Abstract: A communication terminal, server and a method for filtering incoming calls to a user. The server creates an extended contact list based on a social network formed by the user on a social networking site and the communication terminal obtains the extended contact list from the server. The user creates a plurality of lists and assigns a set of rules to the plurality of lists and the user classifies entries in the extended contact list into the plurality of lists using the communication terminal. On receiving a call from a calling user the communication terminal identifies a list from the plurality of lists, to which the calling user belongs and on identifying the list, the communication terminal applies the rule associated with the list to the call. The extended contact list comprises of friends of the user and friends of the friends.
FORM 2
The Patent Act 1970
(39 of 1970)
&
The Patent Rules, 2005
COMPLETE SPECIFICATION
(SEE SECTION 10 AND RULE 13)
TITLE OF THE INVENTION
“SPAM CONTROL USING EXTENDED CONTACT LIST”
APPLICANTS:
Name Nationality Address
Alcatel Lucent France 54 rue de la Boétie, 75008 Paris, France
The following specification particularly describes and ascertains the nature of this invention and the manner in which it is to be performed:-
FIELD OF INVENTION
[001] This invention relates to SPAM control and more particularly, but not exclusively, to blocking unwanted calls in telecommunication networks.
BACKGROUND
[002] This section introduces aspects that may be helpful in facilitating a better understanding of the invention. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art.
[003] Spam is the abuse of communication systems, where unsolicited and unwanted approaches are made in an indiscriminate manner to users. The most widely recognized form of spam is unsolicited and unwanted messages received by users, where the messages may be in the form of emails or Short Messaging Service (SMS). Also, spam may include unwanted calls received by users from unknown callers. People who make SPAM calls could be telemarketers, opinion poll takers and so on.
[004] If the user receives a call from any number not stored in the contact list on his terminal, a name is not displayed. The user has the option of either answering the call or terminating the call. Thus, potential spam calls may be avoided by the user.
[005] Also, there might be calls from numbers which belong to acquaintances or friends of the user, but are not present in the contact list of the user, as, the contact list on the communication terminal can store only a limited number of entries. Thus, the contact list on the communication terminal can store only a subset of the contact numbers of the user’s acquaintances and friends. The user may also have friends listed on social networking sites but the contact numbers of the friends may not be stored on the contact list. Thus the called user may not be able to identify calls from known users whose numbers are not stored in the contact list. Also, the called user has no control over who can contact him at specific periods of time.
[006] Users may also avoid receiving spam calls from specific numbers by entering the numbers into a barred list and ensuring that calls from any number in the barred list does not reach them. However, only a limited number of entries may be entered into the barred list and also, the user may not know all the numbers from which spam calls could originate. This list exists at the end of the network operators, and hence the user needs to register for this list. Also, if any number needs to be added to the list, the user has to contact the network operator for the same. Similarly, if any number needs to be removed from the list, the user has to contact the network operator for the same.
[007] Users may also register their number in a do-not-call database. Once again, the user needs to register with his network operator to include his number in the do-not-call database. But, the presence of his number in the database does not ensure that the user does not receive any SPAM calls. The source of the SPAM call has to be identified as a source of SPAM calls; else calls from that number are not filtered, according to the database. So, a second database is required, where the people making SPAM calls are required to register their numbers. Hence, any number not present in the second database is free to make SPAM calls. Further, modifications are needed at the network operator level in the form of a filter to check if a call made from a number in the second database is to number present in the do-not-call database and blocking the call.
[008] This section introduces aspects that may be helpful in facilitating a better understanding of the invention. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art.
SUMMARY
[009] In view of the foregoing, an embodiment herein provides a method for filtering incoming calls in a communication terminal belonging to a user. A server creates an extended contact list based on a social network formed by the user on a social networking site and the communication terminal obtains the extended contact list from the server. The user creates a plurality of lists and assigns a set of rules to the plurality of lists. The user classifies entries in the extended contact list into the plurality of lists using the communication terminal. By default all numbers are white listed unless marked by the user as members of the grey list or members of the black list. All numbers which are friend’s of grey list member automatically become members of the grey list if not present in white list/black list at n+1 level. Black listed numbers are handpicked number present in user’s personal black list. This list cannot be viewed and list cannot be shared. On receiving a call from a calling user, the communication terminal identifies a list from the plurality of lists, to which the calling user belongs and on identifying the list, the communication terminal applies the rule associated with the list to the call. The communication terminal may be a smart phone and the extended contact list comprises of friends of the user and friends of the friends. The server has the login information of the user for the social networking site. If the calling user belongs to the grey list and the user is in an inactive mode, the communication terminal forwards the incoming call to voice mail box of the user. If the calling user belongs to the grey list and the user is in an active mode, the communication terminal accepts the call. If the calling user belongs to the white list, the communication terminal accepts the call and if the calling user belongs to the black list, the communication terminal rejects the incoming call. If the calling user is not present in the list and the user is in inactive mode, then the communication terminal forwards the incoming call to voice mail box of the user. If the calling user is not present in the list and the user is in an active mode, the communication terminal forwards the incoming call to the server. The server attempts to authenticate the calling user and on authenticating the calling user, If the calling user is not in any of white/grey/black list, then the call should be forwarded to the media server for accepting the passcode, irrespective of the mode of the user. On receiving the correct passcode, the terminal categorizes the user as white/grey/black or unknown user. The terminal then applies the rule depending upon the state of user. The media server instructs the communication terminal to accept the incoming call. The server rejects the incoming call if the server fails to authenticate the calling user. On receiving a call from a calling user, a check is made if the number of the calling user matches with the black list. If the calling number is found in the black list, the call is rejected. If the calling user is not found in the black list, the calling number is checked in the grey list. If the calling user is found in the grey list, then the appropriate action is taken. If the user is not found in the grey list, then the calling number is checked in the white list. If the user is found in the white list, then the appropriate action is taken.
[0010] In view of the foregoing, an embodiment herein provides a communication terminal, belonging to a user, filtering incoming calls. The communication terminal comprises atleast one means adapted for synchronizing an extended contact list with a server connected to a social networking site. The communication terminal enables the user to create a plurality of lists and assigns a set of rules to the plurality of lists. The communication terminal enables the user to classify entries in the extended contact list into the plurality of lists. On receiving a call from a calling user, the communication terminal identifies a list from the plurality of lists to which the calling user belongs. On identifying the list, a rule associated with the list is applied to the call. The communication terminal may be a smart phone.
[0011] In view of the foregoing, an embodiment herein provides a server connected to a social networking site for creating an extended contact list for a user of the social networking site. The server comprises atleast one means adapted for creating the extended contact list using a social network created by the user on the social networking site and for classifying the extended contact list on the basis of pre-defined rules. Classification is done on the terminal. User can add any number to black list/grey list from his terminal as and when required. The server comprises atleast one means adapted for creating the extended contact list using the social network created by the user on the social networking site, wherein the social network comprises of contacts of the user and contacts of the contacts.
[0012] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings.
BRIEF DESCRIPTION OF THE FIGURES
[0013] Some embodiments of apparatus and/or methods in accordance with embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings, in which:
[0014] Fig. 1 schematically shows the elements in a communication network, according to an embodiment herein;
[0015] Figure 2 schematically illustrates a multi level extended contact list, according to an embodiment herein;
[0016] Figure 3 illustrates a flowchart depicting a method to determine the rule associated with a calling number, according to an embodiment herein;
[0017] Figures 4 a and 4b illustrates a flowchart depicting a method to determine the rule assigned to a calling number when the user is in red mode, according to an embodiment herein;
[0018] Figures 5a and 5b illustrates a flowchart depicting a method to determine the rule assigned to a calling number when the user is in grey mode, according to an embodiment herein;
[0019] Figure 6 illustrates a flowchart depicting a method to determine the rule assigned to a calling number when the user is in white mode, according to an embodiment herein;
DESCRIPTION OF EMBODIMENTS
[0020] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[0021] The embodiments herein achieve a method for adaptively allowing a user to filter calls by using an extended contact list of friends. The extended contact list is obtained from the user’s friends list in the user’s communication terminal and from the user’s friends list in social networking sites. The extended contact list would be used to identify the calling users and the called user may then be able to recognize calls. The extended contact list also decreases the probability of genuine calls being terminated. Referring now to the drawings, and more particularly to FIGS. 1 through 6, where similar reference characters denote corresponding features consistently throughout the figures, there are shown embodiments.
[0022] Fig. 1 schematically shows the elements in a communication network, according to an embodiment herein. A communication Terminal (CT) 101 is connected to a mobile network 102. The communication terminal 101 may be a mobile phone or a smart phone. The mobile network 102 is connected to social networking sites 103. The mobile network 102 may also be connected to the social networking sites 103 through an application server 104. The social networking sites 103 may be Orkut, Facebook, Linkedln or any other social networking site 103. The list of contact numbers in the user’s contact list on the social networking site 103 is obtained, stored and may be classified as level 1 in an extended contact list. The contact numbers of the friends, on the contact list of the user’s friends may also be obtained, stored and classified as level 2 in the extended contact list. Also, the friends on the contact list of the level 2 contacts may also be obtained, stored in the extended contact list and the list of contact numbers may be classified as level 3. The user may also determine the level into which each number is to be listed or the user may specify rules to classify the level of the contact numbers. For example, a user may want to restrict his contact list to only his contacts and the contacts of his contacts, so the user can specify that the extended contact list only extends up to level 2. The social networking site 103 is configured to continuously update the extended contact list to reflect changes in the user’s contact list. The application server 104 may also be configured to perform the above mentioned tasks. The communication terminal 101 synchronizes with the social networking site 103 through the mobile network 102 and transfers the extended contact list from the social networking site 103. The transfer may also take place using General packet radio service (GPRS). The user may further modify the extended contact list on the communication terminal 101. For example, the user may move some contacts from level 2 to level 1.
[0023] The contacts in the extended contact list may be further classified into a white list, a grey list or a black list. By default all the contacts will be classified as white list contacts unless the user classifies a particular contact as grey list contact or a black list contact. The user can modify the classification of a contact in the extended contact list using the communication terminal 101. For example, the user may move contacts in the extended contact list from the white list into the grey list. If a contact is in the white list, calls from the contact will be received by the user, irrespective of the current status of the user. If a contact is in the grey list, calls from the contact will be directed to the user’s voice mail box or will be received by the user, depending on the current status of the user. If a contact is present in the black list, calls from the contact will be rejected irrespective of the current status of the user. The current status of the user could be busy, at work, in a meeting and so on.
[0024] The communication terminal 101 may be configured to synchronize with the social networking site 103 periodically. The user may also synchronize the communication terminal 101 with the social networking site 103 manually. The communication terminal 101 may synchronize with the social networking site 103 on detecting any modification in the contact list present in the social networking site 103. The communication terminal 101 connects to the specific social networking site 103 as indicated by the user. For example, the user may indicate to the communication terminal 101 that the communication terminal needs to contact the social networking site 103 Facebook, as the user has an account in Facebook and would like to add contacts from Facebook to the extended contact list.
[0025] Figure 2 schematically illustrates a multi level extended contact list. The communication terminal 101 has an extended contact list 202 wherein the contact numbers of the user’s friends are stored. Each contact in the extended contact list 202 is assigned a unique passcode that can be used to identify the friend if the friend is calling the user from an unlisted number. The extended contact list 202 also stores the passcodes that have been assigned to the contacts. The Communication Terminal (CT) 101 synchronizes with the social networking site 103 and obtains the user’s contact list from the social networking site 103. The social networking site 103 maintains a list of friends of a user of the social networking site 103. The social networking site 103 may be configured to create a list comprising of contact details of friends and contact details of friends of friends for creating an extended contact list for the user. The communication terminal 101 may synchronize with the social networking site 103 periodically without any intervention by the user or the user may synchronize the communication terminal 101 with the social networking site 103 manually. Synchronizing the communication terminal 101 comprises, downloading the latest version of the extended contact list from the social networking site 103 by the communication terminal 101. The communication terminal 101 may be configured to download the extended contact list from the social networking site 103 at specific intervals, regardless of any changes in the social networking site 103. The communication terminal 101 may also be configured to compare the current version of the extended contact list present in the communication terminal 101 with the version existing on the social networking site 103. The communication terminal 101 downloads the extended contact list only in the case of changes being present in the extended contact list i.e. there is a difference between the current version of the extended contact list present in the communication terminal 101 with the version existing on the social networking site 103. The contact list of the user in the social networking site 103 is obtained and stored in the extended contact list 202. The extended contact list 202 may be stored in the inbuilt memory of the communication terminal 101. The extended contact list 202 may also be stored in memory present in an external memory slot present in the communication terminal 101. The unique passcode is assigned by the user to a specific contact after the contact details have been stored in the extended contact list 202. The user may then convey the passcode to the contact by SMS, e-mail or by any other communication means.
[0026] In an embodiment, the list of contact numbers obtained from the user’s contact list may be classified as level 1 and stored in the extended contact list 202. The friends of the user in turn have contact lists 203 wherein the contact numbers of their friends are stored. The contact numbers from the friend’s contact list 203 may be obtained and the contact numbers may then be classified as level 2. Also, the contact list 203 of the level 2 contacts may be accessed to obtain the contact numbers on the contact list 203 of the level 2 contacts. The contact numbers may then be stored in the extended contact list 203 and classified as level 3 contacts. The contact lists 203 of contacts in multiple levels may be accessed, stored in the extended contact list 202 and classified into multiple levels. For example, the contact list of contacts in level 2 may be obtained from the social networking site 103, stored in the extended contact list and classified as level 3. The user may decide the level into which a particular contact number has to be classified or the user may specify rules into which the contact number is to be classified. The user may also move a contact number from one level to another level using the communication terminal 101. The contact numbers in the extended contact list 202 may be classified into white list contact, grey list contact or black list contacts. By default all the contacts will be classified as white list contacts unless the user classifies a particular contact as grey list contact or a black list contact. The user can modify the classification of a contact in the extended contact list using the communication terminal 101. For example, if the user prefers a particular contact to be in the grey list, the user may move the contact number from any list to the grey list using the communication terminal 101. The classification of contact numbers may be done dynamically or the classification may also be done manually by the user. Each contact in the extended contact list 202 is then assigned a unique passcode that can be used to identify the friend if the friend is calling the user from an unlisted number.
[0027] Figure 3 illustrates a flowchart depicting a method to determine the rule associated with a calling number. The communication terminal 101 has an extended contact list 202 wherein the contact numbers of the user’s friends are stored. The communication terminal 101 synchronizes (301) with the social networking site 103 and obtains (302) the user’s extended contact list 202 from the social networking site 103, where the extended contact list 202 comprises contact details of friends and contact details of friends of friends and so on. The communication terminal 101 may synchronize (301) with the social networking site 103 periodically without any intervention by the user. The user may also synchronize (301) the communication terminal 101 with the social networking site 103 manually. The contact list of the user may be obtained, stored and classified as level 1 in the communication terminal 101. The friends of the user in turn have contact lists 203 wherein the contact numbers of their friends are stored. The contact numbers from the friend’s contact list 203 may also be obtained, stored and classified in the communication terminal 101. The contact numbers may be classified as level 2. Also, the contact list 203 of the level 2 contacts may be obtained, stored and classified in the communication terminal 101. The contact lists 203 of contacts in multiple levels may be accessed, stored in the extended contact list 202 and classified into multiple levels. The user may also decide the level into which a particular contact number has to be classified or the user may specify rules into which the contact number is to be classified. For example, the contacts of the users may be classified as level 1 and the friends of the level 1 contacts may be classified as level 2. The user may also move a contact number from one level to another level. For example, the user may move some contacts from level 2 to level 1. The contact list 202 present in the social networking site 103 may also reflect changes made by the user to the extended contact list 202 using the communication terminal 101. Contact numbers stored in the extended contact list 202 may also be classified as white list contact, grey list contact or a black list contact. By default all the contacts will be classified as whiltelist contacts unless the user classifies a particular contact as grey list contact or a black list contact. The user can modify the classification of a contact in the extended contact list using the communication terminal 101. The classification of contact numbers may be done dynamically by the social networking site 103 or manually by the user. The social networking site 103 may also check user preferences to classify contacts based on user preferences. For example, at a later stage, the user may prefer to change the classification of a black list number to grey list.
[0028] The extended contact list 202 contains a list of all contacts classified into different levels and/or different lists. The user may also specify (303) different modes during different periods of time. The modes may be one of Red mode, Grey mode or White mode. The user may allow contacts from different classifications to communicate with the user at specific modes. For example, in Red mode, the user may allow contacts from only the white list to communicate with the user and in Grey mode the user may allow contacts from white list and grey list to communicate with the user. After obtaining (302) the extended contact list 202, the classification of the contacts may be determined (303). For example, a contact may be classified into the grey list. Using the classification of the calling user and the mode of the user, the rule associated with the calling number may be determined (305). After determining (305) the rule associated with the calling number, the rule could then be applied (306) to the calling number. The various actions in the method may be performed in the order presented, in a different order, or simultaneously. Further, in some embodiments, some actions listed in Figure 3 may be omitted. Calling number should be compared with black list numbers first then grey list numbers and then white list numbers.
[0029] Figures 4a and 4b illustrate a flowchart depicting a method to determine the rule assigned to a calling number when the user is in red mode. The extended contact list 202 is used to determine (401) the classification of the calling user. If the user is in (402) Red mode and it is determined (403) that the calling user is classified under black list, the call may be terminated (407). If the user is in (402) Red mode and it is determined (404) that the calling user is classified under grey list, the message from the calling user may be stored (406) as a voice mail. The call may then be terminated (407). If the calling user is classified (408) under white list the call would proceed (405) with the users communicating with each other. If the call is from an unknown user, the call would be redirected (409) to the mobile network 102 server. The mobile network 102 server then prompts the calling user to authenticate the session. If the calling user authenticates (4010) the session by entering the correct passcode, the calling user would be identified at the communication terminal 101. The extended contact list 202 is then used to determine (4011) the classification of the calling user. If it is determined (4012) that the calling user is classified under black list, the call may be terminated (4016). If it is determined (4013) that the calling user is classified under grey list, the message from the calling user may be stored (4014) as a voice mail. The call may then be terminated (4016). The various actions in the method may be performed in the order presented, in a different order, or simultaneously. Further, in some embodiments, some actions listed in Figures 4a and 4b may be omitted.
[0030] Figures 5a and 5b illustrates a flowchart depicting a method to determine the rule assigned to a calling number when the user is in grey mode. The extended contact list 202 is used to determine (501) the classification of the calling number. If the user is in (502) Grey mode and it is determined (503) that the calling user is classified under black list, the call may be terminated (506). If the user is in (502) Grey mode and it is determined (504) that the calling user is classified under grey list, the call would proceed (505) with the user communicating with the calling user. If it is determined (507) that the calling user is classified under white list, the call would proceed (505) with the users communicating with each other. If the call is from an unknown user, the call would be redirected (508) to the mobile network 102 server. The mobile network 102 server prompts the calling user to authenticate the session. If the calling user authenticates (508) the session by entering the correct passcode, the calling user would be identified at the communication terminal 101. The extended contact list 202 is then used to determine (5010) the classification of the calling user. If it is determined (5011) that the calling user is classified under black list, the call may be terminated (5013). If the calling user has entered the correct passcode and the calling user is not listed under black list then the calling user will be classified under grey list or white list and the call may proceed (5014) with the users communicating with each other. If the calling user does not enter the correct passcode and authenticate the session, the message from the calling user may be stored (5012) as a voice mail. The call would then be terminated (5013). The various actions in the method may be performed in the order presented, in a different order, or simultaneously. Further, in some embodiments, some actions listed in Figures 5a and 5b may be omitted.
[0031] Figure 6 illustrates a flowchart depicting a method to determine the rule assigned to a calling number when the user is in white mode. The extended contact list 202 is used to determine (601) the classification of the calling number. If the user is in (602) white mode, then the user may answer all incoming calls. The call would then proceed with the user communicating with the calling user. The various actions in the method may be performed in the order presented, in a different order, or simultaneously. Further, in some embodiments, some actions listed in Figure 6 may be omitted.
[0032] The description and drawings merely illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.
[0033] It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the invention. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
CLAIMS
What is claimed is:
1. A method for filtering of incoming calls in a communication terminal belonging to a user, said method comprising steps of
creating an extended contact list based on a social network formed by said user on a social networking site;
said communication terminal obtaining said extended contact list from said social networking site;
said user classifying entries in said extended contact list into a plurality of lists using said communication terminal;
said communication terminal, on receiving a call from a calling user, identifying a list from said plurality of lists to which said calling user belongs; and
said communication terminal, applying a rule associated with said list to said call.
2. The method, as claimed in claim 1, wherein said communication terminal is a smart phone.
3. The method, as claimed in claim 1, wherein said server has login information of said user for said social networking site.
4. The method, as claimed in claim 1, wherein a server creates said extended contact list from said social networking site.
5. The method, as claimed in claim 1, wherein said list is a white list, wherein if said calling user belongs to said white list, said communication terminal accepts said call.
6. The method, as claimed in claim 1, wherein said list is a grey list, wherein if said calling user belongs to said grey list and said user is in an inactive mode, said communication terminal forwards said incoming call to voice mail box of said user.
7. The method, as claimed in claim 1, wherein said list is a grey list, wherein if said calling user belongs to said grey list and said user is in an active mode, said communication terminal accepts said call.
8. The method, as claimed in claim 1, wherein said list is a black list, wherein if said calling user belongs to said black list, said communication terminal rejects said incoming call.
9. The method, as claimed in claim 1, wherein if said calling user is not present in said list and said user is in inactive mode, said communication terminal rejects said incoming call.
10. The method, as claimed in claim 1, wherein if said calling user is not present in said list and said user is in an active mode,
said communication terminal forwarding said incoming call to said server;
said server checking to authenticate said calling user;
said server instructing said communication terminal to accept said incoming call, on authenticating said calling user; and
said server rejecting said incoming call, if failing to authenticate said calling user.
11. A communication terminal, filtering incoming calls, said communication terminal comprising atleast one means adapted for
synchronizing an extended contact list with a social networking site;
enabling said user to classify entries in said extended contact list into a plurality of lists using said communication terminal;
identifying a list from said plurality of lists to which a calling user belongs, on receiving a call from said calling user; and
applying a rule associated with said list to said call.
12. The communication terminal, as claimed in claim 11, wherein said communication terminal is a smart phone.
13. A server connected to a social networking site for creating an extended contact list for a user of said social networking site, said server comprising atleast one means adapted for
creating said extended contact list using a social network created by said user on said social networking site; and
classifying said extended contact list into levels using pre-defined rules.
14. The server, as claimed in claim 13, wherein said server comprises atleast one means adapted for creating said extended contact list using said social network created by said user on said social networking site, wherein said social network comprises of contacts of said user and contacts of said contacts.
Dated this 24th June 2009
Dr. Kalyan Chakravarthy
Patent Agent
ABSTRACT
A communication terminal, server and a method for filtering incoming calls to a user. The server creates an extended contact list based on a social network formed by the user on a social networking site and the communication terminal obtains the extended contact list from the server. The user creates a plurality of lists and assigns a set of rules to the plurality of lists and the user classifies entries in the extended contact list into the plurality of lists using the communication terminal. On receiving a call from a calling user the communication terminal identifies a list from the plurality of lists, to which the calling user belongs and on identifying the list, the communication terminal applies the rule associated with the list to the call. The extended contact list comprises of friends of the user and friends of the friends.
| # | Name | Date |
|---|---|---|
| 1 | 1496-CHE-2009 FORM-13 31-12-2010.pdf | 2010-12-31 |
| 1 | 1496-CHE-2009-AbandonedLetter.pdf | 2019-08-21 |
| 2 | 1496-che-2009 form-13. 31-12-2010.pdf | 2010-12-31 |
| 2 | 1496-CHE-2009-FER.pdf | 2019-02-12 |
| 3 | Drawings.pdf | 2011-09-03 |
| 3 | Power of Authority.pdf | 2011-09-03 |
| 4 | Form-1.pdf | 2011-09-03 |
| 4 | Form-5.pdf | 2011-09-03 |
| 5 | Form-3.pdf | 2011-09-03 |
| 6 | Form-1.pdf | 2011-09-03 |
| 6 | Form-5.pdf | 2011-09-03 |
| 7 | Drawings.pdf | 2011-09-03 |
| 7 | Power of Authority.pdf | 2011-09-03 |
| 8 | 1496-che-2009 form-13. 31-12-2010.pdf | 2010-12-31 |
| 8 | 1496-CHE-2009-FER.pdf | 2019-02-12 |
| 9 | 1496-CHE-2009 FORM-13 31-12-2010.pdf | 2010-12-31 |
| 9 | 1496-CHE-2009-AbandonedLetter.pdf | 2019-08-21 |
| 1 | SEARCHSTRATEGYFOR1496_11-02-2019.pdf |