Browse Prior Art Database

TECHNIQUE FOR TRANSFERRING MOBILE ADDRESS BOOK CONTACT TO A REMOTE MOBILE DEVICE ON DEMAND

IP.com Disclosure Number: IPCOM000232630D
Publication Date: 2013-Nov-22
Document File: 9 page(s) / 84K

Publishing Venue

The IP.com Prior Art Database

Abstract

The disclosure describes a technique for sharing mobile address records between mobile phones that are currenty in use by their owners. When the owner of the first mobile phone talks to another person that owns the second mobile phone, there exists a difficulty in sharing a third person's mobile address contact information stored on the first mobile phone to the second mobile phone. The difficulties comes in terms of needing to put one person on hold while the information is retrieived, searching through the address book for the record, and then communicating the details either through verbal mode, a short message or an electronic business card. This disclosure provides an easier approach for sharing mobile address information between mobile phones when both mobile phones are currently in use for voice communications.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 48% of the total text.

Page 01 of 9

TECHNIQUE FOR TRANSFERRING MOBILE ADDRESS BOOK CONTACT TO A REMOTE MOBILE DEVICE ON DEMAND

When two people are communicating over mobile phone, there exist a difficulty in sharing a third person mobile address contact details among each other. Difficulties comes in terms of


 Keeping another person on hold


 Searching through the address book


 Communicating the details either on verbal mode or as a short message or as a business card

Thus the mobile usage is not very friendly and causes inconvenient if there is a need to dig around the contact details while on a call.

Available solutions exists today but are inconvenient. These solutions are as follows:


 Put the requesting person who is on the call on HOLD . Manually search for the contact details. Further communicate back to the requestor.


 Disconnect the ongoing call and forward the contact details as short message or business card.

An alternative solution could be a requester sending a request event and getting a manual response from the responder. As mentioned, these event based trigger can be implemented only as a offline mode of information transfer and it cannot be an automated contact details update.

Hence this necessitates the need to have an automated technique to transfer contact details whenever it is requested.

The condensed version of the solution is to have the combination of the following solution components to respond to such request:


Voice Command - activated through mobile key combination and takes the requested contact person details (say,name) as voice input


Validation Service - This validates the availability of the contact and the privacy status of the contact


Message & Alert service - This service constructs the message and responds to the caller . Also, this service alerts the third person whose contact information is been shared across

For example, person A is talking to person B using mobile phones. Person B request person C's contact details. Person A presses a key combination to activate the mobile phone's voice command component. At this point either person A or B can give a comment to search for the requeste contact information.

As the validation logic within the mobile phone searches for the requested information, it also knows about the privacy settings of the person. Privacy settings can be set so that their contact

1


Page 02 of 9

information is either public or private information. The validation service makes use of the

privacy details of the contact and communicate accordingly. If the privacy setting is PRIVATE then it denies the request. If the privacy setting is PUBLIC then it continues with the request, retrieves the contact information and sends the contact details over the "Message & Alert" service.

The responsibility of the "Message & Alert" service is to construct the message with the requested contact details and responds back to the caller using Caller ID. Also, it alerts the third

person whose contact is bein...