TW499806B - Communications control method and apparatus - Google Patents
Communications control method and apparatus Download PDFInfo
- Publication number
- TW499806B TW499806B TW89124018A TW89124018A TW499806B TW 499806 B TW499806 B TW 499806B TW 89124018 A TW89124018 A TW 89124018A TW 89124018 A TW89124018 A TW 89124018A TW 499806 B TW499806 B TW 499806B
- Authority
- TW
- Taiwan
- Prior art keywords
- communication
- caller
- time
- patent application
- incoming
- Prior art date
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
Description
499806 A7 B7 五、發明說明(丨) 發明背景 本發明大致有關於控制通訊裝置用的裝置及方法。更 特別地,本發明係有關於可容許使用者控制被供應至例如 在一例子中爲電話的通訊裝置之進入的通訊之裝置及方法 〇 今曰的消費者正不斷地被持續增加的不想要的推銷電 話數量所轟炸和困擾。基本上,推銷員正隨時或是在任何 推銷員所選擇的領域之內使用被動的電話裝置去侵入一般 大眾的隱私權。當它是來自於高壓的和持續性的電話行銷 來源’這種程度的困擾是特別地討厭的。當被提出此問題 :“你會購買可禁止推銷員打電話給你的電話嗎?,,答案明顯 的總是“是的!” 非常渴望的是去提供電話使用者可按使用者的選擇去 限制其暴露在這些不想要的電話通話的功能。解決這問題 之一種傳統的方法是複合式的電話/答錄機,其允許使用者 去聆聽主叫方是誰和然後即時地決定是否接起電話機話筒 和主叫方交談。這是以“電話過濾”爲其最基本形式的稱呼 。當然’使用者也有稍後聆聽主叫方的訊息及然後決定是 否回覆電話的選擇。 另一限制使用者暴露在不想要的電話的方法是描述在 授予Brown的美國專利5,060,255號,名稱爲“電話通訊定 時不受干擾的系統”。此專利揭露一種電話系統可使電話用 戶指定時間期間內將沒有進入的電話在電話用戶線上被接 收。任何在此時間撥到該電話用戶之電話號碼的電話會被 4 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) --------訂— —------* · 經濟部智慧財產局員工消費合作社印製 499806 經濟部智慧財產局員工消費合作社印製 A7 __B7_______ 五、發明說明(〆) 轉到語音回覆單位以發出一適當的通告來通知主叫方所撥 號碼機的無法接聽。此種定時的電話阻擋的特性是施行在 電話公司的中央局或是交換機設備中。 另一種電話過濾方法是揭露在美國專利5,467,388、授 予Redd,Jr.等人之名稱爲“選擇性地阻擋進入的電話通話 之方法和裝置”。在該專利中’ 一種系統被揭露用於容許電 話用戶在所選擇的時間期間或在預定的時間間隔內選擇性 地阻擋進入的電話。在此種方法中’電話過濾是再一次在 電話公司的中央局或交換機設備中被進行。 又一種傳統的電話過濾技術是描述在美國專利 4,277,649發表、授予Sheinbein之名稱爲“用於過濾電話通 話的方法和裝置”。在該專利中,一種電話系統被揭露,其 中被叫的消費者或使用者可以根據主叫方線路的辨識來過 濾進入他的位置的電話。主叫方線路的辨識是送到包含被 叫的消費者的過瀘記憶之交換局。該記憶被詢問以根據先 前由被叫的消費者放入記憶的訊息來確定電話的處置。在 此種方法中,過濾的程序是再一次依據集中的資料庫所位 於之電話公司的中央局或交換機設備所進行的過濾處理而 定。 發明摘要 因此,本發明之一目的是提供一種藉由使用先進的控 制機構施行在或是靠近於通訊裝置而限制使用者的暴露在 不希望的通訊之方法和裝置。 本發明的另一目的是提供一種藉由使用先進的控制機 5 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------衣--------訂--I-----線 (請先閱讀背面之注意事項再填寫本頁) 499806 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(> ) 構在電話服務交換機處並且提供消費者服務,以限制使用 者的暴露在不希望的通訊的方法和裝置。 本發明的另一目的是提供一種允許消費者先前主動地 控制如何、何時、和消費者是否應答進入的通訊之通訊裝 置控制方法和裝置。 仍是本發明另一目的是提供一種轉換通訊裝置(例如, 電話、電腦、和/或電視)從被動的裝置成爲納入個人時間 管理値和訂製型的消費者優先權的可控制的裝置之方法和 裝置。 本發明之再一目的是提供一種通訊裝置的控制裝置, 其中進入的通訊係按照一天中的時間、次數、形式、期間 、和特別的通訊被接收的優先等級被管理和控制。 根據本發明之一實施例,其提供一種用以處理從主叫 方傳送到接收方的通訊裝置的一個進入的通訊之方法。所 揭露的方法係包含儲存包括複數個記錄的主叫方資料庫的 步驟。每一個記錄係包含對應於一特定的主叫方之主叫方 識別訊息和從複數個優先權選出之個別的優先權。該方法 也包含儲存阻斷的時間資料庫的步驟,該資料庫係包括個 別地對應於該複數個優先權之複數個記錄,並且更包括對 於每個優先權之個別的阻斷的時間資訊。一包括主叫方識 別資訊之進入的通訊係被接收。該進入的通訊被接收之時 間係被判斷出,以提供一通話被接收到的時間。 接著,搜尋該主叫方資料庫以找出一具有主叫方識別 資訊的記錄係相符於該進入通訊的主叫方識別資訊,並且 6 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) !!會--------訂——!i (請先閱讀背面之注意事項再填寫本頁) 499806 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(γ ) 取出該記錄之個別的優先權以產生一被取出的優先權。該 阻斷的時間資料庫係被搜尋以判斷出相關於該被取出的優 先權之阻斷的時間資訊’以產生被取出的阻斷時間資訊。 該進入的通訊之通話被接收到的時間是與被取出被取出的 阻斷時間資訊做比較。該方法更包含步驟爲如果該通話被 接收到的時間發生在以被取出的阻斷的時間資訊所指示之 阻斷的時間之期間時,則阻斷進入的通訊,否則就會容許 該進入的通訊被指定路由到有通訊裝置的使用者。該方法 更包含檢查被阻斷的通話是否爲緊急的通話之步驟,該緊 急的通話將會按照消費者的預先選擇之選項而被指定路由 〇 圖式的簡要說明 相信是新穎的本發明之特點係明確地敘述在後附的申 請專利範圍中。然而,本發明本身之結構和操作方法兩者 ,最好可藉由參考如下的敘述和隨附的圖式而加以瞭解。 圖1是展現所揭露的通訊控制器相對於其他的電話通 訊裝置功能之整體關係的功能方塊圖。 圖2Α和2Β是通訊控制器系統操作的流程圖。 圖3係描述主叫方ID資料庫的結構,因其有關於支 援通訊控制器的處理邏輯所需要之主要的領域。 圖4係描述時間阻斷的資料庫結構,因其有關於支援 通訊控制器的處理邏輯所需要之主要的領域。 圖5係描述查看表的結構,其係提供有關於進入的通 話時間和主叫方優先權條件之重要的功能之操作的設定。 7 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) "" " (請先閱讀背面之注意事項再填寫本頁j g衣---------訂---------線一 499806 A7 B7_ 五、發明說明(4 ) 圖6是描述獨特的模糊(Fuzzy)邏輯控制器系統操作之 流程圖。 圖7是描述時間阻斷的模糊集合歸屬之表現圖。 圖8是描述主叫方優先權模糊集合歸屬之表現圖。 圖9是描述重要的通訊控制器操作模糊集合歸屬之表 現圖。此表現係使用單元素(singleton)直接地對映到明確 的解答。 圖10是支援通訊控制器所需要的硬體方塊圖。此硬體 的施行可以爲界接到即時應答裝置、訊息應答裝置、和主 叫方識別裝置功能之獨立的單元、或是一整合的元件/特點 組。 圖11是本發明可被利用之一種通訊系統之簡化的系統 圖。 牛要部份代表符號之簡要說明 100通訊控制器功能 101即時應答裝置功能 102訊息應答裝置功能 103主叫方識別裝置功能 104通訊線 105介面 206主叫方ID資料庫 300主叫方ID欄位 301主叫方名字欄位 302索引欄位 8 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) - 訂i —— — ^----線· 經濟部智慧財產局員工消費合作社印製 499806 經濟部智慧財產局員工消費合作社印製 A7 _B7 五、發明說明(w ) 303 OGM ID 欄位 304通告ID欄位 305主叫方優先權欄位 306次數欄位 307計數欄位 308期間欄位 309緊急的操作欄位 310 §己錄 400索引欄位 401開始時間欄位 402結束時間欄位 403星期的日期欄位 404暫時的旗標 405優先權欄位 406記錄 500優先權 501阻斷的時間 502容許的時間 5 0 3緊急的通g舌 504記錄 1000通訊控制器 1001即時應答硬體 1002訊息應答硬體 1003主叫方識別硬體 (請先閱讀背面之注意事項再填寫本頁) --------訂----I---* . 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 499806 A7 B7 五、發明說明(η ) 1004通訊線 1005匯流排499806 A7 B7 V. Description of the Invention (丨) Background of the Invention The present invention relates generally to a device and method for controlling a communication device. More particularly, the present invention relates to devices and methods that allow a user to control incoming communications that are supplied to a communication device such as a telephone in one example. Consumers today are constantly increasing in unwanted The number of sales calls was bombed and haunted. Basically, salespeople are using passive telephone devices to invade the general public's privacy right at any time or in any field selected by the salesman. This level of distress is particularly annoying when it comes from a high-pressure and continuous telemarketing source. When asked this question: "Would you buy a phone that would prevent salespeople from calling you?", The answer is always "Yes!" It is very eager to provide phone users with the choice of users Limit its ability to be exposed to these unwanted phone calls. A traditional approach to this problem is a hybrid telephone / answering machine, which allows the user to listen to who the caller is and then instantly decide whether to pick it up The telephone microphone talks to the caller. This is called "phone filtering" in its most basic form. Of course, the user also has the option of listening to the caller's message later and then deciding whether to answer the call. Another limitation is the user The method of exposing to unwanted telephones is described in US Patent No. 5,060,255 issued to Brown, entitled "System for Uninterrupted Telephone Communication Timing." This patent discloses a telephone system that allows telephone users to be inaccessible for a specified period of time. The call is received on the telephone subscriber's line. Any call made to the telephone number of the telephone subscriber at this time will be accepted by 4 paper sizes. Use Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling out this page) -------- Order— ———---- * · Ministry of Economic Affairs Printed by the Intellectual Property Bureau employee consumer cooperative 499806 Printed by the Intellectual Property Bureau employee consumer cooperative of the Ministry of Economic Affairs A7 __B7_______ V. Invention Description (〆) Go to the voice reply unit to issue an appropriate notification to notify the caller that the dialed number machine is unavailable Answer. The characteristic of this kind of regular telephone blocking is implemented in the telephone company's central office or exchange equipment. Another method of telephone filtering is disclosed in U.S. Patent 5,467,388, granted to Redd, Jr. et al. Method and device for blocking incoming telephone conversations ". In the patent, a system is disclosed for allowing telephone users to selectively block incoming telephone calls during a selected time period or within a predetermined time interval. In this method Medium 'telephone filtering is performed once again in the central office or exchange equipment of the telephone company. Another traditional telephone filtering technology is described in US Patent 4,277,649 The name given to Sheinbein is "Method and Device for Filtering Telephone Calls". In this patent, a telephone system is disclosed in which the called consumer or user can filter access based on the identification of the calling party's line The phone at his location. The identification of the calling party's line is sent to the exchange containing the memory of the called consumer. The memory is interrogated to determine the phone based on the message previously put into the memory by the called consumer. In this method, the filtering process is again based on the filtering performed by the central office or exchange equipment of the telephone company where the centralized database is located. SUMMARY OF THE INVENTION Therefore, it is an object of the present invention to provide A method and device for restricting a user's exposure to undesired communication by using advanced control mechanisms to perform on or near the communication device. Another object of the present invention is to provide a paper size which is adapted to the Chinese National Standard (CNS) A4 (210 X 297 mm) by using an advanced controller. ------- Order--I ----- line (please read the notes on the back before filling out this page) 499806 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Invention Description (> Methods and devices constructed at telephone service exchanges and providing consumer services to limit user exposure to unwanted communications. Another object of the present invention is to provide a communication device control method and device that allow a consumer to actively control how, when, and whether the consumer responds to an incoming communication. Still another object of the present invention is to provide a means of switching communication devices (e.g., telephones, computers, and / or televisions) from passive devices to controllable devices incorporating personal time management and customized consumer priorities Methods and apparatus. Still another object of the present invention is to provide a control device for a communication device, wherein the incoming communication is managed and controlled according to the time of day, number of times, form, period, and the priority level at which special communication is received. According to one embodiment of the present invention, a method is provided for processing an incoming communication transmitted from a communication device of a calling party to a receiving party. The disclosed method includes the step of storing a caller database including a plurality of records. Each record contains a caller identification message corresponding to a particular caller and an individual priority selected from a plurality of priorities. The method also includes the step of storing the time database of the block, the database including a plurality of records corresponding to the plurality of priorities, and further including the time information of the individual blocks for each priority. An incoming communication system including caller identification information is received. The time when the incoming communication is received is determined to provide a time when a call is received. Next, search the caller database to find a record with caller identification information that matches the caller identification information of the incoming communication, and 6 paper standards are applicable to the Chinese National Standard (CNS) A4 specification (210 x 297 mm) !! will -------- order-! i (Please read the notes on the back before filling out this page) 499806 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of Invention (γ) Take out the individual priority of the record to generate a priority for removal . The blocked time database is searched to determine the blocked time information 'related to the retrieved priority right to generate the retrieved blocked time information. The time that the incoming communication call was received is compared with the block time information that was taken out and taken out. The method further includes the step of blocking the incoming communication if the time when the call is received occurs within the blocking time indicated by the removed blocking time information, otherwise the incoming communication will be allowed Communication is routed to users who have a communication device. The method further includes a step of checking whether the blocked call is an emergency call. The emergency call will be designated according to a pre-selected option of the consumer. The brief description of the figure is believed to be a novel feature of the present invention It is clearly stated in the scope of the attached patent application. However, both the structure and operation method of the present invention can be best understood by referring to the following description and accompanying drawings. FIG. 1 is a functional block diagram showing the overall relationship of the disclosed communication controller with respect to the functions of other telephone communication devices. 2A and 2B are flowcharts of the operation of the communication controller system. Figure 3 describes the structure of the caller ID database as it relates to the main areas required to support the processing logic of the communication controller. Figure 4 describes the database structure of the time block, as it relates to the main areas required to support the processing logic of the communication controller. Figure 5 describes the structure of a look-up table, which provides settings for the operations of important functions regarding the incoming call time and the caller's priority conditions. 7 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) " " " (Please read the precautions on the back before filling in this page jg clothing --------- order --------- Line 1 499806 A7 B7_ V. Description of the invention (4) Figure 6 is a flowchart describing the operation of a unique fuzzy logic controller system. Figure 7 is a fuzzy set describing time blocking Attribution performance chart. Figure 8 is a description of the caller priority fuzzy set attribution. Figure 9 is an important communication controller operation fuzzy set attribution performance chart. This performance is a single element (singleton) directly Mapping to a clear answer. Figure 10 is a block diagram of the hardware required to support the communication controller. The implementation of this hardware can be an independent unit connected to the functions of the instant response device, message response device, and caller identification device. Or an integrated component / feature group. Figure 11 is a simplified system diagram of a communication system that can be used in the present invention. Brief description of some representative symbols 100 Communication controller function 101 Instant response device function 102 message Transponder Function 103 Caller identification device Function 104 Communication line 105 Interface 206 Caller ID database 300 Caller ID field 301 Caller name field 302 Index field 8 This paper standard applies to China National Standard (CNS) A4 Specifications (210 X 297 mm) (Please read the precautions on the back before filling out this page)-Order i —— — ^ ---- Line · Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives 499806 Intellectual Property Bureau of the Ministry of Economic Affairs Printed by employee consumer cooperative A7 _B7 V. Description of invention (w) 303 OGM ID field 304 Notification ID field 305 Caller priority field 306 Number of times field 307 Count field 308 Period field 309 Urgent operation field 310 § Recorded 400 index field 401 start time field 402 end time field 403 week date field 404 temporary flag 405 priority field 406 record 500 priority 501 block time 502 allowable time 5 0 3 Urgent communication tongue 504 record 1000 Communication controller 1001 Instant response hardware 1002 Message response hardware 1003 Caller identification hardware (Please read the precautions on the back before filling this page) -------- Order ---- I --- *. The paper size is suitable Chinese National Standard (CNS) A4 size (210 X 297 mm) 499806 A7 B7 V. invention is described in (η) 1004 1005 bus communication lines
1006 CPU1006 CPU
1007 MCU RAM1007 MCU RAM
1008 ROM 1009 MCU輸入埠 1010監視器/IRQ 1011 EPROM 1012內部的匯流排 1013輸入埠 1014使用者裝置 1101主叫方裝置 1102中央局設備 本發明的詳細說明 所揭露的通訊控制器實際上免除接收方之來自於不想 要的進入的通訊(例如’通話和/或電子媒介)之接連不斷的 、無附加價値的干擾。有利地,此揭露的控制器可使消費 者能夠再次取得對於其私人時間之具有附加價値的控制。 只是爲了說明的目的,而不是限制一般性,此通訊控 制器將會被說明有關於其在處理進入的電話上的使用作爲 其應用的一個例子。該通訊控制器包含自動的控制邏輯, 其係智慧型地整合通訊路由和過濾功能。該控制器係按照 一天之中的時間、次數、形式、期間、和接收通訊的優先 等級來管理和控制進入的通訊。圖11大致描繪在一電話系 10 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) --------訂---------線I血 經濟部智慧財產局員工消費合作社印製 499806 ___—_B7__ 五、發明說明(义) (請先閱讀背面之注意事項再填寫本頁) 統中介於主叫方裝置與接收裝置之間的關係,並且顯示該 主叫方裝置1101與接收裝置1014是如何與中央局設備有 所區隔。本發明的功能係被施行在該接收裝置中,因而與 中央局的功能無關。 此揭露的通訊控制器可使消費者有效地控制一通話被 允許鈴響/通知有一通進入的電話之白天或晚上的時間。它 也允許消費者建立進入的通話的優先權。然後這些優先權 被使用來以一種方式爲適合消費者特定的需要和價値、自 動地指定路由給通話透過話機而至消費者。如果需要的話 ,不想要的進入的電話(例如,來自推銷員以及騷擾者)將 甚至不會鈴響。因此,在接收方的選擇之下,接收方是不 會被打擾的。所揭露的控制器係有利地轉換電話成爲一個 可控制的裝置,其係提供及時而有效率的且有效的、有附 加價値的通訊。 所揭露的通訊控制器是首先描述其功能上有關於其它 的電話通訊裝置功能。稍後,用於實施此控制器之代表性 的硬體再加以詳細地描述。 經濟部智慧財產局員工消費合作社印製 更特別地,圖1是一展現此揭露的通訊控制器100相 對於其它的電話通訊裝置功能之整體的關係之功能性的方 塊圖。經由該通訊控制器所提供給一特定的進入的電話之 處理是依賴時間和進入的通話優先權而定的。應注意的是 該通訊控制器和有關的控制邏輯可與其它的消費者電話的 裝置(例如電話、電話答錄機、主叫方ID裝置、電腦、電 話/電視的解決方式)一齊被應用並且作成消費產品。此通 11 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)+ "" 499806 A7 B7 五、發明說明(1 ) 訊控制器也可以被施行在電話服務交換機,並且以電話服 務的方式提供給消費者。 在一實施例中,如圖1所示,即時應答裝置功能101 、訊息應答裝置功能102、和主叫方識別裝置功能103可 被施行爲一整合的裝置或獨立地支援通訊控制器功能100 〇 即時應答裝置功能1〇1(例如,電話裝置)係提供例如是 電話的通訊裝置所需要的互動支援。此裝置所提供的支援 的例子是鈴響/通告、通話轉接、通話等待以及傳呼使用者 以立即的應答進入的電話。 訊息應答裝置功能1〇2(例如,電話答錄機)係提供通訊 裝置所需要的被動支援。此裝置所提供的支援的例子是撥 放、儲存、和記錄訊息資料(例如,語音留言、電子郵件、 多媒介的郵件),使用者可以在他們的方便下但非必要地在 通話/聯絡被安置或達成的期間來應答之。連結至其它的通 訊裝置的通訊線1〇4(例如,電話線或電纜)是結合到該主叫 方識別裝置功能103。 主叫方識別(ID)裝置103係傳送進入的通話資料,例 如是主叫方ID資料到通訊控制器100。通訊控制器1〇〇係 使用接收到的主叫方ID資料來處理進入的通話。如果一特 定的進入的通話其進入的主叫方ID資料是不可得到的,則 通訊控制器1〇〇就會使用訊息應答裝置(例如是電話答錄機 )功能102去撥放一向外的訊息(OGM),促使主叫方輸入他 們的識別資料。當這通訊控制器1〇〇嘗試得到此資料之際 12 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂---------線—應 經濟部智慧財產局員工消費合作社印製 499806 A7 B7 經濟部智慧財產局員工消費合作社印制π 五、發明說明( ’其將會繼續處理該通話。結果,通訊控制器1〇〇將會使 用: 1) 即時應答裝置功能101來處由電話裝置鈴響/通告、 轉接電話、傳呼被打電話的人、支援裝置的遙控、終止通 話、經由一特定的嗶嗶聲音指示來通知使用者通話的等待 ,或是、 2) 訊息應答裝置(例如,電話答錄機)功能1〇2撥放一 適當的OGM和容許主叫方留下一訊息。 介面105係支援通訊來傳送和指定路由給資料在上面 所描述的圖1中之系統功能之間。 進入的主叫方ID資料可以是依據起始的裝置而定的( 相關於通話起始裝置的識別符)或依據主叫方而定的(相關 於個別的主叫方/個人的識別符)。使用今日科技的主叫方 識別裝置功能103的消費者產品是依據裝置而定的,其係 提供主叫方的電話號碼和/或名字。然而,按照通訊控制器 100的施行方式,此資料可能是網路上的一個節點之Ι ρ·位 址或是其它的裝置識別符資料。相反地,依據主叫方而定 的主叫方ID資料可以利用此種要素如下: 1) 主叫方私人的帳戶資料(例如,帳戶號碼、電子郵件 位址、網際網路位址、等等。); 2) 依據揚聲器而定的語音資料,個人藉由說出他們的 名字以爲了獲得他們的時間上的語音信號資料以表明身分 ;和 3) 影像的資料,主叫方的獨特的識別符之影像幀(例如 13 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---------* I I I I I I 1 ^ --------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 499806 A7 B7 五、發明說明(α) ,主叫方的臉、視網膜的掃描、指紋/拇指指紋、等等。) 在此實施例中,通訊控制器1〇〇並不是依據主叫方id 資料/媒介形式。而是,控制器100只是符合由主叫方識別 裝置功能103所使用的資料形式,主叫方識別裝置功能 103是通訊控制器100的一個外部的介面。通訊控制器100 只是利用此相關於主叫方的資料,而不管它的形式爲何(例 如,依據裝置而定的或是依據主叫方而定的),以決定主叫 方之被給予的優先權。(通訊控制器100係使用進入的主叫 方ID資料,來嘗試比較此資料以及儲存於其資料庫中的主 叫方ID資料,以用於通電話優先權之決定。) 圖2A和2B—起構成一描述被通訊控制器1〇〇系統實 行之操作的流程之流程圖。圖2A和2B中所示的步驟係提 供一指定路由和處理進入的通話所必需之控制邏輯的例子 。操作開始於進入的通話步驟200之監視器處,並且當進 入的通話被接收的情形時,一項測試係被通訊控制器100 執行在決定方塊201之處,以決定進入的主叫方ID資料是 否存在。如果主叫方ID資料存在時,則其會被讀取做更進 一步地處理和監視從主叫方輸入之進入的密碼,其係被執 行於202之處。一項檢查是執行於203之處,以決定一進 入的密碼是否存在。當接收一進入的密碼時,如在旁路方 塊204所示,通訊控制器邏輯是被旁路,並且通話的控制 是直接地指定路由到即時應答裝置101。然而,如果主叫 方ID資料不存在,則在212之處,一向外的資訊(OGM)是 被撥放而要求主叫方提供他們的主叫方ID資料。如在方塊 14 衣紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂----------線· A7 __B7_ " '""""" _ _ 1 '發明說明(\,) 213所示地,腿_器1GG然後^_觀讀取被提供 〇 髓在214處執行-項測試,以判斷進λ的密碼是否 存在。當接收到-進入的密碼時’如在旁路方塊204所示 ’通訊控制器邏輯是被旁路’並且通話的控制是直接地指 定路由到即時應答裝置ΗΠ。然而,如果在測試川之處 找不到進入的密碼’則在2丨5之處執行—項檢查,以檢視 主叫方ID資料現在是否已經被主叫方提供。通訊控制器 100然後監視是否有接收到的主叫方ID資料。如果測試 215係判斷主叫方ID資料並未被接收到時,則在216之處 從主叫方得到主叫方ID資料之嘗試係被加1。—項檢查係 在217處被執行,以判斷主叫方有被要求提供他們的主叫 方ID的次數是否少於最大允許的次數。如果最大的嘗試次 數沒有超過時,則通訊控制器100會如方塊的212所示地 ’被程式化來送出控制資訊至電話裝置,以掛斷或重覆爲 了得到主叫方ID資訊的請求(OGM)。此重覆的程序可以依 據一最大値而再發生一選定的次數。當主叫方在被提供最 大次數的嘗試之後仍不能提供有效的主叫方ID資料時,通 話的優先權就會在方塊218中被設定爲一不明的主叫方, 以支援做更進一步地處理。 然而,如果測試215發現主叫方已經提供其主叫方ID 資料時,則一主叫方ID資料庫搜尋是於205之處被呼叫來 在主叫方ID資料庫206的主叫方ID資料欄位上搜尋。此 搜尋嘗試去找出與現在被判斷出的主叫方ID相符的主叫方 15 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) --------訂---------線. 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 499806 A7 B7 五、發明說明() ID資料攔位內容相關的記錄。若主叫方1D相符是在相符 測試207被找到時’則相符之記錄的每一欄位値(例如:名 字、索引、優先權、〇GM ID、通告ID、次數、計數(次數) 、期間和緊急的操作)是在208之處被讀取或得到’以支援 做更進一步地處理。然後’計數(次數)欄位係在209增加1 並且新的計數(次數)値是在210之處被儲存用作更進一步 地處理。(此計數(次數)欄位的目的是提供使用者以一預先 選擇的次數讓一特別的主叫方ID可以在一特定的時間期間 (譬如24小時)打電話,以便於減少被連續不斷的從一特別 的主叫方打電話的煩惱。)若一主叫方1D相符在207之處 沒有被找到時,則優先權欄位値就會被設定來指示主叫方 的識別(不明的主叫方)並沒有相關連的記錄在主叫方ID資 料庫211中。同樣地,主叫方ID記錄的所有欄位(例如: 名字、索引、優先權、OGM ID、通告ID、次數、計數(次 數)、期間和緊急的操作)係在方塊211中被設定到零,以 支援做更進一步地處理。 應注意的是主叫方ID資料也可能是依據主叫方而定 的或依據裝置而定的。例如,對於依據裝置而定的資料, 主叫方ID資料可g旨是由起始的通§舌電話號碼或用於網路施 行之Ι·ρ·位址所組成。相反地,依據主叫方而定的資料可 能是由主叫方視訊影像的資料、語音形式資料、和/或私人 的帳戶識別資料所組成。 若在測試221之處,新的計數(次數)欄位被發現比記 錄的次數欄位(見圖2Β)大時,則通訊控制器100就會被程 16 -------------1------訂-------—線 (請先閱讀背面之注意事項再填寫本頁) 本纸張尺度適用中國國豕標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 499806 A7 B7 五、發明說明(A) 式化,以送出控制資訊至電話裝置,以通知(OGM)主叫方 此通話是被阻斷的,除非他們指示此通話是緊急的222。 此通話是被指定路由至被阻斷但有機會打緊急的通話222 之情形,因爲在事先預定的時間期間(譬如24小時)內一特 別的主叫方被容許的通話次數已經超過。 處理係開始於在方塊223中監視來自主叫方的輸入。 檢查224是用來決定一緊急的密碼是否已經被接收到。如 果沒有緊急的密碼接收到,通話將被保持在一阻斷的情形 229。被方塊的情形與被決定的主叫方優先權情形一起將會 被使用在227中找出重要的電話操作資料。此裝置相關的 操作資料是從查看表227讀出,並且相對應的控制資料是 被傳送到在228處的系統功能(稍早如圖1中所示),如支 援特定的操作(例如,鈴響形式、通告選擇、OGM選擇、 記錄訊息、終止通話、通話轉接、通話等待的嗶嗶聲選擇 、等等)所需的。從查看表227被取出的操作控制資料將會 被傳送到裝置功能,並且該通話將會被處理爲阻斷的情形 228 ° 如果一緊急的密碼已經在檢查224中被接收到時,則 另一檢查225會被執行來判斷該緊急的操作密碼是否爲有 效的。當一有效的緊急的操作密碼(此密碼是重要的電話操 作資料被使用於其所支援的條件),此重要的電話操作資料 將會被傳送到系統功能228。然而,如果緊急的操作資料 不是有效的,此緊急的情形226與被決定的主叫方優先權 情形一起將會在方塊227中被使用來找出重要的電話操作 17 中國國家標準(CNS)A4規格(210 X 297公釐) --I I -----------I-----訂* 丨丨 ----- (請先閱讀背面之注意事項再填寫本頁) 499806 A7 B7 五、發明說明(/ ) 資料。從查看表227被取出的操作控制資料將會被傳送到 裝置功能。此通話將會被處理爲一緊急的電話。 _ 然而,如果新的計數(次數)欄位是少於或等於次數欄 位221,則判斷主叫方ID的優先權的時間阻斷之處理將會 如231所示地繼續。 然後通話時間資料是於步驟217之處被讀取。通話時 間資料包含進入的通話被接收之小時、分、白天、和日期 値。一時間阻斷的資料庫231捜尋是被執行以得到特別的 通話優先權之所有被阻斷的次數232。該通話時間資料係 與該通話優先權相關的時間阻斷的間隔做比較。如果在測 試233中被發現通話的時間是在時間阻斷的間隔之間,貝[J 時間會在234之處被設定爲“阻斷”進入的通話之特定的優 先權。然而,如果通話的時間不是在時間阻斷的間隔之間 233,則時間會被設定爲“容許”進入的通話之特定的優先權 235。如果時間被設定到“阻斷”,則使主叫方歸類其通話是 緊急的機會是出現在2〗2之處。如果時間被設定到容許 237,則查看表227的容許情形是被使用來得到重要的電話 操作資料,如在228所示地。 圖3係描述被使用於一所揭露之通訊控制器的實施例 中之一種主叫方資料庫結構。此資料的目的是提供通訊控 制器相關於使用者對於特定的主叫方形式所:設定的優先權 資料之進入的主叫方ID資料的儲存。此資料結構是由稍早 討論的圖2A的主叫方ID資料庫搜尋所利用,來得到進入 的通話優先權。 18 本紙張尺度適用中國國家標準(CNS)A4規袼(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂---------線· 經濟部智慧財產局員工消費合作社印製 499806 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(V>) 此主叫方資料庫結構係包含複數個記錄310,其係被 指定爲記錄1…η。如圖3所示,每一記錄包含一進入的主 叫方ID(CID)欄位300 ; —主叫方名字欄位301 ; —索引欄 位302 ; — OGM ID欄位303 通告id欄位304 ; —主 叫方優先權欄位305 ; —次數欄位306,其係含有在一段所 選的時間期間內主叫方潛在地可以鈴響之設定的限制或是 最大次數;一計數欄位307,其係與次數欄位306協同來 追蹤一特定的主叫方在所選的時間期間(例如,24小時)之 內打電話的次數;一期間欄位308(此期間欄位係支援使用 者典型地分配於和此特定的主叫方交談之所選的時間量, 以便於安排其時間);和一緊急的操作欄位309(此欄位含有 將被使用於其所支援的條件之重要的電話操作控制資料)。 此進入的主叫方ID 300是進入的通話獨特的識別符。 以今日科技而言,主叫方ID是通話起始的電話號碼。然而 ,主叫方ID 300或者可能是由語音/聲音辨識資料(亦即獨 特的語音或聲音資訊)、和/或影像處理資料(獨一的圖像資 訊)所支援。此主叫方名字欄位301可以被使用來儲存相關 於進入的主叫方ID 300之名字。此索引欄位302是被使用 於通訊控制器1〇〇的維護。當資料庫的記憶體變成不足以 儲存額外的記錄309時,此通訊控制器100可以根據哪個 記錄是最低優先權並且是依索引302的指示爲最靜止來選 出一候選者。此候選者記錄的記憶體配置然後可以被使用 來儲存新的資料在這些欄位中。OGM ID 303欄位含有對 於特定的主叫方ID資料將被撥放之一特定的OGM的識別 19 ----—-----------—訂---------線 (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 499806 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(\\ ) 符。此通告ID 304欄位也含有對於特定的主叫方ID資料 將被撥放之一特定的通告。優先權欄位305是被使用來根 據使用者的需要/選擇以儲存主叫方1D的相對的優先權。 例如,一相對的優先權表現係被給予在以下表1中’其中 優先權1是最低的優先權,而優先權8是最高的優先權: 表1 •優先權1-騷擾(最低優先權) •優先權2-乞求 •優先權3-友善的,但不在資料庫中 •優先權4-賣方/入會 •優先權5-工作/業務 •優先權6-次要的朋友 •優先權7-主要的朋友/遠親 •優先權8-親密的家人(最高的優先權) 圖4係描述被使用於所揭露的通訊控制器100之一實 施例的阻斷的時間資料庫結構。此阻斷的時間資料庫結構 是被圖2B的測試220使用,以根據通話被接收的時間來 決定進入的通話是被阻斷的或允許的。此資料庫結構包含 齊數個記錄406,其係被指定爲記錄1··.ηι。每一個記錄均 定義一時間阻斷的間隔,亦即一段時間的間隔爲使用者不 希望具有特定的優先權之進入的通話來引起其電話鈴響或 通報該主叫方。 每一個記錄1…m都包含一索引欄位400、一阻斷的時 間間隔開始時間欄位401、一阻斷的時間間隔結束時間欄 20 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) (請先閱讀背面之注意事項再填寫本頁) 訂---------線· 499806 經濟部智慧財產局員工消費合作社印制衣 Α7 Β7 五、發明說明(Y多) 位402、一星期的日期欄位403、一暫時的旗標404、和優 先權欄位405。索引欄位可以被使用於內部的通訊控制器 100之處理。此開始時間欄位401係提供阻斷的時間間隔 開始的小時和分鐘。此結束時間欄位402係提供此阻斷的 時間間隔結束的小時和分鐘。此星期的日期欄位403係提 供在星期之間的日期爲阻斷的間隔是有效的時間。此優先 權欄位405是被使用於根據此使用者的需要來儲存主叫方 之相對的優先權。例如,一時間阻斷的間隔的表示可以是 從晚上1〇點到早上5點、星期天到星期五、阻斷所有優先 權除了優先權8-家人的主叫方以外。此暫時的旗標欄位 404是指示此時間阻斷的間隔是暫時的旗標。此旗標係支 此發明之無聲的模式。此無聲的模式允許使用者選擇一段 相對的時間期間來阻斷其電話。譬如,下兩個小時將所有 通話置於此阻斷的模式,在使用者選擇的通話優先權除外 之下。 圖5係描述使用於所揭露的通訊控制器100中之一代 表性的查看表結構。此查看表結構是被使用於圖2Β的測 試224和236,以得到此整合的電話裝置功能之重要的操 作控制資料。這些結果是根據出現的條件結果而定。特別 地,此查看表結構包含複數個記錄504,其係被指定l...p ,而依據使用於任何特定之通訊控制器100的實施例之主 叫方優先權的數目而定。例如,在其中優先權1-8是參照 於上述的表1中之所揭露的實施例,Ρ將具有8的値。 在通話於阻斷的時間501期間被進行和此進入的通話 21 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) !«!——·鮝 i!f------•線· (請先閱讀背面之注意事項再填寫本頁) 499806 A7 ______ B7 五、發明說明(d) 之優先權500被指明之組合的條件之下,電話裝置之所要 的重要操作係被定義。(應該記得的是控制器係從圖4的阻 斷的時間資料庫取出此阻斷的時間資訊,此並且控制器係 從圖3的主叫方資料庫取出此進入的通話優先權。)在一緊 急的通話503於此阻斷的時間被進行,並且此進入的通話 優先權500被指明之組合的條件之下,此電話裝置之所要 的重要操作是被定義。再次地,在通話在容許的時間502 被進行,和此進入的通話的優先權500被指明之組合的條 件之下,此電話裝置之所要的重要操作係被定義。此電話 裝置的操作係包含主叫方識別裝置功能103、訊息應答裝 置功能102、和即時應答裝置功能101。這些操作中的一些 操作係包含以下、但是不限於此: •提供一種特定的鈴響形式(具有多種鈴響形式選擇) •爲一特定的主叫方提供一特定的通告 •提供具有或沒有機會給主叫方留下訊息之一特定的 OGM(具有多種OGM的選擇) •終止該通話(例如,在沒有鈴響之下掛斷電話裝置) •當電話被指定路由來鈴響和使用者預先選擇此選項 時,通話轉接/傳呼 •通話等待將會傳送一嗶聲信號給在電話中的使用者 。此嗶聲可以對應到優先權等級的嗶聲形式,以在其中斷 現有的談話之前通知使用者該通話的重要性。 在一實施例中,此通訊控制器1〇〇之軟體的施行可以 被程式化,以直接地支援圖2A和2B的流程圖。此種方法 22 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 -#______丨丨tT_________f·_____________________ 499806 經濟部智慧財產局員工消費合作社印製 A7 ______B7 _ 五、發明說明(y°) 稍後將會被討論。然而,對於此通訊控制器的控制邏輯之 軟體施行的另一種方法是使用模糊推論邏輯(FIL)。圖6係 描述支援FIL處理所需要的獨特處理之流程圖。注意到的 是相同於圖2A中所描述之初始的處理流程是使用來監視 一進入的通話。此優先權是於步驟600之處得到,並且通 話時間資料是於601之處得到。然後,模糊集合歸屬函數 是爲特別的主叫方優先權602而產生。針對主叫方優先權 和時間之明確値是於603之處得到,並且被使用於操作此 FIL的模糊集合。如步驟604所示,此係將資料模糊化至 相對於該等値的歸屬程度。然後,FIL規則係被應用於605 之處。如606之處所示地,產生最強的結果之規則係被認 爲是此裝置應執行之重要的功能的操作,其係對應到明確 的輸出。然後’此輸出操作控制資料於607之處被指定路 由到其它的電話功能。 舉例來說’此FIL的施行可能是利用2個條件的模糊 集合。一條件的模糊集合是針對特定的優先權之阻斷的時 間條件,其之表現係表示在圖7中。另一個條件的模糊集 合是如圖8中所描述之相對的主叫方優先權。 至此FIL之明確的輸入是: 1) 以小時/分鐘/日期資料之通話實際的時間相關値 2) 使用者預先選擇的主叫方優先權之相對値,此例子 使用以下相關之明確的値·· 1=優先權1-騷擾(最低優先權) 2=優先權2-乞求 23 張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公釐) ---- ---——III ^ · Ιί I I--I I AW (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 499806 A7 ___ _ B7 五、發明說明(yl) 3=優先權3-友善的,但不在此資料庫 4=優先權4-賣方/入會 5=優先權5-工作/業務 6=優先權6-次要的朋友 7=優先權7-主要的朋友/遠親 8=優先權8-親密的家人(最高的優先權) 對一特定的主叫方優先權,此阻斷的時間間隔功能是 根據此時間間隔的期間而產生。由圖7中可見,一種用以 達到時間阻斷的間隔功能之方法是去使得此功能在702和 703之間大約的中心處保持90%期間之1的歸屬程度。此 期間剩餘的10%是被分割在點701到702和703到704之 間的間隔中。例如,如果此阻斷的時間間隔開始於晚上9 點並且結束於早上6點而產生540分鐘的期間,則此間隔 的90%是486分鐘的702和703之期間,其將會保持1的 歸屬程度。剩餘的54分鐘被除以2而產生27分鐘的期間 。對於產生的函數的開始點,此歸屬程度是在此27分鐘的 期間701、702之內,從0上升至1的程度。對該結束點而 言,歸屬程度在此阻斷的時間間隔的結束點是〇 ’並且阻 斷的時間間隔之最後的27分鐘內是1。相反地’容許時間 間隔函數可以應用此相同的邏輯來加以產生。 圖8係描述主叫方優先權模糊集合的表現。此模糊集 合保持歸屬函數爲其相關於明確的優先權輸入値。此種表 現係將主叫方優先權對映至如下的相關的進入的通§舌條件 24 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 x 297公爱) --------^-----—^ (請先閱讀背面之注意事項再填寫本頁) 499806 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(yy) •無優先權800 •低優先權801 •中等優先權802 •高優先權803 •最高的優先權804 爲了簡化起見,此例子係利用單元素輸出模糊集合’ 用於如圖9所示之重要的功能操作,其係產生明確的輸出 如下·· 1=掛斷=無優先權電話 2=〇GM4=低/無優先權OGM訊息 3=OGM3 =中等優先權OGM訊息 4=OGM2=高優先權OGM訊息 5=OGMl=最高的優先權OGM訊息 6=鈴響4=低優先權鈴響形式 7=鈴響3=中等優先權鈴響形式 8=鈴響2=高優先權鈴響形式 9=鈴響1=最高的優先權鈴響形式 注意到的是此單元素明確的邏輯是直接可應用於圖2A 和2B的軟體施行。並且,其它的要素可以被加入此單元 素邏輯,例如對於不同的通話等待優先權之嗶聲模式形式 〇 對於這些條件的模糊集合之一代表性的模糊規則集合 係如下: -若時間是阻斷的,和優先權是無,則操作是掛斷; 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------^0--------^ (請先閱讀背面之注意事項再填寫本頁) 499806 A7 一― B7 五、發明說明(乃) -若時間是阻斷的,和優先權是低,則操作是OGM4 ; -若時間是阻斷的,和優先權是中等,則操作是0GM3 9 -若時間是阻斷的,和優先權是高,則操作是0GM2 ; -若時間是阻斷的,和優先權是最高的,則操作是 0GM1 ; -若時間是容許的,和優先權是無,則操作是0GM4 ; -若時間是容許的,和優先權是低,則操作是鈴響4 ; -若時間是容許的,和優先權是中等,則操作是鈴響3 $ -若時間是容許的,和優先權是高,則操作是鈴響2 ; -若時間是容許的,和優先權是最高的,則操作是鈴響 1 ; 爲了討論的目的,而並不是爲了限制,圖10係描述圖 1的通訊控制器之高階的硬體施行爲通訊控制器1000。控 制器系統1000係使用一個微電腦(MCU)。對於此種形式的 應用之MCU的利用是一種典型的方法/施行。然而,在圖 1鐘所指示的功能可以被整合在一起、或是以很多的配置 個別地封裝。這些配置範圍可以從MCU至個人電腦系統 和/或電話/電視系統。 爲淸楚地描述在圖10的通訊控制器1000所需之硬體 支援功能,如下當接收通話之際所執行的步驟之例子是與 有關於此通訊控制器1000的硬體之細節一起被說明。通訊 控制器1000是按照圖2A的流程圖而以軟體被程式化。在 26 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) ----訂-------I I · 經濟部智慧財產局員工消費合作社印製 499806 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(政) 一實施例中,此軟體程式碼是被儲存於控制器1000中的記 億體之內。當控制器1000執行時,此軟體會使得控制器來 施行圖2A和2B的流程圖中所述的步驟。 資料是經由此匯流排被接收和傳送,以容許即 時應答硬體1〇〇1(例如是電話)、訊息應答硬體1002(例如 是電話答錄機)、主叫方識別硬體1〇〇3、和通訊控制器 1000溝通。 當經由通訊線1004接收通話時,此主叫方識別硬體 1003係收到進入的主叫方ID資料。然後從主叫方識別硬 體1003產生一中斷,並且中斷被傳送到通訊控制器之監視 器/IRQ 1010。此監視器/IRQ 1010(例如是中斷控制器)係監 視表明通話正被接收之中斷的接收。在此中斷之後,主叫 方ID資料是從主叫方識別硬體1003經由匯流排1005而被 傳送到通訊控制器MCU輸入埠1009。此資料是經由內部 的匯流排1012而傳送到MCU RAM 1007。 然後主叫方ID資料係與儲存於ROM 1008中的資料做 比較,以得到在圖2A和2B流程圖中的說明所述之優先權 資訊。CPU 1006係進行處理軟體的執行,其於是按照所描 繪的流程圖提供控制邏輯給控制器。此RAM/R0M 1007/1008係提供支援可執行的程式碼之載入所需的記憶 體以及支援即時的處理所需的記億體。此EPROM 1011係 提供支援圖3的主叫方資料庫和圖4的阻斷的時間資料庫 以及圖5的查看表所需的儲存。該內部的匯流排1012是被 使用於支援“本地的,,通訊在通訊控制器1000之內不同的功 27 (請先閱讀背面之注意事項再填寫本頁)1008 ROM 1009 MCU input port 1010 monitor / IRQ 1011 EPROM 1012 internal bus 1013 input port 1014 user device 1101 caller device 1102 central office equipment The communication controller disclosed in the detailed description of the present invention actually eliminates the receiver It comes from a continuous, non-additive interference from unwanted incoming communications (such as 'calls and / or electronic media'). Advantageously, the disclosed controller enables consumers to regain control of their private time with additional cost. For illustrative purposes only, and not to limit generality, this communication controller will be described with regard to its use on incoming calls as an example of its application. The communication controller contains automatic control logic, which intelligently integrates communication routing and filtering functions. The controller manages and controls incoming communications according to the time of day, number of times, form, period, and priority level of receiving communications. Figure 11 roughly depicts a telephone system with 10 paper sizes applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) (Please read the precautions on the back before filling this page) -------- Order --------- Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs of the Ministry of Economic Affairs 499806 __B7__ V. Description of the invention (meaning) (please read the precautions on the back before filling this page) The relationship between the calling device and the receiving device, and shows how the calling device 1101 and the receiving device 1014 are separated from the central office equipment. The function of the present invention is implemented in the receiving device, and therefore has nothing to do with the function of the central office. The disclosed communication controller allows consumers to effectively control the time of day or night when a call is allowed to ring / notify an incoming call. It also allows consumers to establish the priority of incoming calls. These priorities are then used to automatically route calls to the consumer through the telephone in a way that suits the specific needs and price of the consumer. If desired, unwanted incoming calls (for example, from salespeople and harassers) will not even ring. Therefore, under the choice of the receiver, the receiver will not be disturbed. The disclosed controller advantageously converts the telephone into a controllable device that provides timely, efficient, and effective communications with added cost. The disclosed communication controller is first described in terms of its functions in relation to other telephone communication device functions. The representative hardware used to implement this controller will be described in detail later. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs More specifically, FIG. 1 is a functional block diagram showing the overall relationship of the disclosed communication controller 100 with respect to other telephone communication device functions. The processing of a particular incoming call provided via the communication controller depends on time and incoming call priority. It should be noted that the communication controller and related control logic can be applied together with other consumer telephone devices (such as telephones, answering machines, caller ID devices, computers, telephone / TV solutions) and Create consumer products. 11 This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) + " " 499806 A7 B7 V. Description of the invention (1) The communication controller can also be implemented in the telephone service switchboard, and Provided to consumers by telephone service. In one embodiment, as shown in FIG. 1, the instant response device function 101, the message response device function 102, and the caller identification device function 103 can be implemented as an integrated device or independently support the communication controller function 100. The instant answering device function 101 (for example, a telephone device) provides interactive support required by a communication device such as a telephone. Examples of support provided by this device are ringing / announcement, call transfer, call waiting, and paging users to answer incoming calls immediately. The message answering device function 102 (for example, an answering machine) provides the passive support required by the communication device. Examples of support provided by this device are playback, storage, and recording of message data (eg, voice messages, emails, multi-media mail), and users can call / contact at their convenience but not necessarily Respond during placement or agreement. A communication line 104 (e.g., a telephone line or cable) connected to another communication device is coupled to the caller identification device function 103. The calling party identification (ID) device 103 transmits incoming call data, for example, the calling party ID data to the communication controller 100. The communication controller 100 uses the received caller ID data to handle incoming calls. If the incoming caller ID data of a particular incoming call is not available, the communication controller 100 will use a message answering device (such as a telephone answering machine) function 102 to play an outgoing message. (OGM) to prompt callers to enter their identification information. When this communication controller 100 tried to obtain this information, the paper size of this paper was applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) Order- ------- Line—printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 499806 A7 B7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs π 5. Description of the invention ('It will continue to process the call. As a result, The communication controller 100 will use: 1) Instant answering device function 101 to ring / notify the telephone device, transfer the call, call the person who called, support the remote control of the device, terminate the call, via a specific A beep sound indicates to the user to wait for a call, or, 2) a message answering device (for example, a telephone answering machine) functions 102 to release an appropriate OGM and allow the caller to leave a message. Interface 105 supports communication to send and route data between the system functions in Figure 1 described above. Incoming caller ID data may be dependent on the originating device (identifier of the originating device of the call) or on the calling party (identification of the individual caller / individual) . Consumer products using today's technology's caller identification device function 103 are device dependent and provide the caller's phone number and / or name. However, according to the implementation method of the communication controller 100, this data may be the Ip address of a node on the network or other device identifier data. Conversely, caller ID data based on the caller can use such elements as follows: 1) The caller's personal account information (for example, account number, email address, Internet address, etc. .); 2) According to the voice data determined by the speakers, individuals speak their names in order to obtain their temporal voice signal data to indicate their identity; and 3) video data, the caller's unique identification Character image frames (for example, 13 paper sizes are applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) --------- * IIIIII 1 ^ --------- (Please Read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 499806 A7 B7 5. Description of the invention (α), caller's face, retina scan, fingerprint / thumb fingerprint, etc. ) In this embodiment, the communication controller 100 is not based on the caller id data / media format. Instead, the controller 100 only conforms to the data format used by the calling party identification device function 103, which is an external interface of the communication controller 100. The communication controller 100 simply uses this information about the caller, regardless of its form (for example, device-dependent or caller-dependent) to determine the priority given to the caller right. (The communication controller 100 uses the incoming caller ID data to try to compare this data with the caller ID data stored in its database for the determination of the priority of the call.) Figures 2A and 2B— Forms a flowchart describing the flow of operations performed by the communication controller 100 system. The steps shown in Figures 2A and 2B provide an example of the control logic necessary to specify routing and handle incoming calls. The operation starts at the monitor of the incoming call step 200, and when the incoming call is received, a test is performed by the communication controller 100 at decision block 201 to determine the incoming caller ID data does it exist. If the caller ID data exists, it will be read for further processing and monitoring of the incoming password entered from the caller, which is executed at 202. A check is performed at 203 to determine if an incoming password exists. When an incoming password is received, as shown in the bypass block 204, the communication controller logic is bypassed and the call control is directly routed to the instant answering device 101. However, if the caller ID information does not exist, at 212, an outbound message (OGM) is released and the caller is required to provide their caller ID information. If the paper size in box 14 applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling this page) Order ---------- Line · A7 __B7_ " '" " " " " __ 1'Invention note (\,) As shown in 213, the leg device 1GG and then ^ _view reading are provided. The marrow performs an item test at 214. To determine whether a password for λ exists. When the -enter password is received 'as shown in the bypass block 204' the communication controller logic is bypassed 'and the control of the call is directly routed to the instant answering device ΗΠ. However, if the entry password is not found at the test site, then a check is performed at 2 丨 5 to see if the caller ID data has now been provided by the caller. The communication controller 100 then monitors whether there is any caller ID data received. If test 215 determines that the caller ID data has not been received, then the attempt to obtain the caller ID data from the caller at 216 is incremented by one. An entry check is performed at 217 to determine if the caller has been asked to provide their caller ID less than the maximum allowed number of times. If the maximum number of attempts is not exceeded, the communication controller 100 will be 'programmed to send control information to the telephone device as indicated by block 212 to hang up or repeat the request to obtain the caller ID information ( OGM). This iterative process can be repeated a selected number of times based on a maximum threshold. When the calling party is unable to provide valid calling party ID information after being provided the maximum number of attempts, the priority of the call is set to an unknown calling party in block 218 to support further progress deal with. However, if test 215 finds that the calling party has provided their calling party ID information, a calling party ID database searches for calling party ID information called 205 at calling party ID database 206 Field. This search attempts to find the calling party that matches the currently identified calling party ID. 15 This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm). (Please read the notes on the back first (Fill in this page again) -------- Order --------- line. Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 499806 A7 B7 Printed by the Consumers' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the Invention () Records related to the contents of the ID data block. If the caller's 1D match is when the match test 207 is found, then each field of the match record 値 (for example: name, index, priority, 0GM ID, notification ID, number of times, count (number of times), period And urgent operations) are read or obtained at 208 to support further processing. The 'count (count)' field is then incremented by 1 at 209 and the new count (count) is stored at 210 for further processing. (The purpose of this count (number of times) field is to provide the user with a pre-selected number of times so that a particular caller ID can make a call during a specific time period (such as 24 hours) in order to reduce the number of consecutive calls. The trouble of calling from a particular caller.) If a caller's 1D match is not found at 207, the priority field 値 will be set to indicate the identification of the caller (unknown caller Calling party) is not associated with the caller ID database 211. Similarly, all fields of the caller ID record (for example: name, index, priority, OGM ID, notification ID, number of times, count (number of times), period, and urgent actions) are set to zero in block 211 To support further processing. It should be noted that the caller ID data may also be caller-dependent or device-dependent. For example, for device-dependent data, the caller ID data may be composed of the initial phone number or the I · ρ · address used for network implementation. Conversely, the caller-specific data may consist of caller video data, voice form data, and / or private account identification data. If at test 221, the new count (number of times) field is found to be greater than the number of times recorded (see Figure 2B), then the communication controller 100 will be programmed by 16 --------- ---- 1 ------ Order --------- line (Please read the notes on the back before filling this page) This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 499806 A7 B7 V. Description of invention (A) to send control information to the telephone device to notify (OGM) the caller that the call is blocked Yes, unless they indicate that this call is urgent 222. This call is routed to a blocked but has the opportunity to make an emergency call 222, because a particular caller has been allowed more than the number of calls within a predetermined time period (such as 24 hours). The process begins by monitoring input from the caller in block 223. Check 224 is used to determine whether an urgent password has been received. If no emergency code is received, the call will be held in a blocked situation 229. The boxed case along with the determined caller priority case will be used in 227 to find important phone operations information. The operation data related to this device is read from the look-up table 227, and the corresponding control data is transmitted to the system function at 228 (as shown earlier in Figure 1), such as supporting specific operations (for example, bell Ring form, announcement selection, OGM selection, record message, call termination, call transfer, beep selection for call waiting, etc.). The operation control data retrieved from the look-up table 227 will be transmitted to the device function, and the call will be handled as a blocked situation 228 ° If an urgent password has been received in check 224, another A check 225 is performed to determine whether the urgent operation password is valid. When a valid and urgent operation password is used (this password is an important telephone operation data being used under the conditions it supports), this important telephone operation data will be transmitted to the system function 228. However, if urgent operating information is not valid, this emergency situation 226 along with the determined caller priority situation will be used in block 227 to find important phone operations. 17 Chinese National Standard (CNS) A4 Specifications (210 X 297 mm) --II ----------- I ----- Order * 丨 丨 ----- (Please read the precautions on the back before filling this page) 499806 A7 B7 V. Description of the invention (/) Materials. The operation control data retrieved from the look-up table 227 will be transmitted to the device functions. The call will be handled as an emergency call. _ However, if the new count (number of times) field is less than or equal to the number of times field 221, the processing of time blocking to determine the priority of the caller ID will continue as shown in 231. The talk time data is then read at step 217. The call time data includes the hour, minute, day, and date when the incoming call was received 値. A time-blocked database 231 is searched for all blocked times 232 that are performed to get special call priority. The call time data is compared with the time blocking interval related to the call priority. If it is found in test 233 that the time of the call is between the time-blocking intervals, the [J time will be set at 234 as the specific priority of "blocking" the incoming call. However, if the duration of the call is not between the time-blocked intervals 233, the time is set to a specific priority 235 of the "allowed" incoming call. If the time is set to "Blocked", the opportunity for the caller to categorize their call as urgent is to appear at 2 2. If the time is set to allow 237, then the allow case of the look-up table 227 is used to obtain important phone operation information, as shown at 228. Figure 3 illustrates a caller database structure used in an embodiment of a disclosed communication controller. The purpose of this data is to provide the communication controller with the storage of the caller ID data related to the user's access to the specific caller form: set priority data. This data structure is used by the caller ID database search of Figure 2A discussed earlier to obtain the incoming call priority. 18 This paper size is subject to Chinese National Standard (CNS) A4 Regulations (210 X 297 mm) (Please read the precautions on the back before filling this page) Order --------- Line · Ministry of Economy Intellectual Property Printed by the Bureau ’s Consumer Cooperative 499806 Printed by the Consumer Property Cooperative of the Ministry of Economic Affairs ’Intellectual Property Bureau Printed by A7 B7 V. Description of Invention (V >) This caller database structure contains a number of records 310, which are designated as records 1 ... η . As shown in Figure 3, each record contains an incoming caller ID (CID) field 300;-caller name field 301;-index field 302;-OGM ID field 303 notification id field 304 -Caller priority field 305;-Times field 306, which contains a set limit or maximum number of times the caller can potentially ring in a selected period of time; a count field 307 , Which works in conjunction with the number of times field 306 to track the number of calls made by a particular caller within a selected time period (for example, 24 hours); a period field 308 (the period field is to support users Typically selected for the selected amount of time to talk to this particular caller to facilitate scheduling of their time); and an urgent action field 309 (this field contains important information that will be used for the conditions it supports Phone operation control information). This incoming caller ID 300 is a unique identifier for the incoming call. In terms of technology today, the caller ID is the phone number where the call originated. However, the caller ID 300 may be supported by voice / sound identification data (i.e., unique voice or sound information) and / or image processing data (unique image information). This caller name field 301 can be used to store the name associated with the incoming caller ID 300. This index field 302 is used for maintenance of the communication controller 100. When the memory of the database becomes insufficient to store additional records 309, the communication controller 100 may select a candidate based on which record has the lowest priority and is the most stationary according to the indication of the index 302. The memory configuration of this candidate record can then be used to store new data in these fields. The OGM ID 303 field contains the identification of a specific OGM for which specific caller ID data will be played. 19 -------------------- Order ------ --- line (please read the notes on the back before filling this page) This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 499806 Printed by A7 B7, Cooperative of Employees, Intellectual Property Bureau, Ministry of Economic Affairs , Invention description (\\) symbol. This Announcement ID 304 field also contains one specific announcement that will be released for a particular Caller ID profile. The priority field 305 is used to store the relative priority of the calling party 1D according to the user's needs / selections. For example, a relative priority manifestation is given in Table 1 below, where priority 1 is the lowest priority and priority 8 is the highest priority: Table 1 • Priority 1-Harassment (lowest priority) • Priority 2-Begging • Priority 3-Friendly but not in the database • Priority 4-Seller / Enrollment • Priority 5- Job / Business • Priority 6-Secondary Friends • Priority 7- Major friends / distant relatives • Priority 8-Close family members (highest priority) FIG. 4 is a block diagram of a time database structure used in one embodiment of the disclosed communication controller 100. The blocked time database structure is used by test 220 of FIG. 2B to determine whether the incoming call is blocked or allowed based on the time the call was received. This database structure contains a number of records 406, which are designated as record 1 ... ηι. Each record defines a time-blocking interval, that is, a time interval is an incoming call that the user does not want to have a specific priority to cause his phone to ring or notify the caller. Each record 1 ... m contains an index field 400, a block time interval start time field 401, and a block time interval end time field. 20 This paper standard is applicable to China National Standard (CNS) A4 specification (210 X 297 public love) (Please read the precautions on the back before filling out this page) Order --------- line · 499806 Printed clothing for employees' cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Α7 Β7 V. Description of the invention (Y Many) bits 402, a day of the week field 403, a temporary flag 404, and a priority field 405. The index field can be used by the internal communication controller 100 for processing. The start time field 401 is the hour and minute at which the block interval is provided. The end time field 402 provides the hours and minutes at which this blocking time interval ends. This week's date field 403 provides the date between the days when the blocking interval is valid. The priority field 405 is used to store the relative priority of the calling party according to the needs of the user. For example, a one-time blocking interval may be expressed from 10pm to 5am, Sunday to Friday, blocking all priorities except the caller of priority 8-family. The temporary flag field 404 is a flag indicating that the time-blocking interval is temporary. This flag supports the silent mode of this invention. This silent mode allows the user to select a relative period of time to block their call. For example, put all calls in this blocking mode for the next two hours, except the call priority selected by the user. FIG. 5 illustrates a representative look-up table structure used in the disclosed communication controller 100. As shown in FIG. The look-up table structure is used in tests 224 and 236 of FIG. 2B to obtain important operation control data of the integrated telephone device function. These results are based on the conditional results that appear. In particular, this view table structure contains a plurality of records 504, which are designated l. . . p, depending on the number of caller priorities used in any particular embodiment of the communication controller 100. For example, in the embodiment in which the priorities 1-8 are referred to in the above-disclosed Table 1, P will have 8 値. The call was made during this time when the call was blocked 501 and this incoming call 21 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm)! «! —— · 鮝 i! F ---- -• Line · (Please read the notes on the back before filling out this page) 499806 A7 ______ B7 V. Description of Invention (d) Priority 500 is a combination of the specified important operation of the telephone device Is defined. (It should be remembered that the controller retrieves the blocked time information from the blocked time database of FIG. 4, and the controller retrieves the incoming call priority from the caller database of FIG. 3.) An emergency call 503 is performed at the time when the call is blocked, and under the condition that the incoming call priority 500 is specified, the required important operation of the telephone device is defined. Again, under the condition that the call is made at an allowable time 502 and the priority 500 of the incoming call is specified, the desired important operation of the telephone device is defined. The operation system of this telephone device includes a caller identification device function 103, a message response device function 102, and an instant response device function 101. Some of these operations include the following, but are not limited to: • Provide a specific ring pattern (with multiple ring pattern options) • Provide a specific announcement for a specific caller • Provide with or without opportunity Leave a message to the caller with a specific OGM (with multiple OGM options) • Terminate the call (for example, hang up the phone without ringing) • When the call is routed to ring and the user advances When this option is selected, call transfer / paging • call waiting will send a beep signal to the user on the phone. This beep may correspond to a form of priority beep to inform the user of the importance of the call before it interrupts the existing conversation. In one embodiment, the implementation of the software of the communication controller 100 can be programmed to directly support the flowcharts of Figures 2A and 2B. This method 22 This paper size is in accordance with Chinese National Standard (CNS) A4 (210 x 297 mm) (Please read the precautions on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs-# ______丨 丨 tT _________ f · _____________________ 499806 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 ______B7 _ 5. Description of the invention (y °) will be discussed later. However, another method of software implementation of the control logic of this communication controller is to use fuzzy inference logic (FIL). Figure 6 is a flowchart describing the unique processing required to support FIL processing. Note that the same initial processing flow as described in Figure 2A is used to monitor an incoming call. This priority is obtained at step 600 and the call time information is obtained at 601. The fuzzy set attribution function is then generated for a particular caller priority 602. The explicit caller priority and time was obtained at 603 and used to manipulate the fuzzy set of this FIL. As shown in step 604, this is to obfuscate the data to a degree of attribution relative to the puppets. The FIL rule system is then applied at 605. As shown at 606, the rule that produces the strongest result is an operation that is considered to be an important function that the device should perform, which corresponds to a clear output. Then, this output operation control data is routed to other telephone functions at 607. For example, the implementation of this FIL may be a fuzzy set using two conditions. A conditional fuzzy set is a time condition for the blocking of a specific priority, and its performance is shown in FIG. 7. Another conditional fuzzy set is relative caller priority as described in FIG. So far the clear input of FIL is: 1) The actual time of the call with hour / minute / date data is related. 2) The relative priority of the caller pre-selected by the user. This example uses the following related explicit 値 · · 1 = Priority 1-Harassment (lowest priority) 2 = Priority 2-Begging for 23 scales Applicable to China National Standard (CNS) A4 (21〇X 297 mm) ---- ------- III ^ · Ιί I I--II AW (Please read the precautions on the back before filling this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 499806 A7 ___ _ B7 V. Description of Invention (yl) 3 = Priority 3- Friendly but not in this database 4 = Priority 4-Seller / Enrollment 5 = Priority 5-Work / Business 6 = Priority 6-Secondary Friends 7 = Priority 7-Major Friends / Distant Relatives 8 = Priority 8-Close family (highest priority) Priority is given to a particular caller. The blocking time interval function is based on the duration of this time interval. As can be seen in Fig. 7, one way to achieve the time-blocking interval function is to make this function maintain a degree of belonging to 1 of the period of 90% at approximately the center between 702 and 703. The remaining 10% of this period is divided into intervals between points 701 to 702 and 703 to 704. For example, if the time interval of this block starts at 9 pm and ends at 6 am, resulting in a period of 540 minutes, 90% of this interval is between 702 and 703 of 486 minutes, and it will remain at 1 degree. The remaining 54 minutes is divided by 2 to produce a 27 minute period. For the starting point of the generated function, the degree of attribution is a degree of rising from 0 to 1 within these 27-minute periods 701, 702. As for the end point, the degree of attribution at the end point of the blocking time interval is 0 'and the blocking time interval is 1 in the last 27 minutes. Conversely, the 'tolerable time interval function' can be generated using this same logic. Figure 8 describes the performance of the caller's priority fuzzy set. This fuzzy set keeps the attribution function related to its explicit priority input 値. This kind of performance is to map the calling party's priority to the following related entry conditions: 24. This paper size applies the Chinese National Standard (CNS) A4 specification (21〇x 297 public love) ------ -^ -----— ^ (Please read the notes on the back before filling out this page) 499806 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of Invention (yy) • No priority 800 • Low Priority 801 • Medium priority 802 • High priority 803 • Highest priority 804 For the sake of simplicity, this example uses a single-element output fuzzy set for important functional operations as shown in Figure 9, which generates The clear output is as follows: 1 = Hang up = No priority call 2 = 〇GM4 = Low / No priority OGM message 3 = OGM3 = Medium priority OGM message 4 = OGM2 = High priority OGM message 5 = OGMl = Highest Priority OGM message 6 = ringing 4 = low priority ringing form 7 = ringing 3 = medium priority ringing form 8 = ringing 2 = high priority ringing form 9 = ringing 1 = highest priority The right bell ring form notices that this single-element explicit logic is directly applicable to the software implementation of Figures 2A and 2B. And, other elements can be added to this single-element logic, such as the beep pattern form for different call waiting priorities. One representative fuzzy rule set for these conditions is as follows:-If time is blocked , And the priority is None, the operation is to hang up; This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -------- ^ 0 ------- -^ (Please read the precautions on the back before filling this page) 499806 A7 Ⅰ-B7 V. Description of the invention (Y)-If the time is blocked, and the priority is low, the operation is OGM4;-If the time is Blocked, and priority is medium, the operation is 0GM3 9-If time is blocked, and priority is high, the operation is 0GM2;-If time is blocked, and priority is the highest, then The operation is 0GM1;-if time is allowed, and priority is none, operation is 0GM4;-if time is allowed, and priority is low, operation is ringing 4;-if time is allowed, and The priority is medium, then the operation is ringing 3 $-if time is allowed, and priority is high, then The operation is ringing 2;-If time is allowed, and the priority is highest, the operation is ringing 1; For discussion purposes, not for limitation, Figure 10 is a high-level description of the communication controller of Figure 1 The hardware implements the communication controller 1000. The controller system 1000 uses a microcomputer (MCU). The use of an MCU for this form of application is a typical method / implementation. However, the functions indicated in Figure 1 may be integrated together, or individually packaged in many configurations. These configurations can range from MCUs to personal computer systems and / or telephone / television systems. In order to clearly describe the hardware support functions required by the communication controller 1000 in FIG. 10, an example of the steps performed when receiving a call is described below with details about the hardware of the communication controller 1000 . The communication controller 1000 is programmed in software according to the flowchart of FIG. 2A. In 26 paper sizes, the Chinese National Standard (CNS) A4 specification (210 X 297 mm) applies (please read the precautions on the back before filling this page) ---- Order ------- II · Ministry of Economic Affairs Printed by the Intellectual Property Bureau employee consumer cooperative 499806 Printed by the Ministry of Economic Affairs Intellectual Property Bureau employee consumer cooperative A7 B7 V. Invention Description (Politics) In one embodiment, this software code is stored in the controller 1000. Inside. When the controller 1000 executes, this software causes the controller to perform the steps described in the flowcharts of FIGS. 2A and 2B. Data is received and transmitted via this bus to allow instant response hardware 1001 (for example, a telephone), message response hardware 1002 (for example, a telephone answering machine), and caller identification hardware 100. 3. Communicate with the communication controller 1000. When a call is received via the communication line 1004, the caller identification hardware 1003 receives the incoming caller ID data. An interrupt is then generated from the caller identification hardware 1003, and the interrupt is transmitted to the monitor / IRQ 1010 of the communication controller. This monitor / IRQ 1010 (for example, an interrupt controller) monitors the reception of an interrupt indicating that the call is being received. After this interruption, the caller ID data is transmitted from the caller identification hardware 1003 to the communication controller MCU input port 1009 via the bus 1005. This data is transferred to the MCU RAM 1007 via the internal bus 1012. The caller ID data is then compared with the data stored in ROM 1008 to obtain priority information as described in the description of the flowcharts of Figures 2A and 2B. The CPU 1006 executes processing software, which then provides control logic to the controller according to the flow chart depicted. This RAM / R0M 1007/1008 provides the memory needed to support the execution of executable code and the memory needed to support real-time processing. This EPROM 1011 provides the storage required to support the caller database of FIG. 3 and the blocked time database of FIG. 4 and the viewing table of FIG. 5. The internal bus 1012 is used to support the "local, communication, different functions within the communication controller 1000 27 (Please read the precautions on the back before filling this page)
本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 499806 A7 B7 五、發明說明(〆) 能之間。 在一實施例中,例如是使用者選擇的優先權和阻斷的 時間間隔之輸入値是由使用者輸入此些値至即時應答硬體 1001(例如是電話裝置)而被提供到通訊控制器1000。這些 値然後被傳送到通訊控制器1000以儲存在其中的記憶體內 。或者是,例如一鍵盤裝置的輸入裝置或是個人電腦可以 在輸入埠1013被結合到通訊控制器1000以提供用於此種 値的輸入。 雖然一種用以控制進入的通訊的方法已描述於上,但 淸楚的是一種處理包含主叫方識別資訊之進入的通訊之通 訊系統也被揭露。簡言之,此揭露系統包含一種用以接收 進入的通訊和從進入的通訊取出主叫方識別資訊之主叫方 識別裝置。此系統也包含一個使用者通訊裝置用以接收和 提供該通訊裝置的使用者一進入的通訊。此系統更進一步 地包含一通訊控制器,其係結合在此主叫方識別裝置和使 用者通訊裝置之間。在一實施例中,此控制器係包含一處 理器用以執行程式碼,以控制進入的通訊之傳送至使用者 通訊裝置。此控制器更進一步地包含儲存程式碼的記憶體 ,供該處理器得以執行來控制進入的通訊傳送至該通訊裝 置。此儲存的程式碼係包含具有複數個記錄的主叫方資料 庫,每一個記錄都包括對應於一特定的主叫方之主叫方識 別資訊和從複數個優先權選出的個別的優先權。此儲存的 程式碼也包含一具有複數個記錄之阻斷的時間資料庫,每 個記錄係個別地對應於複數個優先權並且包括對於每一優 28 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) " (請先閱讀背面之注意事項再填寫本頁) -ϋ ί n ϋ βϋ m n 一 > n in I n n __1 n I * 499806 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(>) 先權之個別的阻斷的時間資訊。如之前詳細討論地,依據 一特定的進入的通訊被接收的時間和按照複數個優先權中 之哪個優先權而定,此通訊是被阻斷、允許或其它的適當 行動被採取。 簡言之,所揭露的方法和裝置係有利地限制通訊裝置 的使用者之暴露於不希望的通訊之下,其係藉由使用在一 實施例中爲被施行在或是靠近此通訊裝置之先進的控制機 構。此控制方法和裝置係允許消費者主動地控制如何、何 時、和消費者是否應答進入的通訊。有利地,此揭露的方 法係轉變通訊裝置(例如,電話、電腦、和/或電視)從一被 動的裝置到可控制的裝置,其係結合個別的時間管理値和 消費者自訂的消費者優先權。進入的通訊係依據特定的通 訊被接收的一天中的時間、次數、形式、和優先等級來被 管理和控制。在此種方式下,使用者是被准許去控制進入 的通訊。 雖然只有一些本發明較佳的特性已經藉由說明而被展 示,但是許多的修改和改變將會由熟習此項技術者思及。 因此,應了解的是本申請專利範圍是試圖涵蓋所有落入本 發明之真正的精神中之此種修改和改變。 29 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----#裝--------訂-------I--線^^ (請先閱讀背面之注意事項再填寫本頁)This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 499806 A7 B7 V. Description of invention (〆). In one embodiment, for example, the input of the user-selected priority and blocking time interval is input by the user to the instant response hardware 1001 (for example, a telephone device) and provided to the communication controller. 1000. These frames are then transmitted to the memory of the communication controller 1000 for storage therein. Alternatively, an input device such as a keyboard device or a personal computer may be coupled to the communication controller 1000 at the input port 1013 to provide input for such a device. Although a method for controlling incoming communication has been described above, it is clear that a communication system that handles incoming communication that includes caller identification information has also been disclosed. In short, the disclosure system includes a caller identification device for receiving incoming communication and extracting caller identification information from the incoming communication. The system also includes a user communication device for receiving and providing incoming communication to users of the communication device. The system further includes a communication controller which is integrated between the caller identification device and the user communication device. In one embodiment, the controller includes a processor for executing code to control transmission of incoming communication to a user communication device. The controller further includes a memory storing code for the processor to execute to control incoming communication to be transmitted to the communication device. The stored code contains a caller database having a plurality of records, each record including caller identification information corresponding to a particular caller and individual priorities selected from the plurality of priorities. This stored code also contains a blocked time database with a plurality of records, each record individually corresponding to a plurality of priorities and including the application of Chinese National Standard (CNS) A4 for each of the 28 paper standards. Specifications (210 X 297 mm) " (Please read the precautions on the back before filling out this page) -ϋ ί n ϋ βϋ mn 一 > n in I nn __1 n I * 499806 Employees ’Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs Print A7 B7 V. Description of the invention (>) Time information of the individual blocking of the prior rights. As discussed in detail previously, depending on when a particular incoming communication is received and which of a plurality of priorities, the communication is blocked, allowed, or other appropriate action is taken. In short, the disclosed methods and devices advantageously limit the exposure of users of communication devices to undesired communication by using them in an embodiment to be implemented at or near the communication device. Advanced control mechanism. This control method and device allows the consumer to actively control how, when, and whether the consumer responds to incoming communications. Advantageously, the disclosed method is to transform a communication device (eg, telephone, computer, and / or television) from a passive device to a controllable device, which combines individual time management and consumer-defined consumers priority. Incoming communications are managed and controlled based on the time of day, number of times, form, and priority of a particular communication being received. In this way, the user is permitted to control incoming communications. Although only some of the preferred features of the present invention have been shown by description, many modifications and changes will be considered by those skilled in the art. Therefore, it should be understood that the scope of this application patent is intended to cover all such modifications and changes that fall within the true spirit of the invention. 29 This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) ----- # 装 -------- Order ------- I--line ^^ ( (Please read the notes on the back before filling out this page)
Claims (1)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/293,041 US6359970B1 (en) | 1998-08-14 | 1999-04-16 | Communications control method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
TW499806B true TW499806B (en) | 2002-08-21 |
Family
ID=23127384
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW89124018A TW499806B (en) | 1999-04-16 | 2000-11-14 | Communications control method and apparatus |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW499806B (en) |
-
2000
- 2000-11-14 TW TW89124018A patent/TW499806B/en active
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6359970B1 (en) | Communications control method and apparatus | |
TWI289397B (en) | Method of varying the behavior of a mobile phone based on unhandled events on the mobile phone and apparatus | |
JP5351787B2 (en) | Communication processing system and program | |
US8139747B2 (en) | Method and apparatus for selective silencing of telephone ringing | |
JP2002218010A (en) | Call reception prompter for individual | |
JPH06508968A (en) | telephone marketing system | |
JP6040129B2 (en) | High-functional telephone | |
JP2008118409A (en) | Exchange system | |
EP2187608A2 (en) | Call relay system, call relay device, call relay method and program | |
JPH04336742A (en) | Exchange service control system | |
TW499806B (en) | Communications control method and apparatus | |
JP2010028678A (en) | Telephone service system and telephone service method | |
JP6584993B2 (en) | Call processing system and call processing method | |
US9749469B2 (en) | Method and apparatus for selective silencing of telephone ringing | |
JPH06244944A (en) | Future telephone call block instrument | |
US8045684B2 (en) | Securely sending notification of a new incoming e-mail message by way of a public network | |
JP2001237968A (en) | Busy-call processing system | |
JP4056463B2 (en) | Registration and deletion method of outgoing call restriction telephone number in key telephone | |
EP1226704A1 (en) | Communications control method and apparatus | |
JP2003023486A (en) | Telephone set, information management server, originator information notifying method and originator information notifying program | |
JP2000299737A (en) | Notification service system for information of telephone subscriber | |
JP2001346236A (en) | Voice response telephone call transfer system | |
US20030097411A1 (en) | Method and apparatus for providing caller ID information with voicemail services supplied by the phone company | |
JP2023014200A (en) | Speech system, speech method, and program | |
JP2005184373A (en) | Telephone set with automatic answering function and connection control method therefor |