GB2327318A - A method of tracing anonymous telephone calls - Google Patents
A method of tracing anonymous telephone calls Download PDFInfo
- Publication number
- GB2327318A GB2327318A GB9714787A GB9714787A GB2327318A GB 2327318 A GB2327318 A GB 2327318A GB 9714787 A GB9714787 A GB 9714787A GB 9714787 A GB9714787 A GB 9714787A GB 2327318 A GB2327318 A GB 2327318A
- Authority
- GB
- United Kingdom
- Prior art keywords
- call
- calling
- identifier
- calling line
- withheld
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/78—Temporary storage of information of calling or called subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/57—Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/57—Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
- H04M1/571—Blocking transmission of caller identification to called party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/55—Aspects of automatic or semi-automatic exchanges related to network data storage and management
- H04M2203/558—Databases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42008—Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42221—Conversation recording systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13091—CLI, identification of calling line
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13103—Memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13175—Graphical user interface [GUI], WWW interface, visual indication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13204—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/1324—Conference call
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13284—Call tracing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13377—Recorded announcement
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
When a caller 11 makes a call to a called party 12 but chooses to withhold their calling line identifier (CLI), the identifier is stored in an anonymous call trace (ACT) database within the exchange 14. If the called party reports the receipt of an anonymous nuisance call, then the corresponding record in the ACT database can be found and marked so that the complaint is registered. Calls can then be traced by searching the ACT database using the caller's or called party's CLI. If a nuisance caller persists in calling a particular subscriber then call data from previously reported calls may be used to create a conference call between the two subscribers and a recording device.
Description
TELECOMANICATIONS SYSTEMS
TECHNICAL FIELD
The present invention relates to a telecommunications system, and in particular to a telecommunications system in which anonymous and nuisance calls can be traced.
DESCRIPTION OF THE REflATED ART
In conventional telecommunications networks, if a subscriber receives a one-off or unexpected nuisance or malicious call, and the caller withholds their calling line identifier (CLI), it is not possible to identify the origin of the call.
Several systems have been proposed in order to overcome this problem. Even if the caller's CLI is withheld, it will be stored, and can be accessed at the exchange the subscriber has a caller return service provided. However, only the most recently received CLI is stored, and so the number is overwritten with each subsequent incoming call and can therefore be quickly lost.
Alternatively, an anonymous call rejection system simply rejects any calls made to a subscriber with the service active when the caller withholds their number.
This creates problems where legitimate callers withhold their numbers as standard practice, for example in the case of an ex-directory caller.
An operator interception service diverts all incoming calls from a subscriber with the service to an operator. After the operator has investigated and approved the nature of the call, it is forwarded to the called subscriber. The disadvantage is that the service is not appropriate for occasional nuisance calls.
SUMMARY OF THE INVENTION
The present invention seeks to provide a system which allows an occasional nuisance caller to be traced. Specifically, whenever a calling line identifier is withheld from the called party, details of the call are stored, and can be accessed if the called party subsequently complains that the call was a nuisance call.
It is an object of the present invention to allow an occasional random nuisance call to be traced back to the caller.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 shows a schematic diagram of a telecommunications network;
Figure 2 shows a schematic diagram of an exchange unit used in the network of Figure 1; and
Figures 3 and 4 are flowcharts showing steps in the use of a system embodying the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Figure 1 shows a schematic view of a telecommunications system 1 in which a caller 11 makes a call to a called party 12 by way of a network 13 including a local exchange 14. The called party 12 is connected to its local exchange 14 in order to connect to the network. Each caller 11 and called party 12 has an individual calling line identifier (CLI) associated with it so that they can be identified, for example for billing purposes. The calling line identifier (CLI) also enables the call to be correctly routed through the network 13 between the two parties. Depending on the type of telephone apparatus used by the called party, the CLI of the caller may be displayed to the called party before the call is answered, or may be announced to the called party (on request) if appropriate services are available on the subscriber's line. However, the caller may withhold his CLI, so that it is neither displayed nor announced to the called party.
A call is usually set up between the caller 11 and the called party 12 through many nodes of the network, the last node being the local exchange 14.
Such a local exchange 14 is shown schematically in
Figure 2, and includes an input line 20 which is connected to a call routing unit 21. The routing unit 21 operates to connect the incoming call to the correct outgoing line 24, in order to set up the call. The outgoing line 24 is connected to the called party.
The exchange also includes a calling line identifier processing unit 22 and an anonymous call trace database 23.
With reference to Figures 2 and 3, each time an anonymous call (that is, a call in which the calling party has requested that his CLI should be withheld from the called party) is received in the local exchange 14, an anonymous call trace (ACT) record is created for the called party 12 and the anonymous call data (for example CLI date and time) is stored in the
ACT database 23. As shown in Figure 3, a call is received, step 32, and then checked (step 33) to confirm that the CLI is to be withheld from the called party 12. If this is not the case, then the call is set up immediately (step 34). If the call is to be anonymous, however, the call details are stored in the database (step 35). The call is then set up (step 34) as usual. Optionally, the stored records in the database can be deleted if they are not marked for retention (step 45 or 48) and are over a predetermined age (step 36). For example, call records can usefully be kept for 24 hours, or more.
If the called party 12 subsequently reports the receipt of an anonymous nuisance call, then the ACT call record can be found and marked so that the complaint is registered. As shown in Figure 4, the service provider receives a call report (step 42) and then searches the database using the called party's CLI (step 43). This will enable any anonymous calls to be traced that have been made to the called party within the predetermined time limit. If no anonymous call records exist (step 44), then the procedure ends.
However, if anonymous call records do exist, then those records are marked so that they can be retained in the database.
At step 46, a decision regarding searching the PCT database using the calling party's identifier is made.
For example, if a nuisance call has been received by one called party the database can be interrogated so as to discover whether the same nuisance caller has called any other users of the network. Any records that are found in a further search can be marked for retention (step 48).
Call data relating to anonymous calls is stored for a predetermined data retention period, for example 24 hours. However, if the record has been marked as relating to an anonymous nuisance call, then the record is retained until deleted by an operator command. Call data for all subsequent anonymous calls to the same subscriber can also be stored, marked and retained.
The system thus stores calling line identifier data of calls made in which the CLI data is not to be supplied to the called party, the so-called anonymous calls.
If a subscriber receives a nuisance call it should be reported directly to the service provide or via the local authority. Then if the calls continue the subscriber concerned may request that the ACT data be made available through appropriate channels if legal action is to be taken.
As described above, when a nuisance call is reported, the service provider searches for ACT data on the basis of the called party's identifier so as to validate the data.
If a nuisance caller persists in calling a particular subscriber, then call data from previously reported calls may be used to create a conference call between the two subscribers and a recording device, thus providing further evidence of nuisance calls.
The advantages of the embodiments of the present invention are as follows:
Random nuisance calls by a single offender are more readily traced to a single source, since details of all anonymous calls are stored;
Nuisance callers who may be aware of special subscriber services such as customer originated trace and malicious call trace, and therefore may only make a small number of infrequent calls to a single number, can be traced easily; and
When an anonymous nuisance call is received no action by the called subscriber is required to enable individual call data to be stored since call data is recorded automatically for those calls in which the CLI is withheld from the called party. This system enables anonymous calls to be logged without the need for the subscriber to answer the telephone, thereby reducing nuisance and trauma for the victim.
Claims (4)
1. A telecommunications system in which a calling party can withhold its calling line identifier from a called party, wherein the system includes storage means for exclusively storing call information relating to calls in which the calling line identifier is withheld.
2. A telecommunications system in which a calling party can withhold its calling line identifier from a called party, wherein withheld calling line identifier information is stored in an exclusive storage area, the storage area being searchable by way of a called or calling party's identifier.
3. An exchange apparatus for a telecommunication system in which a calling party can withhold its calling line identifier from a called party, wherein the exchange apparatus includes a storage means for exclusively storing call information relating to calls in which the calling line identifier is withheld.
4. A system as claimed in claim 1, 2 or 3, wherein the stored call information relating to a particular call in which the calling line identifier has been withheld, is accessible on receipt of a
request for information from a user of the network.
4. A method of tracing anonymous calls in a telecommunications system in which a caller can withhold its calling line identifier from a called party, the method comprising:
receiving new call data;
determining from the new call data whether the caller's calling line identifier is to be withheld from the called party; and
if the identifier is to be withheld, storing call data relating to the call in an exclusive storage means dedicated to storing data relating to withheld calling line identifiers.
5. A method as claimed in claim 4, wherein the data stored in the storage device is searched in dependence upon the called or calling party's identifier.
Amendments to the claims have been filed as follows
1. A telecommunications system in which a calling party can withhold its calling line identifier
from a called party, wherein the system includes
storage means for exclusively storing call information
relating to all calls connected by the system in which
the calling line identifier is withheld.
2. A system as claimed in claim 1, wherein the
storage means is searchable by way of a called or calling party's identifier.
3. A system as claimed in claim 1 or 2, wherein the stored call information is held for a predefined
amount of time.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9714787A GB2327318A (en) | 1997-07-14 | 1997-07-14 | A method of tracing anonymous telephone calls |
AU89744/98A AU8974498A (en) | 1997-07-14 | 1998-07-09 | Telecommunications systems |
PCT/EP1998/004276 WO1999004546A1 (en) | 1997-07-14 | 1998-07-09 | Telecommunications systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9714787A GB2327318A (en) | 1997-07-14 | 1997-07-14 | A method of tracing anonymous telephone calls |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9714787D0 GB9714787D0 (en) | 1997-09-17 |
GB2327318A true GB2327318A (en) | 1999-01-20 |
Family
ID=10815817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9714787A Withdrawn GB2327318A (en) | 1997-07-14 | 1997-07-14 | A method of tracing anonymous telephone calls |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU8974498A (en) |
GB (1) | GB2327318A (en) |
WO (1) | WO1999004546A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001091487A1 (en) * | 2000-05-26 | 2001-11-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile radio communication system |
GB2600185A (en) * | 2020-10-19 | 2022-04-27 | Vodafone Group Services Ltd | A method of reporting an unsolicited call to a network operator and a network entity for performing the method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI109259B (en) * | 2000-03-17 | 2002-06-14 | Nokia Corp | Tracing a malicious invitation |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0439927A2 (en) * | 1990-01-31 | 1991-08-07 | AT&T Corp. | Enhanced privacy feature for telephone systems |
WO1995001037A1 (en) * | 1993-06-18 | 1995-01-05 | The Telephone Connection, Inc. | Anonymous interactive telephone system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5001710A (en) * | 1989-10-24 | 1991-03-19 | At&T Bell Laboratories | Customer programmable automated integrated voice/data technique for communication systems |
US5058152A (en) * | 1989-12-12 | 1991-10-15 | The Telephone Connection | Anonymous interactive telephone system having direct connect feature |
US5222120A (en) * | 1990-04-23 | 1993-06-22 | Mci Communications Corporation | Long distance telephone switching system with enhanced subscriber services |
US5274699A (en) * | 1992-07-24 | 1993-12-28 | Motorola, Inc. | Method for providing caller identification to a call recipient |
TW225623B (en) * | 1993-03-31 | 1994-06-21 | American Telephone & Telegraph | Real-time fraud monitoring system |
US5497414A (en) * | 1994-05-04 | 1996-03-05 | Bell Atlantic Network Services, Inc. | Telephone system processing of designated caller ID private calls |
-
1997
- 1997-07-14 GB GB9714787A patent/GB2327318A/en not_active Withdrawn
-
1998
- 1998-07-09 AU AU89744/98A patent/AU8974498A/en not_active Abandoned
- 1998-07-09 WO PCT/EP1998/004276 patent/WO1999004546A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0439927A2 (en) * | 1990-01-31 | 1991-08-07 | AT&T Corp. | Enhanced privacy feature for telephone systems |
WO1995001037A1 (en) * | 1993-06-18 | 1995-01-05 | The Telephone Connection, Inc. | Anonymous interactive telephone system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001091487A1 (en) * | 2000-05-26 | 2001-11-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile radio communication system |
GB2600185A (en) * | 2020-10-19 | 2022-04-27 | Vodafone Group Services Ltd | A method of reporting an unsolicited call to a network operator and a network entity for performing the method |
WO2022084193A1 (en) * | 2020-10-19 | 2022-04-28 | Vodafone Group Services Limited | A method of reporting an unsolicited call to a network operator and a network entity for performing the method |
GB2600185B (en) * | 2020-10-19 | 2023-10-04 | Vodafone Group Services Ltd | A method of reporting an unsolicited call to a network operator and a network entity for performing the method |
Also Published As
Publication number | Publication date |
---|---|
AU8974498A (en) | 1999-02-10 |
GB9714787D0 (en) | 1997-09-17 |
WO1999004546A1 (en) | 1999-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2215819C (en) | Method and apparatus for providing a caller id alias | |
US5930344A (en) | Method and apparatus for tracing a specific communication | |
US7215759B2 (en) | Hold queue wait estimations | |
US6301608B1 (en) | Method and apparatus providing personalized mailbox filters | |
US5943397A (en) | Network assisted callback system | |
US7336777B2 (en) | Method and apparatus for managing presenting and changing ring-back sounds in subscriber-based ring-back sound service | |
US5892820A (en) | Directory assistance access to intercept telephone numbers | |
CA2536725C (en) | Systems and methods for call measurement | |
CA2199573C (en) | Organization chart based call information routing | |
US8311204B2 (en) | Automatic complaint registration for violations of telephonic communication regulations with call rejection | |
US20020122542A1 (en) | System and method for providing visual indication of caller and telephony platform information on customer premises equipment | |
JP2000069147A (en) | Method for taking caller identification information out of telephone call | |
JPH0936965A (en) | System and method for processing call to network subscriber with changed telephone number | |
WO1997042784A1 (en) | Method and apparatus for facilitating law enforcement agency monitoring of cellular telephone calls | |
US20060233320A1 (en) | Method and system for canceling unwanted calls | |
JP2002300290A (en) | Method and system for managing communication history information, program therefor and recording medium | |
US7756258B2 (en) | Communications system with direct access mailbox | |
US7352855B2 (en) | Method and system for providing a privacy management service | |
US8577009B2 (en) | Automatic complaint registration for violations of telephonic communication regulations | |
US6771947B1 (en) | Method and system for call administration | |
US6754312B1 (en) | Method for monitoring a subscriber of an intelligent network | |
GB2327318A (en) | A method of tracing anonymous telephone calls | |
US7624191B2 (en) | Transmission of call-related data in a communications system | |
US7646860B2 (en) | Enhanced private call screening | |
EP1545104A2 (en) | Telephone network based call recording |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |