Monitoring System BACKGROUND OF THE INVENTION
1. Field of the Invention.
The present invention concerns monitoring systems for monitoring whether or not a person has reached or left one or more selected destinations.
2. Description of the Prior Art.
Such systems are already known and are particularly useful in the expanding field of home caring. In the last few years there has been a substantial increase in the number of elderly or incapacitated people who live in their own homes and are reliant on regular visits by carers. The carers can be employed by local authorities or independent organisations.
In either case it is necessary for management to be able to monitor the staff who carry out the actual visits in order to ensure that the visits are both actually made and also importantly, made at the right time.
Before the arrival of Computer Integrated Telephony (CTI) such monitoring would normally be carried out on the basis of time logs filled in by individual staff. More recently systems have involved a carer calling into a central office and inputting an identifying PIN
number. A similar call on departure will identify the period at which the caller was at a particular address as Caller Line Identification (CLI) will supply the time, date and location of the calls.
A disadvantage of such a system is that calls actually have to be completed by being answered at the central office. This causes additional expense and also talces time.
A concern of the present invention is to provide a simple yet efficient monitoring system.
Thus an embodiment of the invention provides a monitoring system in which incoming calls remain uncompleted, i.e. no expenses incurred, and in which a call is returned automatically to the original caller.
However there still remains the problem in that many organisations employing carers require, for payroll a~ld client billing purposes, confirmation with regard to each visit of the actual identity of the carer rather than just confirmation that a visit has been made at a particular client location. With the earlier situation in which the incoming calls are answered and the carer enters an identifying PIN the carer is identified immediately. In the unanswered system of the first embodiment of the invention.the carer's identity is only confirmed by referring to a prior schedule which matches the location from which the incoming call was made with the carer who in accordance with the schedule was meant to make the visit. However this means that the schedule has to be updated constantly as errors can arise if the schedule is out of date. This is difficult to achieve.
There is therefore the rislc of inaccuracies occurring in the electronic time sheets that are produced as a result of the matching process. Such discrepancies could have serious consequences if the system was to be used as a basis for determining staff pay.
SUMMARY OF THE INVENTION
The present invention is also concerned with providing a solution to this problem whilst still giving the cost saving advantages of an unanswered calling system. One aspect of the invention comprises a monitoring system for monitoring incoming telephone calls routed through a call system, the system comprising an electronic processor and an associated database, the system being adapted to detect the originating number of the caller and the called number to which the incoming call was made, and to store the time and date of an incoming call the number of which has been identified and data representing the number to which the incoming call was made.
The present invention can be implemented by a computer program operating on a standard desk top computer. An aspect of the present invention thus provides a storage medium storing processor implementable instructions for controlling a processor to carry out the method as hereinabove described. Further aspects of the invention will be apparent from the description and the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
In order that the present invention may be more readily understood, an embodiment thereof will now be described by way of example and with reference to the accompanying drawings, in which:
Figure 1 shows a general overview of a monitoring system incorporating the present invention;
Figure 2 is a flow diagram of the basic operation of the monitoring system of Figure 1;
Figure 3 is a block diagram of the hardware involved in the monitoring system of Figure 1;
Figure 4 is a flow diagram of the operation of application software for the hardware of Figure 3.
Figure 5 shows a general overview of a second embodiment of the monitoring system incorporating the present invention;
Figure 6 is a block diagram showing some of the hardware of Figure 5 in greater detail;
Figure 7 is a flow diagram of the basic operation of the monitoring system of Figure 6;
Figure ~ is a flow diagram of the operation of application software for the hardware of Figure 4 but modified in accordance with the second embodiment, Figure 9 is a flow diagram of an additional facility, Figure 10 is a flow diagram of an auto check-up sequence, Figure 11 is a flow diagram of an event processing routine forming part of the operation of the monitoring system according to the invention, Figure 12 is a flow diagram of part of the operation of remote use of aii event menu procedure, and Figure 13 is a magnetic view of part of a display generated by the system according to the invention.
MORE DETAILED DESCRIPTION
Whilst the following description is given in relation to a home caring situation it will be appreciated that there are many other situations where it is wished to monitor the visits of people to outside locations other than the home caring situation.
Referring now to Figure 1 of the accompanying drawings the Public Services Telephone Network (PSTN) is shown at 1. Two locations 2 and 3 each with a telephone represent sites to be visited by a user of a monitoring system. As shown in Figure 1 the monitoring system comprises a programmable electronic processor 4, a database 5, a printer 6 and modem 7 whereby data can be sent to clients via the Internet.
The database for example can comprise an extenial hard disc or internal memory space of the processor 4.
It will be appreciated that the monitoring system to be described can be used in a number of different ways. Firstly an organisation employing people who travel from place to place, such as home carers, can operate the system themselves. The monitoring system can also be used by one organisation to monitor activities on behalf of one or more other organisations.
Referring now to the flow diagram of Figure 2, step S 1 represents the point at which a visitor such as a carer rings into the monitoring system for example from location 2. At step S2 the call is received at the monitoring system 4. It is assumed that CLI is available on the incoming call. Using CLI the call is time logged and the source number identified at step S3. However the call is not answered and the circuit between the caller and the monitoring system 4 is not completed. This is achieved by the caller hanging up at step S4 within a short specified period, for example after two, three or four rings. At step SS the monitoring system automatically returns the call to the originating number. Once again this call is not answered and the monitoring system is programmed to hang up at step S6 after a short predetermined period, for example two rings. This sequence is carried out at the start of a visit. When the caller has completed his/her business at location 2, a call is once again made to the monitoring system which follows the same procedure.
Thus a clear record is made of both the start and end times of the visit. The caller then proceeds to the next location, location 3, and the pxocedure repeated.
By way of alternatives to the caller hanging up at step S4, the system can respond differently for example in order to give the caller assurance that the correct number has been dialled into the system without requiring a response call as set out at step S5, though of course this may be given also. In one alternative, the system presents the caller with a busy tone after a predetermined number of rings such as two rings.
Referring now to Figure 3 of the accompanying drawings, this shows in block form the functional organisation of the monitoring system of Figure 1.
In the present embodiment the main haxdware is a personal computer generally indicated at 10 which can be an IBM (RTM) or IBM compatible computer operating in a Microsoft Windows (RTM) environment though of course both the type of computer is not essential and the operating system need not necessarily be Windows based.
Alternative systems include DOS and UNIX.
The computer 10 is provided with a plug-in card 11 enabling the computer to receive calls from the PSTN. A typical card is a Dialogic pro-card, part number D/21H-UK manufactured by the Dialogic Corporation of the USA. This plug-in card 11 interacts via Microsoft Windows (indicated at 12) with another software suite 13 such as the Parity Callsuite manufactured by the Parity Software Corporation of the USA. The Parity Callsuite provides a comprehensive set of VBX and OCX controls and can also be used in a number of different operating environments such as Visual Basic, Visual C++, Delphi and Visual Fox Pro.
The software suite 13 in turn interacts with application software 14 in accordance with the flow diagram shown in Figure 4 of the accompanying drawings. Thus the application software 14 receives notification of an incoming call from the suite 13 at step S 10. At step S I 1 the application software checks if CLI is available. If not, the flow ends at step S12 in the embodiment shown in figure 4 though more sophisticated call handling is described later with reference to figures 7 and 8 for example. If the answer is YES the flow proceeds to step S 13 where the application software looks for the clients' details in the database 5. Optionally however, if CLI is available at step S 11 then at S 11 a the system determines whether the call is from a carer number. If the call is from a known carer number, such as the carer's home phone number or mobile phone number for example, then the system recognises that the carer requires to enter details of a visit from a remote location to a client and accordingly, the remote menu options can be provided as described in relation to step S 130 onwards in relation to figure 12. If the call is not from a carer then the flow proceeds from step S 1 I a to S I 3 . At step S 14 a decision is made with regard to the existence of the clients' details. Even if the incoming number is not matched with a client number the details of the incoming call are stored at step S 15 in the database 5 as there is a possibility that the monitoring system will not have been informed of a new client number.
If the number of the incoming call is matched in step S 13 with a client then in step S 16 an attempt is made to match the time of the call with a schedule of times stored in database 5 and once again details of the call are stored in step S 15 in the database.
At step S 17 the application software 14 takes the phone off hook and at step dials the stored telephone number, waits a predetermined number of seconds while the dialled number rings and at step S 19 hangs up without a call having ever been completed.
In many cases the monitoring system will be acting for a plurality of clients each of whom will have a number of people malting regular visits and who will require to have regular reports on the dates, times and extent of the visits.
Thus at step S20 the application software separates matched and unmatched incoming numbers, collates the matched number in accordance with the client to which they belong, generates data at step S21 showing whether or not a matched call corresponds to a scheduled visit and generates one or more reports at step 522. These can be displayed, printed by the printer 6 for onward transmittal or sent to the clients via the Internet connection 7 or (permanently connected) to a leased line or dial-up modem.
Whilst the forgoing description has been given with regard to the PSTN it will be appreciated that what has been described is equally applicable to a local network, or that the monitoring system is itself located in LAN or a WAN connected to the PSTN.
From the foregoing description it will be appreciated that the monitoring system described has a number of advantages over the prior art. All unanswered call systems work on the basic principle that CLI and date/time information is transmitted along phone lines before a connection is made I.e. without incurring call charges. The present embodiment differs in that when a user replaces the handset after allowing the phone to ring a prescribed number of times, instead of hearing nothing, after a short pause the system automatically dials and returns a number of rings to the incoming caller, and then hangs up.
The whole process can take less than 10 seconds. In a modification of the embodiment just described the system can hang up automatically after a predetermined number of rings if the caller continues to ring over the normal number. This prevents the system from getting clogged .
The main problem with existing CLI only monitoring systems is that the person making the call has no way of knowing if their call has been logged or not.
For example, they may have dialled the wrong telephone number or they may not have let the phone ring a sufficient number of times for the system to pick up the CLI as 1 ring is usually the minimum on an analogue system.
It would be very difficult to prove or disprove whether the caller has or has not phoned in - or more to the point whether they made the visit or not - as the caller could argue that the system did not pick up the call. With the system as described, not only will the caller have received verification that the call was received and CLI
recorded by means of the automatic ring-back facility, but also the system can tell the controller that the caller received confirmation by showing whether the ring back was successful or not.
One of the difficulties of conventional CLI only systems is that there is a small chance that CLI will not be picked up even from a telephone which normally sends a CLI
signal. The intermittent disruption to the CLI transmission is unpredictable and means that there will always be a percentage of calls which will show as exception errors and can never be matched to a client. This makes such systems inherently fallible if accurate time sheet replication is required. The advantage of approach described in the present specification is that if an intermittent CLI problem occurs and the caller does not hear a ring-back on the first time they ring, all they have to do is ring the number once again and it is almost certain that they will get a ring-back on their second attempt.
The system could potentially be used to notify the caller of whether they are making an arrival or departure call by varying the number of rings that the caller hears on ring-back (e.g. 1 ring for arrival, 2 rings for departure). This would work by programming the system to recognise where the caller is calling in for the first time from a particular number and then recognising where the caller is calling for the second time from that same number -during the same visit. This could be done by matching calls to Care Plans or by ensuring that the caller makes all calls exactly in sequence i.e. 1 call in and 1 call out for every visit.
It would assume that the correct number of calls were made for each visit or use a more sophisticated matching routine as described later in relation to figure 11 for example.
Referring now to Figure 5 of the accompanying drawings the Public Services Telephone Network (PSTN) is shown at 1 this shows a second embodiment of the present invention. Two locations 2 and 3 each with a telephone represent client sites scheduled to be visited by a specific user of a monitoring system. Two further locations 2' and 3' are scheduled to be visited by another user of the monitoring system. In a system in which incoming calls were answered each user would have their own PIN number. As shown in Figure 5 the monitoring system comprises a programmable electronic processor 4, a database 5, a printer 6 and modem 7 whereby data can be sent to customers via the Internet or dial-up modem connection. The database for example can comprise an external hard disc or internal memory space of the processor 4. Here, reference is made to a customer meaning the organisation fox whom the callers, in the examples given carers, work. Whilst such an organisation could run the system or systems described herein themselves, it is envisaged that the system will be run by a service provider on behalf of one or more carer organisations or agencies.
Accordingly, it will be appreciated that the monitoring system to be described can be used in a number of different ways. Firstly an organisation employing people, such as home carers, who travel from place to place, can operate the system themselves. The monitoring system can also be used by one service provider company to monitor activities on behalf of one or more other organisations. Also shown in Figure 5 is a node 9 of the PSTN to which the calls from the locations 2, 2', 3 and 3' axe directed before being received at the monitoring system. The overall telephony system shown in Figure 5 is an ISDN-system (Integrated Services Digital Network) or a comparable system. A
feature of ISDN systems is that a user is able to purchase a number, usually a 0800-number which is free to the caller. Such numbers will be referred to hereinafter as "free call numbers".
Thus a caller dials the free call number and is then transferred to the call's final destination which bears the cost of the call rather than the caller. Tn addition ISDN
supports what is known as DNIS (Dialled Nuunber Identification Service). By means of the latter feature the recipient of an free call can not only, using CLI (Caller Line Identification), identify the telephone and thus the location from which the call was made but also identify the 0800 number to which the call was made. Whilst free call numbers are preferred in many instances, they are not essential. It is possible to use direct dial in numbers known as DDI
numbers in an ISDN system which direct dial numbers would carry a charge if a call were answered. Of course, where the call is unanswered there is no charge to the owner, generally the client, of the telephone from which the call was made. However, there is a benefit in using free call numbers where exceptionally a call is answered for example in order to deliver messages to a carer thereby avoiding any charge to the client. Also, it will be appreciated that whilst ISDN is preferred in order to enable call transference, an analogue system is possible albeit more complex and presently more expensive in that a greater number of land lines are required compared to a comparable ISDN
The present embodiment proposes that by utilising this DNIS feature together with the CLI information the caller can be identified unambiguously without the need to answer a call. Thus each caller is given his or her own individual free call number for a particular area. This can be done because it is a relatively simple and inexpensive matter for an organisation to acquire a sequential batch of 0800 (or other DDI) numbers so that each number can be allocated to a specific user.
This arrangement is shown in greater detail in Figure 6. Similar integers in this figure have been given the same reference numerals. However the diagrammatic telephones 20, 21 and 22 each represent a different user with a different free call number which in the present embodiment is a 0800 number. Three are shown, but the number associated with telephone 22 is indicated as 0800..n to clearly indicate that this number is not limiting. Naturally each carer will travel within his or her allocated region to a number of clients. As shown all the telephones connect to the exchange 9 in such a manner that the exchange transfers the calls to a single number at the premises of the company carrying out the monitoring.
Tlus is done by the function indicated at box 22 and is transferred to the premises via an ISDN-30 connection 23. At the premises an appropriate telephony card 24 in the computer 4 obtains the original 0800 numbers called using DNIS.
If the organisation acquiring and using the 0800 numbers is a large one it is still not necessary to have an individual number for every user. Tlus is because the DNIS
information is coupled with CLI which gives the location of the originally dialled call.
Thus the coupling of the two pieces of information will identify the caller provided that users with the same 0800 number are distributed so that no number is ever used more than once in a particular telephone region, that is in the UI~ in a particular STD
It must also be appreciated that the system just described can operate without the use of 0800.... numbers or any other kind of "free call" number. Any number can be used provided that the caller has a unique ntunber. The 0800 number merely ensures that a client and or carer does not have to pay for the call.
The hardware and functional organisation of the monitoring system of Figure 5 is the same as that of the first embodiment and is shown is Figure 3 and will not be described again. Turning now to the flowchart of Figure 7, the application software 14 receives notification of an incoming call from suite 13 at step S 10. For the purposes of this flowchart it is assumed that DNIS is available. At step S11 the application software checks if CLI is available. If not the call is answered at step S 12 and the carer's PIN is requested at step S 13. In either case data representing the carer's identity is entered to step S 14. In this step the client's details as identified either by CLI or the input PIN are compared with client's details on the database 5. At step S 15 a decision is made as to whether or not a match has been found in the database 5. If the incoming number is not matched with a client location the details of the incoming call are stored at step S 16 in the database 5 as there is a possibility that the monitoring system will not have been informed of a new client number. ' If the number of the incoming call is matched in step S 14 then in step S 17 the DNIS
is used to lookup the carer details in the database 5. If at step S 17 a match cannot be found this information is stored in the database 5 in step S 16. Otherwise after step S 1 ~ an attempt is made to match at step S 19 the time of the call with a schedule of times stored in database 5. Additionally the final details of the call are stored in the database. The final details will include the client location and the carer's identity if these were available.
At step S20 the application software 14 takes the phone off hook and at step dials the stored telephone number, waits a predetermined number of seconds when the dialled number rings and at step S22 hangs up without a call having ever been completed.
In many cases the monitoring system will be acting for a plurality of customers each of whom will have a number of people malting regular visits and who will require to have regular reports on the dates, times and extent of the visits.
Thus at step S23 the application software separates matched and unmatched incoming numbers, collates at step S24 the matched number in accordance with the client to wluch they belong, generates data showing whether or not a matched call corresponds to a scheduled visit and generates one or more reports. These can be displayed, printed by the printer 6 for onward transmittal or sent at step S25 to the clients via the Internet connection 7 or other suitable electronic media, eg leased line or dial-up modem.
It will be appreciated that steps 520, S23-S25 are optional and that the acquired data can be processed in other ways provided that information corresponding to CLI and DNIS is available or equivalent.
Advantageous additional features of the second embodiment will now be discussed.
Thus it is possible to identify whether a call represents an arrival or a departure. Using digital or analogue telephone connections, it can be identified when a caller hangs up -without the call being answered. By automatically recording a. when the call is first presented to the system, (that is the ring tones commence) and b. when the caller hangs up (the ring tones cease) it can be measured how long the calling party allowed their phone to IO
ring the system number. Another advantage is that by knowing exactly when the calling party hangs up the system can immediately send the return call without any delay. This is an improvement on the existing system whereby the system sends a return call after a predetermined time period i.e. when it thinks the caller has hung-up.
By instructing users of the system to vary the length of time they allow the phone to ring for when calling the system, the different types of visit events can thus be readily identified. One useful application of this process is to record whether the caller is arriving at a client's home at the start of a visit or leaving a client's house at the end of a visit. So, for example, the caller could allow the phone to ring 3 times on arrival and 5 times on departure. In order to confirm to the caller that the system has correctly identified the visit type, the application software can be programmed to vary the number of times it makes the client's telephone ring during the ring baclc process. This could be the same number of times the caller rang or a different number e.g. 2 for arrival and 3 for departure. Again, in all cases, there is no requirement for either the initial call or confirmation call to be answered in order for visit details to be recorded. Calls can be connected, however, if desired as in the case described below.
One of the fundamental features of the system described in this specification is the ability to automatically make a return call to the calling party within 10 seconds of the original call. An improvement to this process is when the return call can be automatically programmed to ring until answered (or for a specified time period) under certain conditions. One of the principal features of the system in its current application as a home care monitoring device is in its ability to facilitate communication between managers/supervisors and field workers. Traditionally, if a manager/supervisor wishes to make contact with a certain member of staff they would probably look at a schedule of work to identify where the field worker in question was expected to be.
Because of the nature of the job, it is extremely unusual for home care staff to adhere rigidly to a fixed time schedule of work and hence the manager/supervisor may have to make many calls to different clients before tracking down the field worker and communicating with them.
Many care workers do now carry mobile phones but it is costly to make calls from fixed line to mobile phone services.
As already described existing systems rely on calls being answered and a PIN
number recorded to identify the intended recipient. The solution proposed in the present case provides carer identification through DNIS and hence the system will recognise if a carer has a message waiting for them without the call being answered. 1n this solution, there are two alternatives according to customer preference for how the message can be retrieved. Firstly, the system can automatically play the message to the recipient when the caller rings the system and within the 2 to 5 rings that the caller would normally make before hanging up using the unanswered system. The message would be played and an option given at the end of the message for the recipient to record a return message to the originator if they so desire. Secondly, the system can be programmed to -initially - treat the call as a normal call and wait for the caller to hang up after 2 to 5 rings. However, when the system calls back it can make the clients phone continue to ring until the call is answered (or certainly for a much longer time period than the usual 2 to 5 rings). When the call is answered, the message is delivered as before and again with the option for the recipient to leave a return message if so desired.
The advantage of the second option for message delivery is in the fact that the caller will be more likely to respond to the phone ringing out continually as it is an obvious means of communication. The risk with the first option is that the caller will be so used to their initial call not being answered (as it is anticipated that only a small percentage of callers would have a message waiting for them) that they may not even hold the phone to their ear when calling the system. Another advantage to the second option is that because the message is delivered during the ring back process it is always the call centre (monitoring service provider) which will incur the direct call charges for the delivery of the message. This is an important issue as many home care users, clients, are older and often confused - they have genuine concerns that they may be paying for the cost of calls on their telephone bill. In reality this cannot happen as 0800 numbers are utilised for this service - whether calls are answered or unanswered, this system does give added reassurance to clients.
Turning now to Figure 8 of the accompanying drawings this figure is a flow diagram of the operations wluch can be carried out by the enhanced system just described.
As in the previously described flow diagrams the first two steps S50 and S51 represent receipt of an incoming call by the software suite and determining if CLI is available or not.
However if CLI is not available the data flow does not end. Instead the system offers alternative options which are shown in the Figure as parallel branches at "A". In the first option the call is answered at step S52 within the number of rings that the caller would normally be waiting for such as 3 rings. The carer is asked, preferably by a recorded message at step 53 to redial prefixing the number in the UI~ system with the number 1470.
This temporarily switches off the CLI barring for this call only. The caller then responds after hanging up at step 54 by redialling at step S50 with the 1470 message.
In the other option the call is again answered by the system, this time at step 555.
Once again the call is answered before the caller receives the expected number of rings. At step S56 the initial caller is asked to press the stax key in order to allow the system to determine whether or not the phone is a push button one. Step S57 decides whether or not the star key has been pressed. If the answer is YES the client's PIN is requested at step S58 and at step S59 it is checked whether or not the requested PIN is on the database. If the answer to this step is NO the client's name is xequested at step S60 and the answer from either step S59 or step S60 entered in the database at step S61 in order to attempt to match the client's details with the schedules and locations stored on the database.
If the outcome of decision step S51 is "YES" step S62 looks up the carer details on the database and at step S63 a decision is made as to whether or not the details are found.
If the answer is "NO" an attempt is made to match the incoming number with a client at step 564. If the answer to step S64 is "NO" step S65 goes to already described step S55 so as to xepeat steps 556, S57 and 560. If the answer to step S64 is "YES" the flow proceeds to already described step S61.
If the answer at step S63 is "YES" the call is answered at step S66 and at step S67 an options menu is played to the caller. If the caller responds appropriately at step S68 and an option entered the procedure loops with step S69 until the selections of options is terminated with a "NO" response from step S68 where the system hangs up at step 570.
Returning now to the main path of the flow diagram a decision is made at step as to whether or not the DNIS has been matched to the carex's details on the database. If the answer to this step is "YES" then the next step, 572, corresponds to step S 16 of Figure 4. If the details are not found and the answer to step S71 is "NO", then the call is answered again within the normal number of rings which would be expected by the caller.
This occurs at step S73 and the system goes into a loop similar to steps 557, 558, S59 and S60 save that in this loop it is the carer's details which are requested at steps S74-578. The requested information is then entered at step S71 as previously described.
Step S78 corresponds to step S15 of Figure 4 and steps 580, 81 and 82 also correspond to steps S20-22 of Figure 4. Howevex the enhanced system being described also checks if there are any messages waiting for the carer. This is done at step 583. If the answer is "NO" steps 573, 74 and 85 correspond to steps S17-19 of Figure 4. If the answer is "YES" two options are available. Either at step S87 the phone is taken off hook and the stored number is dialled as a network call at step 588. In this case the number of ringing tones is greater than the expected number so the carer is prompted to pick up the phone so that the waiting messages can be replayed to himlher at step S89 after which the call is terminated at step 590. Alternatively the call is answered within the short number of rings which is the system's normal response at step S91 whereupon after the messages have been relayed at step S89 the call is terminated as before.
Turning now to Figure 9, this shows a short sequence which can be added to the flow diagrams of Figure 4, 7 and 8 and illustrates the considerable versatility of the system.
It is assumed that the sequence is added to flow from step S71 of Figure 8 between step S71 and step 572. Thus at extra step 5100 a decision is made as to whether or not this is the first call from a carer working for a particular client. If the decision is "YES", the call is answered at step S 101, a welcome message played at step 5102 and the original step S72 follows. If the answer is "NO" step S72 follows as usual.
It will be appreciated that a key component of the monitoring systems just described is the application software 14. This software suite can be located into an electronic processor via any suitable medium such as floppy disc shown at 8 in Figure 1.
Further, the computer program can be obtained in electronic form for example by downloading the code over a network such as the Internet.
One present embodiment also incorporates an auto-check ability and this is shown in the flow diagram of Figure 10.
This facility utilises a separate telephone line and automatically calls the system of Figure 5 at defined intervals, such as say 10 minutes. It thus mimics an actual caller. It also waits for a short period after the check-up call has been made, for example 1 minute, so as to determine whether or not the call was received.
If no ringing tones are detected or the ring back was not received the system is judged to be failing and an alarm call is made to a designated number. This facility can be sited away from the main monitoring system with dedicated PC hardware and telephone line. The system hardware is similar to that shown in Figure 5. If more than one telephone line is being used by the main monitoring system the facility can be programed to dial the different niunbers either randomly or in sequence.
The operation of the auto-checlc facility is described in the flow diagram of Figure 10. At step 5200 the phone is taken off hook and the free-call number dialled at step 5201.
A decision is made at Step 5202 whether or not ringing tones are detected. If the answer is "YES" the next Step, 5207 hangs up the phone and the facility waits for the return call.
Step 5209 is a decision step which decides whether or not a ring-back has been detected. If the answer is "YES" the flow chart loops back to Step 5200 after logging the successful result in the database at Step 5205. If the answer to Step 5202 is "NO" Step 5205 hangs up the phone at Step 5206. Step 5207 is common to both branches of the flow diagram as it deals with a fault on the monitoring system. In this step the phone is taken off hook and at Step 5208 a stored emergency number is dialled or a message transmitted in the modem and an alert message is sent. Finally Step 5210 hangs up the phone at Step 5209 again to repeat the procedure.
Referring to figure 11, there is shown a flow diagram of event processing which is possible using a system according to the invention. After step S79 (or at step S72) whereby call details are stored in the database, the system can be configured at step S 110 to retrieve previous client and or carer details from the database. If a recent earlier event is not found at step S 112, then the new event (ie. incoming call) is logged as an arrival and saved at step S 114. However, if the previous event is found, then at step S 116 the system determines whether or not the previous event was a departure event. If no then the system determines at step S 118 if the new event is within a predetermined number Y, of minutes (such as 15) of an expected departure time. If no, the event is stored as an arrival at step S 114. If yes, the event is stored as a departure and saved as step S 120.
If the previous event was a departure event as determined at step S 116, then at step S 122 the system determines whether the new event is within a predetermined time X, such as 15 minutes. If the answer is yes, then the new event is logged as a departure and the last event logged as unknown and this information is saved at step 124. If the answer is no, then the new event is logged as an arrival and saved at step S 114. Step S 122 provides for the possibility that a carer calls in from a client to record a departure then stays with the client for some reason such as additional care being required before calling again to record actual departure.
Referring to figure 12, there is shown a flow diagram of steps taken by a carer to log visits remote from the client who has been visited. Accordingly, in the circumstances for example that a client does not have a telephone, a career dials into the system preferably from a predetermined telephone number associated with the carer such as a home telephone number of mobile telephone number. Accordingly, at step 5130 in figure 12, the system is able to answer a call from a carer from a predetermined number having identified using CLI that the carer is calling from an associated number such as home. It is then possible between steps 5130 and 5132 to play any messages to a carer which might be stored within the system. In any event at step 5132 the menu for remote access to the system is played and the carer is requested to input a response to the played menu at step S
132. For example, if digit 1 is pressed indicating that the carer wishes to log an event previously unrecorded in the system, then at step S 134 the carer is requested to input the client ID
which could for example be in the format of a three digit numerical reference.
The system determines for step S 136 if the ID is valid or not. If no the caller is informed and requested to input the ID again at step S 134. If yes, the system requests the date of the event from the carer at step S 13 8. If the date is validly entered at step S 140 eg as a simple four digit reference ddmm, such as 2901 representing the 29th of January, or simply by pressing the key for today, the system requests the start time at step S 142, or if the date is not valid the user is informed at step 5139 and the date is again requested. The user inputs the time and this is assessed at step S 144. Again if not valid then the user is informed and the start time is requested. When the start time is validly entered, the user is requested to enter the end time at step 146. If the end time is validly entered then the user is requested to enter a reason at step 150 as to why the event has been logged remotely. Menu options can be provided at step 150 such as; the client does not have a phone, the client telephone and/or telephone line are/is inoperable, or due to carer error such as the carer has forgotten the free phone number to be dialled.
Referring to figure 13 there is shown an example of an active report provided by the system moutoring scheduled events. On the display 300, rows of information 302 representing individual events are provided. Each event comprises a series of information including one or more of the following. At column 304, the agency (or system customer) providing the monitoring service is indicated. Beneficially, a service provider can select individual agencies at column 304 and or view all active events being monitored by a system. At column 306, visual representations are provided regarding the immediate status of an event for example, a cross can be used to indicate that a carer has not logged in in relation to a scheduled event. The image of face is here used at column 306 readily to indicate that a carer is in attendance at a scheduled event. A tick is used here readily to indicate that an event has been completed, and a clipboard symbol is used to indicate that an event is scheduled for some time in the future eg on a given day being viewed .
Subsequently an alarm can be raised to indicate that an event has not taken place at all. At column 308 a symbol is used to indicate non compliance with exact requirements of a scheduled event; for example when a carer is late beyond a predetermined period of a start time despite the fact that the carer subsequently turned up. An alarm clock is shown in column 308 in respect of two events where the care worker arrived more than an hour after the planned start time. At column 310 the date is shown for the scheduled event. At column 312 the planned time of each of these scheduled events is shown and at column 314 the name of the client is indicated. Column 316 shows the actual start time a caller dialled in for an event in progress, or the start and end time for a completed event as shown. At column 318 the punctuality of the carer is shown and at column 320 the overall duration of an event is recorded. The identified care worker is shown in column 322 which is of course enabled through use of the DNIS facility described earlier. Where the carer is not the same as the scheduled carer, the scheduled carer is shown in parentheses in column 324. A further visual indicator is given in column 326 in the form of a pie chart representative of a comparison of actual or lapsed time versus scheduled time of a scheduled event which has taken or is taking place. For example a pie chart might only be shown for completed events where the duration of attendance of a care worker within predetermined limits such as less than a quarter of the anticipated event time and or less than half of the anticipated time.
Beneficially, the system enables active reports to be provided to separate customers of the service provider such as different carer organisations. Accordingly, a display as shown in figure 13 can actively be provided for a carer organisation or agency (customer of the monitor service provider) as shown at column 304 including information appropriate for the customer. Additionally, separate alarms can be raised for customers in the event of late arrival of a carer at a scheduled event and this system can be configured to generate such alarm messages in the form of pre-recorded telephone calls and or SMS
text messages for example, or by means of the PC software.
The return call from the system such as identified at step 5 as shown in figure 2, and or as described herein, need not be directed back to the recognised incoming call phone number. It is possible to configure the system to return a call for a response or recognition call to a separate munber, or multiple numbers, appropriate for a given carer such as a home telephone number or mobile telephone number or indeed to send appropriate indications such as an SMS text message to a carer's mobile phone or to a pager. Indeed, it is possible to configure the system to generate periodic reports to individual carers such as a daily report of logged events and times in the form of a SMS text message.
Accordingly, the carer can then use the remote access facility described in relation to figure 12 in order to enter unrecorded events.
Beneficially therefore the system is able to generate payroll reports based on individual carer's actual activity which has been logged in the system.
Criteria can be specified regarding the punctuality and extent of completion of scheduled events in order to generate a suitable pay report for an individual caxer. For example, scheduled events can be deemed fully payable provided that a predetermined percentage of the schedule duration of the event is completed. The predetermined percentage can for example be greater than 50% or some other value such as 75% of the predetermined duration.
Additionally, over-time can be calculated and a proposal made for pay to an individual carer based on recorded additional time work based on predetermined criteria.
It will be appreciated that features of the individual systems described in relation to the relevant figures can be adapted for use on any one of the system described herein.
Beneficially, a system according to the invention can be provided which enables sophisticated call handling in particular in relation to attaching a type of event such as arrival or departure of a carer from a site to data stored in relation to an incoming call thereby to process a further incoming call from the same number depending on the type of previous event. Additionally, a call monitoring system can be provided which enables call handling dependent on the origin of the incoming call such as in relation to an area code such as an STD region, or an actual number thereby for example to enable preferential call handling in a queuing system dependent on the incoming call number.