摘要 |
<p>One communications device (called the 'impersonating' device) (110) can selectively impersonate another communications device (called the 'impersonated' device) (100) by arranging the impersonating device (110) to take over and/or use the same network identification number (typically stored in an identification number (108) memory and used to control selection of incoming calls to which the device responds) normally associated with the impersonated device (100). As a result of impersonation, there is a hand-off between the devices, with the impersonated device (100) becoming dormant and the impersonating device (110) becoming active, such that calls normally received by the impersonated device (100) are received by the impersonating device (110), and such that calls originating in the impersonating device (110) get the identical network treatment as would be accorded to calls originated by the impersonated device (100), all of this without any need to adjust or update profiles stored in a network database. Impersonation can be triggered automatically, as by the physically proximity (102, 112) of one terminal device to the other, or manually, such as by pushing a button on one of the devices.</p> |