Apparatus and method for accessing contact lists on an electronic device that is unavailable or unusable

ABSTRACT

An apparatus, method, and non-transitory computer readable medium are provided for accessing data on a phone that is inaccessible. The apparatus includes a memory configured to store a plurality of contact profiles in a contact list corresponding to an inaccessible device, and a processor coupled to the memory. The apparatus receives, from an unknown device over a voice connection, an access identifier corresponding to the inaccessible device and a contact identifier associated with a contact profile of the plurality of contact profiles; identifies the contact list based on matching the access identifier with the inaccessible device; determines a contact device of the contact profile in the contact list corresponding to the contact identifier; and connects, over the voice connection, the unknown device to the contact device corresponding to the contact profile.

CROSS-REFERENCE TO RELATED APPLICATION(S) AND CLAIM OF PRIORITY

This application is a continuation of U.S. patent application Ser. No.16/172,355, filed Oct. 26, 2018, which claims the benefit of U.S.Provisional Patent Application No. 62/578,286 filed on Oct. 27, 2017,the disclosures of which are hereby incorporated by reference in theirentirety.

TECHNICAL FIELD

This disclosure relates generally to inaccessible cellular devices. Morespecifically, this disclosure relates to accessing contact lists on anelectronic device that is unavailable or unusable.

BACKGROUND

People are more connected via mobile devices than ever. An unintendedside effect is the diminishing ability to remember facts that are easilyobtainable on a cellular device or can easily be stored on a cellulardevice for future use.

SUMMARY

This disclosure provides for accessing contact lists on a phone that isunavailable or unusable.

In a first embodiment, an apparatus provides for accessing contact listson a phone that is unavailable or unusable. The apparatus includes amemory that stores a plurality of contact profiles in a contact listcorresponding to an inaccessible device, and a processor coupled to thememory. The processor receives, from an unknown device over a voiceconnection, an access identifier corresponding to the inaccessibledevice and a contact identifier associated with a contact profile of theplurality of contact profiles; identifies the contact list based onmatching the access identifier with the inaccessible device; determinesa contact device of the contact profile in the contact listcorresponding to the contact identifier; and connects, over the voiceconnection, the unknown device to the contact device corresponding tothe contact profile.

In a second embodiment, a method provides for accessing contact lists ona phone that is unavailable or unusable. The method is for an apparatusincorporating a memory and a processor, the memory configured to store aplurality of contact profiles in a contact list corresponding to aninaccessible device and the processor coupled to the memory. The methodincludes receiving, from an unknown device over a voice connection, anaccess identifier corresponding to the inaccessible device and a contactidentifier associated with a contact profile of the plurality of contactprofiles; identifying the contact list based on matching the accessidentifier with the inaccessible device; determining a contact device ofthe contact profile in the contact list corresponding to the contactidentifier; and connecting, over the voice connection, the unknowndevice to the contact device corresponding to the contact profile.

In a third embodiment, a non-transitory computer-readable mediumprovides for accessing contact lists on a phone that is unavailable orunusable. The computer readable medium storing instruction that, whenexecuted, causes the processor to receive, from an unknown device over avoice connection, an access identifier corresponding to an inaccessibledevice and a contact identifier associated with a contact profile of aplurality of contact profiles in a contact list corresponding to theinaccessible device; identify the contact list based on matching theaccess identifier with the inaccessible device; determine a contactdevice of the contact profile in the contact list corresponding to thecontact identifier; and connect, over the voice connection, the unknowndevice to the contact device corresponding to the contact profile.

Other technical features may be readily apparent to one skilled in theart from the following figures, descriptions, and claims.

Before undertaking the DETAILED DESCRIPTION below, it may beadvantageous to set forth definitions of certain words and phrases usedthroughout this patent document. The term “couple” and its derivativesrefer to any direct or indirect communication between two or moreelements, whether or not those elements are in physical contact with oneanother. The terms “transmit,” “receive,” and “communicate,” as well asderivatives thereof, encompass both direct and indirect communication.The terms “include” and “comprise,” as well as derivatives thereof, meaninclusion without limitation. The term “or” is inclusive, meaningand/or. The phrase “associated with,” as well as derivatives thereof,means to include, be included within, interconnect with, contain, becontained within, connect to or with, couple to or with, be communicablewith, cooperate with, interleave, juxtapose, be proximate to, be boundto or with, have, have a property of, have a relationship to or with, orthe like. The phrase “at least one of,” when used with a list of items,means that different combinations of one or more of the listed items maybe used, and only one item in the list may be needed. For example, “atleast one of: A, B, and C” includes any of the following combinations:A, B, C, A and B, A and C, B and C, and A and B and C.

Moreover, various functions described below can be implemented orsupported by one or more computer programs, each of which is formed fromcomputer readable program code and embodied in a non-transitory computerreadable medium. The terms “application” and “program” refer to one ormore computer programs, software components, sets of instructions,procedures, functions, objects, classes, instances, related data, or aportion thereof adapted for implementation in a suitable computerreadable program code. The phrase “computer readable program code”includes any type of computer code, including source code, object code,and executable code. The phrase “computer readable medium” includes anytype of medium capable of being accessed by a computer, such as readonly memory (ROM), random access memory (RAM), a hard disk drive, acompact disc (CD), a digital video disc (DVD), or any other type ofmemory. A “non-transitory” computer readable medium excludes wired,wireless, optical, or other communication links that transporttransitory electrical or other signals. A non-transitory computerreadable medium includes media where data can be permanently stored andmedia where data can be stored and later overwritten, such as arewritable optical disc or an erasable memory device.

Definitions for other certain words and phrases are provided throughoutthis patent document. Those of ordinary skill in the art shouldunderstand that in many if not most instances, such definitions apply toprior as well as future uses of such defined words and phrases.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of this disclosure and its advantages,reference is now made to the following description, taken in conjunctionwith the accompanying drawings, in which:

FIG. 1 illustrates an example communication system in which variousembodiments of the present disclosure may be implemented;

FIG. 2 illustrates an example server according to various embodiments ofthe present disclosure;

FIG. 3 illustrates an example electronic device according to variousembodiments of the present disclosure;

FIG. 4 illustrates an example process for setting up an accessiblecontact list with the application according to various embodiments ofthe present disclosure;

FIG. 5 illustrates an example process for accessing a contact list on aphone that is unavailable or unusable according to various embodimentsof the present disclosure;

FIG. 6 illustrates an example process for accessing a contact list on aphone that is inaccessible according to embodiments of the presentdisclosure; and

FIG. 7 illustrates an example process for accessing a contact list on aphone that is inaccessible according to embodiments of the presentdisclosure.

DETAILED DESCRIPTION

FIGS. 1 through 7, discussed below, and the various embodiments used todescribe the principles of this disclosure in this patent document areby way of illustration only and should not be construed in any way tolimit the scope of the disclosure. Those skilled in the art willunderstand that the principles of this disclosure may be implemented inany suitably arranged electronic device.

Hereinafter, embodiments of the present disclosure are described withreference to the accompanying drawings. However, it should beappreciated that the present disclosure is not limited to theembodiments, and all changes and/or equivalents or replacements theretoalso belong to the scope of the present disclosure. The same or similarreference denotations may be used to refer to the same or similarelements throughout the specification and the drawings.

As used herein, the terms “have,” “may have,” “include,” or “mayinclude” a feature (e.g., a number, function, operation, or a componentsuch as a part) indicate the existence of the feature and do not excludethe existence of other features.

As used herein, the terms “A or B,” “at least one of A and/or B,” or“one or more of A and/or B” may include all possible combinations of Aand B. For example, “A or B,” “at least one of A and B,” “at least oneof A or B” may indicate all of (1) including at least one A, (2)including at least one B, or (3) including at least one A and at leastone B.

As used herein, the terms “first” and “second” may modify variouscomponents regardless of importance and do not limit the components.These terms are only used to distinguish one component from another. Forexample, a first user device and a second user device may indicatedifferent user devices from each other regardless of the order orimportance of the devices. For example, a first component may be denoteda second component, and vice versa without departing from the scope ofthe present disclosure.

FIG. 1 illustrates an example communication system 100 in which variousembodiments of the present disclosure may be implemented. The embodimentof the communication system 100 shown in FIG. 1 is for illustrationonly. Other embodiments of the communication system 100 could be usedwithout departing from the scope of this disclosure.

As shown in FIG. 1, the system 100 includes a network 102, whichfacilitates communication between various components in the system 100.For example, the network 102 can communicate Internet Protocol (IP)packets, frame relay frames, or other information between networkaddresses. The network 102 can include one or more local area networks(LANs); metropolitan area networks (MANs); wide area networks (WANs);all or a portion of a global network, such as the Internet; or any othercommunication system or systems at one or more locations.

The network 102 facilitates communications between various servers 103and 104 and various electronic devices 106-114. Each server 103 and 104includes any suitable computing or processing device that can providecomputing services for one or more electronic devices. Each server 103and 104 could, for example, include one or more processors, one or morememories storing instructions and data, and one or more networkinterfaces facilitating communication over the network 102.

Each electronic device 106-114 represents any suitable computing orcommunication device that interacts with at least one server or othercomputing device(s) over the network 102. In this example, theelectronic devices 106-114 include electronic devices, such as, forexample, a desktop computer 106, a mobile telephones or smartphones 108,a personal digital assistant (PDA) 110, a laptop computer 112, a tabletcomputer 114, a headset, a display, a wearable device, smart watch, andthe like However, any other or additional electronic devices could beused in the communication system 100.

In this example, some electronic devices 108-114 communicate indirectlywith the network 102, For example, the electronic devices 108-110communicate via one or more base stations, such as cellular basestations. Also, the electronic devices 112-114 communicate via one ormore wireless access points (APs), such as IEEE 802.11 wireless APs,Bluetooth, and WiFi direct. Note that these are for illustration onlyand that each electronic device could communicate directly with thenetwork 102 or indirectly with the network 102 via any suitableintermediate device(s) or network(s).

As described in more detail below, the electronic devices 108-114interact for accessing a contact list or lists on an electronic devicethat is unavailable or unusable. While electronic devices 108-114 aredescribed as accessing contact lists on an electronic device that isunavailable or unusable, servers 103 and 104 could also be utilized foraccessing contact lists on a phone that is unavailable or unusable.Hereinafter, the term “inaccessible” may refer to either unavailable orunusable.

Although FIG. 1 illustrates one example of a communication system 100,various changes may be made to FIG. 1. For example, the system 100 couldinclude any number of each component in any suitable arrangement. Ingeneral, computing and communication systems come in a wide variety ofconfigurations, and FIG. 1 does not limit the scope of this disclosureto any particular configuration. While FIG. 1 illustrates oneoperational environment in which various features disclosed in thispatent document can be used, these features could be used in any othersuitable system.

FIGS. 2 and 3 illustrate example electronic devices in a communicationsystem according to various embodiments of the present disclosure. Inparticular, FIG. 2 illustrates an example server 200, and FIG. 3illustrates an example electronic device 300. The server 200 couldrepresent the server 103 or the server 104 in FIG. 1, and the electronicdevice 300 could represent one or more of the client devices 106-114 inFIG. 1.

As shown in FIG. 2, the server 200 includes a bus system 205, whichsupports communication between at least one processor 210, at least onestorage device 215, at least one communications unit 220, and at leastone input/output (I/O) unit 225.

The processor 210 executes instructions that can be loaded into a memory230. The processor 210 can include any suitable number(s) and type(s) ofprocessors or other devices in any suitable arrangement. Example typesof processor 210 include microprocessors, microcontrollers, digitalsignal processors, field programmable gate arrays, application specificintegrated circuits, and discreet circuitry.

The memory 230 and a persistent storage 235 are examples of storagedevices 215, which represent any structure(s) capable of storing andfacilitating retrieval of information (such as data, program code,and/or other suitable information on a temporary or permanent basis).The memory 230 can represent a random access memory or any othersuitable volatile or non-volatile storage device(s), such as application231. The persistent storage 235 can contain one or more components ordevices supporting longer-term storage of data, such as a read onlymemory, hard drive, flash memory, or optical disc. The persistentstorage 235 can include a contact list 241 or lists, a user profile 242or profiles, user settings 243, an access identifier 244 or identifiers,an operation indication 245, contact information 246, and a contactidentifier 247 or identifiers. In one embodiment, the memory 230 isconfigured to store a plurality of contact profiles in a contact listcorresponding to an inaccessible device and a processor is coupled tothe memory.

The server 200 receives the updates to the contact list 241 from anelectronic device 300. The contact list 241 includes contact information246 such as contact name, contact phone, contact address, contact email,or any other information generally stored in a contact list 241 on anelectronic device.

The processor 210 runs the application 231 when a user calls the serverdirectly or logs in through a web portal. The processor 210 receives anaccess identifier 244 from the user, which is matched with acorresponding user profile 242. The processor 210 also receives anoperation indication 245. The processor 210 performs the operationassociated with the operation indication 245, which for example couldinclude returning contact information 246 associated with the contactlist 241.

The contact list 241 contains any relevant information stored in anelectronic device related to a contact list or group of contact lists.The contact list 241 can also contain any relevant information relatedto an individual contact. For example, the contact list 241 can storeuser profiles, group profiles, etc. The contact list 241 can also storecalendar entries, event reminders, notes, messages, and photos. Theserver 200 can be configured to search multiple databases on theinaccessible electronic device for contact information 246 associatedwith the contact list 241, including contact information 246 locallystored on the inaccessible electronic device. For example, the contactlist 241 can be formed from a phone contact list, an email contact list,a social media contact list (FACEBOOK, LINKEDIN, etc.), or any otherlist found on an electronic device. The server 200 can also beconfigured to update the contact list 241 stored on the database whenthe contact information 246 compiled from multiple different sources hasbeen modified. For instance, contact information 246 may be modifiedwhen a contact is added or deleted. Contact information 246 may also bemodified when information on an existing contact is added or removed(e.g., adding a second phone number to an existing account, removing awork email from an existing account, or updating a phone number on anexisting account). In one embodiment, the contact list 241, prior totelecommunication with the server 200, is locally stored on the initialdevice. The contact list 241 can also remain locally stored on theelectronic device after telecommunication with the server 200. In oneembodiment, the contact list 241 includes contact profiles 270. Thecontact list 241 can also contain a plurality of contact profiles. Thecontact identifier is associated with a contact profile 270 of theplurality of contact profiles.

The user profile 242 can include any necessary information foridentifying the user related to a specific account. The user profile 242can include any user name, user phone number, user email, user address,user payment information, etc.

The user settings 243 include the settings set by the user in regards toaccessing the application, updating the application, and performingoperation using the application. The user settings 243 are set on theinitial device that is at some point inaccessible. For example, theinitial device may become inaccessible because the user left his/hersmartphone at home. The initial device may also become inaccessiblebecause the user's smartphone screen has cracked, the user's smartphonefingerprint scanner is broken, the user's smartphone touch screen hasbecome unresponsive, or one or more buttons on the user's smartphone hasbecome damaged. The user settings 243 also can be set from a computer orapplication logged into from a different electronic device.

The access identifier 244 can identify the user when accessing theserver 200. In one embodiment the access identifier includes a username250. The access identifier 244 can also be an alphanumeric code, a name,a caller ID, or any other set of characters and numbers for individuallyidentifying a user. In one embodiment, the username 250 includes a phonenumber 252. The username 250 can also be an alphanumeric code, name, acaller ID, or any other set of characters and numbers for individuallyidentifying a user. Each user can have a single access identifier 244for all purposes of accessing the application or different accessidentifiers for accessing the application in different manners. Forexample, an access identifier 244 can be set for accessing theapplication 231 from a known source or for full functionality and asecond access identifier 244 can be used when accessing from an unknownsource, such as a random person's electronic device. The accessidentifier 244 can be sent to the server 200 via text message, phonecall, email, or any other appropriate form of communication. The accessidentifier 244 can also include a password 260. In one embodiment, thepassword 260 is a PIN code 262. The password 260 can also be analphanumeric code, a caller ID, or any other set of characters andnumbers for individually identifying a user.

The operation indication 245 can indicate the operation to be performedby the application based on the interaction. For example, the operationindication 245 can indicate operations to provide specific contactinformation 246 back to the user or attempt to contact a specific useror group of users. The operation indication 245 can also indicate anyspecific means of communication to use in the operation. For example,the operation indication 245 can indicate setting up a phone call orgroup call, can indicate sending a text or email to a single contact ora group of contacts, can indicate setting up a video chat session, etc.

The contact information 246 can include contact name, contact number,contact address, contact email, contact birthday, contact groups, etc. Auser profile 242 can include multiple amounts of the relevantinformation, such as multiple contact numbers (home phone, work phone,cell phone, etc.).

The contact identifier 247 can identify a specific contact or a group ofcontacts. The user can specifically set up the contact identifierinformation on the application or the contact identifier 247 can bedetermined by the application 231. The contact identifier 247 isprovided to identify the specific contact or the group of contacts forthe operation to be conducted. For example, the contact identifier 247can identify the group of contacts that the user is attempting to reachby the specified operation. The contact identifier 247 can be sent tothe server 200 via text message, phone call, email, or any otherappropriate form of communication. In one embodiment, the server 200 isconfigured to receive a text message from an electronic device andanalyze the text message to identify the access identifier 244 and thecontact identifier 247.

The communications unit 220 supports communications with other systemsor devices. For example, the communications unit 220 could include anetwork interface card or a wireless transceiver facilitatingcommunications over the network 102. The communications unit 220 cansupport communications through any suitable physical or wirelesscommunication link(s).

The I/O unit 225 allows for input and output of data. For example, theI/O unit 225 can provide a connection for user input through a keyboard,mouse, keypad, touchscreen, or other suitable input device. The I/O unit225 also can send output to a display, printer, or other suitable outputdevice.

As described in more detail below, the processor 210 manages the userprofile 242 and contact list 241 on the server 200. The processor 210runs the application 231 to connect a user corresponding to anauthenticated profile to one or more of the contacts in the contact list241.

In one embodiment, the server 200 is configured to receive an accessidentifier 244 associated with a user and a contact identifier 247associated with a contact list 241. The server 200 can access thecontact list 241, wherein the contact list 241 is locally stored on aninaccessible electronic device associated with the user and notexternally stored on a cloud storage system. The server 200 can alsoperform an operation based on the contact identifier 247. For instance,performing an operation may include sending phone calls, text messages,entails, or other forms of contact. The application 231, in connectionwith the server 200, can also be configured to perform a default action,such as initiating a phone call, when the server 200 receives an accessidentifier 244 and a contact identifier 247 from the unknown device 406.The application 231, in connection with the server 200, can also beconfigured to give a list of operations to choose from when the server200 receives an access identifier 244 and a contact identifier 247 fromthe unknown device 406.

Note that while FIG. 2 is described as representing the server 104 ofFIG. 1, the same or similar structure could be used in one or more ofthe client devices 106-114. For example, a laptop or desktop computercould have the same or similar structure as that shown in FIG. 2.

As shown in FIG. 3, the electronic device 300 includes an antenna 305, acommunication unit 310, and a microphone 320. The electronic device 300also includes a speaker 330, a processor 340, an input/output (I/O)interface (IF) 345, an input 350, a display 355, and a memory 360. Thememory 360 includes an operating system (OS) program 361, one or moreapplications 362, and any contact list 363 associated with theelectronic device.

The application 362 automatically transmits contact information 246 tothe server 200 when the contact information 246 is entered or updated onthe electronic device 300. The application 362 also providescustomizable settings.

The communication unit 310 may receive an incoming RF signal such as aBluetooth® or Wi-Fi® signal. The communication unit 310 may down-convertthe incoming RF signal to generate an intermediate frequency (IF) orbaseband signal, then generate a processed baseband signal by filtering,decoding, and/or digitizing the baseband or signal. The communicationunit 310 transmits the processed baseband signal to the processor 340for further processing (such as for web browsing data, online gameplaydata, notification data, or other message data).

The communication unit 310 also receives analog or digital voice data orother outgoing baseband data (such as web data, e-mail, or interactivevideo game data) from the processor 340. The communication unit 310encodes, multiplexes, and/or digitizes the outgoing baseband data togenerate a processed baseband or IF signal. In the case that thecommunication unit 310 is an RF transceiver, the communication unit 310up-converts the baseband or IF signal to RF signal that is transmittedvia an antenna.

The processor 340 can include one or more processors or other processingdevices and execute the OS 361 stored in the memory 360 in order tocontrol the overall operation of the electronic device 300. For example,the processor 340 could control the reception of forward channel signalsand the transmission of reverse channel signals by the communicationunit 310 in accordance with well-known principles. The processor 340could also receive analog or digital voice data from the microphone 320,and output analog or digital audio to the speaker 330. In someembodiments, the processor 340 includes at least one microprocessor ormicrocontroller.

The processor 340 is also capable of executing other processes andprograms resident in the memory 360. The processor 340 can move datainto or out of the memory 360 as required by an executing process. Insome embodiments, the processor 340 is configured to execute theapplications 362 based on the OS program 361 or in response to signalsreceived from external devices or an operator. The processor 340 is alsocoupled to the I/O interface 345, which provides the electronic device300 with the ability to connect to other devices such as laptopcomputers and handheld computers. The I/O interface 345 is thecommunication path between these accessories and the processor 340.

The processor 340 is also coupled to the input 350 and the display 355.The operator of the electronic device 300 can use the input 350 (e.g.,keypad, touchscreen, button and the like) to enter data into theelectronic device 300. The display 355 can be a liquid crystal display,a light-emitting diode (LED) display, an optical LED (OLED), an activematrix OLED (AMOLED), or other display capable of rendering text and/orat least limited graphics, such as from web sites.

The memory 360 is coupled to the processor 340. Part of the memory 360could include a random access memory (RAM), and another part of thememory 360 could include a Flash memory or other read-only memory (ROM).

As described in more detail below, the processor 340 allows foraccessing a contact list on a phone that is inaccessible. The electronicdevice 300 provides for accessing a contact list on a phone that isinaccessible.

Although FIGS. 2 and 3 illustrate examples of devices in a communicationsystem, various changes may be made to FIGS. 2 and 3. For example,various components in FIGS. 2 and 3 could be combined, furthersubdivided, or omitted and additional components could be addedaccording to particular needs. As a particular example, the processor340 could be divided into multiple processors, such as one or morecentral processing units (CPUs) and one or more graphics processingunits (GPUs). Also, while FIG. 3 illustrates the electronic device 300configured as a mobile telephone or smartphone, electronic devices couldbe configured to operate as other types of mobile or stationary devices.In addition, as with computing and communication networks, electronicdevices and servers can come in a wide variety of configurations, andFIGS. 2 and 3 do not limit this disclosure to any particular electronicdevice or server.

FIG. 4 illustrates an example communication system 400 in which variousembodiments of the present disclosure may be implemented. The embodimentof the communication system 400 shown in FIG. 4 is for illustrationonly. Other embodiments of the communication system 400 could be usedwithout departing from the scope of this disclosure.

As shown in FIG. 4, the system 400 includes a server 402, aninaccessible device 404, an unknown device 406, and a contact device408.

The inaccessible device 404, the unknown device 406 and the contactdevice 408 can represent any suitable computing or communication devicethat interacts with at least one server or other computing device(s)over a network, such as the network 102. In this example, theinaccessible device 404 includes an electronic device, such as a cellphone, that is a functioning device that a user is unable to operate dueto malfunction of an interface or misplacement of the functioningdevice. The unknown device 406 includes an electronic device, such as acell phone, that the server 200 has not previously communicated with. Inone embodiment, the unknown device 406 is a stranger's smartphone thatthe user is borrowing to call the server 200. The contact device 408includes an electronic device, such as a cell phone, corresponding to acontact on the contact list 241.

Before the inaccessible device 404 becomes inaccessible, the server 402receives a contact list from the device. The contact list on the server402 can be automatically synced or manually synced. The server 402 canreceive or assign an access identifier to the contact list.

The server 402 operates to provide access to contact lists from aninaccessible device 404 to a user that is making a voice call from anunknown device 406. The voice call can be through wired communication,wireless communication, data communication. VOIP communication, etc.

The unknown device 406 can place a call to the server 402. The server402 prompts the unknown device 406 for the access identifier. The accessidentifier can include a username and a password. The username is usedto identify the specific contact list corresponding to the inaccessibledevice 404. The password is matched with a stored password to gainaccess to the contact list. If the passwords do not match, the server402 can terminate the voice communication or re-prompt the user for adifferent access identifier combination.

Once the password is matched with the stored password, the server 402can identify a specific contact in the contact list using the contactidentifier. The contact identifier can be verbally received by theserver 402 and proceeds to convert the verbal contact identifier todetermine the contact. If the server 402 locates the contact, the server402 can provide or repeat the name to the unknown device forconfirmation or in general. If the contact is not confirmed, otheroptions of contacts with similar names can be provided or the unknowndevice can be re-prompted for a new contact identifier.

When the contact s confirmed, the server 402 can initiate a voice callwith the contact device 408 associated with the contact or contactidentifier. The server 402 can provide the caller information of theinaccessible device 404 to the contact device 408.

Although FIG. 4 illustrates one example of a communication system 400,various changes may be made to FIG. 4. For example, the system 400 couldinclude any number of each component in any suitable arrangement. Ingeneral, computing and communication systems come in a wide variety ofconfigurations, and FIG. 4 does not limit the scope of this disclosureto any particular configuration. While FIG. 4 illustrates oneoperational environment in which various features disclosed in thispatent document can be used, these features could be used in any othersuitable system.

FIG. 5 illustrates an example process 500 for synchronizing a contactlist on a phone that is accessible according to embodiments of thepresent disclosure. For example, the process 500 depicted in FIG. 5 maybe performed by the electronic device 106-114 in FIG. 1 or the server200 in FIG. 2.

In operation 505, a user downloads an application 231 on an initialdevice. The initial device is a functioning device that is operable bythe user. The initial device is a device that belongs to a user andcontains a contact list of contacts that the user has collected.

In operation 510, the user creates an access identifier 244 using theapplication 231. For example, the user can create a four-digit PIN onthe application 231. The four-digit PIN can serve as a means foridentifying the initial device. For instance, the four-digit PIN mayrepresent the last four digits of the phone number associate with theinitial device.

In operation 515, the server 200 can store the access identifier 244 ina memory.

In operation 520, the server 200 sends a request, to the initial device,for permission to access a contact list 241 locally stored on theinitial device. For example, the request may be received by the user inthe application 231. The user may also respond to the request by usingthe application 231.

In operation 525, the server 200 receives permission to access thecontact list 241. For example, the server 200 may receive permission toaccess the contact list 241 from the application 231 on the initialdevice.

In operation 530, the server 200 stores the contact list in the memory.

In operation 535, the server 200 synchronizes the contact list stored inthe memory with the contact list locally stored on the initial device.For example, the server 200 may periodically update the contact liststored in the memory by checking for changes made to the contact listlocally stored on the initial device. The initial device in FIG. 5 canalso be the inaccessible device in FIGS. 4, 6, and 7. For instance,while the initial device was originally operable by the user, the devicecan later become inaccessible for numerous reasons, such as a crackedphone screen or defective home button.

Although FIG. 5 illustrates an example process 500 for synchronizing acontact list on a phone that is accessible according to embodiments ofthe present disclosure, various changes could be made to FIG. 5. Forexample, while shown as a series of steps, various steps in each figurecould overlap, occur in parallel, occur in a different order, or occurmultiple times.

FIG. 6 illustrates an example process 600 for accessing a contact list241 on a phone that is inaccessible according to embodiments of thepresent disclosure. For example, the process 600 depicted in FIG. 6 maybe performed by the electronic device 106-114 in FIG. 1 or the server200 in FIG. 2.

In operation 605, the server 200 receives, from an unknown device 406,an access identifier corresponding to an inaccessible device and acontact identifier associated with contact information stored in acontact list in a memory. The access identifier 244 and the contactidentifier 247 can be received by the server 200 over a voice connectionfrom the unknown device 406. For example, the user may call the server200 from the unknown device 406 (i.e., a smartphone) and verbally speakthe access identifier 244 or the contact identifier 247. The accessidentifier 244 can also be a numeric PIN entered by a user on theinitial device. The voice connection includes campus calls, local calls,domestic long-distance calls, international calls, toll free calls,directory assistance calls, digital calls, and any other appropriatetype of telephone call. The server can also be configured to receive,from an unknown device over a voice connection, an access identifiercorresponding to the inaccessible device and a contact identifier 247associated with a contact profile 270 of the plurality of contactprofiles.

In operation 610, the server 200 authorizes, by comparing the receivedaccess identifier 244 against a stored access identifier, that thereceived access identifier 244 corresponds to the inaccessible device404. The server 200 can also authenticate the user using the accessidentifier 244. The access identifier 244 can be a specific extension,an alphanumeric code, a user name and password, etc. The accessidentifier 244 provides the ability to identify the specific usercorresponding to a stored user profile 242 whose own electronic deviceassociated with the user profile 242 is inaccessible. The accessidentifier 244 can be a username 250, a password 260, or a combinationof both. In one embodiment, the username 250 is a phone number 252associated with the inaccessible device, and the password 260 is a PINcode 262 set up on the inaccessible device. The access identifier 244and the PIN code 262 may comprise a four-digit PIN. The stored accessidentifier 244 may also comprise a four-digit PIN. In one embodiment,the server 200 compares the received four-digit PIN against a four-digitPIN stored in the memory. The four-digit PIN may have been previouslystored in the memory by the server 200 when the user accessed theapplication 231. The server can also be configured to identify thecontact list based on matching the access identifier with theinaccessible device. The server can further determine a contact deviceof the contact profile 270 in the contact list corresponding to thecontact identifier 47. In one embodiment, the access identifier includesa username and a password. To identify the contact list, the processoris further configured to locate the contact list in the memoryassociated with the username, compare a stored password received withthe access identifier, determine the contact device of the contactprofile 270 when the stored password matches the received password, anddisconnect the unknown device when the stored password does not matchthe received password.

In operation 615, the server 200 connects the unknown device 406 with acontact device 408 via a voice connection, the contact device 408corresponding to the contact identifier 247. In some embodiments, thecontact device 408 receives a caller ID corresponding to theinaccessible device 404 when the apparatus connects the unknown device406 with the contact device 408 via a voice connection. For example, auser associated with the contact device 408, upon seeing the caller ID,may believe the call is coming directly from the inaccessible phone. Thecaller ID may state the call is coming from contact A (the phone numberassociated with the inaccessible phone) even though the call mayultimately be coming from the unknown device 406 (via the apparatus).The server can also be configured to connect, over the voice connection,the unknown device to the contact device corresponding to the contact.In one embodiment, a phone number of the inaccessible device is used inplace of a phone number of the unknown device when connecting thecontact device. The processor can also be configured to verbally providea phone number for the contact device to the unknown device. Theprocessor can also be configured to confirm the contact identifier 247before connecting the unknown device to the contact device. Theprocessor can also be configured to provide an alternative contactidentifier when unable to determine the contact profile 270corresponding to the contact identifier 247.

In one embodiment, the server 200 periodically sends a phone call or atext message, to a contact device 408 associated with the contactidentifier 247, until the contact device 408 responds to the phone callor the text message. For example, the server 200 can attempt to contacta specific contact, a group of contacts, or the entire contact list 241based on a user specification until one or more contacts answers thecall or responds to a text message. The user can verbally give commandsor give text commands. The communication can include phone calls, textmessages, emails, or other forms of contact. The server 200 can be setto continuously attempt to reach contacts for a specified amount oftime, until a call is ended, a message is closed or otherwise indicatedas completed, etc. The server 200 may periodically send a phone call ortext message based on time (i.e., send a phone call every fifteenminutes) or some other factor.

In another embodiment, the server 200 patches the unknown device 406into a group call when the contact device 408 answers the phone call orthe text message. For example, the user can have the calls or messagessent to the contact list 241 appear as if they were sent directly fromthe inaccessible device 404. The server 200 also can providefunctionality to remain calling other contacts and patching them into agroup conversation as they are answering the call or responding tomessages. The group call may include three or more electronic devices,or two electronic devices with a third electronic device attempting toconnect (i.e., in the process of forming a three-way call).

Although FIG. 6 illustrates an example process 600 for accessing acontact list 241 on a phone that is inaccessible according toembodiments of the present disclosure, various changes could be made toFIG. 6. For example, while shown as a series of steps, various steps ineach figure could overlap, occur in parallel, occur in a differentorder, or occur multiple times.

FIG. 7 illustrates an example process 700 for accessing a contact list241 on a phone that is inaccessible according to embodiments of thepresent disclosure. For example, the process 700 depicted in FIG. 7 maybe performed by the electronic device 106-114 in FIG. 1 or the server200 in FIG. 2.

In operation 705, the server 200 receives a text message from an unknowndevice 406. For example, the text message may contain the user's firstand last name followed by a short statement requesting the server tocall an individual.

In operation 710, the server 200 analyzes the text message to identifyan access identifier 244. For example, the server 200 can analyze thetext message and identify the user's first and last name as an accessidentifier 244.

In operation 715, the server 200 gives the unknown device 406 remoteaccess to the inaccessible device 404. For example, the user's phone isinaccessible and the user needs to get in touch with someone in anon-emergency situation or emergency situation. If the user is using apay phone or another phone, the inaccessible phone may not be availablefor an extended period of time and a contact is needed to get ahold ofas soon as possible. In one example, the server 200 can be configured tosend the unknown device 406 a hyperlink that leads the user to anapplication. Using the application, the user can remotely access theinaccessible device 404 from the unknown device 406 (i.e., remotelyaccessing the inaccessible device 404 from a separate smartphone orcomputer).

In one embodiment, the server 200 encrypts the contact list 241 toprevent the apparatus from storing the contact list 241 and contactinformation 246 associated with the contact list 241 in the memory 230.In one embodiment, while the server 200 allows the user remote access tothe inaccessible device 404, the server simultaneously encrypts all ofthe user's actions to prevent the server 200 from recording any of theuser's actions. The encryption of the user's actions benefits the userbecause it provides privacy. Many current devices actively trace auser's actions and search history (known as metadata). Metadata isfrequently sold to third parties without the user being aware. Byencrypting the user's actions, the server 200 is unable to trace theuser's metadata and thus cannot sell this metadata to a third party. Theuser may not even be aware that the server 200 is actively encryptingthe user's actions.

Although FIG. 7 illustrates an example process 700 for accessing acontact list 241 on a phone that is inaccessible according toembodiments of the present disclosure, various changes could be made toFIG. 7. For example, while shown as a series of steps, various steps ineach figure could overlap, occur in parallel, occur in a differentorder, or occur multiple times.

In some embodiments, various functions described in this patent documentare implemented or supported by a computer program that is formed fromcomputer readable program code and that is embodied in a computerreadable medium. The phrase “computer readable program code” includesany type of computer code, including source code, object code, andexecutable code. The phrase “computer readable medium” includes any typeof medium capable of being accessed by a computer, such as read onlymemory (ROM), random access memory (RAM), a hard disk drive, a compactdisc (CD), a digital video disc (DVD), or any other type of memory. A“non-transitory” computer readable medium excludes wired, wireless,optical, or other communication links that transport transitoryelectrical or other signals. A non-transitory computer readable mediumincludes media where data can be permanently stored and media where datacan be stored and later overwritten, such as a rewritable optical discor an erasable memory device.

None of the description in this application should be read as implyingthat any particular element, step, or function is an essential elementthat trust be included in the claim scope. The scope of patented subjectmatter is defined only by the claims. Moreover, none of the claims isintended to invoke 35 U.S.C. § 112(f) unless the exact words “means for”are followed by a participle.

What is claimed is:
 1. An apparatus, comprising: a memory configured tostore a plurality of contact lists; and a processor coupled to thememory, the processor configured to: receive, from an unknown device, anaccess identifier corresponding to an inaccessible device and a groupidentifier associated with a group profile; identify a contact listcorresponding to the inaccessible device from the plurality of contactlists based on the access identifier; determine a plurality of contactdevices each related to a different user in a group in the contact listcorresponding to the group identifier; initiate communication with theplurality of contact devices for the different users in the group untila contact device is successfully contacted, wherein a phone number ofthe inaccessible device is used in place of a phone number of theunknown device when initiating communication with the plurality ofcontact devices; and connect the unknown device to the contact devicethat is successfully contacted.
 2. The apparatus of claim 1, wherein:the access identifier includes a username and a password, and toidentify the contact list, the processor is further configured to:locate the contact list in the memory associated with the username,compare a stored password to the password included with the accessidentifier, determine the plurality of contact devices when the storedpassword matches the password included with the access identifier, anddisconnect the unknown device when the stored password does not matchthe password included with the access identifier.
 3. The apparatus ofclaim 2, wherein: the username is a phone number associated with theinaccessible device, and the password is a PIN code set up on theinaccessible device.
 4. The apparatus of claim 1, wherein: thecommunication initiated with the plurality of contact devices is a phonecall, and a connection between the unknown device and the contact deviceis a phone call.
 5. The apparatus of claim 1, wherein: the communicationinitiated with the plurality of contact devices is a text message, and aconnection between the unknown device and the contact device is a textchat.
 6. The apparatus of claim 1, wherein, when a second contact deviceis contacted, connect the second contact device in a group conversationwith the contact device and the unknown device.
 7. The apparatus ofclaim 1, wherein to initiate communication occurs simultaneously withthe different users in the group.
 8. A method for an apparatusincorporating a memory and a processor, the memory configured to store aplurality of contact lists and the processor coupled to the memory, themethod comprising: receiving, from an unknown device, an accessidentifier corresponding to an inaccessible device and a groupidentifier associated with a group profile; identifying a contact listcorresponding to the inaccessible device from the plurality of contactlists based on the access identifier; determining a plurality of contactdevices each related to a different user in a group in the contact listcorresponding to the group identifier; initiating communication with theplurality of contact devices for the different users in the group untila contact device is successfully contacted, wherein a phone number ofthe inaccessible device is used in place of a phone number of theunknown device when initiating communication with the plurality ofcontact devices; and connecting the unknown device to the contact devicethat is successfully contacted.
 9. The method of claim 8, wherein: theaccess identifier includes a username and a password, identifying thecontact list further comprises: locating the contact list in the memoryassociated with the username, comparing a stored password to thepassword included with the access identifier, determining the pluralityof contact devices when the stored password matches the passwordincluded with the access identifier, and disconnecting the unknowndevice when the stored password does not match the password includedwith the access identifier.
 10. The method of claim 9, wherein: theusername is a phone number associated with the inaccessible device, andthe password is a PIN code set up on the inaccessible device.
 11. Themethod of claim 8, wherein: the communication initiated with theplurality of contact devices is a phone call, and a connection betweenthe unknown device and the contact device is a phone call.
 12. Themethod of claim 8, wherein: the communication initiated with theplurality of contact devices is a text message, and a connection betweenthe unknown device and the contact device is a text chat.
 13. The methodof claim 8, wherein, when a second contact device is contacted, connectthe second contact device in a group conversation with the contactdevice and the unknown device.
 14. The method of claim 8, whereininitiating communication occurs simultaneously with the different usersin the group.
 15. A non-transitory computer-readable medium storinginstructions that, when executed, causes a processor to: receive, froman unknown device, an access identifier corresponding to an inaccessibledevice and a group identifier associated with a group profile; identifya contact list corresponding to the inaccessible device from a pluralityof contact lists based on the access identifier; determine a pluralityof contact devices each related to a different user in a group in thecontact list corresponding to the group identifier; initiatecommunication with the plurality of contact devices for the differentusers in the group until a contact device is successfully contacted,wherein a phone number of the inaccessible device is used in place of aphone number of the unknown device when initiating communication withthe plurality of contact devices; and connect the unknown device to thecontact device that is successfully contacted.
 16. The non-transitorycomputer-readable medium of claim 15, wherein: the access identifierincludes a username and a password, to identify the contact list, theinstructions further cause the processor to: locate the contact list ina memory associated with the username, compare a stored password to thepassword included with the access identifier, determine the plurality ofcontact devices when the stored password matches the password includedwith the access identifier, and disconnect the unknown device when thestored password does not match the password included with the accessidentifier.
 17. The non-transitory computer-readable medium of claim 16,wherein: the username is a phone number associated with the inaccessibledevice, and the password is a PIN code set up on the inaccessibledevice.
 18. The non-transitory computer-readable medium of claim 15,wherein: the communication initiated with the plurality of contactdevices is a phone call, and a connection between the unknown device andthe contact device is a phone call.
 19. The non-transitorycomputer-readable medium of claim 15, wherein: the communicationinitiated with the plurality of contact devices is a text message, and aconnection between the unknown device and the contact device is a textchat.
 20. The non-transitory computer-readable medium of claim 15,wherein, when a second contact device is contacted, connect the secondcontact device in a group conversation with the contact device and theunknown device.
 21. The non-transitory computer-readable medium of claim15, wherein to initiate communication occurs simultaneously with thedifferent users in the group.