s) and a predetermined time period in which communications from the preselected contact are either permitted or denied access to the priority interface of computing device 130, as previously discussed herein.
  • the parent user 150 can view the nonpriority interface of computing device 130 and/or control the access of the child user 160 to the nonpriority interface and the communications on the nonpriority interface.
  • the parent user 150 may decide that it is acceptable for the child user 160 to view nonpriority communications and the parent user 150 can select an icon 256 to transmit all nonpriority communications to the priority interface of the child user 160 's computing device 130.
  • the parent user 150 may desire to see who is contacting the child user 160 during a preselected period of time.
  • the parent user 150 may further desire to limit the ability of the child user 160 to view nonpriority communications on the nonpriority interface of the computing device 130 of the child user 160.
  • the parent user 150 can conceal the nonpriority interface from the child user 160 during a preselected time period. This can eliminate the temptation the child user 160 may have to directly contact those individuals who have transmitted a nonpriority communication, but are denied direct access to the child user 160 during the preselected period of time.
  • the parent user 150 can make a request on computing device 114.
  • the user 150 can select an icon 356 to view the nonpriority interface of computing device 130 of the child user 160 and to control stored nonpriority communications of computing device 130, including concealing the nonpriority interface from the child user 160.
  • the parent user 150 can view nonpriority communications on the display 124 of computing device 114 of the parent user 150 at all times.
  • computing device 130 may prompt the parent user 150 to make the desired selection concerning the nonpriority interface of computing device 130 of the child user 160.
  • a prompt may appear on display 124 of computing device 114 of the parent user 150.
  • the parent user 150 can make a determination regarding the features of the nonpriority interface that the parent user 150 seeks to manage.
  • the parent user 150 may select an icon 312 that can retrieve and view the nonpriority interface of computing device 130 of the child user 160.
  • the parent user 150 can further choose to conceal the nonpriority interface from the child user 160 for a preselected period of time.
  • a communication can be transmitted to the parent user 150 to provide notice of the change.
  • a communication from processors 104 in server computer 102 may transmit a communication to computing device 114 of the parent user 150 to indicate that a change has been made.
  • the communication may include information concerning the prior setting and the new setting.
  • the communication can be in the form of a text message, an e-mail message, or any type of message transmitted to the parent user 150 notifying the parent user 150 that the settings on the computing device have been changed. This ensures that if the child user 160 attempts to override the parameters selected by the parent user 150, the child user 160 cannot do so without first notifying the parent user 150.
  • the communication can be transmitted from another server (not shown) that can be connected to network 112.
  • the child user 160 can maintain the ability to prioritize incoming communication on the child user 160 's computing device 130. However, in one example, any changes made by the child user 160 can be communicated to the parent user 150. In another example, the parent user 150 may retain complete control over the prioritization settings on the computing device 130 of the child user 160, such that the child user 160 has no ability to control the prioritizing settings of computing device 130.
  • control over other computing devices on the network 112 is not limited to use by families, such as in this example, but can be expanded to include any scenario where a user of a computing device on network 112 desires to control the prioritization settings of another computing device on the network.
  • control may be desired in the corporate environment when employers distribute cellular phones to its employees and seek to restrict their use; a school which requires that all incoming communications or texts are limited during school hours or during testing; movie theaters seeking to control incoming communications during a movie; a company controlling the use of computing devices in vehicles, such as automobiles, airplanes and the like.
  • any third party seeking to control the communications of a user's computing device is contemplated within the scope of the disclosure.
  • FIG. 15 an example flow diagram illustrates some aspects that were described above, which may be performed by one or more computing devices, such as the computing devices 114, 130, 132, 134 and/or server computing devices 110.
  • a processor of a computing device receives the user's input at block 402.
  • the user's input provides data about whether an incoming communication is a priority communication or a nonpriority communication.
  • Processors receive an incoming communication at block 404 as it is transmitted to the computing device.
  • the processors determine at block 406 whether the incoming communication is a priority communication based upon the user ' s input .
  • processors can determine whether the nonpriority communication can be transmitted to the priority interface. In one example, based on the user's input, it is determined whether the current time falls within a preselected period of time selected by the user and the nonpriority communication is provided with access to the priority interface. In one example, the preselected period of time may be a period of time after which all nonpriority communications may be transferred to the priority interface . The predetermined period of time may also be a period of time after which a preselected contact may be converted to a nonpriority communication.
  • FIGS. 16-20 flow diagrams illustrate additional aspects that were described above and that may be performed in connection with example 400.
  • a series of steps are provided that may be performed prior to block 402 shown in FIG. 15.
  • a series of prompts may assist the user with providing appropriate instructions to the computing device with regard to classifying incoming communications as a priority or nonpriority communication.
  • the computing device prompts the user at block 442 to select whether to place the computing device in the passive mode, restrictive mode, or clear mode.
  • processors determine what mode the user has selected at block 444.
  • a determination by the processors can first be made as to whether the user has selected the restrictive mode. A decision is made at block 446.
  • the processor provides an additional prompt at block 448.
  • the user is provided with a selection menu that prompts the user to identify one or more contacts from a contact database who are permitted to access a priority database during a period of time that is selected by the user. During this same period of time, those contacts who have not been specifically designated by the user to access the priority interface during this period of time are inherently identified by the user as a contact that will be denied access to the priority interface during this period of time.
  • the computing device may further prompt the user to select a specific time or time period after which a nonpriority communication may be automatically transmitted to the priority interface.
  • the processor determines whether the user has selected the passive mode and makes a decision at block 450.
  • the processor provides an additional prompt at block 452.
  • the user can be provided with a selection menu that prompts the user to identify one or more contacts from a contact database wherein communications received from this contact during a preselected period of time are denied access to the priority database. During this same period of time, those contacts who have not been specifically designated by the user as one whose communications are denied access to the priority interface during this same period of time are identified as a priority communication.
  • the next step is block 402 as previously discussed.
  • processors make a decision at block 450 that the user has not selected the passive mode, processor decides that the computing device is operating in the standard mode at block 454 and, in one example, no additional prompts are provided.
  • processors make a decision at block 450 that the user has not selected the passive mode, processor decides that the computing device is operating in the standard mode at block 454 and, in one example, no additional prompts are provided.
  • processors make a decision at block 450 that the user has not selected the passive mode, processor decides that the computing device is operating in the standard mode at block 454 and, in one example, no additional prompts are provided.
  • additional steps for determining whether the incoming communication is from a priority contact may also be used.
  • one or more processors can determine in what mode the computing device is operating at block 502. A decision is made at block 504.
  • processors determine that the device is in the passive mode at block 504, processors next determine whether the incoming communication is from a preselected contact at block 506. A decision is made at block 508. If the contact is not a preselected contact, the processors identify the incoming communication as a priority communication at block 510. The communication is then permitted to access the priority interface, just as previously described with respect to block 410 in FIG. 15.
  • the contact is a preselected contact
  • a determination is made as to what time the communication from the contact is being transmitted to the computing device at block 512. Once the time is obtained, a determination can be made whether that time falls within a preselected time period that the user is denied access to the priority interface at block 514. A decision is made at block 516. When it is determined that the time the incoming communication is transmitted from a contact falls within the time period the contact is denied access the priority interface, the incoming communication is identified as a nonpriority communication at block 518.
  • the communication is identified as a nonpriority communication and denied access to the priority interface.
  • processors can then determine whether the device is in the restrictive mode at block 524. Processors can then determine whether the incoming communication is from a preselected contact at block 526. A decision is made at block 528.
  • processors identify the incoming communication as a nonpriority communication at block 530. Steps 412-418, described in FIG. 15, can continue to be carried out by the processor. However, if the processors determine that the contact is a preselected contact at block 528, processors can next determine at what time the communication from the contact is being transmitted to the computing device at block 532. Once the time in which the communication has been transmitted to the computing device has been determined, processors determine whether that time falls within a preselected time period that the user has permitted this contact to access the priority interface at block 534. A decision is made at block 536.
  • the incoming communication is identified as a priority communication at block 538. If however, it is determined that the time the communication is transmitted does not fall within a preselected time period that the contact is permitted access to the priority database, the communication is identified as a nonpriority communication at block 540.
  • An additional time comparison step can also be conducted to determine whether a nonpriority communication can be transferred to priority interface.
  • processors can determine whether the nonpriority communication can be converted to a priority communication.
  • the determination can be made whether the contact is from a preselected contact. If the communication is not from preselected contact, a decision is made that the nonpriority communication cannot be converted to a priority communication. [0193] When the communication is from a preselected contact, a determination is made whether the current time identified by the processor falls within a preselected time or time period for that preselected contact. In the passive mode, in one example, as previously discussed, the preselected time period can be the second preselected time period that results from the express identification by the user of the first preselected time period a communication from a preselected contact is denied access to the priority interface.
  • the preselected time period is the initial preselected time period identified by the user that a communication from a preselected contact is provided with access to the priority interface.
  • the nonpriority communication is transmitted to the priority interface. This is because the nonpriority communication is now converted to a nonpriority communication upon expiration of the time selected by the user to prohibit access to the priority interface.
  • FIG. 19 a flow diagram provides an example 600 of one computing device 114 controlling the prioritization of incoming communication on a second computing device, such as computing device 130.
  • the user 150 of computing device 114 can request access to another client computing device, such as computing device 130, on the network 112 at block 602.
  • Prompts can appear on computing device 114 that allow the user 150 to provide the input necessary to prioritize incoming communications to second computing device 130.
  • a processor of the second computing device 130 receives the user's input from the user 150 at block 602.
  • the user's input can include, for example, data about whether an incoming communication is a priority communication or a nonpriority communication, when nonpriority communications that appear on the nonpriority interface may be transmitted to the priority interface, or any other input that can control the prioritization settings on the second computing device 130.
  • Second computing device 130 receives user input from computing device 114 at block 603. The prioritization of incoming communications can then be performed in the same or similar steps as described in FIG. 15.
  • Processors receive an incoming communication at block 604 as it is transmitted to the second computing device 130.
  • the processors determine at block 606 whether the incoming communication is a priority communication based upon the user's input.
  • processors continually determine whether the nonpriority communication can be transmitted to the priority interface. In one example, based on the input of the user 150, it is determined whether the current time falls within a preselected period of time selected by the user and the nonpriority communication is provided with access to the priority interface. In one example, the preselected period of time may be a period of time after which all nonpriority communications may be transferred to the priority interface . In another example, the predetermined period of time may be a period of time after which a preselected contact may be converted to a nonpriority communication. [ 0201 ] A decision is made at block 616 whether the nonpriority communication may be transferred to the priority interface.
  • FIG. 20 a flow diagram illustrates an example 700 of how the user 150 of computing device 114 can be notified that the prioritization settings on second computing device 130 have been changed.
  • the user 160 of computing device 130 may change the prioritization settings on computing device 130 at block 702.
  • a communication is transmitted to server computing device 102 at block 704.
  • the communication can be, for example, a message indicating that the settings on computing device 130 have been changed, and can further include an identification of the new settings.
  • Server computing device 102 receives the communication from second computing device 130 at block 706.
  • Server computing device 102 determines what computing device is controlling second computing device 130 at block 708.
  • Server computing device 102 can then provide a communication or message to computing device 114 at block 710.
  • the communication from server computing device 102 is received at block 712.
  • the communication can then be displayed to the user 150 on computing device 114 at block 714.
  • the communication can be an e-mail, text message, voicemail, or any type of communication that will notify the user 150 that a change has been made.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The aspects described herein include systems, methods, and computer readable medium for prioritizing communications. A method of prioritizing communications may include receiving user input for handling incoming communications received at a computing device (402); receiving an incoming communication at one or more processors of a computing device (404); determining, using the one or more processors, whether the incoming communication is a priority communication or a non-priority communication based upon the user's input (406); providing the incoming communication to a priority interface of the communication device when the one or more processors determines that the incoming communication is a priority communication (410); and providing the incoming communication to a non-priority interface of the communication device when the one or more processors determines that the incoming communication is a non-priority communication (408).

Description

METHOD OF PRIORITIZING COMMUNICATIONS
TRANSMITTED TO A COMPUTING DEVICE
CROSS-REFERENCES TO RELATED APPLICATIONS
[ 0001 ] The present application claims the benefit of the filing date of U.S. Provisional Application No. 61/915,279, filed on December 12, 2013, the disclosure of which is hereby incorporated herein by reference.
BACKGROUND
[ 0002 ] The way we communicate has progressively changed, with a greater variety of communication modes and communication media made available to the general public. As a result, the amount of incoming communications that an individual may receive on a computing device at any given time is voluminous. For example, an individual may be interrupted with many communications, such as text messages, social media messages, e-mail messages, voicemail messages, voice communications, video chats, etc., from numerous individuals throughout the day. The overwhelming amount of incoming communications makes it difficult for one to prioritize more important communications from those that may be less important.
[ 0003 ] When the computing device is a mobile phone, some individuals attempt to solve this problem by purchasing two mobile phones and limiting dissemination of contact information for one of the mobile phones to a select group of individuals. However, such solution is cumbersome and cost prohibitive to those who cannot afford to incur the costs associated with procuring a second mobile phone.
[ 0004 ] Other mobile phone users may seek to limit certain communications by incorporating a call-blocking function that prevents incoming communications from less important contacts. Some users may even request that the phone company be responsible for blocking certain phone numbers. However, such solutions are limited and have many disadvantages.
BRIEF SUMMARY
[ 0005 ] Aspects of the systems and methods described herein provide the user with the ability to manage communications being transmitted to a computing device. For example, during a time period selected by a user, the user can separate more important communications away from less important communications. More important communications can be directly brought to the attention of the user and appear on a priority interface on the computing device. For example, the user can be provided with both immediate audible and visual notification of the more important communications. Less important communications can be indirectly brought to the attention of the user. For example, the less important communications can be directed to a nonpriority interface on the computing device without notification to the user. In this regard, the user can view the less important communications on the nonpriority interface when the user has time. In time, the less important communications can be automatically transferred to the priority interface, so as to bring them to the attention of the user. This provides the user with immediate knowledge of more important communications, while allowing the user to decide when the less important communications will be reviewed.
[ 0006 ] The ability to manage communications being transmitted to a computing device can be beneficial to a user in many scenarios . By way of example only, during an important meeting, an individual at the meeting may desire to only receive communications from the president of the company, but still retain the ability to review all other incoming communications at a later time. The methods described herein enable the user to segregate more important communications from less important communications, while still retaining the ability to review less important communications at a later time. It also enables the user to disregard the less important communications altogether, until the less important communications are brought to the attention of the user .
[0007] At other times, an individual may wish to receive all incoming communications, except for a select few persons with whom the individual does not desire to speak with during a certain period of time. The ability to manage these communications provides the user with the ability to filter out the less important communications from whom the user does not wish to directly communicate at a certain time period, while still retaining the ability to review the less important communications at a later time.
[0008] The systems and methods described herein can also provide practical benefits for the computing device itself. Providing the user with the ability to prioritize communications minimizes the amount of communications and notifications being directly transmitted to the user. Additionally, providing the user with the ability to focus on more important communications minimizes the amount of time the user must spend on the computing device to filter through less important communications. This can help to preserve the battery life of the computing device.
[0009] Aspects of the systems and methods disclosed herein can also provide a user of a computing device with the ability to manage incoming communications on one or more other computing devices that operate on the same network as the computing device of the user. By way of just one example, a parent may seek to prioritize incoming communications to the computing device of a child. The systems and methods described herein enable the parent to remotely manage the child's computing device and segregate more important communications from less important communications during periods of time selected by the parent.
[ 0010 ] For example, during school hours, a parent may seek to block incoming calls to the computing device of the child, except for emergency calls from the parent. Additionally, a parent can conceal the nonpriority interface from the child so that the child has no knowledge of who may be attempting to communicate with the child during school hours. This can deter a child from trying to return a communication to an individual who is prohibited from communicating with the child during school hours.
[ 0011 ] In another example, a setting can also be implemented so that a parent can receive a notification each time that the settings on the child's computing device are changed. This can notify the parent of any attempts by the child attempting to override the settings put in place by the parent .
[ 0012 ] One aspect of the present technology provides a method that includes receiving a selection of communications, wherein the selection identifies particular communications as priority communications or nonpriority communications during a given time period. An incoming communication is received and a determination is made whether the incoming communication is a priority communication or a nonpriority communication based on the received selection. The incoming communication is provided to a priority interface if it is determined to be a priority communication.
[ 0013 ] In one example, a selection of one of a passive mode, restrictive mode, and standard mode is received.
[ 0014 ] In another example, the incoming communication is provided to a nonpriority interface if the incoming communication is determined not to be a priority communication . [0015] In another example, the given time period is a first time period and the nonpriority communication is provided to the priority interface after a second time period. In one example, the first time period and the second time period are the same time period. In another example, the first time period and the second time period are different time periods .
[0016] In another aspect, a system is provided for prioritizing incoming communications. The system can include memory and one or more processors coupled to the memory. The one or more processors may be being configured to receive a selection of communications that can identify particular communications as priority communications or nonpriority communications during a given time period. The processors can receive an incoming communication and a determination can be made whether the incoming communication is a priority communication or a nonpriority communication based on the received selection. The processor may be further configured to provide the incoming communication to a priority interface if the communication is determined to be a priority communication .
[0017] In one example, the one or more processors are configured to receive a selection of one of a passive mode, restrictive mode, and standard mode.
[0018] In another example, the one or more processors are configured to provide the incoming communication to a nonpriority interface when it is determined not to be a priority communication.
[0019] In still another example, the given time period is a first time period and the processors are configured to provide the nonpriority communication to the priority interface after a second time period. In one example, the first time period and the second time period are the same time period. In another example, the first time period and the second time period are different time periods .
[ 0020 ] In another aspect of the present disclosure, a method includes receiving user input for handling incoming communications received at a computing device; receiving an incoming communication at one or more processors of a computing device; determining, using the one or more processors, whether the incoming communication is a priority communication or a non-priority communication based upon the user's input; providing the incoming communication to a priority interface of the communication device when the one or more processors determines that the incoming communication is a priority communication; and providing the incoming communication to a non-priority interface of the communication device when the one or more processors determines that the incoming communication is a non-priority communication .
[ 0021 ] In one example of this aspect, the user input may include selection of a mode. The mode may further include one of: a restrictive mode, a passive mode, or a standard mode. The restrictive mode may permit communications from pre-selected individuals or groups of individuals for a preselected time. The passive mode may block communications from pre-selected individuals or groups of individuals for a pre-selected time. The standard mode may provide all incoming communications to the priority interface .
[ 0022 ] In another example of this aspect, the user input specifies at least one of a type of message, a time period, and one or more senders . Additionally, the method may further include comparing a time of the incoming message to the user input. The user input may identify a first time period for a first sender, and a second different time period for a second sender. [0023] In still another example of this aspect, the type of message includes at least one of a voicemail, a text message, a social media message, and an e-mail message.
[0024] In yet another example of this aspect, the step of determining whether the incoming communication is a priority communication further includes determining an identity of the sender of the incoming communication; and comparing the identity of the sender to the user input.
[0025] In another example of this aspect, receiving user input for handling communications received at the computing device further includes providing instructions for managing incoming communications on a secondary computing device, wherein the instructions include limiting particular incoming communications .
[0026] In still another example of this aspect, the non- priority interface on the secondary computing device may be concealed for predetermined time periods. A first user may also be notified when a user of the secondary computing device attempts to access the concealed non-priority interface .
[0027] In another example of this aspect, the priority interface provides a notification of the communication immediately .
[0028] In one example of this aspect, the non-priority communications may be forwarded to the priority interface after a predetermined time. The non-priority interface may also disable notifications for received non-priority communications .
[0029] In accordance with another aspect of the present disclosure, a system includes an input interface; at least one memory; a receiver; one or more processors; a priority interface; and a non-priority interface. The at least one memory may store settings provided by a user through the input interface. The settings may identify at least one communication as a priority communication or a non-priority communication. The receiver may receive at least one incoming communication. The one or more processors may be communicatively coupled to the at least one memory and the receiver. The one or more processors may be programmed to determine whether the at least one incoming communication is a priority communication or a non-priority communication based on the stored settings . The priority interface may be adapted to display the at least one incoming communication when the one or more processors determines that the at least one incoming message is a priority communication. The non- priority interface may be adapted to display the at least one incoming communication when the one or more processors determines that the at least one incoming message is a non- priority communication.
[ 0030 ] In accordance with one example of this aspect, the one or more processors may be further configured to temporarily store the incoming communication when the one or more processors determine that the incoming communication is a non-priority communication.
[ 0031 ] In accordance with another aspect of the present disclosure, a non-transitory computer readable medium on which instructions are stored, the instructions, when executed by one or more processors cause the one or more processors to perform a method that includes receiving user input for handling incoming communications received at a computing device; receiving an incoming communication at one or more processors of a computing device; determining whether the incoming communication is a priority communication or a non-priority communication based upon the user's input; providing the incoming communication to a priority interface of the communication device when the one or more processors determines that the incoming communication is a priority communication; and providing the incoming communication to a non-priority interface of the communication device when the one or more processors determines that the incoming communication is a non-priority communication.
BRIEF DESCRIPTION OF THE DRAWINGS
[0032] FIG. 1 is a functional diagram of an example system in accordance with an aspect of the disclosure.
[0033] FIG. 2 is a pictorial diagram of the example system of FIG . 1.
[0034] FIG. 3 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0035] FIG. 4 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0036] FIG. 5 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0037] FIG. 6 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0038] FIG. 7A illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0039] FIG. 7B illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0040] FIG. 8 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0041] FIG. 9 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure . [0042] FIG. 10 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0043] FIG. 11 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0044] FIG. 12 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0045] FIG. 13 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0046] FIG. 14 illustrates an example of a computing device and a screenshot in accordance with aspects of the disclosure .
[0047] FIG. 15 is a flow diagram in accordance with aspects of the disclosure.
[0048] FIG. 16 is a flow diagram in accordance with aspects of the disclosure.
[0049] FIG. 17 is a flow diagram in accordance with aspects of the disclosure.
[0050] FIG. 18 is a flow diagram in accordance with aspects of the disclosure.
[0051] FIG. 19 is a flow diagram in accordance with aspects of the disclosure.
[0052] FIG. 20 is a flow diagram in accordance with aspects of the disclosure.
DETAILED DESCRIPTION OVERVIEW
[0053] Aspects of the technology discussed here employ a method of prioritizing incoming communications received on a computing device and displaying those communications to the user. For example, aspects of the disclosure may be used to provide the user of the computing device with greater control over when individuals or contacts may directly communicate with the user, how these individuals may communicate with the user, and how those communications are reviewed by the user. In one instance, the user may determine that during a preselected time period, the user only wishes to directly receive communications from a selected individual or group of individuals, e.g., a priority communication. If desired, the user may further specify what type of communication the user would like to receive from the individual during that preselected time period, such as a voice mail, text message, social media message, e-mail message, etc. During the preselected time period, a priority communication may be transmitted to a priority interface. The user may see, hear, and/or otherwise be notified (e.g., by vibration) of an incoming priority communication and view information regarding the priority communication on the priority interface . Any other incoming communication received during this preselected time period can be identified as a nonpriority communication that the user of the computing device does not wish to directly receive during the preselected time period. A nonpriority communication is denied access to the priority interface and can be instead transmitted to a nonpriority interface during the preselected time period, so as to separate the nonpriority communications from the priority communications . Nonpriority communications can be later transmitted to the priority interface at a preselected time.
[ 0054 ] In one example of how incoming communications on a computing device are prioritized, a user may select and place the computing device into one of three modes : a restrictive mode, a passive mode, or a standard mode. These modes provide the user with different alternatives for deciding what communications are priority communications and those that are nonpriority communications .
[0055] In response to the user's mode selection, the processor can access a database of prestored contacts and incorporate the prestored contacts into a selection menu. The prestored contacts or prestored groups of contacts may be retrieved from local or remote storage. The prestored contacts may have been stored, for example, on the computing device as part of the preliminary set-up for the prioritization process. The prestored contacts may also be retrieved from a remote server. It is to be appreciated that the prestored contact list or address book may include contacts name(s), associated telephone number (s), e-mail address (es), physical address (es) or other information related to the particular contact .
[0056] Using the selection menu, the user can provide input as to what constitutes a priority communication or nonpriority communication. The user can identify one or more contacts or groups of contacts on the selection menu and the corresponding time periods the respective contact or groups of contacts may directly or directly communicate with the user. For example, on the restrictive mode selection menu, a user can identify priority communications, such as preselected contacts or individuals that the user would like to directly communicate with during a preselected period of time. Conversely, on the passive mode selection menu, a user can identify nonpriority communications, such as communications from preselected contacts or individuals that the user does not wish to directly communicate with during a preselected period of time.
[0057] In some examples, the user can identify the specific type of communication that a user would like to receive or not receive from a preselected contact during a preselected time period. For example, in the restrictive mode, the user may choose to only receive texts messages, or may further limit communications by selecting to only receive text messages, from a preselected contact during a preselected time period (i.e., priority communications). The user may therefore choose not to receive any other types of communications (e.g., voice mail, incoming phone call, email, video chat, social media message) from one or more contact during the preselected time period (i.e., nonpriority communications) .
[0058] When an incoming communication is transmitted to the computing device, the processor determines whether the communication is a priority communication or a nonpriority communication, based upon the user's input. For example, the processor will determine the mode the user has selected and whether the incoming communication is received from a preselected contact during a preselected time.
[0059] In the restrictive mode, the incoming communication received from a preselected contact during a preselected time will be identified as a priority communication. However, when the incoming communication is not received from a preselected contact during a preselected time, the communication will be identified as a nonpriority communication .
[0060] Conversely, in the passive mode, the incoming communication received from a preselected contact during a preselected time will be identified as a nonpriority communication. However, when the incoming communication is not received from a preselected contact during a preselected time, the communication will be identified as a priority communication .
[0061] In the standard mode, all communications will be identified as a priority communication. [ 0062 ] Once a communication has been identified as a priority or nonpriority communication, the communication is respectively directly or indirectly transmitted to the user.
[ 0063 ] In one aspect, incoming communications identified by the processor as a priority communication will be directly transmitted to the user for immediate receipt and review of the incoming communication. In one example, incoming priority communications will be transmitted to a priority interface that allows the user to immediately view or receive the communication as it is being transmitted. For example, an incoming text message identified as a priority communication will be provided with access to a priority interface and the user will be able to immediately receive and view the incoming text message. Related notifications concerning the text message, including audible notifications and the like, will also be directly communicated to the user.
[ 0064 ] On the other hand, incoming communications identified by a processor as a nonpriority communication will not be directly transmitted to the user for immediate receipt and review. For example, a nonpriority communication will be denied access to the priority interface and transmitted to a nonpriority interface of the computing device. The nonpriority communication can also be stored in a database. The computing device will provide no immediate related notifications, including audible notifications, concerning the incoming nonpriority communications so that the user is not disturbed by nonpriority communications . The user will have no knowledge that a nonpriority communication has been received by the computing device, unless the user decides to view the nonpriority interface or if the nonpriority communication is eventually transmitted to the priority interface .
[ 0065 ] Based upon a time or time period preselected by the user, each of the nonpriority communications that appear on the nonpriority interface can eventually be provided with access to the priority interface. For example, the user can select a specific time or time period when all nonpriority communications that appear on the nonpriority interface will be automatically transmitted to the user. In another example, or additionally, certain nonpriority communications can be converted to a priority communication and provided with access to the priority interface. For example, as will be explained in further detail herein, when the current time falls within a preselected time period that a communication from a preselected individual is a priority communication, a nonpriority communication from the same preselected individual can be converted to a priority communication.
[0066] In still another example of prioritizing incoming communications to a computing device, one computing device in the network can be used to manage and prioritize incoming communications on other computing devices in the network. In one aspect, a primary computing device can communicate with a secondary computing device through a network server. The primary computing device can transmit instructions concerning how incoming communications are managed on the secondary computing device .
[0067] When a user of a primary computing device seeks to manage a secondary computing device in the network, the user may select a menu that identifies all other computing devices on the network. The user can select a secondary computing device to manage. Once the secondary computing device has been selected, the steps for prioritizing incoming communications are identical to those previously discussed herein .
[0068] The user of the primary computing device may select and place the secondary computing device into one of three modes: a restrictive mode, a passive mode, or a standard mode. In response to the user's mode selection, the processor can access a database of prestored contacts for the secondary computing device and provide a corresponding selection menu. The prestored contacts may be stored and retrieved from local storage or remotely stored. As in the previous example, the selection menu viewed by the user provides different options for the user to select depending on what mode has been selected.
[0069] When the secondary computing device in the network is placed into the restrictive mode by the primary computing device, the user of the primary computing device identifies the contacts from the prestored contacts whom the user would like the owner of the secondary computing device to directly communicate with during a preselected time period. When the device is in the passive mode, the selection menu allows the user to identify certain individuals from the prestored contacts of the secondary computing device that the user does not wish to directly communicate with during a preselected period of time. Finally, if the computing device is in the standard mode, no selection menu need be provided, as all communications can be identified as priority communications.
[0070] When an incoming communication is transmitted to the secondary computing device in the network, a processor in the network can determine whether the communication is a priority communication or a nonpriority communication, as in the previous example. Access to the priority interface of the computing device is further determined by a processor in the computing device or remote server or the like .
EXAMPLE SYSTEMS
[0071] FIGS. 1 and 2 illustrate an example system 100 in which the features described above may be implemented. As shown, system 100 can include computing devices, as well as a storage system. Each of the computing devices may contain one or more processors, memory, and other components generally found in general purpose computing devices. [0072] The one or more processors 104 in example system
100 can be any known processor, such as a commercially available CPU. In one example, the processor can be customized for a particular use, such as an ASIC or other hardware-based processor.
[0073] Memory of the computing devices stores information accessible by one or more processors, including instructions that can be executed by the one or more processors. Memory may further include data 110 that is capable of being retrieved, manipulated, or stored by the processor. The memory can be any nontransitory type capable of storing information accessible by the processor, such as a hard- drive, memory card, ROM, RAM, DVD, CD-ROM, write-capable, and read-only memories.
[0074] The instructions 108 accessible by the processors
104 can be any set of instructions to be executed directly, such as machine code, or indirectly, such as scripts, by the one or more processors. Accordingly, the terms
"instructions," "application," "steps," and "programs" can be used interchangeably herein. The instructions can be stored in object code format for direct processing by the processor, or in any other computing device language, including scripts or collections of independent source code modules that are interpreted on demand or compiled in advance. Functions, methods, and routines of the instructions are explained in more detail below.
[0075] Instructions can be executed by the one or more processors to, for example, without limitation, prioritize incoming communications or provide messages to one or more client computing devices 114, 130, 132,134 in the network 112.
[0076] Communications module 109 can be implemented in the system to allow for communication between or among the client computing devices 114, 130, 132, and 134 in the network. For example, when client computing device 114 controls prioritization settings on another computing device, such as computing device 130, communications module 109 can access user contact information of computing device 114 and transmit a message to computing device 114 alerting computing device 114 of any changes being made on client computing device 130.
[0077] Data 110 can be stored, retrieved, or manipulated by the one or more processors 104 in accordance with the user's instructions 108. For instance, although the subject matter described herein is not limited by any particular data structure, the data can be stored in computer registers in a relational database, as a table having several different fields and records, or XML documents, including RSS, Atom, SOAP, and XHMTL . The data can also be formatted in any computing device-readable format such as, but not limited to, binary values, ASCII or Unicode. Moreover, the data can comprise any information sufficient to identify the relevant information, such as numbers, descriptive text, proprietary codes, pointers, references to data stored in other memories such as at other network locations, or information that is used by a function to calculate the relevant data.
[0078] It is to be appreciated that although the computing device of FIG. 1 illustrates each of one or more processors, memory, and other elements of computing devices 102 as being within the same block, these components may comprise multiple processors, computers, computing devices, or memories that may or may not be stored within the same physical housing. In one example, memory can be a solid-state drive or other storage media located in a housing separate from that of computing device 102. In this regard, it is to be appreciated that references to a processor, computer, computing device, or memory will be understood to also include multiple processors, computers, computing devices, or memories that may or may not operate in parallel. For example, computing device 102 may include a single server computing device or a load-balanced server farm. Additionally, although some functions described herein may be described as operating on a single computing device having a single processor, various aspects of the subject matter described herein can be implemented by a plurality of computing devices, for example, the communication of information over a network 112.
[0079] The client computing devices 114, 130, 132, 134 can be positioned at nodes of a network 112 and capable of direct and indirect communication with other nodes of network 112. In the example shown in FIGS. 1-2, although only a few computing devices are illustrated, it should be appreciated that a conventional system can be expanded to include numerous connected computing devices, with each different computing device being positioned at a different node of the network 112.
[0080] Various protocols and systems can be used to interconnect the network 112 and intervening nodes described herein, so that the network can be part of the Internet, World Wide Web, specific intranets, wide area networks, or local networks. The network can further utilize standard communication protocols, such as Ethernet, Wi-Fi, and HTTP, protocols that are proprietary to one or more companies, and various combinations of the foregoing. Although certain advantages are obtained when information is transmitted or received as noted above, other aspects of the subject matter described herein are not limited to any particular manner of transmission of information.
[0081] Each of the client computing devices may be configured similarly to the server computing devices 102, with a processor, memory, and instructions as described above. Each computing device 114, 130, 132, 134 can be a personal computing device intended for use by a user 150, 160, 162, 164 and have all of the components typically used in connection with a personal computing device such as a central processing unit (CPU), memory (e.g., RAM and internal hard drives) storing data and instructions, a display such as displays 124, 126, 128, 129 (e.g., a monitor having a screen, a touch-screen, a projector, a television, or other device that is operable to display information), and the user's input device 121 (e.g., a mouse, keyboard, touch-screen, or microphone ) .
[ 0082 ] Although computing devices 114, 130, 132, 134 may each comprise a full-sized personal computing device, they may alternatively comprise mobile computing devices capable of wirelessly exchanging data with a server over a network such as the Internet or a wireless telephone service provider network. By way of example only, computing device 114 may be a mobile phone or a device such as a wireless-enabled PDA, a tablet PC, laptop computer, or a netbook that is capable of obtaining information via the Internet.
[ 0083 ] Prioritization module 121 can prioritize incoming communications. For example, prioritization module 121 can provide the interfaces for the prioritization selections to be made by user, including, for example, the selection of mode and an identification of individuals who may directly or indirectly communicate with user during a predetermined time period. Prioritization module can additionally provide the parameters for handling received communications and filter the information provided to the user, including, for example managing display and notifications of the incoming communications .
[ 0084 ] The computing device may further include an internal time clock 125 for determining time. For example, the time clock 125 may be used to determine the time an incoming communication is transmitted to the computing device 114. In another example, the time clock 125 may be used to determine the current time.
[0085] Additionally, computing device 114 may include an address book or a list of contacts 123. The contact information may include contacts name(s), associated telephone number (s), e-mail address (es), physical address (es) or other information related to the particular contact. In other examples, contact information can be stored in storage system 136 or in memory 106 of server computer 102.
[0086] As with memory 118, storage system 136 can be any type of computerized storage capable of storing information accessible by one or more of server computing devices 102, such as a hard-drive, memory card, ROM, RAM, DVD, CD-ROM, write-capable , and read-only memories. In addition, storage system 136 may include a distributed storage system where data is stored on a plurality of different storage devices which may be physically located at the same or different geographic locations. Storage system 136 may be connected to the computing devices via the network 112 as shown in FIG. 1 and/or may be directly connected or incorporated into any of the computing devices 102, 114, 130, 132, and 134.
EXAMPLE METHODS
USER SELECTION OF MODE AND PRIORITIZATION PARAMETERS
[0087] A user may request to prioritize incoming communications to a computing device. For instance, the user 150 may request to prioritize and directly receive incoming communications to the computing device 114 from certain preselected contacts during a preselected period of time, while requesting that all other incoming communications be stored for later review by the user. In another example, the user may request that incoming communications to the computing device 114 from certain preselected contacts during a preselected period of time be stored for later review by the user, while requesting to prioritize and directly receive all other incoming communications. It is to be appreciated that an incoming communication may be any form of communication, such as a telephone call, a text message, a voicemail message, an e-mail, a social media message, and any other mode of communication from the selected contact. Furthermore, as previously discussed, computing device 114 may be a mobile device, tablet, desktop, laptop, etc.
[0088] FIGS. 3 and 4 illustrate example (or screenshot) interfaces, for example, which may be provided by the prioritization module number on a client device 114. In example 165 shown in FIG. 3, main menu 170 appears on display 124 of computing device 114. Selection of device mode icon 172 can permit the user 150 to initiate prioritization of incoming communications. It is to be appreciated that selection of icon 172 may be a means for accessing and manipulating the parameters of the operating system of computing device 114. In another example, the user 150 may initiate an application that concurrently runs on computing device 114.
[0089] In response to the request of the user 150 to prioritize incoming communications to computing device 114, computing device 114 may prompt the user 150 to identify the prioritization mode in which to place the phone. For example, in the example 180 shown in FIG. 4, a prioritization menu 182 is shown on display 124, which prompts the user 150 to select among the prioritization modes: restrictive mode, passive mode, or standard mode.
[0090] The restrictive mode may be selected if, for example, the user 150 does not want to be disturbed for a preselected period of time, such as when going to dinner, and the user only desires to receive communications from select individuals. In the restrictive mode, only communications from certain preselected contacts during a preselected period of time will be directly transmitted to the user 150 and viewed on a main or priority interface. All other incoming communications that are transmitted during the preselected period of time are denied access to the priority interface and can be stored for review by the user 150 at a later time.
[ 0091 ] The passive mode may be selected if, for example, the user 150 would like to receive a majority of all incoming communications, but does not want to be disturbed by select individuals for a certain period of time. In the passive mode, communications from select individuals for a preselected period of time will be prohibited from directly reaching the user 150 and denied access to the priority interface. All other incoming communications during this preselected period of time will be directly transmitted to the user 150 and the priority interface.
[ 0092 ] The standard mode may be selected when the user
150 does not wish to prioritize any incoming communications or wishes to clear all previous instructions provided by the user for either the restrictive mode or the passive mode. In this example, the user 150 can directly receive all incoming communications in the passive mode.
[ 0093 ] Based upon the selection by the user of the desired mode (e.g., restrictive, passive, or standard mode), the computing device can provide additional prompts to request further instructions from the user 150.
[ 0094 ] If the user 150 selects the restrictive mode, the computing device may prompt the user 150 to identify those contacts from whom the user 150 desires to directly receive incoming communications during a preselected time period. For example, upon selection of the mode, computing device 114 may access a list of the contacts of the user 150, for example, from its memory or from a remote location. The contacts 123 can include the contact name(s), associated telephone number (s), e-mail address (es), physical address (es) or other information related to the particular contact. The list of contacts may also be stored on one or more different subscriber identification module (SIM) cards. Information regarding certain groups of individuals may be stored on the SIM cards, such that, for example, a user may opt to have one SIM Card for work contacts, a separate SIM card for friends, and yet another SIM card for family. This allows the user with another way in which to store and access information.
[0095] The list of contacts may be provided to the user
150 on display 124, for example, along with one or more input fields. In one example, a selection menu can list each of the contacts from the address book of the user 150. Additionally, for each contact, the selection menu can provide the user 150 with the ability to indicate the time period in which the preselected contact may directly communicate with the user 150, based upon the selected mode.
[0096] While a list of all contacts is shown in the example of FIG. 5, in other examples a list may not be displayed. For example, the user can begin typing a contact name or other information, and processors can access the list to display matching or corresponding contacts. According to another example, the user can enter input restricting communications from particular phone numbers/e-mail addresses not on the contact list, or from any source not identified on the contact list.
[0097] FIG. 5 illustrates an example 202 of a selection interface for the restrictive mode. In the restrictive mode, selection menu 200A allows the user 150 to select from among the listed contacts those contacts who may directly communicate with the user 150 during a preselected period of time. In this example, as shown, contacts have been incorporated into selection menu 200A shown on display 124 of computing device 114. In this example, the user 150 has determined that the user would only like to directly receive communications from contacts identified as "Mom" and "Work" during the time period 6:00 p.m. to 8:00 p.m. (e.g., a priority communication) . Thus, "Mom" is an example of a preselected contact, and 6:00 p.m. to 8:00 p.m. is an example of a preselected time period. In the restrictive mode, by the user 150 's selection of a preselected time period where communications from preselected contacts are permitted to directly access the user, the user 150 also inherently selects a second preselected time period for the preselected contact (i.e., "Mom"). For example, during a second preselected time period from 8:01 p.m. to 5:59 p.m. the next day, the user 150 has determined that the user 150 does not want to receive incoming communications from "Mom" and "Work." Thus, such communications will be nonpriority communications .
[ 0098 ] FIG. 6 illustrates an example 204 of a selection interface for the passive mode. In the passive mode, the selection menu prompts the user 150 to identify those contacts from whom the user 150 does not wish to directly receive incoming communications during a preselected time period. For example, in the same manner previously described, upon selection of the passive mode, computing device 114 may access the list of contacts from the address book of the user 150 and the contacts may be incorporated into a selection menu that will appear on display 124. By way of this example 204 shown in FIG. 6, selection menu 200B incorporates and lists each of the contacts from the address book of the user 150. Selection menu 200B further allows the user 150 to select from among the listed contacts those contacts who are not permitted to communicate with the user 150 during a preselected period of time, e.g., nonpriority communications. In the example 204, the user 150 has determined that the user 150 does not wish to be disturbed and does not want to receive a communication from a contact identified as "Noelle" during work hours. In this regard, the user 150 has selected "Noelle" on selection menu 200B and has further preselected a time period to restrict incoming communications from "Noelle" during the preselected time period 9:00 a.m. to 5:00 p.m. (e.g., a nonpriority communication) .
[ 0099 ] By the user's selection of a preselected time period in the passive mode to deny preselected contacts direct access to the user and the priority interface, the user also inherently selects a second preselected time period for preselected contacts. For example, during a second preselected time period from 5:01 p.m. to 8:59 a.m. the next day, the user 150 has determined that the user 150 would like to receive incoming communications from "Noelle." Thus, such communications will be identified as nonpriority communications .
[ 0100 ] Finally, if user 150 selects the standard mode, the computer may prompt the user to confirm that all previous selections made in either restrictive mode or passive mode should be cleared or stored. For example, user 150 may desire to directly receive all incoming communications to the computing device .
IDENTIFYING INCOMING COMMUNICATIONS AND PROVIDING DIRECT OR INDIRECT ACCESS TO THE USER
[ 0101 ] When an incoming communication is transmitted to computing device 114, a processor may determine in what mode the computing device 114 is currently operating. For ease of discussion, processor 116 of computing device 114 will be described as performing various steps in the process, but it is to be appreciated that any processor in the network may be utilized .
[ 0102 ] After determining in what mode the computing device is operating, processors can determine whether the user will directly receive the incoming communication. For example, based upon the selected mode, processor 116 can determine whether the incoming communication is a priority communication that is to be directly received by the user 150 or a nonpriority communication that can be reviewed by the user 150 at another time. For example, processor 116 can determine if the communication is from a preselected contact and, if so, (a) what time it is received and (b) whether the incoming communication is being transmitted at a time period that the preselected contact is either allowed or prohibited to directly communicate with user 150.
[ 0103 ] For ease of ongoing discussion, the additional description concerning prioritizing incoming communications to the computing device will be further explained according to the mode selected by the user.
(1) RESTRICTIVE MODE
[ 0104 ] In the restrictive mode, to determine whether an incoming communication is a priority or nonpriority communication, a processor can determine whether the incoming communication is from a preselected contact.
[ 0105 ] If the incoming communication is from a contact who has not been preselected by the user in the restrictive mode, the incoming communication is determined to be a nonpriority communication .
[ 0106 ] If the incoming communication is from a preselected contact, processor 116 can proceed to determine the time of the incoming communication. For example, processor 116 can determine at what time the incoming communication from the preselected time was transmitted to computing device 114. In one example, at the time the incoming communication is transmitted, a corresponding time stamp may accompany the incoming communication and processor 116 can obtain the time information from the time stamp. [ 0107 ] After determining the time at which the incoming communication was transmitted, the time of the incoming communication may be compared to the preselected time period for the preselected contact. For example, processor 116 may compare the time of the incoming communication obtained from clock 125 to the preselected time period in which the selected contact is permitted to directly communicate with the user 150. In one aspect, processor 116 may review the user 150 's input 126 concerning the selected contact and the corresponding preselected time periods in which the selected contact may directly communicate with the user 150.
[ 0108 ] If the time in which the incoming communication from the preselected contact is transmitted to the computing device 114 falls within the preselected time period for that contact, the communication is identified by the processor as a priority communication. For example, assume the user 150 has made the selections illustrated in FIG. 5. If the incoming communication, such as a text message, is from a contact named "Mom" and it is transmitted at 5:30 p.m., the incoming communication will be identified by processor 116 as a priority communication.
[ 0109 ] If the time of receipt of the incoming communication from the preselected contact does not fall within the preselected time period, the communication is identified by processor 116 as a nonpriority communication. In this example, assume the user 150 has made the selections illustrated in FIG. 5. If the incoming communication, such as a text message, is from a contact named "Joe" and the message is transmitted at 4:00 p.m., the incoming communication will be identified by processor 116 as a nonpriority communication. This is because "Joe" is not a "preselected" contact and is therefore a contact with whom the user 150 does not want to communicate while in the restrictive mode. [ 0110 ] Computing device 114 may be able to directly communicate with a third party application to allow the transfer of information, for example, to identify priority and nonpriority communications. For example, when a social media application receives an incoming communication or social media message from an individual, the social media application can be designed to transmit the time and contact information of the social media message to processor 116 of computing device 114. Processor 116 can then use this information to prioritize the communication as a priority communication or a nonpriority communication, as previously discussed .
[ 0111 ] Additionally, a third party application can be designed to prioritize incoming communications on its own platform. For example, after the computing device transmits the user's input 126 to a third party application, the third party application can be designed to prioritize incoming communications on the third party application itself. Thus, all third party applications that can communicate with processor 116 can likewise prioritize information on their own interfaces. This provides the user the ability to control the prioritization of incoming communication through all modes of communication, including third party applications .
(2) PASSIVE MODE
[ 0112 ] In the passive mode, to determine whether an incoming communication is a priority communication or nonpriority communication, processor 116 can first determine whether the incoming communication is from a preselected contact.
[ 0113 ] If the incoming communication is from a contact who has not been "preselected" by the user in the passive mode, the incoming communication is determined by processor 116 to be a priority communication, and the communication will be directly transmitted to the user 150. [ 0114 ] If the incoming communication is from a preselected contact, processor 116 can carry out the same steps described in the restrictive mode to determine whether the time the incoming communication is transmitted to computing device 114 falls within the preselected time designated by the user 150. For example, after determining that the incoming communication is from a preselected contact, processor 116 can determine at what time the incoming communication is being transmitted to computing device 114.
[ 0115 ] After determining the time at which the incoming communication was transmitted, the time of the incoming communication can be compared to the preselected time period for the preselected contact. For example, as previously discussed, processor 116 may compare the time of the incoming communication to the preselected time period in which the selected contact is permitted to directly communicate with the user 150.
[ 0116 ] If the processor determines that the time in which the incoming communication from the preselected contact is transmitted to computing device 114 falls within the preselected time period for that contact, the communication is identified by the processor as a nonpriority communication. This is because in the passive mode, the user 150 desires to permit all incoming communications, except for those communications from a preselected contact during a preselected period of time (i.e., nonpriority communications) . For example, assume the user 150 has made the selections illustrated in example 200B of FIG. 6. If the incoming communication, such as a text message, is from a contact named "Noelle" and it is transmitted at 4:30 p.m., the incoming communication is from a preselected contact during a preselected time period. Accordingly, in the passive mode, the communication will be identified by processor 116 as a nonpriority communication. [ 0117 ] If processor 116 determines that the time the incoming communication from the preselected contact is transmitted to the computing device is not within the preselected time period, the communication is identified by processor 116 as a priority communication. In one example, assume the user 150 has made the selections illustrated in FIG. 6. If the incoming communication, such as a text message, is from a contact named "Joe" and the message is transmitted at 9:00 a.m. (or at any time), the incoming communication will be identified by processor 116 as a priority communication. (3) STANDARD MODE
[ 0118 ] In the standard mode, the user has determined that the user does not want to prioritize incoming communications. As a result all communications in the standard mode are priority communications, which may be directly transmitted to the user .
[ 0119 ] The aforementioned examples provide one example of how a user can identify an incoming communication as a priority communication or a nonpriority communication . As noted above, a priority communication can be a communication that a user would like to receive and a nonpriority communication is a communication that a user does not wish to receive. In these examples, a user classified a communication as either a priority communication or a nonpriority communication based upon a preselected time period and an individually selected contact .
[ 0120 ] Other criteria may be used to identify an incoming communication as a priority communication or a nonpriority communication. The criteria can include any parameter that may assist a user differentiate between one or more communications. For example, a priority communication may be limited to contacts that have attempted to communicate with the user in the last 30 days or contacts that have called more than five times in the last 30 days. Numerous other criteria may be provided as to how a user may choose to distinguish between a priority communication and a nonpriority communication.
[ 0121 ] Additional criteria from the previous examples may also be included to further classify a communication as a priority communication or a nonpriority communication. For example, in each of the prior examples, all types of incoming communications as a whole from a specific preselected contact are permitted or denied access to the priority interface. For example, if a user selected to receive an incoming communication from a specific preselected contact at a preselected time (i.e., a priority communication), the user effectively selected to receive all types of incoming communications from the preselected contact, including, without limitation, telephone calls, voicemail messages, text messages, and social media messages.
[ 0122 ] In another example, the user 150 may instead choose to select the specific type of communication the user 150 would like to either directly or indirectly receive from a preselected contact at a preselected time. For example, when the user 150 has selected the mode in which computing device 114 will operate, computing device 114 may provide another selection menu 200C on display 124, such as shown in FIG. 7A. The selection menu 200C can enable the user 150 to specify what type of communication the user 150 would like to receive during a given time period. In one example, as shown in FIG. 7A, if computing device 114 is in the restrictive mode, the user 150 may only wish to receive text messages and voice mails from a contact named "Mom" during the time period 3:00 p.m. to 5:00 p.m. In effect, these communications would be identified by processor 160 as priority communications that will be directly transmitted to the priority interface of computing device 114. All other types of communications received from "Mom" during this time period are nonpriority communications. Thus, any telephone calls, social media messages, e-mails, etc., that are received from "Mom" during this preselected time period will be identified by processor 116 as nonpriority communications that are denied access to the priority interface and indirectly transmitted to the user 150. Additionally, any incoming communications from any other contacts would also be identified by a processor as a nonpriority communication.
[ 0123 ] In another example, with reference to FIG. 7B, the user 150 can make similar selections in the passive mode. In this example, assuming the user 150 still only desires to receive voice mails and text messages from Mom, the user 150 would select to restrict email, social media, video chat and phone calls, as shown in FIG. 7B . Thus, incoming voice mails and text messages from "Mom" will be identified as priority communications. All other communications will be considered nonpriority communications, including phone calls, emails, social media, video chats, and any other selected mode of communication (not shown) from "Mom" between 3:00 p.m. to 5:00 p.m. These nonpriority communications will be denied access to the priority interface and routed to the nonpriority interface .
[ 0124 ] It is to be appreciated that while the user can rely upon the example selection interfaces to provide the parameters for prioritization of incoming communications, alternative methods of user input may be provided to the computing device. For example, the user may use voice commands to provide computing device 114 with the user's prioritization selections. In one example, the user 150 may be able to use a series of voice prompts to initiate a routine that prioritizes incoming communications and to set the desired selections. By way of one example, the user may be able to identify the mode, the contact, and the time of the restriction. For example, the user may say "mode" (to initiate prioritization); "restrictive" (to identify the selected mode); "Mom" (to identify the preselected contact), and "5:00 p.m. to 8:00 p.m." (to identify the preselected time period) . Additionally, the user may input information from another computing device on the network 112, such as an iPad, personal computer, etc.
[ 0125 ] In other examples, the user may incorporate preset settings that can automatically place the computing device 114 into a selected mode. For example, the user 150 can place the phone into a "work setting" and preset the computing device to restrict or allow incoming communications, based on whomever the user would like to communicate with during the work day. Similarly, a child may desire to have a "school setting," where incoming communications are automatically restricted during the school week. For example, the school setting may automatically restrict all incoming calls during the day, except for selected emergency contacts. At the conclusion of the school day, the restrictions can be lifted.
[ 0126 ] Additionally, in one example, the preset settings may work in tandem with the selected modes. For example, a user may be able to use preset settings, while also manually placing the phone into a desired mode and making the desired selections .
[ 0127 ] Once the user 150 has made the desired selections either on the respective selection interfaces (200C,200D) from the examples shown in FIGS. 7A, 7B or using any other method of user input, the computing device 114 can continue to process, prioritize, and display incoming communications, based upon whether a communication is a priority communication or a nonpriority communication, as previously discussed herein.
EXAMPLE INTERFACES [ 0128 ] Once the incoming communication has been identified as a priority communication or a nonpriority communication, the incoming communication can be respectively directly or indirectly transmitted to the user.
(1) PRIORITY INTERFACE
[ 0129 ] When the incoming communication is identified as a priority communication, it can be directly transmitted to the user. In one example, priority communications may be transmitted to a priority interface shown on display 124, and the user 150 can directly receive notice of the incoming communication .
[ 0130 ] FIG. 8 illustrates an example priority interface 190. In this example, the priority interface is the main menu 192 (see also FIG. 3) and the priority communication is a text message. A notification 194 may appear adjacent a related icon 196 on the main menu 192 to advise the user 150 that a priority communication, such as a text message, has been received. A similar notification may also appear with regard to an icon for a third party application, such as social media and the like.
[ 0131 ] Another example of a priority interface can include an interface specific to a particular mode of communication. For example, if the user 150 desires to view a listing of all text messages, the user 150 can select icon 196 (FIG. 8) to access such a listing.
[ 0132 ] FIG. 9 illustrates another example priority interface 190A, where the interface also identifies stored text messages. For example, in the restrictive mode, using the user 150 's input illustrated in FIG. 5, a text message received from a contact named "Mom" during the preselected time period (i.e., 5:00 p.m. to 8:00 p.m.) will appear on the listing. Additional text messages that were not initially identified as priority communications may also appear on the priority interface if, for example, a predetermined amount of time has passed. For example, while the text message from "Jen" was received last week, notification of the message may be pushed to the priority interface 190A after several days or one week.
[ 0133 ] Still, another example of a priority interface can be a notification interface (not shown) that provides an itemized listing of all incoming types of communications. Priority interface can also be a pop-up or push notification to the user 150 on display 124 of computing device 114.
[ 0134 ] The user can also receive an audible notification of an incoming priority communication. For example, an audible notification can include a ringtone, a vibration, or the like, that can be heard by the user 150 when the priority communication is transmitted to computing device 114. Providing the user 150 with the ability to only receive notifications of priority communications during a preselected period of time provides the user 150 with the opportunity to prioritize those communications that are important to receive (i.e., priority communications) and to disregard all other communications (i.e., nonpriority communications) during the preselected period of time.
(2) NONPRIORITY INTERFACE
[ 0135 ] When the incoming communication is identified as a nonpriority communication, the nonpriority communication is indirectly transmitted to the user 150. For example, the nonpriority communication is denied access to the priority interface and the user 150 is provided with no immediate knowledge of the incoming communication. In one example, the computing device will provide no audible or visual notice of the incoming nonpriority communication, as it is being transmitted to computing device 114.
[ 0136 ] FIG. 10 illustrates an example 218 of a nonpriority interface 220 on the computing device 114. In this example 218, nonpriority interface 220 can provide a listing of all nonpriority communications that have been received by computing device 114. For example, in the restrictive mode, based upon the user input from example 202 in FIG. 5, text messages from "Joe" at 5:00 a.m. and "Mom" at 10:00 a.m. are nonpriority communications. These text messages have been denied access to the priority interface and were instead provided access to nonpriority interface 220. In another example, in the passive mode, using the user input from example 204 in FIG. 6, a text message from "Noelle" at 9:00 a.m. is a nonpriority communication. This is because the user 150 has specifically identified what constitutes a nonpriority communication.
[ 0137 ] It is to be appreciated that the nonpriority interface 220 can be any interface that includes an identification of one or more nonpriority communications. Should the user 150 choose to view the nonpriority interface, the user 150 can access each of the identified nonpriority communications that are displayed on the nonpriority interface 220.
[ 0138 ] The user 150 may additionally access the nonpriority interface at any time. For example, the user 150 may access the prioritization menu 182, as illustrated in FIG. 4, and request access to nonpriority interface 220 by selecting an icon 256. In the example where the priority interface is the main menu 192 of computing device 114 (as illustrated in FIG. 3), the priority interface 190 may further include an icon (not shown) which can provide direct access to the nonpriority interface 220 upon a user request. Thus, if desired, the user 150 can opt to view nonpriority communication on the nonpriority interface 220 at any desired time, while the nonpriority communication is itemized on the nonpriority interface 220. The user therefore possesses the ability to disregard nonpriority communications and decide whether, if at all, the user would like to view nonpriority communications on the nonpriority interface. [ 0139 ] Nonpriority communications can also be stored in a database. For example, nonpriority communications can be locally stored within the memory 118 of computing device 114 or in remote storage .
TRANSFER OF COMMUNICATIONS APPEARING ON NONPRIORITY INTERFACE TO PRIORITY INTERFACE
[ 0140 ] Nonpriority communications can be automatically transmitted to the user 150 at a preselected time. For example, the user 150 can select to have nonpriority communications identified on the nonpriority interface 220 automatically transmitted to the priority interface at the conclusion of a preselected time. This can help to ensure that the user 150 will be able to review the nonpriority communications, even if the user 150 does not want to take the time to view them on the nonpriority interface 220.
(1) AUTO-FORWARDING NONPRIORITY COMMUNICATIONS
[ 0141 ] The user 150 may request to designate a time when all nonpriority communications appearing on the nonpriority interface 220 and stored in a database should be forwarded to the priority interface. In one example, the user 150 can request to automatically forward nonpriority communications identified on the nonpriority menu. By way of an illustrative example only, the user 150 may initiate the request by selecting an icon 250 on the prioritization menu 182 (FIG. 4) .
[ 0142 ] Once the request is received, computing device 114 may prompt the user 150 to indicate a time when nonpriority communications on the nonpriority interface can be automatically transmitted to the priority interface. For example, in the example 222 shown in FIG. 11, auto-forwarding interface 224 on computing device 114 can provide the user 150 with options from which to determine when nonpriority communications may be automatically transmitted to the priority interface. [ 0143 ] In response to the prompt, the user 150 can make a selection as to when nonpriority communications can be forwarded to the priority interface. By way of example only, as illustrated in example 222 of FIG. 11, an auto-forwarding interface 224 of computing device 114 can provide the user 150 with one or more options for controlling the transfer of the nonpriority communication to the priority interface. In this example, the user 150 may select to have nonpriority communications forwarded at a designated time interval, such as, for example, every five hours. In another example, computing device 114 may provide the user with the option to forward nonpriority communications at one or more times each day, for example, at 8:00 p.m. (not shown) .
[ 0144 ] In still another example, the user 150 can select to override the settings of the restrictive or passive mode and forward all nonpriority communications to the priority interface on demand at any given time. For example, the user 150 may select icon 226 to initiate a request for all nonpriority communications on nonpriority interface to be forwarded to the priority interface. The prior auto-forwarding selections made by the user (such as forwarding nonpriority communications every five hours) can remain in place even after the user 150 has selected to forward nonpriority communications on demand. In the example 222, if the user 150 transmits nonpriority communications to the nonpriority communication on demand, processor 114 can then continue to forward nonpriority communications every five hours from when the user last transmitted the nonpriority communications .
(2) CONVERSION OF NONPRIORITY COMMUNICATIONS TO PRIORITY COMMUNICATIONS
[ 0145 ] A nonpriority communication may also be transmitted and provided access to a priority interface when the nonpriority communication is converted to a priority communication .
[ 0146 ] For example, in the restrictive mode, only one type of nonpriority communication can be converted to a priority communication. This type of nonpriority communication occurs when a communication is transmitted from a preselected contact, but not during the time preselected by the user to access the priority interface. Put another way, it is a communication that occurs when a preselected contact attempts to communicate with the user 150 during a time period outside of the permissible and preselected time period designated by the user. However, this nonpriority communication can become a priority communication when the current time eventually falls within the preselected time period that a communication from the preselected contact is permitted to access the priority interface. Thus, only certain nonpriority communications are eligible for conversion to a priority communication .
[ 0147 ] In the restrictive mode, one example of a nonpriority communication that can be converted to a priority communication can be explained using the example selections of the user 150 in the restrictive mode shown in FIG. 5. In this example, "Mom" is a preselected contact. When an incoming communication is received at 10:00 a.m. from "Mom," the communication can be identified as a nonpriority communication. This is because the communication is from a preselected contact ("Mom") and is not transmitted during the preselected time period (i.e., during the time period 5:00 p.m. to 8:00 p.m.) . This particular communication from "Mom" is therefore denied access to the priority interface and routed to the nonpriority interface, such as nonpriority interface 220 shown in FIG. 10. Accordingly, this is just one example of a nonpriority communication that is eligible to be automatically converted to a priority communication. [ 0148 ] Conversion of a nonpriority communication to a priority interface in the passive mode, is similar to conversion in the restrictive mode. In the passive mode, all nonpriority communications are expressly identified by the user as a communication from a preselected contact during a preselected time period. By virtue of the user selecting a preselected time period that the incoming communication is a nonpriority communication, the user also inherently selects a second preselected time period that the communication would be considered a priority communication. The second preselected time period can be the time period of the day that does not encompass the original preselected time period. When it is determined that the current time falls within the inherently selected second preselected time period (i.e., the time period outside of the original preselected time period) , the nonpriority communication can be converted to a priority communication .
[ 0149 ] By way of one example in the passive mode where a nonpriority communication converts to a priority communication, FIG. 6 illustrates the selections of a user of the computing device in the passive mode. The user has determined that communications from "Noelle" between 9:00 a.m. to 5:00 p.m. are nonpriority communications. Here, "Noelle" is a preselected contact and the predetermined time period is 9:00 a.m. to 5 p.m. By virtue of the user 150's selection, the user has also inherently selected a second predetermined time period for "Noelle." Specifically, the user has identified a second preselected time period of 5:01 p.m. to 8:59 a.m. the next day, where communications received from "Noelle" are priority communications. Thus, in this example, a nonpriority communication from "Noelle" can be converted to a priority communication when it is determined that the current time falls within a preselected time period, i.e., the second preselected time period. [ 0150 ] To determine whether a nonpriority communication can be converted to a priority communication, in both restrictive and passive modes, processor 116 may first determine whether the contact sending the communication is among the preselected contacts identified by the user in the restrictive mode.
[ 0151 ] If the contact is not a preselected contact, a determination can be made that the communication from this particular contact cannot be converted to a priority communication. Such nonpriority communication can still be transmitted to the nonpriority interface using another method, such as previously described.
[ 0152 ] If the processor determines that the contact is from a preselected contact, processor 116 can determine the current time and then compare the current time to the preselected time period in which the preselected contact may directly contact the user 150. When the current time falls within the preselected time period, the nonpriority communication may be converted to a priority communication. The nonpriority communication can then be transmitted and provided access to the priority interface.
[ 0153 ] When the current time does not fall within the preselected time period, nonpriority communication is denied access to priority interface. For example, until the current time falls within the preselected time period the preselected contact may access the priority interface, the steps of (a) obtaining the current time and (b) comparing the current time to the preselected time can be continually repeated. In one example, the processor can wait a predetermined period of time, such as every hour, to repeat the process steps of determining whether the current time falls within a preselected time period. The predetermined period of time can be selected by the user or preset by the processor. When the current time coincides with the preselected time period, a nonpriority communication, now converted to a priority communication, can be transmitted and provided with access to the priority interface.
[ 0154 ] It is to be appreciated that these above examples provide one method of determining when a nonpriority communication may be transmitted to a priority interface, but any other criteria may be selected by the user.
CONTROLLING OTHER COMPUTING DEVICES ON THE NETWORK
[ 0155 ] In some examples, one computing device in the network can control the mode and prioritization settings of another computing device in the network. For example, with reference back to FIGS. 1-2, computing devices 114, 130, 132, 134 are located at nodes of network 112, each of the computing devices 130, 132, and 134 having the same or similar features previously discussed with regard to computing device 114.
[ 0156 ] In one example, a family may operate each of the computing devices 114 through network 112 and a parent operating one computing device may desire to manage the incoming communications of another computing device operated by another member of the family in the network. For ease of discussion in this example, the user 150 will be referred to as the parent user 150, and the child user 160 will be referred to as a child user. The parent user 150 may desire the ability to prevent the child user 160 from receiving a communication from one or more selected contacts during a preselected time period, such as while the child user 160 is in school, studying, sleeping, etc. The parent user 150 may instead desire to prevent all contacts from communicating with the child user 160 during a preselected time period, such as during school hours, except for family members. In either scenario, additional features may be desired to provide the parent user 150 with greater control over the incoming communications to the computing device 130 of the child user 160. [0157] The parent user 150 of computing device 114 may request to prioritize incoming communications being transmitted to another computing device 130 operated by the child user 160. For example, the parent user 150 can make the request by selecting an icon 174 (FIG. 3) on main menu 192 of computing device 114 of the parent user 150.
[0158] In response, computing device 114 may prompt the user to select the computing device in the network to operate. For example, a processor in computing device 114 (or any processor in the network) may determine what other client devices are operating on the network 112. By way of one example 300, a selection interface 302, as shown in FIG. 12, may appear on display 124 of computing device 114 of the parent user 150. Selection interface 302 may identify all computing devices operating on the network 112 and request the parent user 150 to select one.
[0159] Once the parent user 150 has selected the computing device, such as computing device 130, the parent user 150 may be prompted to identify the prioritization mode in which to place computing device 130 of the child user 160. For example, through network 112, the parent user 150 may request to place the computing device 130 of the child user 160 into restrictive mode, passive mode, or standard mode. By way of the example 304, shown in FIG. 13, the user 150 can view an interface 306 (which is similar to the interface used to control the computing device of the user 150) and make the appropriate selection.
[0160] After the parent user 150 selects the mode in which computing device 130 of the child user 160 will operate, the contacts of the child user 160 can be incorporated into a selection menu (not shown) similar to those shown in FIGS. 5-6. The parent user 150 can select a contact (s) and a predetermined time period in which communications from the preselected contact are either permitted or denied access to the priority interface of computing device 130, as previously discussed herein.
[ 0161 ] Once the parent user 150 has selected the appropriate mode and selected the mode parameters, incoming communications will be permitted or denied access to the priority interface of computing device 130 of the child user 160, as previously described herein.
[ 0162 ] The parent user 150 can view the nonpriority interface of computing device 130 and/or control the access of the child user 160 to the nonpriority interface and the communications on the nonpriority interface. In example 304 (FIG. 13), the parent user 150 may decide that it is acceptable for the child user 160 to view nonpriority communications and the parent user 150 can select an icon 256 to transmit all nonpriority communications to the priority interface of the child user 160 's computing device 130.
[ 0163 ] According to another example, the parent user 150 may desire to see who is contacting the child user 160 during a preselected period of time. The parent user 150 may further desire to limit the ability of the child user 160 to view nonpriority communications on the nonpriority interface of the computing device 130 of the child user 160. In one example, the parent user 150 can conceal the nonpriority interface from the child user 160 during a preselected time period. This can eliminate the temptation the child user 160 may have to directly contact those individuals who have transmitted a nonpriority communication, but are denied direct access to the child user 160 during the preselected period of time.
[ 0164 ] To view the nonpriority interface of computing device 130 or control the access of the child user 160 to the nonpriority interface, the parent user 150 can make a request on computing device 114. [ 0165 ] In example 304 shown in FIG. 3, the user 150 can select an icon 356 to view the nonpriority interface of computing device 130 of the child user 160 and to control stored nonpriority communications of computing device 130, including concealing the nonpriority interface from the child user 160. Even when the nonpriority interface is concealed from the child user 160 on the computing device 130 of the child user 160, the parent user 150 can view nonpriority communications on the display 124 of computing device 114 of the parent user 150 at all times.
[ 0166 ] In response to the user's request to access stored nonpriority communications, computing device 130 may prompt the parent user 150 to make the desired selection concerning the nonpriority interface of computing device 130 of the child user 160. In the example 310 shown in FIG. 14, a prompt may appear on display 124 of computing device 114 of the parent user 150.
[ 0167 ] The parent user 150 can make a determination regarding the features of the nonpriority interface that the parent user 150 seeks to manage. In one example shown in FIG. 14, the parent user 150 may select an icon 312 that can retrieve and view the nonpriority interface of computing device 130 of the child user 160. The parent user 150 can further choose to conceal the nonpriority interface from the child user 160 for a preselected period of time.
[ 0168 ] If the parent user 150 makes a decision to limit the ability of the child user 160 to view the nonpriority interface, a communication can be transmitted to the parent user 150 to provide notice of the change. For example, a communication from processors 104 in server computer 102 may transmit a communication to computing device 114 of the parent user 150 to indicate that a change has been made. The communication may include information concerning the prior setting and the new setting. The communication can be in the form of a text message, an e-mail message, or any type of message transmitted to the parent user 150 notifying the parent user 150 that the settings on the computing device have been changed. This ensures that if the child user 160 attempts to override the parameters selected by the parent user 150, the child user 160 cannot do so without first notifying the parent user 150. The communication can be transmitted from another server (not shown) that can be connected to network 112.
[0169] It is to be appreciated that the child user 160 can maintain the ability to prioritize incoming communication on the child user 160 's computing device 130. However, in one example, any changes made by the child user 160 can be communicated to the parent user 150. In another example, the parent user 150 may retain complete control over the prioritization settings on the computing device 130 of the child user 160, such that the child user 160 has no ability to control the prioritizing settings of computing device 130.
[0170] It is to be appreciated that control over other computing devices on the network 112 is not limited to use by families, such as in this example, but can be expanded to include any scenario where a user of a computing device on network 112 desires to control the prioritization settings of another computing device on the network. For example, without limitation, such control may be desired in the corporate environment when employers distribute cellular phones to its employees and seek to restrict their use; a school which requires that all incoming communications or texts are limited during school hours or during testing; movie theaters seeking to control incoming communications during a movie; a company controlling the use of computing devices in vehicles, such as automobiles, airplanes and the like. Thus, any third party seeking to control the communications of a user's computing device is contemplated within the scope of the disclosure.
[ 0171 ] Turning now to FIG. 15, an example flow diagram illustrates some aspects that were described above, which may be performed by one or more computing devices, such as the computing devices 114, 130, 132, 134 and/or server computing devices 110.
[ 0172 ] In the example 400 shown in FIG. 15, a method of prioritizing communications is shown. A processor of a computing device receives the user's input at block 402. The user's input provides data about whether an incoming communication is a priority communication or a nonpriority communication. Processors receive an incoming communication at block 404 as it is transmitted to the computing device. The processors determine at block 406 whether the incoming communication is a priority communication based upon the user ' s input .
[ 0173 ] A decision is made at block 408 as to whether the incoming communication is a priority communication. If the communication is a priority communication, the user is provided with access to the priority interface at block 410. If the communication is not a priority communication, i.e., a nonpriority communication, the nonpriority communication is denied access to the priority interface and instead provided access to a nonpriority interface at block 412.
[ 0174 ] At block 414, processors can determine whether the nonpriority communication can be transmitted to the priority interface. In one example, based on the user's input, it is determined whether the current time falls within a preselected period of time selected by the user and the nonpriority communication is provided with access to the priority interface. In one example, the preselected period of time may be a period of time after which all nonpriority communications may be transferred to the priority interface . The predetermined period of time may also be a period of time after which a preselected contact may be converted to a nonpriority communication.
[0175] A decision is made at block 416 whether the nonpriority communication may be transferred to the priority interface. In one example, if the current time falls within a preselected time period, the nonpriority communication can be provided to the priority interface at block 418. If not, the processor can wait a predetermined time period at block 417 before the determination step is repeated at block 414. The process can be repeated until the nonpriority communication can be transmitted to the priority interface.
[0176] Turning now to FIGS. 16-20, flow diagrams illustrate additional aspects that were described above and that may be performed in connection with example 400.
[0177] In another example 440 shown in FIG. 16, a series of steps are provided that may be performed prior to block 402 shown in FIG. 15. For example, a series of prompts may assist the user with providing appropriate instructions to the computing device with regard to classifying incoming communications as a priority or nonpriority communication. In this example, the computing device prompts the user at block 442 to select whether to place the computing device in the passive mode, restrictive mode, or clear mode.
[0178] Once the user has selected the desired mode, processors determine what mode the user has selected at block 444. In this example, to determine what mode has been selected, a determination by the processors can first be made as to whether the user has selected the restrictive mode. A decision is made at block 446.
[0179] If the user has selected the restrictive mode, the processor provides an additional prompt at block 448. The user is provided with a selection menu that prompts the user to identify one or more contacts from a contact database who are permitted to access a priority database during a period of time that is selected by the user. During this same period of time, those contacts who have not been specifically designated by the user to access the priority interface during this period of time are inherently identified by the user as a contact that will be denied access to the priority interface during this period of time. In another example, the computing device may further prompt the user to select a specific time or time period after which a nonpriority communication may be automatically transmitted to the priority interface. Once the user has made the appropriate selections in the restrictive mode, the next step is block 402 as previously discussed.
[ 0180 ] If a decision is made at block 446 that the user has not selected the restrictive mode, the processor then determines whether the user has selected the passive mode and makes a decision at block 450. When the user has selected the passive mode, the processor provides an additional prompt at block 452. The user can be provided with a selection menu that prompts the user to identify one or more contacts from a contact database wherein communications received from this contact during a preselected period of time are denied access to the priority database. During this same period of time, those contacts who have not been specifically designated by the user as one whose communications are denied access to the priority interface during this same period of time are identified as a priority communication. Once the user has made the appropriate selections in the restrictive mode, the next step is block 402 as previously discussed.
[ 0181 ] Finally, if the processors make a decision at block 450 that the user has not selected the passive mode, processor decides that the computing device is operating in the standard mode at block 454 and, in one example, no additional prompts are provided. [ 0182 ] In another example 500 shown in FIG. 17, additional steps for determining whether the incoming communication is from a priority contact (see blocks 406, 408 in FIG. 15) may also be used. In this example, based upon the user's input, one or more processors can determine in what mode the computing device is operating at block 502. A decision is made at block 504.
[ 0183 ] If processors determine that the device is in the passive mode at block 504, processors next determine whether the incoming communication is from a preselected contact at block 506. A decision is made at block 508. If the contact is not a preselected contact, the processors identify the incoming communication as a priority communication at block 510. The communication is then permitted to access the priority interface, just as previously described with respect to block 410 in FIG. 15.
[ 0184 ] If, at block 508, the contact is a preselected contact, a determination is made as to what time the communication from the contact is being transmitted to the computing device at block 512. Once the time is obtained, a determination can be made whether that time falls within a preselected time period that the user is denied access to the priority interface at block 514. A decision is made at block 516. When it is determined that the time the incoming communication is transmitted from a contact falls within the time period the contact is denied access the priority interface, the incoming communication is identified as a nonpriority communication at block 518. If however, it is determined that the time the communication is transmitted does not fall within a preselected time period that the contact is denied access to the priority database, the communication is identified as a nonpriority communication and denied access to the priority interface. [ 0185 ] If the device is not in the passive mode at block 504, processors can then determine whether the device is in the restrictive mode at block 524. Processors can then determine whether the incoming communication is from a preselected contact at block 526. A decision is made at block 528.
[ 0186 ] If the contact is not a preselected contact, the processors identify the incoming communication as a nonpriority communication at block 530. Steps 412-418, described in FIG. 15, can continue to be carried out by the processor. However, if the processors determine that the contact is a preselected contact at block 528, processors can next determine at what time the communication from the contact is being transmitted to the computing device at block 532. Once the time in which the communication has been transmitted to the computing device has been determined, processors determine whether that time falls within a preselected time period that the user has permitted this contact to access the priority interface at block 534. A decision is made at block 536.
[ 0187 ] When it is determined that the time the incoming communication is transmitted from a preselected contact falls within the time period the contact is permitted to directly access the user, the incoming communication is identified as a priority communication at block 538. If however, it is determined that the time the communication is transmitted does not fall within a preselected time period that the contact is permitted access to the priority database, the communication is identified as a nonpriority communication at block 540.
[ 0188 ] When it is determined that the computing device is in neither the passive mode nor the restrictive mode, a decision is made at block 542 that the computing device is in the standard mode and all communications are identified as priority communications . [ 0189 ] In another example, additional steps may be provided for determining when a nonpriority communication can be transmitted to the priority interface. In example 550 shown in FIG. 18, when a nonpriority communication has been transmitted to the nonpriority interface, the processor can obtain the current time and a determination is made at block 552.
[ 0190 ] A determination is made whether the current time falls within a preselected time or time period that the user has selected for automatically forwarding nonpriority communications from the nonpriority interface to the priority interface at block 554. A decision is made at block 556. If the current time falls within a preselected time or time period that the user has selected for automatically forwarding nonpriority communications from the nonpriority interface, the nonpriority communication will be transmitted to the priority interface at block 558. If the current time does not fall within a preselected time or time period, the processors can start the process all over again at block 552. Processors can continually repeat the steps at blocks 552-558 until the nonpriority communication is transmitted to the priority interface. In another example, the process can be repeated continuously or at preselected time intervals.
[ 0191 ] An additional time comparison step can also be conducted to determine whether a nonpriority communication can be transferred to priority interface. For example, processors can determine whether the nonpriority communication can be converted to a priority communication.
[ 0192 ] To begin determination of whether the nonpriority communication can be converted, the determination can be made whether the contact is from a preselected contact. If the communication is not from preselected contact, a decision is made that the nonpriority communication cannot be converted to a priority communication. [0193] When the communication is from a preselected contact, a determination is made whether the current time identified by the processor falls within a preselected time or time period for that preselected contact. In the passive mode, in one example, as previously discussed, the preselected time period can be the second preselected time period that results from the express identification by the user of the first preselected time period a communication from a preselected contact is denied access to the priority interface.
[0194] In the restrictive mode, in one example, there is a first preselected time period, the preselected time period is the initial preselected time period identified by the user that a communication from a preselected contact is provided with access to the priority interface.
[0195] When the current time falls within the preselected time period, the nonpriority communication is transmitted to the priority interface. This is because the nonpriority communication is now converted to a nonpriority communication upon expiration of the time selected by the user to prohibit access to the priority interface.
[0196] Turning to FIG. 19, a flow diagram provides an example 600 of one computing device 114 controlling the prioritization of incoming communication on a second computing device, such as computing device 130. As shown, the user 150 of computing device 114 can request access to another client computing device, such as computing device 130, on the network 112 at block 602. Prompts can appear on computing device 114 that allow the user 150 to provide the input necessary to prioritize incoming communications to second computing device 130.
[0197] A processor of the second computing device 130 receives the user's input from the user 150 at block 602. The user's input can include, for example, data about whether an incoming communication is a priority communication or a nonpriority communication, when nonpriority communications that appear on the nonpriority interface may be transmitted to the priority interface, or any other input that can control the prioritization settings on the second computing device 130.
[ 0198 ] Second computing device 130 receives user input from computing device 114 at block 603. The prioritization of incoming communications can then be performed in the same or similar steps as described in FIG. 15. Processors receive an incoming communication at block 604 as it is transmitted to the second computing device 130. The processors determine at block 606 whether the incoming communication is a priority communication based upon the user's input.
[ 0199 ] A decision is made at block 608 as to whether the incoming communication is a priority communication. If the communication is a priority communication, the user is provided with access to the priority interface at block 610. If, however, the communication is not a priority communication, i.e., a nonpriority communication, the nonpriority communication is denied access to the priority interface and instead provided access to a nonpriority interface at block 612.
[ 0200 ] At block 614, processors continually determine whether the nonpriority communication can be transmitted to the priority interface. In one example, based on the input of the user 150, it is determined whether the current time falls within a preselected period of time selected by the user and the nonpriority communication is provided with access to the priority interface. In one example, the preselected period of time may be a period of time after which all nonpriority communications may be transferred to the priority interface . In another example, the predetermined period of time may be a period of time after which a preselected contact may be converted to a nonpriority communication. [ 0201 ] A decision is made at block 616 whether the nonpriority communication may be transferred to the priority interface. In one example, if the current time falls within a preselected time period, a decision is made that the nonpriority communication can be transmitted to the priority interface at block 618. If not, the processor can wait a predetermined time period at block 617 before repeating the steps at block 614. The step of determining whether the nonpriority communication can be provided to the nonpriority interface can be repeated until the nonpriority communication is transmitted to the priority interface.
[ 0202 ] Turning now to FIG. 20, a flow diagram illustrates an example 700 of how the user 150 of computing device 114 can be notified that the prioritization settings on second computing device 130 have been changed. The user 160 of computing device 130 may change the prioritization settings on computing device 130 at block 702. When this occurs, a communication is transmitted to server computing device 102 at block 704. The communication can be, for example, a message indicating that the settings on computing device 130 have been changed, and can further include an identification of the new settings. Server computing device 102 receives the communication from second computing device 130 at block 706. Server computing device 102 determines what computing device is controlling second computing device 130 at block 708. Server computing device 102 can then provide a communication or message to computing device 114 at block 710. The communication from server computing device 102 is received at block 712. The communication can then be displayed to the user 150 on computing device 114 at block 714. The communication can be an e-mail, text message, voicemail, or any type of communication that will notify the user 150 that a change has been made. [ 0203 ] Most of the foregoing alternative examples are not mutually exclusive, but may be implemented in various combinations to achieve unique advantages. As these and other variations and combinations of the features discussed above can be utilized without departing from the subject matter defined by the claims, the foregoing description of the embodiments should be taken by way of illustration rather than by way of limitation of the subject matter defined by the claims. As an example, the preceding operations do not have to be performed in the precise order described above. Rather, various steps can be handled in a different order or simultaneously. Steps can also be omitted unless otherwise stated. In addition, the provision of the examples described herein, as well as clauses phrased as "such as," "including" and the like, should not be interpreted as limiting the subject matter of the claims to the specific examples; rather, the examples are intended to illustrate only one of many possible embodiments. Further, the same reference numbers in different drawings can identify the same or similar elements.
[ 0204 ] Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims .

Claims

1. A method, comprising:
receiving user input for handling incoming communications received at a computing device;
receiving an incoming communication at one or more processors of a computing device;
determining, using the one or more processors, whether the incoming communication is a priority communication or a non-priority communication based upon the user's input;
providing the incoming communication to a priority interface of the communication device when the one or more processors determines that the incoming communication is a priority communication;
providing the incoming communication to a non-priority interface of the communication device when the one or more processors determines that the incoming communication is a non-priority communication.
2. The method of claim 1, wherein the user input includes selection of a mode, the mode comprising one of: a restrictive mode,
the restrictive mode permitting communications from preselected individuals or groups of individuals for a preselected time,
a passive mode, the passive mode blocking communications from pre-selected individuals or groups of individuals for a pre-selected time, and
a standard mode, the standard mode providing all incoming communications to the priority interface .
3. The method of claim 1, wherein the user input specifies at least one of a type of message, a time period, and one or more senders .
4. The method of claim 3, wherein the type of message includes at least one of: a voicemail, a text message, a social media message, and an e-mail message.
5. The method of claim 3, wherein determining whether the incoming communication is a priority communication further comprises :
determining an identity of the sender of the incoming communication; and
comparing the identity of the sender to the user input.
6. The method of claim 3, further comprising:
comparing a time of the incoming message to the user input .
7. The method of claim 3, wherein the user input identifies a first time period for a first sender, and a second different time period for a second sender.
8. The method of claim 1, wherein receiving user input for handling communications received at the computing device further comprises :
providing instructions for managing incoming communications on a secondary computing device, wherein the instructions comprise limiting particular incoming communications .
9. The method of claim 8, further comprising:
concealing the non-priority interface on the secondary computing device for predetermined time periods .
10. The method of claim 9, further comprising: notifying a first user when a user of the secondary computing device attempts to access the concealed non- priority interface.
11. The method of claim 1, wherein the priority interface provides a notification of the communication immediately.
12. The method of claim 1, further comprising:
forwarding non-priority communications to the priority interface after a predetermined time.
13. The method of claim 1, wherein the non-priority interface disables notifications for received non-priority communications .
14. A system comprising:
an input interface;
at least one memory storing settings provided by a user through the input interface, the settings identifying at least one communication as a priority communication or a non- priority communication;
a receiver to receive at least one incoming communication ;
one or more processors, communicatively coupled to the at least one memory and the receiver, the one or more processors programmed to determine whether the at least one incoming communication is a priority communication or a non- priority communication based on the stored settings;
a priority interface adapted to display the at least one incoming communication when the one or more processors determines that the at least one incoming message is a priority communication; and
a non-priority interface adapted to display the at least one incoming communication when the one or more processors determines that the at least one incoming message is a non- priority communication.
15. The system of claim 14, wherein the one or more processors are further configured to temporarily store the incoming communication when the one or more processors determine that the incoming communication is a non-priority communication .
16. A non-transitory computer readable medium on which instructions are stored, the instructions, when executed by one or more processors cause the one or more processors to perform a method, the method comprising:
receiving user input for handling incoming communications received at a computing device;
receiving an incoming communication at one or more processors of a computing device;
determining whether the incoming communication is a priority communication or a non-priority communication based upon the user's input;
providing the incoming communication to a priority interface of the communication device when the one or more processors determines that the incoming communication is a priority communication;
providing the incoming communication to a non-priority interface of the communication device when the one or more processors determines that the incoming communication is a non-priority communication.
PCT/US2014/069723 2013-12-12 2014-12-11 Method of prioritizing communications transmitted to a computing device WO2015089275A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361915279P 2013-12-12 2013-12-12
US61/915,279 2013-12-12

Publications (1)

Publication Number Publication Date
WO2015089275A1 true WO2015089275A1 (en) 2015-06-18

Family

ID=53371828

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/069723 WO2015089275A1 (en) 2013-12-12 2014-12-11 Method of prioritizing communications transmitted to a computing device

Country Status (1)

Country Link
WO (1) WO2015089275A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060056311A1 (en) * 2004-09-14 2006-03-16 Samsung Electronics Co., Ltd Mobile terminal and controlling method thereof
EP2306314A2 (en) * 2009-09-15 2011-04-06 Raytheon Company Method and system for resource management using fuzzy logic timeline filling
US20130172037A1 (en) * 2011-12-28 2013-07-04 Motorola Solutions, Inc. Method and apparatus for priority monitoring of communication groups over multiple disparate wireless networks
US20130265261A1 (en) * 2012-04-08 2013-10-10 Samsung Electronics Co., Ltd. User terminal device and control method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060056311A1 (en) * 2004-09-14 2006-03-16 Samsung Electronics Co., Ltd Mobile terminal and controlling method thereof
EP2306314A2 (en) * 2009-09-15 2011-04-06 Raytheon Company Method and system for resource management using fuzzy logic timeline filling
US20130172037A1 (en) * 2011-12-28 2013-07-04 Motorola Solutions, Inc. Method and apparatus for priority monitoring of communication groups over multiple disparate wireless networks
US20130265261A1 (en) * 2012-04-08 2013-10-10 Samsung Electronics Co., Ltd. User terminal device and control method thereof

Similar Documents

Publication Publication Date Title
JP6884183B2 (en) Conditional disclosure of personally controlled content in group context
AU2013205561B2 (en) Generating context -based options for responding to a notification
US8626112B2 (en) Multi-button emergency message generation
CN101516073B (en) Administration of policies for wireless devices in a wireless communication system
US9531652B2 (en) Communications routing and contact updates
US20090287783A1 (en) Method of social interaction between communication device users
US11611844B2 (en) Systems and methods for users to receive and/or reply to information affiliated with communication attempts while remaining substantially disconnected from mobile electronic device(s) and/or networks
US7769154B1 (en) Aggregated perceived presence
US20100174575A1 (en) Meeting management system with failover and failback capabilities for meeting moderators
US9820119B2 (en) Method and systems for lockbox secured file transmission
ES2914327T3 (en) Dynamic filtering procedure of a group communication
US9547846B2 (en) Method and apparatus for the processing of data relating to calendar entries
US20130006913A1 (en) System and Method for Automating Proactive Communication
US20130130659A1 (en) Updating social networks in response to trigger events on mobile communication device
EP3694197B1 (en) System and method of connecting a caller to a recipient based on the recipient's status and relationship to the caller
CN110036622A (en) Prevent the methods, devices and systems communicated unintentionally
US10528914B2 (en) System and method for rule-based information routing and participation
CA2857470C (en) System and method for communications routing
JP2015170032A (en) Schedule adjustment program, schedule adjustment method, and schedule adjustment device
US20150264001A1 (en) System and method for contact management
US9451449B1 (en) Method and system for sharing a communication terminal availability
WO2015089275A1 (en) Method of prioritizing communications transmitted to a computing device
US8682991B2 (en) Electronic messaging systems
US9729710B2 (en) Prioritized ongoing communication interrupt
US20130268606A1 (en) System and Method for Determining and Presenting a Status from Multiple Sources and Devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14869767

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14869767

Country of ref document: EP

Kind code of ref document: A1