CA2485464A1 - Method and electronic device for selective telephone call screening - Google Patents

Method and electronic device for selective telephone call screening Download PDF

Info

Publication number
CA2485464A1
CA2485464A1 CA 2485464 CA2485464A CA2485464A1 CA 2485464 A1 CA2485464 A1 CA 2485464A1 CA 2485464 CA2485464 CA 2485464 CA 2485464 A CA2485464 A CA 2485464A CA 2485464 A1 CA2485464 A1 CA 2485464A1
Authority
CA
Canada
Prior art keywords
cnid
call
telephone
database
rules
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2485464
Other languages
French (fr)
Inventor
Samuel Chiu
Edward Samson Chiu
Albert Herman Chiu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA 2485464 priority Critical patent/CA2485464A1/en
Publication of CA2485464A1 publication Critical patent/CA2485464A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a method and electronic device for user specific, selective, telephone call screening. The method affords one a multitude of choices and options relative to telephone call screening employing calling number identification values and user screening rules.

Description

TITLE OF INVENTION
METHOD AND ELECTRONIC DEVICE FOR SELECTIVE TELEPHONE CALL
SCREENING.
CROSS-REFERENCE TO RELATED APPLICATIONS
Not Applicable STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR
DEVELOPMENT
Not Applicable BACKGROUND OF THE INVENTION
The present invention relates generally to telephone call blocking services, and more specifically to a selective telephone call screening method implemented at the premises of the call recipient.
1. Description of Related Art Several US patents disclose methods for identifying and blocking calls by subscribers of puhlic telephone services, e.g., Solomon et. al, US Patent No.
5,596,627;
Holiday, II, US F~a~tent No. 6,85,310 E31; Leung et al, US Patent No.
6,005,870; Bell et al, US Patent No. 6,549,619 B1; and l'elletier et al, in US Patent No.
6,496,569 B2.
These methods include communication protocols, codes and other software programs operating thraugh central and local telephone company ofi'ices, and ultimately allow an end user the ability to selectively screen incoming calls.

.- ..." .., ~. ~, ~,. < . , ... , ".a, .... , . ._ ..... .. a ... s,.:-_.:<..sx~._, m a~x. c. ar?~ ~a 9..,.~. ~::an;uawr, -,_, ~su~. "
~c ~~~-a--..».s;~-m.~a~~,r ,a~~,~.a»zr.~~.-.,,~.~.
.Paz....~.w~...~~,~,ra~..:~."......~.rvs, Numerous attempts have been made as well to offer telephone service subscribers various programming and identification mean;; to block unwanted incoming calls via convenience features, e.g., Latter et al, in US Pai:ent No.
6,574,319 B2; or Knuth et al, in US Patent No. 5,781,613.
Additionally, still other methods and devices aimed at selective caller identification services, such as, switching methods, station software, and access codes are discussed in US Patent Nos. 6,553,110 B1; 6,584,178. B2; and 6,332,021 B2;
invented by Peng; Crockett et al; and Latter et al respectively.
2. Background Information As the general population continues to commit more hours to working, they value time spent at home and desire it to be free from unwanted) distractions. The telephone serves as an invaluable form of communication, but introdluces many nuisances into the home. Interruptians may be caused by unwanted calls from telemarketers or wrong numbers, or from known callers calling at inopportune timE;s. In some cases, callers may continue to attempt to contact the recipient against the recipient's noted wishes.
These calls may repa esent more than a nuisance and a form of harassment to the recipient. People always have the option of muting the telephone ringer, but this action eliminates the audible signaling of all calls including the ones they may wish to receive.
Recognizing these frustrations, telephone service providers have leveraged the functionality of caller identification (ID) technology to offer various call blocking services.
The telephone company has access to the originating Calling Number Identification (CHID). Then caPler information is the basis for caller identification services, and it allows the telephone company to provide call blocking services before calls reach the recipient.

N~a;?,., . ...:..a . ..,.M,. , . ~ n- s~: . _ ..xx,,a~. ~~~ . ~...- ,.~x.-..-.. ::r..~,." aro.xe~r~xR. g " , ~y,e"q.;~.,.~°..sara~ <.as. ,n .,,~,..,a .M,.~~x~..~
~~ ~~.»~.,x In cases with a history of harassing telephone calls from the same caller a recipient may request the telephone company to block any further contact from said caller. In less drastic cases the telephone company can offer services blocking calls originating from 900 calling codes, toll-free calling codes, and numbers with unknown caller ID information. A caller initiates a call and the telef>hone company upon receiving the caller 1D checks if the recipient has subscribed to any call blocking services. If the caller's I D matches a category the recipient subscribes to a blocking service for the call is not connected and the caller is informed of this block b;y a message from the telephone company.
As these services require the intervention of the tellephone company, they are limited in scope and application to what the service provider decides to offer. Not all telephone companies will offer these services. if they are offered, a telephone service subscriber must coniact the telephone company to initiate. the service and to make any subsequent changes. Other telephone company services include blocking callers from a list specified by the recipient or only allowing callers from a recipient specified list.
Again, these services have the disadvantages of limited availability, the onus on the telephone user to contact the telephone company whenever changes are made to the lists; and typically, a limitation on the size of the lists (coulld be as few as 3telephone numbers) imposed by the telephone company.
Aside from a small list of specific numbers, telephone line subscribers are only offered blocking services on large subsets of special callers: toll-free callers or callers with unknown caller ID for example. existing services do not afford the subscriber the ability to block calls according to area codes or exchanges. Numbers are blocked on an all or nothing basis with no degree of masking.
Furthermore, the call blocking service offered by tellephone companies is time-inflexible, costly and cumbersome: 1 ) Once activated they are always active until the subscriber changes the subscription. 2) There is a monthly service charge. 3) It does not offer different call screening rules depending on the time of day, and 4) It does not offer individual screening options to a each phone number being screened.
The User may trade off the possibility of blocking wanted calls for stricter screening during night hours while preferring a more IeniE;nt system during the day.
Although it is conceivable for the telephone company to offer these expanded functionalities, the subscriber has no control over the situation. The decision to expand call block functionality or to offer the services at all rests ~;oleiy with the telephone company. Prior art has not afforded the telephone subscriber the ability to effectively screen incoming telephone calls in a flexible and highly controllable manner without intervention from the telephone company.
BRIEF SUMMARY OF THE INVENTfON
it is the object of the present invention to provide a means for a telephone line subscriber or telephone call recipient (hereafter referred to as 'User') to selectively screen incoming telephone calls that overcomes the limitcitions of the aforementioned prior art.
It is also an object of tile present invention to provide means for a telephone line and caller ID service subscriber to screen incoming telephone calls without further intervention by the telephone company.
It is further an object of the present invention to allow means of screening by blocking specifically stored telephone numbers, only allowing specifically stored numbers or any combination thereof by validating the CNID with a database stored in the electronic call screener of Claim 5 (hereinafter referred to as the "Call Screening Device" or "CSD") installed a': the recipient's premises. A t;SD can be a stand-alone unit or incorporated into another device to serve the purposes of this invention.
a K , ... n , .. .. .. ..'~~J0.9.pVb.~h , .z:tlg 11"A"p~ . .:.-.~~.9~4k f ~:~~S~fpgn ..,s-zzey~.g nEC:~~s~g~~~,x3p,~~ ' - _ _ . . , . . . . . _ .. .fir It is further an object of the present invention to allow means of validating CHID
by wildcard searches whereby a call may be screened based on area code, exchange number, or other user selected format.
It is still further an object of the present invention tea allow means of setting the aforementioned call screening objectives based on a time schedule.
The present invention includes the steps conducted at the call recipient's premises of determining the CNID value of an incoming call and processing the call according to the User defined screening rules. A decision would be made whether the call should be allowed or blocked. The call recipient muss: subscribe to a caller ID
service provided by the local telephone company.
When an incoming call is placed, the telephone company transmits the calling party's CNID to the call recipient. This CNID value is checked against a database of CN1D values and call screening rules stored at the recipie;nt's CSD. Rules determine if a call originating from a particular CNll7 value should be blocked or allowed to ring.
A CNID value that is previously stored in the database has associated screening rules assigned by the User. The User may enter the CNID values and rules into the database through an interface on the CSD. CNID values of previous callers stored in the device buffer may also be added to the database of the CSD with the desired screening rules.
Further user specification allows the recipient to assign time-dependent variations of the screening rules. In certain situations the recipient may not receive caller's valid CNID due to: a) tf~e caller may have elected to block transmission of his outgoing telephone number; b) inter-carrier handoff of a long distance telephone call may result in loss of the original CHID value; and, c) the C;NID data may be corrupted during transmission of the call. Accordingly, the CNID value passed is not a telephone number but a standard message relaying the cause of a non-numeric CNID.
the CSD stores the User's chosen screening acticms when these situations are encountered: no n-numeric CNID values also have associated screening rules that decide if the call should be blocked or allowed to ring the recipient. Any numeric CNID
value that is not present in the database is considered as another calling situation with user assigned screening rules. An incoming call cross-referenced and flagged as allowed to pass will continue ringing the recipient telephone line.
On an incoming call that is cross-referenced and filagged for blocking, the recipient may pre-set the option of allowing the calling party to provide authentication before the call being rejected. If the authentication option is enabled, the calling party will be prompted to enter a numeric authentication code that is stored in the recipient's database. Proper authentication will allow the call to continue ringing.
Incorrect authentication, or in the event the authentication option is disabled, an incoming call flagged for blocking will be disconnected to prevent ringing of the recipient's telephone line.
A CNID stored in the database of the CSD by the User can be a complete or partial telephone number. The more digits of the telephone number stored the more specific it would be for validate the CHID.
The CSD has the capability of forcing the nighttime screening rules to be used during daytime hours. 'his is done through a setting on the CSD system level.
This enforcement can bE: temporary or permanent until the User reset it.
BRIEF DESCRIPTION OF THE DRAWINGS
.~ . ~ ,. . r~,art.r:. ...~,. ~~ x .~~~, ~ ~~n~ ~"~~ 7r.-~..~~~,~. . ~
~.~~.~.< . . F~.~,~~:x M"-,~ ~ . ~,~ . ~.~
rte... ~ m~~ ~.m~ ~,upra~m.~~a:.r~,~.w.~w. ,:~.z.-.~~.~... M~.~~-,.~..-.

FigLlrB 1 is a schematic view of the telephone system with which the method and electronic device for selective telephone call screening according to the present invention can be used.
Figure 2 is the overall flow chart of the logical operation of the present invention.
Figure 3 is a flow chart of the logical operation in detail of Figure 2 in determining whether the daytime or nighttime screening rules to be u~;ed.
Figure 4. is a flow chart of the logical operation in detail of Figure 2 in determining a call with valid CHID be blocked or allowed.
Figure 4A is fihe process of a new CNID or a CNID Error screening process.
Figure 5 is a flow chart of the detailed logical operations of Step 105 of Figure 2 determining the CNID for further process.
Figure 6 is a flow chart of the detailed logical operations of Step 123 of Figure 2 formatting CNID ~'cr output displays.
Figure ~ is a flow chart of the detailed logical operations of Step 125 of Figure 2, is a reversal of Figure 6 tde-format the CNID for storing into the database.
Figure 8 is a flow chart of determining whether a call is allowed to dial out or not.
DETAILED DESCRIPTION OF THE IPJVENTION
The present invention, as referenced in the drawings, utilizes currently implemented telephone service technologies to provide a solution to the aforementioned probie ms that are not met by current services offered by telephone companies. Gurrent6y, the User may add services implernented by the telephone company that are related to or utilize caller ID information of an originating caller:
1 ) The calling party's CHID, if transmitted, may be displayed on a caller ID
device at the User's premises provided caller ID service fronn the local telephone company has been subscribed.
2) The User receiving harassing telephone calls from an originating caller may request that the telephone company block all calls from that originating number.
3) The User may further subscribe to services offered by the telephone company to block incoming calls from special originating caller:>: 900/976-numbers, toll-free numbers, caters blocking transmission of their CNID
The present invention requires subscription to the ifirst service and supersedes the second and third services. The present invention implemented on the call recipient's premises affords the User the ability to selectively block (:,creep) calls originating from any stored CNID value including the scenarios serviced by aforementioned choices #2 and #3 vrithout further reliance on the telephone company.
A user subscribing to caller ID service from the telephone company receives the originating caller's LIVID with every incoming telephone call as in the current caller 1D
service described in option #1 above: The CNID value received is checked against a recipient-side database for any screening rules the User has defined for that CNID
value. GNIU values may represent the telephone number of the calling party or special messages if the telephone number is blocked, corrupted, or otherwise unavailable.
Each special instance of a non-numeric CNID may also be stored in the database with associated screening rules.
Screening rules define whether an incoming call frcom a particular CNID should be flagged for blocking or allowed to ring the recipient. A t~NID value not present in the database is considered as another situation with associated rules. Screening rules may _g_ further be defined in a time-dependent manner, allowing the User to specify different rules for a particular CIVID value depending on the system time.
Once an incoming call has been flagged, the device embodying these rules must implement the predefined action. A call flagged as acceptable is allowed to continue ringing the recipient's telephone line unhindered. A call flagged for blocking will be terminated by the device nitiafiing an off-hook command to connect the call followed by an on-hook command to terminate the call.
If the User has activated the authentication procedlure, incoming calls flagged for blocking wilt initiate an intermediate step that allows the calling party to enter an authentication code stored on the recipient-side: proper authentication allows the call to continue ringing; otherwise the device will proceed to terminate the incoming call.
There are various levels of screening rules and securities pass codes as outlined in Tables 1 and 2, lout not limiting to. There are three (3) types of system-level pass codes, namely, master, permanent (incoming access code), and temporary (soft).
The moaster and permG:nent fypes are the ones have been stored in the CSD by the User.
The temporary or 'soft' type is the one generated and prompted by the CSD at that instance and not stored in the LSD. Temporary type of pass code is used primarily in daytime screening to screen out automated telemarketing or fax but still allow calls made by persons to continue.
_g_ ..n . _. ",x,u.~.~.. ..:xeaw - ~..~;,~.~:,o-.,,.-.c~,:.ra.:~ r.wasr~. ~sra~~,.
...~~,~ .. . .. . . G:.a~.~-. .~ ...... ,,..~~..~...

Table 1: Partial list of Screening Rules (subject to changes) CNID Day time Nigh t time Ruies _ _ Block alue rompt Pass code Prompt Pass code recei~~edTypes Passcode valid Passcode - Valid Invalid Invalid Always No No Blocked Blocked Blocked Blocked CNID Never _ No Allowed No Allowed Allowed Allowed found No, if in CMD Blocked Blocked CSD niGht ! nio Allowed 1g is Allowed !V0 database Yes, if CMD ~
qllowed I BIOCked 19 is YES

Dial No call out to Out this number regardless of time.

CNID O pl,~~aysAlways blocked 2F and plays message s ~

b caller ~o' if cMD = AllowedAllowedNo, if BlockedBlocked ' CMD

New C~ 18 is NO 19 is -JID IVo Or CN p ~ a I D 'Soft', Error , BIOCkedlg~is AllowedBlocked i if cMD 1s is YES
Allowed Y'S.

Also accepts the 4-digits 'Hard' pass code.

NOTES: ~Z~Inofuded"PRIVAC;Y CALL", iitem " BLOCKED CALL. 10 of See Table 3Ø
Plays message "

the coil is not allowed because you blocked your phone number.

= ~:,ommand # in command table A2.1.

fir R~r~.3U~*:;im.Am~"..TT.n.~=?9~. P:~?'.v~ae82~~s~~P~~'~maettx..w~~~,~a-.~

Table 2: System Setting (partial list, subject to changes) Applies when...

Master ass codeCan be_modified by User.To control the screener.
_ On Night time or day time rules Permanent pass ~ Given to those allow if CHID is flagged to them to be Blocked code call. Can be modified or CHID is "Private Ca8";
by User.

S stem reset, etc.

Temporary or Generated & prompted 0'n Day time rules & invalid soft by pass code CSD, not saved. CNID or not on database Authentication On or Off it is turned ON

Tel co displays CNID from Home area code, home area code with or max 4 digits without area code. See step 105 2" language Selectable by User Prompt after English for ass code rom t 90019?6 Blocking' Restricts of 9001976 numbers.

Display unit always displays Prima User selectaf~le of English,in and 2"d i l 2"d l ry pr French mary Spanish anguage.
nd Chinese anguage languages , is used for voice prompt a after as primary and 2 language.

rimary language.

Reset - PasswordRestore Master pass codeUser for ets the pass code Reset - System ( Restore to factory preset except CNID entries in database.

Command sequences of each function or feature can be entered either through a telephone set or the call screener. When entering through the telephone set, the call screener may display a related message or prompt for data entry of the function.
The general format of the command sequence is: ##nn[...~...]#
Where: ## is the initiation of a command sequence.
nn is the 2 digit command code.
[... (...~ is the Fist of parameters of the function. Multiple values allowed.
# is the terminator of the command sequence.
'Fhe details of the incoming call screening method will be described in further detail, referring to flow charts of Figures 1 to ~.
A user 19 of Figure 1 subscribing to telephone Line: service and caller ID
service installs the sefeci:ivE: telephone CSD 13 on the telephone line on his premises. The User electronically stores a list of telephone numbers and their respective screening rules to the database in the CSD. These numbers and rules will be examined when an incoming call originates from that specific CNID value. The list may be input through a user interface 17 an the CSD a priori or after a new caller's CHID is received. When incoming call is received, the CSD will reference the CNID value with this database to determine hove the call will be handled.
A caller 10 determines ahead of time with the telephone company 11 or before the call is placed k>y entering an override command whether his telephone number will be displayed by a caller iD service. As the telephone company sends the ring signal indicating the attempted placement of a call it sends the C:NID value, either the caller's telephone number or a standard message indicating that the telephone number is unavailable (blocked).
In step 101 cf Figure ?, the CSD detects the ring signal transmitted by the telephone compau,~! 11 and receives the CNID of the origiinating caller. The determines whether daytime or nighttme screening rules should be applied on this call (step 103 of Figur a 2, and details in Figure 3).
Ire step 10', it determines whether the daytime or nighttime screening rules is used. Details are in Figure v. It will use nighttime rules if t:he User has triggered the nighttime rules or. ~,:'~e CSD, regardless of the current time of the day.
This enables the CSD how to hanc~ie the caA screening rules accordingly. Refer to Tables 1 and 2 for details.
in step 10J, it determines if the CNlD value is a unique telephone number that exists in the dataaase of the CrSD. If the CNID exists in the database, it will proceed to step 10? for further process. If not, it will be considered as a CNID error and proceed to step 10~ to retrieve the user-stored ru9es applying to the particular error message received arid futr~~r processing.

The CNID received is either a valid CNID or invalid CNID. Invalid CHID
includes a) a numeric ID but not found in the database of the CSD, and, b) it consists alphabetic messages.
1 ) Valid CNID - If the CNID value is a unique telephone number, the CSD
processes the screening rules as in step 107, detailed in (Figure 4. The status of the call is then fed into step 119, which determines the call either be blocked or allowed to continue to ring.
:~ da'<abase entry for a specific CHID value contains a plurality of screening rules for scenarios differing on time or globally defined user options. Different rules can be stored to the CSL fcr a CNiD value depending on the sy~;tem time and the user may set the device to only block calls when a rule states the caller should be blocked or only alto°rv calls from callers with rules specifying they should be accepted. The current system time and the global mode selected by the user determine which rules are examined for that caller's CHID (Steps 107 and 106). The call is flagged to indicate if it is allowed to continue or if it should be blocked.
The User can store CNID values with wildcard entries to the database of the CSD to enable con~.ienient masked database searches. T'he CNID value checked with the database only needs to match the specific CNID digits in a wiklcard database entry.
This method of partially matching a caller's CNID value with a masked CN1D
database entry allow the user to define rules for callers originating from entire area codes or exchange prefi;~ec~s where those digits are the only common digits required for a database match.
If in step 1 °I ~ it is determined that the caller 10 is placing an acceptable incoming call given th:~ currEnt time and user screening rules the CSD will allow the ring signal to continue and the recipient's telephone 19 will ring (step 123).

uxx..n"a i)w',so:y ," ~ .." qwa'Lxxy,,~hF4 t:c».'%."'f~;,er~~~-.~-;3FTfi(t<'".N..,","-~y, .-ssw my mw.,".,rr.x-~,.......-x.~.~.e~.,,.nv-m.~enuwnrmf~s-amc mteamrmvarnnn~zv-~.vwvmrnwnn~~~-,wm.w ~~kn8'pfi~$t'tWo->sf7 x. "ii'A~~~f,~~1/N~I4GF~aemff~x!pVASwNPmen.

If the callers telephone number is flagged for blocking the CSD will seize the line and connect the call by issuing an off hank command then disconnect the line (Step 121 ) by issuing an on-hook command, emulating the action of the User picking up and hanging up the prone receiver.
2) Invalid or CNID Error- If the CHID value is a CNID error message or the CHID
not found in the CSD database, the CSD processes the screening rules as in step 106 of Figure 2. it retrieves the associated screening rules for invalid CHID
calls. It has been pre-determined by step 103 that this call is subject to daytime or nighttime screening rules.
The User mey specify to let the caller to authenticate a block flagged incoming cal! and allo~N the call to continue ringing. If the authentication procedure is enabled the device audibly prompts the caller to enter a pre-specified authentication code (step 111 or 113 cf Figure ~~,), For step 113, the caller's response is verified with the code stored in the CSC ihard pass cads type). For step 111, the caller's response is verified with the soft pas: code generated by the CSD for that particular call. Proper authentication allows the call to continue ringing (step 123) while failed authentication after "n" times of attempts continues V~rith step 121 and disconnects the call as explained before.
In step 1t~g of Figure 4A, the CSD decides the type of pass code it expects the caller to respond. the GSD offers the 'soft' type of pass code due to the fact that: a) the User goes rot vu~~L every body knows the permanent (hard) pass code stored in the CSD. Changing th:.~ perr~~anent code requires the User to inform all the people whom he wants lo receive their calls. The soft pass code eliminates this problem; and, b) It eliminates calls fr~;n-: automated dialing systems while still allows calls placed by persons to get thr ough. The soft pass code is generated by the CSD and is different each time.
_~4_ n step 1z5, the User has the choice of storing (saving) a unique phone number from the CHID into the CSD database after the call flnishf:d. This CHID
becomes available for future call checking.
3) Storing Ct~iDs -A CNID can be stored either as a complete or partial telephone number. A parfiial phone number is stored for the wider scope of phone numbers to be screened. The more digits of the telephone number stored the more specifir, it v~ould be for validate the CNID. For example, 519 123 4567 can be stored as it appears or just as 51, 519, or 51925, etc. When the CSD receives a CNID it searches and retrieves the ist from its database either in complete or partial matching. The CSD
will only compare the CHID it received up to the last digit of the more specific number it retrieved and ignorta the remaining digits of the received CNID. This is an added convenient feature instead of having the User to store all the individual phone numbers for a particular area code, which may deem impossible.
in ease where a more specific number is found together with a wider scope one from the database of the CSD, the screening rules of the more specific one will override the broader one. For example, if both 5192522008 and 519 and their associated screening rules arr stored in the database of the CSD. When the CSD receives a CNID
of 519252?_C~08 it ~vi!I anly a;~ply the screening rules associated with this number, but not the ones of 519. I-Ic~Arevar, if the CNiD is from 519 but not 5192522008, then the 519 screening rules will be applied.
All th~a CN=Ds arid phone numbers are entered though the keypads and LCD (17 and 15 of Figure 1, respectively) on the CSD andlor a telephone set with LCD
display.
The CHID can be either entered ahead of or after the call as long as it stays in the CSD
rnerr~ory buf'~er.
Various scenarios =~rili be given to better explain the present i nvention.
_15_ > > rv:~~. __ ~._ Case 1 - A.Iways Blocked The recipient 19 no longer wishes to receive calls from caller 10 under any circumstances and regardless of time of the day. The USE:r stores the caller's telephone number with rules to block all calls originating from that number. The caller places a call to the recipient arid the CSD 13 receives the caller's CNID. The CSD searches its database .and rr~atches the CNID value with rules stating the call should be blocked under all circumstances (steps 1070-1071 of Figure 4). The CSD disconnects the call preventing furth~.~r ringing of the recipient's telephone (step 1198 of Figure 4).
Case 2 ~- Never Blo~:lced There are situatic.nd~ that certain calls should never be blocked at all. For example, calls from family men elders and relatives, etc., regardless of time of the day. The User enters the phone numbers into the database of the CSD with the screening option that they will never be blocked.
>~ call from the caller 10 to recipient 19 is placed and the telephone company transmits the call=pr's CI~JID. The CSD 13 receives the caller's CNID value, checks the database= fir a r~~=,;t~.hing entry and retrieves all rules associated with that telephone number. The rule specifies that calls from this CNID be always accepted (step 1072), thus it continues t,~ ring tie recipient's telephone (step 1199 of Figure 4).
Case v - fVight tirr~e Blocking T~°e rECpient 19 will accept calls from caller 10 during daytime hours but not nightti~~e hours. -k ire caller's telephone number is stored in the database of the CSD
with rules dicta;i~~g days:ime calls from the caller be accepted and nighttime calls be blockE:d. ,~, call frc,rn the caller to the recipient is placed and the telephone company 11 transmits the call=.'3-'s CNID. The CSD 13 receives the caller's CNiD value, checks the database for a matching entry and retrieves all rules associated with that telephone number. The ruPG associated with the current time dictates how fhe call will be handled (step °107. c~f Fig_~a 4}. If the current time falls within the user-defined daytime range or nighttime screening rules are not used during daytime hours, then the call is accepted and rings the recipient's telephone otherwise be blocked.
Case 4 - Nighttime Blocking by group:
The recipient 19 wishes to decline all incoming phone calls in the nighttime except for long distance calls originating from a particular area code, exchange, or a specific telephab-ee number pattern, for example, area code 408. An entry is stored in the database of the G CD for a wildcard CNID value beginning with area code 408.
The remaining digits need not required be matched. This CNIC3 is accepted at nighttime hours and under nighttime rules for all other database entries specify the call to be blocked. The iisE~r fcsrther programs the CSD to only accept calls originating from telephone numbers stored in the database that explicitly state the call is accepted.
~, seller 10 from the 4038 area code places a nighttime call to the recipient and the '>:ele~,hane ca~:~l~< n~,.~ °t 1 trGxf ~smits ~thul CHID. The CSD
matches the CNID value to the rule governing ail area code 4.08 callers and confirms that the call shall continue ringing the recipients. If the caller had decided to block his telephone number from being trarssmitted, the telephone company would have sent a CP~ID specifying that the caller's number be blocked. The CSD retrieves the nighttime rule for callers with blocked CNID
and flags the call for blacking. If the authentication option for block flagged calls is on then C:~D prompts the caller for a cods. The recipient has previously informed the caller of that code. 'fir°;e c:alfer correctly inputs the authentication code, the CSD confirms authentication and allows the call to proceed ringing, otherwise the call be blocked.
Case 5-- Day tlrr~e ,3locking The recipient 19 will not accept calls from caller 10 during daytime hours for persar~al reasar;;~. For example, the person works night shift. The caller's telephone number is storey i,~ the database of the CSD with rules dictating daytime calls from the calls=r fee blacked. A, call from the caller to the recipient is placed and the telephone company 11 trap-=_~rnits the caller's CNID. The CSD 13 receives the caller's CNID value, _17_ v:... '..., ~,~~~'F. '..,° . ~T=~~k'Sfi:SC.'~~'.B.S~v~-: ~ .... , lF
~3:~. ..G.~2,~3i,3' ...... ~,~~ ... .., p~s$.. . . . . ~ . -zaramraa checks the database for a matching entry and retrieves all rules associated with that telephone number.
The rule associated with the current time rules dictate how the call will be handled (step 1071; of Figure 4). If the CNID is flagged far blocking during daytime the call is accepted and continue to ring (step 1199). On the other hand, the caller will be prompted and offered "n" times of opportunity to enter a valid pass code in order for the cal6 to get through (step 1190 of Figure 4) and the call is allowed to continue to ring the recipient phone (4>tep 1199 oi~ Figure 4). Failure to enter a valid pass code will result the line being disconnected (step 1198 of Figure 4). If the current time falls within the user-defined nighttime Mange then the call is accepted and rings the recipient's telephone otherwise be blccked.
Case 6 - Forcing Nighttime ieilocking during daytime hour;>
This is the apposite of Nighttime Blocking. The recipient 19 does not want calls from caller 10 during day hours for personal reasons. For example, the recipient works night shift. The CSC has the capability to force nighttime screening rules to be used during day:~~aurs. Iis done through the flip of an external switch, software setting, or an automated process ors the CSD or a combination of any of these. This nighttime enforcement ca: o be a iE:mporary or permanent one. A temporary one has effect until the next time z~;e changes while a permanent one stays on until the User changes it back.
a call from ~tt~c: caller fio the recipient is placed and the telephone company 11 trar~srr~its thf~ ca'!er's C~IID. The CSD 13 receives the caller's CNID value, checks the database for a =°.~~at~:hinc~ entry and retrieves ail rules associated with that telephone nur~eber°. It uses the r~ighttim~: screening rules even though if may be daytime. The rule associated with the c~.irrent ti,r~e dictates how the call will be handled (steps 1014 and 103 of Figure ~;.
_1~_ "r.... . n.. n .,.. a,.Gle~~,Ww~'Abr/.:.,., W.,:,.~TjfF,~Xa y"ic.,,~~.--";"~,-.g"yRyy.~.;,t,.~;,qt*7~Ff';.g. _.,WSx.MP.vw.
4"~xzr-~;~3,99K~w~W a'nHKt swg , ,VaP~ T.SS~ "3A~fi4(YlpE3!~riw..~.rw~a..a...
emn.wmrn Case 7 ~-R Call with invalid CHID or ChIID Error Quite frequent a caller may not want to have his phone number and name be transmitted to the r~;cipi~:o7t. i-le can do so by subscribing the blocking service from his local telephone company or t:y entering a special command to override it during dialing.
It is still possible that the CHID corrupted during transmission by the telephone compa.~ries, or such service is unavailable. The recipient 19 will not be able to get a valid C~IID t,~ matcP~ up the d<~tabase entries.
A, call frorr3 ~.~e caller to he recipient is placed and the telephone company trar;~:~nits the c~il.f.r's c~NiD. The CSD 93 receives the caller's CHID value and found it is an invalid CI~!~'~ car ChilD Error by step 105 of Figure 2 with details in Figure 5. If the call has a valid C:~ViD then i'~ goes to vtep 107 of Figure 2 with details in Figure 4. If the call E~~;s an invalid crt~IC then ii goes to step 106 of Figure 2 with details in Figure 4A.
If daytim:~ s~~rQen=ng vales are used and that system authentication is off (step 110 of Figure 4A~, then the call is not blocked and continues to step 123 of Figure 4A.
On the ~3ther hana:l, i~ ur~derr~c~es a series of pass code aui:hentication to determine v;~hethe~r ii sho;~ic~ b~: blockeci or allowed (steps 111 and 113 of Figure 4A).
The foregcir~g ernbcdiments and examples serve to describe our invention in a var i~ay of ways; iaowever, oth er variations of our method are possible falling within the scope c~f thE: cfa:;~::.°.
_1g_

Claims (10)

1. A method for selective telephone call screening, comprising the steps of:

a) providing a user defined list of calling number identification values (CNID's) and a list of user screening rules;

b) storing said CNID's and said screening rules onto a database;

c) receiving a CNID from an incoming telephone call;

d) determining if said CNID of said incoming telephone call is valid or erroneous;

e) selecting a certain set of said screening rules so as to apply to said incoming telephone call, hereafter referred to as a classification of said incoming telephone call;

f) verifying said selected screening rules which have been enabled by a user; and g) establishing whether said incoming telephone call will be allowed to continue to ring or will terminated pursuant to said selected screening rules.

20a
2. The method of claim 1, wherein said step (e) comprises:

a) retrieving from said database said screening rules for the specific CNID error when the CNID is erroneous;

b) searching said database for a match to the unique received CNID
when said CNID is valid pursuant to said selected screening rules; and c) retrieving from said database said selected screening rules for instances when the valid CNID is not present in said database.
3. The method of claim 2, wherein said selected screening rules may further include selecting a method to communicate to a calling party that a call has been screened and to prompt the calling party for a response, comprising the steps of:

a) seizing a telephone line and then playing a prerecorded message;

b) prompting for a predefined key entry so as to eliminate incoming automated calling parties; and c) prompting for a stored pass code entry for caller authentication.
4. The method of claim 1 wherein said database can store said CNID's for entire area codes and exchanges.

21a
5. An electronic device for carrying out selective telephone screening, comprising:

a) a line interface means for connecting said electronic device to a telephone line;

b) a ring detector means for detecting a ring signal of an incoming call from a telephone company central office (CO);

c) a means to receive said CNID information;

d) a means to store said CNID and said screening rules' database; and e) a controller means for implementing said method so as to determine whether or not an incoming call is allowed to continue to ring.
6. The electronic device of claim 5, further comprising:

a) a means for a user to enter and manage entries into said database;

b) a means to display device information and database entries; and c) a means for said user to globally enable and disable said screening rules.

22a
7. The electronic device of claim 5 wherein after said ring detector detects a first ring said CNID receiver decodes said incoming call CNID
so that said controller can determine which of said screening rules contained in said database apply to said incoming call, and said controller compares said rules to said user enabled rules so as to determine the outcome of said incoming call.
8. The electronic device of claim 5 wherein a) the call continues to ring if said controller determines that said incoming call is allowable; and b) the line interface means seizes said telephone line so as to terminate said incoming call if necessary.
9. The electronic device of claim 8 wherein step (b) further comprises:

a) a means to play prerecorded massages after said telephone line is seized;

b) a controller means to prompt and authenticate an appropriate caller response;

c) ringing a telephone if an appropriate response is received; and d) disconnecting said telephone line if an inappropriate response is received.
10. The electronic device of claim 5 wherein said database comprises a maskable memory array so as to create wildcard entries.

22b
CA 2485464 2004-11-12 2004-11-12 Method and electronic device for selective telephone call screening Abandoned CA2485464A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2485464 CA2485464A1 (en) 2004-11-12 2004-11-12 Method and electronic device for selective telephone call screening

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2485464 CA2485464A1 (en) 2004-11-12 2004-11-12 Method and electronic device for selective telephone call screening

Publications (1)

Publication Number Publication Date
CA2485464A1 true CA2485464A1 (en) 2006-05-12

Family

ID=36319847

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2485464 Abandoned CA2485464A1 (en) 2004-11-12 2004-11-12 Method and electronic device for selective telephone call screening

Country Status (1)

Country Link
CA (1) CA2485464A1 (en)

Similar Documents

Publication Publication Date Title
US5802160A (en) Multi-ring telephone method and system
US6370233B1 (en) Security system with call management functionality
US5157712A (en) Telephone nuisance call mitigation screening device
US5467388A (en) Method and apparatus for selectively blocking incoming telephone calls
US5745559A (en) Restricted access telephones for logical telephone networks
US8199887B2 (en) Phone call management
US6430270B1 (en) Automatic conversational record
US20020067813A1 (en) Method and system for providing enhanced caller identification and privacy management
US20030035520A1 (en) Display of call related information regarding a called party
JP2001086228A (en) Portable telephone set
US20050047575A1 (en) Secure valet telephone system
US20010036258A1 (en) Telecommunication service for prioritizing and enhancing privacy of incoming calls
US20080026723A1 (en) Event processing apparatus and method for mobile communication terminal
CN1835525A (en) Method for multiple dialing by phone
US20050185784A1 (en) Method and electronic device for selective telephone call screening
KR20010101824A (en) Special phone book entries
US20070274493A1 (en) Method, system, and article for placing a telephone call to a previously-called party
CA2485464A1 (en) Method and electronic device for selective telephone call screening
KR100334768B1 (en) Method for changing auto answering mode depending on caller id
JP2000059503A (en) Incoming call denial method and telephone set with incoming call denial function
EP1258131A2 (en) Call screening that prompts caller for an access code
US5912959A (en) Method of and system for password protection in a telecommunications network
JP2001045136A (en) Telephone set
JP3298533B2 (en) Apparatus and method for restricting caller ID display in telephone terminal
JPH06253022A (en) Public line call control system outside id management

Legal Events

Date Code Title Description
EEER Examination request
FZDE Dead