此应用程序的某些内容目前无法使用。
如果这种情况持续存在,请联系我们反馈与联系
1. (WO2019027736) HEADER MODIFICATION FOR SUPPLEMENTARY SERVICES
注:相关文本通过自动光符识别流程生成。凡涉及法律问题,请以 PDF 版本为准

CLAIMS

What is claimed is:

1. A system comprising:

one or more processors;

memory; and

a plurality of programming instructions stored on the memory and executable by the one or more processors to perform operations comprising:

receiving, from a first user device operated by a user, a policy associated with routing one or more communications addressed to a first identifier to a second identifier, the policy indicating a period of time for implementing the routing;

receiving, at a time within the period of time, a communication from a second user device, the communication being associated with a header identifying the first identifier as an intended recipient of the communication; replacing, based at least in part on the policy, the first identifier in the header with the second identifier;

adding, based at least in part on the policy, data to the header indicating at least a portion of the policy; and

transmitting, based at least in part on the header, the communication to an entity associated with the second identifier.

2. The system as claim 1 recites, wherein the entity is a voice mailbox.

3. The system as claim 1 recites, wherein the entity is a third user device.

4. The system as claim 1 recites, wherein the first identifier corresponds to a first line associated with the first user device and the second identifier corresponds to a second line associated with the first user device.

5. A system comprising:

one or more processors;

memory; and

a plurality of programming instructions stored on the memory and executable by the one or more processors to perform operations comprising:

receiving, from a first user device operated by a user, a policy associated with handling one or more communications directed to a first identifier;

receiving a communication from a second user device, the communication being associated with a header identifying the first identifier as the intended recipient of the communication;

updating, based at least in part on the policy, the header to include data indicating at least a portion of the policy; and

transmitting the communication based at least in part on the header.

6. The system as claim 5 recites, wherein the policy provides one or more instructions for re-routing the one or more communications directed to the first identifier to a second identifier associated with a different user device than the first identifier.

7. The system as claim 5 recites, wherein:

the first user device is associated with multiple lines;

the first identifier corresponds to a first line of the multiple lines; and the policy provides one or more instructions for re-routing the one or more communications in which the first identifier is the intended recipient to a second identifier corresponding to a second line of the multiple lines.

8. The system as claim 5 recites, wherein:

the policy provides one or more instructions for delaying transmission of the one or more communications;

the policy is associated with a duration; and

the operations further comprise:

determining an expiration of at least one of the duration or the policy; and

transmitting the communication to an entity corresponding to the first identifier based at least in part on the expiration of the at least one of the duration or the policy.

9. The system as claim 5 recites, wherein the policy is associated with a duration, the duration based at least in part on a specified start time for starting implementation of the policy and a specified end time for ending implementation of the policy.

10. The system as claim 5 recites, wherein updating the header further comprises replacing the first identifier with a second identifier corresponding to an alternate line or an alternate device identified in the policy.

11. The system as claim 5 recites, the operations further comprising:

performing a look-up operation of a database to determine whether a profile associated with the first identifier is associated with a particular policy;

determining that the profile is associated with the policy;

determining that the policy is valid; and

updating the header responsive to determining that the policy is valid.

12. The system as claim 11 recites, wherein determining that the policy is valid is based at least in part on one or more constraints associated with the policy, the one or more constraints including a duration constraint, a geographical location constraint, or a roaming constraint.

13. A computer-implemented method comprising:

receiving, from a first user device, a policy associated with handling one or more communications directed to a first identifier;

receiving a communication from a second user device, the communication being associated with a header identifying the first identifier as an intended recipient of the communication;

determining that the policy is to be applied to the communication;

updating the header to include data indicating at least a portion of the policy; and

transmitting the communication based at least in part on the header.

14. The computer-implemented method as claim 13 recites, further comprising: receiving, from the first user device, a request to initiate a policy;

sending, to the first user device, one or more policy options; and

receiving the policy responsive to sending the one or more policy options, the policy corresponding to at least one policy option of the one or more policy options.

15. The computer-implemented method as claim 13 recites, further comprising, based at least in part on receiving the policy, sending an authentication notification to the first user device, the authentication notification confirming receipt of the policy.

16. The computer-implemented method as claim 13 recites, wherein the policy provides one or more instructions for routing the one or more communications to a second identifier instead of the first identifier.

17. The computer-implemented method as claim 16 recites, wherein:

the first identifier corresponds to a line associated with the first user device; and the second identifier corresponds to at least one of a voice mailbox, a third user device, or an alternate line associated with the first user device.

18. The computer-implemented method as claim 13 recites, wherein the policy is associated with a duration constraint, the duration constraint corresponding to a period of time for implementing the policy.

19. The computer-implemented method as claim 18 recites, wherein the policy provides one or more instructions for delaying transmission of the one or more communications until expiration of at least one of the period of time or the policy.

20. The computer-implemented method as claim 18 recites, wherein the policy provides one or more instructions for re-routmg the one or more communications to a second identifier instead of the first identifier until expiration of at least one of the period of time or the policy.