WO2001049013A2 - Method and apparatus for selective incoming call blocking based on calling line identification - Google Patents

Method and apparatus for selective incoming call blocking based on calling line identification Download PDF

Info

Publication number
WO2001049013A2
WO2001049013A2 PCT/US2000/035099 US0035099W WO0149013A2 WO 2001049013 A2 WO2001049013 A2 WO 2001049013A2 US 0035099 W US0035099 W US 0035099W WO 0149013 A2 WO0149013 A2 WO 0149013A2
Authority
WO
WIPO (PCT)
Prior art keywords
calling party
call
party
scp
message
Prior art date
Application number
PCT/US2000/035099
Other languages
French (fr)
Other versions
WO2001049013A3 (en
Inventor
Gilman R. Stevens
Original Assignee
Alcatel Usa Sourcing, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Usa Sourcing, L.P. filed Critical Alcatel Usa Sourcing, L.P.
Priority to AU22901/01A priority Critical patent/AU2290101A/en
Publication of WO2001049013A2 publication Critical patent/WO2001049013A2/en
Publication of WO2001049013A3 publication Critical patent/WO2001049013A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/22Automatic class or number identification arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13095PIN / Access code, authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13103Memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13141Hunting for free outlet, circuit or channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13176Common channel signaling, CCS7
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13256Call screening
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13345Intelligent networks, SCP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13377Recorded announcement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13546Intelligent Peripheral

Definitions

  • the present invention relates generally to communication networks and more particularly to subscriber features for telephone networks including intelligent networks (IN), signaling system no. 7 (SS7) networks and wireless networks.
  • intelligent networks I
  • SS7 signaling system no. 7
  • wireless networks wireless networks.
  • a service control point examines a call setup message to determine if the calling party is authorized to place a call to the called party if the called party is a Calling Party Name Based Filter feature subscriber. More specifically, the SCP examines a called party subscriber profile to determine that the called party is a subscriber of a calling party based message filter. Only those calling parties listed within the subscriber's profile are allowed to place calls to the subscriber in one embodiment of the invention. In an alternate embodiment of the invention, the calling party is allowed an option of paying a toll charge to complete the call. The toll is credited to the called party's account. Yet in another embodiment of the invention, the calling party is allowed to enter an access PIN (personal Id Number) to allow the call to be setup if the calling party phone is not listed on the list of authorized calling parties.
  • PIN personal Id Number
  • the SCP compares the identity of the calling party to the list within the subscriber profile to determine whether the call setup may be completed and the voice trunk may be routed to the called party telephone.
  • a subscriber profile contains a list of authorized calling parties by calling party name. Accordingly, either the SCP or the SSP convert the calling party number to a calling party name and then compare the calling party name to the list of names that are authorized to place calls to the called party.
  • the invention includes prompting, by way of an integrated voice response (IVR) system, the calling party to state his or her name if the calling party phone number does not translate into a calling party name that is on the authorized list. After the calling party states his name into the phone, the stated name is converted to text and then compared to the list of authorized calling parties. This allows authorized calling parties to place phone calls from phones other than their own to the called party subscriber.
  • IVR integrated voice response
  • Either the toll is charged to the phone number from which the call is being made or to a given number or a number associated with a calling party name that was given.
  • a calling party is asked to provide an Id, such as a pin number, to verify that the toll may be charged to the given calling party number or name.
  • a calling party is asked to list his or her home phone number and a PIN number. If the PIN number corresponds to a PIN number stored for the calling party phone number, then a specified toll amount is charged to the calling party phone.
  • the calling party is prompted to enter either a credit card number or a debit card number so that the calling party's financial phone account may be charged for the call.
  • the call setup is completed and the call is routed. Accordingly, with each of the described embodiments, telemarketing organizations will be effectively blocked from pandering and disturbing consumers unless they are willing to pay for the disturbance that they cause.
  • FIGURE 1 is a functional block diagram of a modern IN according to one embodiment of the present invention.
  • FIGURE 2 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention
  • FIGURE 3 is a flow chart of a preferred embodiment of a method of the invention for determining whether a calling party is authorized to place a call to a called party;
  • FIGURE 4 is a flow chart of a method for setting up a call according to an alternate preferred embodiment of the invention;
  • FIGURE 5 is a flow chart of an alternate embodiment of the invention for completing a call from a calling party to a called party; and
  • FIGURE 6 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention.
  • FIGURE 1 is a functional block diagram of a modern IN according to one embodiment of the present invention.
  • IN 100 is coupled to communicate with a calling party phone 104 and a called party telephone 108. More specifically, a signal switching point (SSP) 112 of IN 100 is coupled to communicate with calling party telephone 104 while SSP 116 is coupled to communicate with called party telephone 108.
  • SSP's are telephone switches (end offices or tandems) equipped with signaling system number 7 (SS7) capable software and terminating signaling links. SS7 switches generally originate, terminate or switch calls.
  • SSP 112 also is coupled to signal transfer point (STP) 120.
  • STP's are the packet switches of the SS7 network. They receive and route incoming signaling messages towards the proper destination and also perform specified routing.
  • STP 120 also is coupled to STP 124.
  • STP 124 also is coupled to SSP 116 that serves the called party telephone 108.
  • STP 120 also is coupled to communicate with signal control point (SCP) 128.
  • SCP's are database systems that provide information that is necessary for advanced call-processing capabilities and for providing specific user information such as user profiles as they relate to subscriber features.
  • SSP's commonly communicate with an SCP by way of STPs
  • the presence of the STP is largely transparent in many embodiments with respect to subscriber feature operation. Accordingly, with respect to the descriptions herein, the presence of the STP in the network will be assumed to be there even if not explicitly mentioned.
  • SSP 112 is connected to communicate with interactive voice response (IVR) system 132.
  • IVR system is a computer having voice recognition software capable of taking a voice message and converting it to text for analysis and also capable of playing messages in either a recorded human voice or in a synthesized computer generated voice. IVR systems are specifically designed to instruct and receive instructions through a telephone without requiring digit activation.
  • SCP 128 includes computer instructions that define the logic for blocking calls for those callers that are not listed in a list of authorized callers for the called party. SCP 128 also includes the subscriber profiles for each subscriber of the inventive call-blocking feature. More specifically, SCP 128 includes a processor 128A and a store 128B. Processor 128A executes computer program instructions stored in store 128B to perform and provide subscriber features that are created through the logic defined in the computer instructions of store 128B. Moreover, store 128B includes a memory for storing operational parameters including, by way of example, subscriber profiles defining the subscriber features to which an individual or organization has subscribed.
  • SSP 112 includes a processor 112A and a store 112B.
  • Processor 112A executes computer program instructions stored in store 112B to setup calls according to whether an SCP, for example, SCP 128, indicates that the call can be set up.
  • SCP for example, SCP 128, indicates that the call can be set up.
  • the SSP 112 also performs some varying degrees of decision making and control as a part of an implemented subscriber feature. By way of example, in one embodiment, it is SSP 112 that determines that a call an IVR message is to be played to the calling party for the purpose of informing it that the call cannot be completed or for the purpose of requesting information.
  • the instructions also define the logic and protocol for storing and for uploading toll charge information whenever a toll is to be charged to a calling party.
  • the functional processes are defined in the computer instructions stored within store 112B.
  • IVR 132 includes a processor 132A and a store 132B.
  • Processor 132A executes computer program instructions stored in store 132B to perform and provide messages to a called party and to interpret called party responses.
  • the logic for playing the appropriate message or for interpreting a response is defined in the computer instructions of store 132B.
  • store 132B includes a memory for storing operating instructions, including, by way of example, instructions for determining whether a pin entered by the calling party matches the calling party pin stored within the SCP.
  • IN 100 is operable to set up calls between calling parties, by way of example calling party 104, to called parties by way of example called party 108, that are subscribers of the inventive call blocking subscriber feature. More specifically, as a part of setting up a call, SCP 128 analyzes a list of subscribers of the disclosed call-blocking feature to determine that called party 108 is a subscriber. Once SCP 128 determines that called party 108 is a subscriber, it examines the calling party phone number of calling party 104 to determine whether the calling party is authorized to place a call to the called party.
  • the calling party number is examined to determine a calling party name.
  • SCP 128 includes a database that maps calling party numbers to calling party names. Once SCP 128 has determined the calling party name for calling party 104, it then compares that calling party name to the subscriber profile of called party 108 to determine if the calling party of calling party telephone 104 is authorized to place calls to called party 108. If calling party 104 is authorized to place a call, SCP 128 generates a signal to SSP 112 to inform it that the calling party is allowed to place the call to the called party. SSP 112, in turn, transmits data packets to SSP 116 to set up the call. Thereafter, the call is connected. On the other hand, if the calling party is not authorized to place calls to called party
  • SCP 128 sends the corresponding signaling to SSP 112 to inform it of the same.
  • SSP 112 prompts IVR 132 to generate a voice message to inform the calling party that the call cannot be routed.
  • IVR 132 prompts IVR 132 to generate a voice message to inform the calling party that the call cannot be routed.
  • FIGURE 2 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention.
  • the method of FIGURE 2 is a method performed within IN 100.
  • an IN 100 receives an indication that a calling party telephone is off hook, it receives and temporarily stores the digits that were dialed by the calling party and it determines the calling party number as well as the called party number (step 202).
  • an SSP by way of example, SSP 112 analyzes the dialed digits and forwards a packet (query) to an SCP to determine if the called party is a call block feature subscriber (step 204).
  • SSP 112 would forward a packet to SCP 128. Thereafter, the SCP that received the packet, e.g., SCP 128, determines called party is a subscriber of the call blocking subscriber feature of the present invention and, if so, whether the calling party is on an authorized list to call the called party (step 206).
  • SCP that received the packet
  • SCP 128 determines called party is a subscriber of the call blocking subscriber feature of the present invention and, if so, whether the calling party is on an authorized list to call the called party (step 206).
  • SSP 112 If the calling party is not authorized to place a call to the called party, SSP 112, in the described embodiment, prompts IVR 132 to play an IVR message to the calling party. The message is played to inform the calling party through SSP 112 that he or she is not authorized to make a call to the called party (step 208). Thereafter, SSP 112 disconnects the call (step 210). If the calling party is authorized to place the call, one the other hand, call setup is completed and the call is connected (step 212).
  • the SCP merely examines the calling party number and compares that to a calling party number within a subscriber profile for the called party.
  • the SCP converts the calling party number to a calling party name by looking up the calling party name in a table that maps calling party numbers to calling party names. The SCP then compares the calling party name associated with the calling party number to a list of calling party names that are authorized to call the called party. This embodiment is preferred because it creates other capabilities as will be described below.
  • the IVR prompts the calling party to leave a message after informing him that the call cannot be completed. If the calling party chooses to leave a message, IVR 132 stores the message in a voice mailbox for the called party.
  • the invention is adapted to only allow authorized calling parties to leave messages in the voice mailbox.
  • the invention herein may be used to restrict the delivery of text pages to called parties or to restrict the delivery of e-mail messages in those embodiments in which the IVR converts the message to text and then, perhaps by working with an intelligent peripheral, generates an e-mail message to the called party according to a subscriber profile.
  • FIGURE 3 is a flow chart of a preferred embodiment of a method of the invention for determining whether a calling party is authorized to place a call to a called party.
  • an SCP that serves a geographic area in which the calling party is located, by way of example, SCP 128 of FIGURE 1, analyzes the contents of a query generated by an SSP that identify the called party number. Thereafter, the SCP examines the numbers to determine if the called party is a subscriber of the inventive call block subscriber feature (step 302). After determining that the called party is a subscriber of the call block subscriber feature, the SCP determines the calling party name for the calling party number by looking at a table or database that maps calling party names with calling party numbers (step 304).
  • a store within the SCP is used to maintain a database that maps calling party names and numbers. Thereafter, SCP 128 examines a subscriber profile for the called party to determine if the calling party name is authorized to place a call to the called party (step 306).
  • the SCP 128 If the calling party is authorized to place the call, then the SCP 128 generates a response to the SSP that serves the calling party, e.g., SSP 112, to indicate that the call setup may be completed and that the call may be routed (step 308). If the calling party name is not authorized to place the call, then the SCP, e.g., SCP 128 informs the SSP, e.g., SSP 112 of the same. SSP 112, in turn, prompts IVR 132 to play a specified toll request message to the calling party 104 (step 310).
  • the IVR plays the message by way of the SSP to ask the calling party if he is willing to approve a toll charge to the calling party number for completing the call (step 312).
  • the call setup is completed and the call is connected to the called party phone (step 308). If the calling party does not authorized the charge, however, the call is dropped/blocked (step 314).
  • FIGURE 4 is a flow chart of a method for setting up a call according to an alternate preferred embodiment of the invention.
  • SCP by way of example, SCP 128, determines that the calling party is not on the list of authorized callers for the subscriber of the call block subscriber feature disclosed herein, it transmits a signal to an IVR, e.g., IVR 132, to play a specified message (step 400).
  • IVR 132 then plays a message to the calling party through the SSP that serves the calling party phone, e.g., SSP 112, to request an authorization number to which the call may be charged (step 404).
  • the IVR may request that the calling party provide a telephone number to which a toll may be charged for completing the call.
  • the IVR converts the voice response to text so that it may be analyzed and so that the corresponding account information may be ascertained (step 408).
  • IVR 132 prompts the calling party to state his or her access code or PIN number (step 412). As before, that PIN number is translated to text if it is given aurally. After the IVR has received both the phone number to which the toll is to be charged and a PIN or access number to verify that the calling party is authorized to charge calls to the given number, IVR 132 compares the received phone number and PIN to its internal records to determine validity (step 420). Alternatively, the SCP or the SSP may perform this comparison.
  • the call is completed and the charging information is stored for uploading at a later time.
  • the charge information is stored by the SSP, e.g., SSP 112 of FIGURE 1.
  • the SCP sends a signal to an intelligent peripheral, e.g., intelligent peripheral 136 of FIGURE 1, so that the corresponding calling party may be charged the proper toll.
  • the SCP stores the charge information itself.
  • the call is blocked and dropped (step 428). While the described embodiment is that of a system and method for charging the toll charge to a calling party number, the toll charge may also be charged to a bank or credit account.
  • the IVR includes computer instructions that prompt a calling party to enter all of the required information including name as it appears on the account, data of expiration of an issued card for the account, and account or card number. As before, the IVR converts the calling party responses where they can be examined for validity and stored for charging purposes. For this embodiment, the information is preferably transmitted to an external intelligent node.
  • the charged tolls are credit to the account of the called party subscriber less, perhaps, a handling charge or Telephone Company fee.
  • FIGURE 5 is a flow chart of an alternate embodiment of the invention for completing a call from a calling party to a called party.
  • an SCP that serves a geographic area in which the calling party is located, by way of example, SCP 128 of FIGURE 1, analyzes the contents of a query generated by an SSP that identify the called party number (step 500). Thereafter, the SCP examines the numbers to determine if the called party is a subscriber of the inventive call block subscriber feature (step 502).
  • the SCP determines the calling party name for the calling party number by looking at a table or database that maps calling party names with calling party numbers (step 504).
  • a store within the SCP by way of example, store 128B of FIGURE 1, is used to maintain a database that maps calling party names and numbers.
  • SCP 128 examines a subscriber profile for the called party to determine if the calling party name is authorized to place a call to the called party (step 506).
  • the SCP 128 If the calling party is authorized to place the call, then the SCP 128 generates a response to the SSP that serves the calling party, e.g., SSP 112, to indicate that the call setup may be completed and that the call may be routed (step 508). If the calling party name is not authorized to place the call, then the SCP 128 informs the SSP, e.g., SSP 112 of the same. SSP 112, in turn, sends a request to IVR 132 to play a specified message to the calling party 104 to ask the calling party to state his or her name.
  • the invention included determining whether the stated calling party name is on the subscriber's list of authorized calling parties (step 512). If the stated calling party name is on the list of calling party names, then the call is completed (step 508). Otherwise, the call is dropped (step 514).
  • FIGURE 6 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention.
  • the method of FIGURE 6 is a method performed within IN 100.
  • an IN 100 receives an indication that a calling party telephone is off hook, it receives and temporarily stores the digits that were dialed by the calling party and it determines the calling party number as well as the called party number (step 602).
  • an SSP by way of example, SSP 112 of FIGURE 1, analyzes the dialed digits and forwards a packet (query) to an SCP to determine if the called party is a call block feature subscriber (step 604).
  • SSP 112 would forward a packet to SCP 128. Thereafter, the SCP that received the packet, e.g., SCP 128, determines whether the called party is a subscriber of the call blocking subscriber feature of the present invention and, if so, whether the calling party is on an authorized list to call the called party (step 606).
  • SCP that received the packet
  • SCP 128 determines whether the called party is a subscriber of the call blocking subscriber feature of the present invention and, if so, whether the calling party is on an authorized list to call the called party (step 606).
  • SSP 112 prompts IVR 132 to play an IVR message to the calling party to request an access pin code from the calling party (step 608).
  • the message is played to inform the calling party through SSP 112 that he or she is not authorized to make a call to the called party and that the calling party must enter a correct access pin (or authorization code) to gain access and to have the call set up completed.
  • the IVR converts the voice response to text so that it may be analyzed and so that the corresponding account information may be ascertained (step 610).
  • IVR 132 After the IVR has received the PIN number to verify that the calling party is authorized to place calls to the given number, IVR 132 compares the received PIN to its internal records to determine validity (step 612). Alternatively, the SCP or the SSP may perform this comparison.
  • the call setup is completed (step 616). If the pin is not correct, meaning that it does not correspond to a stored PIN entered by the registered owner of the calling party number, the call is blocked and dropped (step 614).
  • a code word or phrase is used in place of the pin number.
  • the calling party may enter the code word on the keypad (effectively the code word is still a pin but has a sequence of digits that can be remembered by a code word). Additionally, the calling party may merely state the code word or phrase to gain access. IVR 132, for example, would then convert the spoken code to text and compare it to internal records within the call block feature subscriber profile.
  • the inventive method and apparatus disclosed herein are particularly advantageous in that they provide a capability for truly filtering calls from unwanted parties. In the case of a telemarketer, the telemarketer, for one embodiment, would have to pay a toll to complete the call.
  • any combination of the described methods may be combined to create an inventive system that reduces the amount of unwanted calls.
  • the method of FIGURE 5 may be combined with the methods of FIGURES 3 and 4 wherein a calling party is allowed to specifically defined the account to which a toll is charged.

Abstract

A method and apparatus for routing a call from the calling party to a called party includes determining within an SCP whether the calling party is authorized to place calls to the called party as a part of setting up the call. In the described embodiment of the invention, the disclosed method is to be implemented as a subscriber feature. In one embodiment of the invention, the SCP merely examines the calling party number to determine whether it is authorized to make the call. In a preferred embodiment of the invention, the calling party number is first mapped to a calling party name and then the calling party name is compared to a list of calling party names that are authorized to make the call. This embodiment is advantageous in that it allows for calling parties to aurally state their name into a telephone so that the SCP, with the help of the IVR, may determine what the calling party name is. This is helpful for those circumstances where an authorized calling party seeks to place a call to the called party from a phone other than his or her own. The invention further includes, in some embodiments, giving the calling party an option to pay a toll to have the call routed for those circumstances in which the calling party is not authorized to place calls to the called party. In one embodiment of the invention, the calling party is asked whether a toll charge can be charged to the calling party. In another embodiment, the calling party is asked to provide an authorization PIN.

Description

METHOD AND APPARATUS FOR A CALLING NAME BASED FILTER
TECHNICAL FIELD
The present invention relates generally to communication networks and more particularly to subscriber features for telephone networks including intelligent networks (IN), signaling system no. 7 (SS7) networks and wireless networks.
SUMMARY OF THE INVENTION
Whenever a call is being placed to a called party, a service control point (SCP) examines a call setup message to determine if the calling party is authorized to place a call to the called party if the called party is a Calling Party Name Based Filter feature subscriber. More specifically, the SCP examines a called party subscriber profile to determine that the called party is a subscriber of a calling party based message filter. Only those calling parties listed within the subscriber's profile are allowed to place calls to the subscriber in one embodiment of the invention. In an alternate embodiment of the invention, the calling party is allowed an option of paying a toll charge to complete the call. The toll is credited to the called party's account. Yet in another embodiment of the invention, the calling party is allowed to enter an access PIN (personal Id Number) to allow the call to be setup if the calling party phone is not listed on the list of authorized calling parties.
In operation, the SCP compares the identity of the calling party to the list within the subscriber profile to determine whether the call setup may be completed and the voice trunk may be routed to the called party telephone. In the preferred embodiment of the invention, a subscriber profile contains a list of authorized calling parties by calling party name. Accordingly, either the SCP or the SSP convert the calling party number to a calling party name and then compare the calling party name to the list of names that are authorized to place calls to the called party.
In one embodiment of the invention, the invention includes prompting, by way of an integrated voice response (IVR) system, the calling party to state his or her name if the calling party phone number does not translate into a calling party name that is on the authorized list. After the calling party states his name into the phone, the stated name is converted to text and then compared to the list of authorized calling parties. This allows authorized calling parties to place phone calls from phones other than their own to the called party subscriber. In yet another embodiment of the invention, once the STP or SCP has determined that the calling party is not authorized to route a call to the called party, an IVR system is used to ask the calling party whether he or she wishes to pay a toll fee to complete the call. Either the toll is charged to the phone number from which the call is being made or to a given number or a number associated with a calling party name that was given. In either case in which a number or calling party name is given to which the toll is to be charged, a calling party is asked to provide an Id, such as a pin number, to verify that the toll may be charged to the given calling party number or name.
For example, in one described embodiment, a calling party is asked to list his or her home phone number and a PIN number. If the PIN number corresponds to a PIN number stored for the calling party phone number, then a specified toll amount is charged to the calling party phone. In an alternate embodiment of the invention, the calling party is prompted to enter either a credit card number or a debit card number so that the calling party's financial phone account may be charged for the call. Once the calling party correctly identifies a calling party phone number and PIN number or a valid debit card number or credit card number, the call setup is completed and the call is routed. Accordingly, with each of the described embodiments, telemarketing organizations will be effectively blocked from pandering and disturbing consumers unless they are willing to pay for the disturbance that they cause.
BRIEF DESCRIPTION OF THE DRAWINGS
FIGURE 1 is a functional block diagram of a modern IN according to one embodiment of the present invention;
FIGURE 2 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention;
FIGURE 3 is a flow chart of a preferred embodiment of a method of the invention for determining whether a calling party is authorized to place a call to a called party; FIGURE 4 is a flow chart of a method for setting up a call according to an alternate preferred embodiment of the invention; FIGURE 5 is a flow chart of an alternate embodiment of the invention for completing a call from a calling party to a called party; and
FIGURE 6 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention.
DETAILED DESCRIPTION OF THE DRAWINGS
FIGURE 1 is a functional block diagram of a modern IN according to one embodiment of the present invention. Referring now to FIGURE 1, IN 100 is coupled to communicate with a calling party phone 104 and a called party telephone 108. More specifically, a signal switching point (SSP) 112 of IN 100 is coupled to communicate with calling party telephone 104 while SSP 116 is coupled to communicate with called party telephone 108. SSP's are telephone switches (end offices or tandems) equipped with signaling system number 7 (SS7) capable software and terminating signaling links. SS7 switches generally originate, terminate or switch calls. SSP 112 also is coupled to signal transfer point (STP) 120. STP's are the packet switches of the SS7 network. They receive and route incoming signaling messages towards the proper destination and also perform specified routing. STP 120 also is coupled to STP 124. STP 124, in turn, also is coupled to SSP 116 that serves the called party telephone 108. STP 120 also is coupled to communicate with signal control point (SCP) 128. SCP's are database systems that provide information that is necessary for advanced call-processing capabilities and for providing specific user information such as user profiles as they relate to subscriber features.
While SSP's commonly communicate with an SCP by way of STPs, the presence of the STP is largely transparent in many embodiments with respect to subscriber feature operation. Accordingly, with respect to the descriptions herein, the presence of the STP in the network will be assumed to be there even if not explicitly mentioned.
Continuing to examine FIGURE 1, SSP 112 is connected to communicate with interactive voice response (IVR) system 132. An IVR system is a computer having voice recognition software capable of taking a voice message and converting it to text for analysis and also capable of playing messages in either a recorded human voice or in a synthesized computer generated voice. IVR systems are specifically designed to instruct and receive instructions through a telephone without requiring digit activation.
SCP 128 includes computer instructions that define the logic for blocking calls for those callers that are not listed in a list of authorized callers for the called party. SCP 128 also includes the subscriber profiles for each subscriber of the inventive call-blocking feature. More specifically, SCP 128 includes a processor 128A and a store 128B. Processor 128A executes computer program instructions stored in store 128B to perform and provide subscriber features that are created through the logic defined in the computer instructions of store 128B. Moreover, store 128B includes a memory for storing operational parameters including, by way of example, subscriber profiles defining the subscriber features to which an individual or organization has subscribed. The specific logic defined by the computer instructions within store 128B that are to be performed by processor 128 A are more specifically discussed in relation to the methods illustrated in FIGURES 2-6 that relate to the operation of the calling party filter subscriber feature. As is understood by those skilled in the art, an internal communication line or bus is used to couple the store 128B to processor 128 A to enable processor 128 A to determine and execute the computer instructions stored in store 128B.
SSP 112, as may be seen, includes a processor 112A and a store 112B. Processor 112A executes computer program instructions stored in store 112B to setup calls according to whether an SCP, for example, SCP 128, indicates that the call can be set up. In addition, according to the type of network and its protocols, the SSP 112 also performs some varying degrees of decision making and control as a part of an implemented subscriber feature. By way of example, in one embodiment, it is SSP 112 that determines that a call an IVR message is to be played to the calling party for the purpose of informing it that the call cannot be completed or for the purpose of requesting information. In another embodiment, the instructions also define the logic and protocol for storing and for uploading toll charge information whenever a toll is to be charged to a calling party. The functional processes are defined in the computer instructions stored within store 112B.
The specific logic defined by the computer instructions within store 112B that are to be performed by processor 112A are more specifically discussed in relation to the methods illustrated in FIGURES 2-6 that relate to the operation of the network to provide the calling party filter subscriber feature. As is understood by those skilled in the art, an internal communication line or bus is used to couple the store 112B to processor 112 A to enable processor 112A to determine and execute the computer instructions stored in store 112B. IVR 132 includes a processor 132A and a store 132B. Processor 132A executes computer program instructions stored in store 132B to perform and provide messages to a called party and to interpret called party responses. The logic for playing the appropriate message or for interpreting a response is defined in the computer instructions of store 132B. Moreover, store 132B includes a memory for storing operating instructions, including, by way of example, instructions for determining whether a pin entered by the calling party matches the calling party pin stored within the SCP.
The specific logic defined by the computer instructions within store 132B that are to be performed by processor 132A are more specifically discussed in relation to the methods illustrated in FIGURES 2-6 that relate to the operation of the calling party filter subscriber feature. As is understood by those skilled in the art, an internal communication line or bus is used to couple the store 132B to processor 132A to enable processor 132 A to determine and execute the computer instructions stored in store 132B.
In operation, IN 100 is operable to set up calls between calling parties, by way of example calling party 104, to called parties by way of example called party 108, that are subscribers of the inventive call blocking subscriber feature. More specifically, as a part of setting up a call, SCP 128 analyzes a list of subscribers of the disclosed call-blocking feature to determine that called party 108 is a subscriber. Once SCP 128 determines that called party 108 is a subscriber, it examines the calling party phone number of calling party 104 to determine whether the calling party is authorized to place a call to the called party.
In a preferred embodiment, the calling party number is examined to determine a calling party name. For example, SCP 128 includes a database that maps calling party numbers to calling party names. Once SCP 128 has determined the calling party name for calling party 104, it then compares that calling party name to the subscriber profile of called party 108 to determine if the calling party of calling party telephone 104 is authorized to place calls to called party 108. If calling party 104 is authorized to place a call, SCP 128 generates a signal to SSP 112 to inform it that the calling party is allowed to place the call to the called party. SSP 112, in turn, transmits data packets to SSP 116 to set up the call. Thereafter, the call is connected. On the other hand, if the calling party is not authorized to place calls to called party
108, then SCP 128 sends the corresponding signaling to SSP 112 to inform it of the same. SSP 112, in the described embodiment, prompts IVR 132 to generate a voice message to inform the calling party that the call cannot be routed. A more detailed explanation of the operation of IN 100 will follow in the discussion of the subsequent FIGURES herein. It is understood that there are a significant number of different types of telephone networks in which the distribution of logic varies from network to network. Thus, functions that are reserved for an SCP in one network may be reserved for the SSP or the STP in another network. Additionally, some functions, such as storing billing records may even be performed in an external intelligent peripheral such as intelligent peripheral 136 of FIGURE 1.
FIGURE 2 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention. In the described embodiment, the method of FIGURE 2 is a method performed within IN 100. First, after an IN 100 receives an indication that a calling party telephone is off hook, it receives and temporarily stores the digits that were dialed by the calling party and it determines the calling party number as well as the called party number (step 202). Thereafter, an SSP, by way of example, SSP 112, analyzes the dialed digits and forwards a packet (query) to an SCP to determine if the called party is a call block feature subscriber (step 204). For example, in FIGURE 1, SSP 112 would forward a packet to SCP 128. Thereafter, the SCP that received the packet, e.g., SCP 128, determines called party is a subscriber of the call blocking subscriber feature of the present invention and, if so, whether the calling party is on an authorized list to call the called party (step 206).
If the calling party is not authorized to place a call to the called party, SSP 112, in the described embodiment, prompts IVR 132 to play an IVR message to the calling party. The message is played to inform the calling party through SSP 112 that he or she is not authorized to make a call to the called party (step 208). Thereafter, SSP 112 disconnects the call (step 210). If the calling party is authorized to place the call, one the other hand, call setup is completed and the call is connected (step 212).
With respect to step 206, there are several embodiments of the invention that are possible. In one embodiment, the SCP merely examines the calling party number and compares that to a calling party number within a subscriber profile for the called party. In a preferred embodiment of the invention, the SCP converts the calling party number to a calling party name by looking up the calling party name in a table that maps calling party numbers to calling party names. The SCP then compares the calling party name associated with the calling party number to a list of calling party names that are authorized to call the called party. This embodiment is preferred because it creates other capabilities as will be described below.
With respect to steps 208 and 210, an in an alternate embodiment of the invention, the IVR prompts the calling party to leave a message after informing him that the call cannot be completed. If the calling party chooses to leave a message, IVR 132 stores the message in a voice mailbox for the called party.
For embodiments in which the called party number is merely the number of a voice mailbox, the invention is adapted to only allow authorized calling parties to leave messages in the voice mailbox. Similarly, the invention herein may be used to restrict the delivery of text pages to called parties or to restrict the delivery of e-mail messages in those embodiments in which the IVR converts the message to text and then, perhaps by working with an intelligent peripheral, generates an e-mail message to the called party according to a subscriber profile.
FIGURE 3 is a flow chart of a preferred embodiment of a method of the invention for determining whether a calling party is authorized to place a call to a called party. First, an SCP that serves a geographic area in which the calling party is located, by way of example, SCP 128 of FIGURE 1, analyzes the contents of a query generated by an SSP that identify the called party number. Thereafter, the SCP examines the numbers to determine if the called party is a subscriber of the inventive call block subscriber feature (step 302). After determining that the called party is a subscriber of the call block subscriber feature, the SCP determines the calling party name for the calling party number by looking at a table or database that maps calling party names with calling party numbers (step 304). Typically, a store within the SCP, by way of example, store 128B of FIGURE 1, is used to maintain a database that maps calling party names and numbers. Thereafter, SCP 128 examines a subscriber profile for the called party to determine if the calling party name is authorized to place a call to the called party (step 306).
If the calling party is authorized to place the call, then the SCP 128 generates a response to the SSP that serves the calling party, e.g., SSP 112, to indicate that the call setup may be completed and that the call may be routed (step 308). If the calling party name is not authorized to place the call, then the SCP, e.g., SCP 128 informs the SSP, e.g., SSP 112 of the same. SSP 112, in turn, prompts IVR 132 to play a specified toll request message to the calling party 104 (step 310). After receiving the request, the IVR plays the message by way of the SSP to ask the calling party if he is willing to approve a toll charge to the calling party number for completing the call (step 312). After the calling party states his approval, the call setup is completed and the call is connected to the called party phone (step 308). If the calling party does not authorized the charge, however, the call is dropped/blocked (step 314).
FIGURE 4 is a flow chart of a method for setting up a call according to an alternate preferred embodiment of the invention. If an SCP, by way of example, SCP 128, determines that the calling party is not on the list of authorized callers for the subscriber of the call block subscriber feature disclosed herein, it transmits a signal to an IVR, e.g., IVR 132, to play a specified message (step 400). IVR 132 then plays a message to the calling party through the SSP that serves the calling party phone, e.g., SSP 112, to request an authorization number to which the call may be charged (step 404). For example, the IVR may request that the calling party provide a telephone number to which a toll may be charged for completing the call. If the calling party provides an authorization number by voice, the IVR converts the voice response to text so that it may be analyzed and so that the corresponding account information may be ascertained (step 408).
Thereafter, IVR 132 prompts the calling party to state his or her access code or PIN number (step 412). As before, that PIN number is translated to text if it is given aurally. After the IVR has received both the phone number to which the toll is to be charged and a PIN or access number to verify that the calling party is authorized to charge calls to the given number, IVR 132 compares the received phone number and PIN to its internal records to determine validity (step 420). Alternatively, the SCP or the SSP may perform this comparison.
If the PIN number is correct, the call is completed and the charging information is stored for uploading at a later time. In the preferred embodiment, the charge information is stored by the SSP, e.g., SSP 112 of FIGURE 1. Alternatively, the SCP sends a signal to an intelligent peripheral, e.g., intelligent peripheral 136 of FIGURE 1, so that the corresponding calling party may be charged the proper toll. In yet another alternate embodiment of the invention, the SCP stores the charge information itself.
If the PIN or access code is not correct, meaning that it does not correspond to a stored PIN entered by the registered owner of the calling party number, the call is blocked and dropped (step 428). While the described embodiment is that of a system and method for charging the toll charge to a calling party number, the toll charge may also be charged to a bank or credit account. For the call to be so charged, the IVR includes computer instructions that prompt a calling party to enter all of the required information including name as it appears on the account, data of expiration of an issued card for the account, and account or card number. As before, the IVR converts the calling party responses where they can be examined for validity and stored for charging purposes. For this embodiment, the information is preferably transmitted to an external intelligent node.
In each of the embodiments for which a toll is charged, different system implementations may be had. In the preferred embodiment, the charged tolls are credit to the account of the called party subscriber less, perhaps, a handling charge or Telephone Company fee.
FIGURE 5 is a flow chart of an alternate embodiment of the invention for completing a call from a calling party to a called party. First, an SCP that serves a geographic area in which the calling party is located, by way of example, SCP 128 of FIGURE 1, analyzes the contents of a query generated by an SSP that identify the called party number (step 500). Thereafter, the SCP examines the numbers to determine if the called party is a subscriber of the inventive call block subscriber feature (step 502).
After determining that the called party is a subscriber of the call block subscriber feature, the SCP determines the calling party name for the calling party number by looking at a table or database that maps calling party names with calling party numbers (step 504). Typically, a store within the SCP, by way of example, store 128B of FIGURE 1, is used to maintain a database that maps calling party names and numbers. Thereafter, SCP 128 examines a subscriber profile for the called party to determine if the calling party name is authorized to place a call to the called party (step 506). If the calling party is authorized to place the call, then the SCP 128 generates a response to the SSP that serves the calling party, e.g., SSP 112, to indicate that the call setup may be completed and that the call may be routed (step 508). If the calling party name is not authorized to place the call, then the SCP 128 informs the SSP, e.g., SSP 112 of the same. SSP 112, in turn, sends a request to IVR 132 to play a specified message to the calling party 104 to ask the calling party to state his or her name.
After receiving the calling party name aurally and converting it to text, the invention included determining whether the stated calling party name is on the subscriber's list of authorized calling parties (step 512). If the stated calling party name is on the list of calling party names, then the call is completed (step 508). Otherwise, the call is dropped (step 514).
FIGURE 6 is a flowchart that illustrates a method for completing a call or for blocking a call according to one embodiment of the invention. In the described embodiment, the method of FIGURE 6 is a method performed within IN 100. First, after an IN 100 receives an indication that a calling party telephone is off hook, it receives and temporarily stores the digits that were dialed by the calling party and it determines the calling party number as well as the called party number (step 602). Thereafter, an SSP, by way of example, SSP 112 of FIGURE 1, analyzes the dialed digits and forwards a packet (query) to an SCP to determine if the called party is a call block feature subscriber (step 604). For example, in FIGURE 1, SSP 112 would forward a packet to SCP 128. Thereafter, the SCP that received the packet, e.g., SCP 128, determines whether the called party is a subscriber of the call blocking subscriber feature of the present invention and, if so, whether the calling party is on an authorized list to call the called party (step 606).
If the calling party is not authorized to place a call to the called party, SSP 112, in the described embodiment, prompts IVR 132 to play an IVR message to the calling party to request an access pin code from the calling party (step 608). The message is played to inform the calling party through SSP 112 that he or she is not authorized to make a call to the called party and that the calling party must enter a correct access pin (or authorization code) to gain access and to have the call set up completed.
If the calling party provides a pin number by voice, the IVR converts the voice response to text so that it may be analyzed and so that the corresponding account information may be ascertained (step 610).
After the IVR has received the PIN number to verify that the calling party is authorized to place calls to the given number, IVR 132 compares the received PIN to its internal records to determine validity (step 612). Alternatively, the SCP or the SSP may perform this comparison.
If the PIN number is correct, the call setup is completed (step 616). If the pin is not correct, meaning that it does not correspond to a stored PIN entered by the registered owner of the calling party number, the call is blocked and dropped (step 614).
In an alternate embodiment of the invention, a code word or phrase is used in place of the pin number. Thus, the calling party may enter the code word on the keypad (effectively the code word is still a pin but has a sequence of digits that can be remembered by a code word). Additionally, the calling party may merely state the code word or phrase to gain access. IVR 132, for example, would then convert the spoken code to text and compare it to internal records within the call block feature subscriber profile. The inventive method and apparatus disclosed herein are particularly advantageous in that they provide a capability for truly filtering calls from unwanted parties. In the case of a telemarketer, the telemarketer, for one embodiment, would have to pay a toll to complete the call. As many telemarketer calls that are made on a daily basis, some people may possibly become very wealthy should the telemarketers decide to pay the toll. If they should decide to not pay the toll, then the secondary advantage of this invention is still great. Mainly, the evening dinner may be enjoyed in peace. While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and detailed description. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the invention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present invention as defined by the claims. As may be seen, the described embodiments may be modified in many different ways without departing from the scope or teachings of the invention. For example, any combination of the described methods may be combined to create an inventive system that reduces the amount of unwanted calls. To illustrate, the method of FIGURE 5 may be combined with the methods of FIGURES 3 and 4 wherein a calling party is allowed to specifically defined the account to which a toll is charged.

Claims

WHAT IS CLAIMED IS:
1. A service control point (SCP), comprising: a processor; and a store coupled to the processor by an internal bus wherein the store includes computer instructions that define operational logic to determine if a calling party is an authorized caller for the called party according to a called party subscriber profile.
2. The SCP of claim 1, wherein the store includes computer instructions that define operational logic that causes the SCP to determine a calling party name based upon the calling party number.
3. The SCP of claim 2, wherein the computer instructions include logic to cause the processor to compare the calling party name to a list of names stored in a subscriber profile for the called party.
4. The SCP of claim 3, wherein the computer instructions define logic to prompt an external IVR to generate a message to the calling party to advise the calling party that it is not an authorized caller for the called party.
5. The SCP of claim 4, wherein the computer instructions further include logic that prompts the IVR to request approval to charge the calling party for the call.
6. The SCP of claim 4, wherein the computer instructions further include logic that prompts the calling party to state one of a calling party name or number for charging purposes.
7. The SCP of claim 6, wherein the computer instructions define logic to prompt the IVR to generate a message to the calling party to request one of a pin or an authorization code as verification that the toll charge may properly be charged to the stated number.
8. The SCP of claim 4, wherein the computer instructions further include logic that prompts the calling party to provide one of credit or bank account information to which the call is to be charged.
9. The SCP of claim 3, wherein the computer instructions define logic to prompt an external IVR to generate a message to the calling party to advise the calling party that it is not an authorized caller for the called party.
10. A method for routing a call, comprising: receiving and analyzing dialed digits to determine a calling destination; and determining if the calling party identified as an authorized calling party for the called party in a called party subscriber profile.
11. The method of claim 10 further including the step of playing an IVR message to inform the calling party that it is not authorized to make a call to the called party.
12. The method of claim 11 further including the step of playing an IVR message to ask the calling party to enter or state an access PIN.
13. The method of claim 10 further including the step of determining a calling party name.
14. The method of claim 13 wherein the step of determining includes the step of examining a subscriber profile for the called party and of comparing a list calling party names within the profile to the calling party name of the calling party.
15. The method of claim 10, further including the step of playing an IVR message to the calling party to request that the calling party state his name.
16. A method for routing a call, comprising: determining that a calling party is not authorized to make calls to the called party; playing a message to request that the called party provide a charge number; verifying the accuracy of the charge number; and connecting or rejecting a call setup request according to whether the supplied charge number was valid.
17. The method of claim 16 wherein the step of playing a message includes playing a message to request a calling party number to which the call is to be charged.
18. The method of claim 16 wherein the step of playing a message includes playing a message to request one of a bank account or credit card account number to which the call is to be charged.
19. A method for routing a call, comprising: determining that a calling party is not authorized to make calls to the called party; playing a message to request approval to charge the call to the calling party phone; and connecting the call.
20. The method of claim 19 wherein the step of playing a message includes playing a message to request a calling party number to which the call is to be charged.
PCT/US2000/035099 1999-12-24 2000-12-22 Method and apparatus for selective incoming call blocking based on calling line identification WO2001049013A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU22901/01A AU2290101A (en) 1999-12-24 2000-12-22 Method and apparatus for a calling name based filter

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US47165899A 1999-12-24 1999-12-24
US09/471,658 1999-12-24

Publications (2)

Publication Number Publication Date
WO2001049013A2 true WO2001049013A2 (en) 2001-07-05
WO2001049013A3 WO2001049013A3 (en) 2002-06-06

Family

ID=23872511

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/035099 WO2001049013A2 (en) 1999-12-24 2000-12-22 Method and apparatus for selective incoming call blocking based on calling line identification

Country Status (2)

Country Link
AU (1) AU2290101A (en)
WO (1) WO2001049013A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395391A (en) * 2021-06-11 2021-09-14 史艳艳 Call authorization method, device, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5467388A (en) * 1994-01-31 1995-11-14 Bell Atlantic Network Services, Inc. Method and apparatus for selectively blocking incoming telephone calls
WO1997046031A1 (en) * 1996-05-31 1997-12-04 Telefonaktiebolaget Lm Ericsson (Publ) An arrangement and a method for making a telephone call
US5903636A (en) * 1997-10-27 1999-05-11 Bellsouth Corporation System and method for providing caller identification in conjunction with calling card calls
WO1999031901A1 (en) * 1997-12-18 1999-06-24 Alcatel Usa Sourcing, L.P. Account calling card service for an advanced intelligent network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5467388A (en) * 1994-01-31 1995-11-14 Bell Atlantic Network Services, Inc. Method and apparatus for selectively blocking incoming telephone calls
WO1997046031A1 (en) * 1996-05-31 1997-12-04 Telefonaktiebolaget Lm Ericsson (Publ) An arrangement and a method for making a telephone call
US5903636A (en) * 1997-10-27 1999-05-11 Bellsouth Corporation System and method for providing caller identification in conjunction with calling card calls
WO1999031901A1 (en) * 1997-12-18 1999-06-24 Alcatel Usa Sourcing, L.P. Account calling card service for an advanced intelligent network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395391A (en) * 2021-06-11 2021-09-14 史艳艳 Call authorization method, device, equipment and computer readable storage medium
CN113395391B (en) * 2021-06-11 2023-12-15 史艳艳 Call authorization method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
AU2290101A (en) 2001-07-09
WO2001049013A3 (en) 2002-06-06

Similar Documents

Publication Publication Date Title
US5325421A (en) Voice directed communications system platform
US5566229A (en) Voice directed communications system employing shared subscriber identifiers
US6356630B1 (en) Telephone calling card service system integrating virtual destination numbers
US5909650A (en) Telecommunications system and method enabling use of a general personal number in fixed and mobile networks and cordless access systems
US5353336A (en) Voice directed communications system archetecture
US5502759A (en) Apparatus and accompanying methods for preventing toll fraud through use of centralized caller voice verification
US5859900A (en) Universal call access with reverse billing
US6505163B1 (en) Network and method for providing an automatic recall telecommunications service with automatic speech recognition capability
US7613452B2 (en) System and method for providing communications services
US6018737A (en) Universal personal telecommunications service for an advanced intelligent network
US6907111B1 (en) Network and method for providing a name and number delivery telecommunications services with automatic speech recognition capability
JP2002515189A (en) Method and system for establishing an acceptance threshold for controlling fraudulent telephone calls
JP2001508613A (en) System and method for unauthorized personal communication service area wireless network with local switcher interface and enhanced customer features
CA2266276A1 (en) Method and apparatus for providing voice assisted call management in a telecommunications network
US20030043984A1 (en) Prepaid telephone service with automatic number identification recognition
JP2948960B2 (en) How to connect special calls for communication switching equipment
US20040029561A1 (en) Revert charging in a telecommunication network
US6993119B1 (en) Network and method for providing a flexible call forwarding telecommunications service with automatic speech recognition capability
US6330315B1 (en) Apparatus and method for routing blocked calls
US20020097854A1 (en) Ani-based dialing in telephone networks
US7164754B2 (en) Control of access for telephone service providers using voice recognition
US6826529B1 (en) Network and method for providing a call screening telecommunications service with automatic speech recognition capability
WO2001049013A2 (en) Method and apparatus for selective incoming call blocking based on calling line identification
US6718029B1 (en) Method and article of manufacture for establishing local payphone calls through long distance carrier switches
US6778640B1 (en) Network and method for providing a user interface for a simultaneous ring telecommunications service with automatic speech recognition capability

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ CZ DE DE DK DK DM DZ EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ CZ DE DE DK DK DM DZ EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP