US20100067667A1 - Method of and system for altering incoming call controls after a call has been placed to an emergency number - Google Patents
Method of and system for altering incoming call controls after a call has been placed to an emergency number Download PDFInfo
- Publication number
- US20100067667A1 US20100067667A1 US12/620,958 US62095809A US2010067667A1 US 20100067667 A1 US20100067667 A1 US 20100067667A1 US 62095809 A US62095809 A US 62095809A US 2010067667 A1 US2010067667 A1 US 2010067667A1
- Authority
- US
- United States
- Prior art keywords
- call
- telephone number
- emergency
- incoming call
- telephone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/0016—Arrangements providing connection between exchanges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems specially adapted for combination with other electrical systems
- H04M11/04—Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13213—Counting, timing circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13256—Call screening
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/1337—Operator, emergency services
Definitions
- the present invention relates generally to telecommunication systems, and in particular, to a method of and system for altering incoming call controls after a call has been placed to an emergency number.
- incoming call controls affect how calls are processed by the network.
- Complex incoming call controls may include a number of rules, which are preferably applied in order.
- Each incoming call control rule may be implemented using a two step call processing model. The first step of the rule is to identify the call to tell whether the rule should be applied, and the second step of the rule is to dispose of the call to which the rule should be applied.
- these rules may be selected and defined by the customer on the receiving end of the calls. Such selection and definition may be implemented using a Web User Interface or other interface.
- incoming call controls may be of increased sophistication as they are integrated with external sources of information like Personal Address Books (PAB), calendars, and call logs.
- PAB Personal Address Books
- An example of increased incoming call control complexity is when a household desires to limit calls between 10:00 PM at night and 8:00 AM in the morning to those numbers listed in their PAB. In this example, all night-time calls received from telephone numbers not listed in the PAB may be blocked by an announcement, such as “The party you have called doesn't accept calls during this time. Please try your call again later.”
- Incoming call controls may be used, for example, to make a person more accessible or less accessible.
- An example of an incoming call controls that may make customers more accessible is a locating service, which may attempt to find the called party at a different telephone number than the one dialed.
- the locating service may involve the end-user publishing a “primary” number.
- the primary number may be a DID number associated with a call answering service or a telephone number (wireless or wireline) with a call answering service like Plain Old Voicemail (POVM) or Unified Messaging Service (UMS) that includes a locating capability.
- POVM Plain Old Voicemail
- UMS Unified Messaging Service
- the service may dial each of the telephone numbers in the end-user's contact list. Two exemplary methods of doing this are to call each number in the contact list one at a time or to call all numbers in the contact list at the same time.
- the caller may be restricted from hearing what is going on with regard to the called contact numbers, such that he is effectively on hold. If any of the dialed numbers is answered, the person answering the call may hear, “ ⁇ Name Announcement> has a call from ⁇ Caller's Spoken Name>. To take the call, press one. To send the call to voicemail press two.”
- the called party may also be required to provide a Personal Identification Number (PIN) to authenticate that they are really the subscriber.
- PIN Personal Identification Number
- the caller is connected to the end-user on the answered phone. Otherwise, the caller may be directed to the end-user's voicemail service.
- callers often endure a delay as they wait for the locating service to find the subscriber.
- a privacy feature may be activated when a caller's telephone number information is unknown or unavailable to the terminating network. When the calling party information is unavailable, the call may be directed to the privacy feature instead of ringing through to the called party's phone.
- the privacy feature may force the caller to provide either their name or a DTMF PIN number. When the caller doesn't have a PIN number, they may be required to state their name. The privacy feature may then call the called party and ask them if they wish to take the call. Again, such features provide significant delays for a calling party trying to reach a called party.
- Incoming call control has two ways of looking at inbound calls.
- the first (shown) is by telephone number.
- Telephone numbers can be entered manually or selected from a list of telephone numbers generated by scanning the address book.
- the second method (not shown) is by name.
- Matching inbound calls can be given a distinctive ring tone.
- the distinctive ring tone sets the call apart from other inbound calls.
- Inbound calls can be forwarded to different destinations based on a ring/no answer rule.
- the subscriber has the ability to select the number of rings the call makes on the customer's phone before being forwarded. Calls can be forwarded to another number or voicemail.
- inbound calls can be directed into a locating type service.
- the locating capability can try each of the possible terminating numbers in sequence or in parallel. The sequential mode works like most locating implementations, while the parallel mode works like simultaneous ring feature.
- a blocking capability could also be used. Callers who are blocked hear a system announcement indicating that the called party has elected not to receive calls from the calling party. Alternatively, the caller can hear a busy signal as though the customer's line is always busy even when the line isn't busy. Another alternative would be that the caller could hear a ring tone as though the customer's line never answers. In this mode, the customer would not hear ringing on their line. Only the caller would hear ringing.
- the caller can be directed to different announcements, thereby providing interactive call blocking. The announcements can be the called party is unavailable, the called party doesn't accept telemarketing calls, a personal announcement recorded by the subscriber, a holiday greeting recorded by the customer, etc.
- a caller could be asked to provide the system with their name. Once a name is recorded by the system, a call is placed to the customer's phone asking the customer if they wish to take a call from the calling party. The customer can elect to direct the call to an announcement (matching the recorded announcements described in the previous paragraph), accept the call, or forward the call directly into voicemail. Blocked calls that are blocked by an announcement or interactive call blocking can be overridden by a subscriber defined PIN number. The caller would enter the PIN during the announcement and the call would be directed to the customer's number.
- the capabilities described above can be applied based on a schedule, such as date/time controls set by the user on a webpage.
- a shortcoming of conventional networks is that these incoming call controls may impede legitimate calls in an emergency situation.
- one incoming call controls methodology may suggest that a phone number of an emergency service might use to call a household be included the PAB. Then, calls from this number could be passed through to the household. This may work for some known emergency services numbers, but this methodology would be impractical because it would not work in all situations.
- emergency services personnel often carry wireless phones or call from emergency call centers. The many telephones that emergency service personnel use may render this solution infeasible.
- there is no telephone line class (payphone, hotel, regular phone, etc.) that identifies emergency services in the inbound call's setup information.
- an outbound call to a number on an emergency call list may change the incoming call controls to a telephone.
- a method of altering incoming call controls after a call has been placed to an emergency number comprises steps of performing a first modification of a first call control related to a first incoming calling number; waiting a predetermined period of time after performing the first modification; performing a second modification of the first call control related to the first incoming calling number.
- a method of altering incoming call controls after a call has been placed to an emergency number comprises steps of detecting a call placed to one of a plurality of numbers on a list of emergency numbers; and performing a first modification of a first call control related to a first incoming calling number during a predetermined period of time in response to the call.
- a method of altering incoming call controls after a call has been placed to an emergency number comprises of performing a first modification of a first call control related to a first incoming calling number in response to the call; and maintaining a second call control related to a second incoming calling number.
- a system comprises a subscriber device coupled to a telecommunications network; a call processing module coupled to the subscriber device by way of the telecommunications network; wherein the call processing module performs a first modification of a first call control related to a first incoming calling number and performs a second modification of the first call control related to the first incoming calling number after a predetermined period of time after performing the first modification.
- a system altering incoming call controls after a call has been placed to an emergency number
- the system comprising a subscriber device coupled to a telecommunications network; a call processing module coupled to the subscriber device by way of the telecommunications network; and a network access module coupled to the call processing module enabling a subscriber to establish rules for performing a first modification of a first call control related to a first incoming calling number and performing a second modification of the first call control related to the first incoming calling number after a predetermined period of time after performing the first modification.
- FIG. 1 is a system level diagram of a telecommunication system for altering incoming call controls after a call has been placed to an emergency number according to the present invention
- FIG. 2 is a block diagram of system for enabling a subscriber to establish rules for altering call controls according to the present invention
- FIG. 3 is a block diagram showing outgoing call control according to the present invention.
- FIG. 4 is a block diagram showing incoming call control according to the present invention.
- FIG. 5 is a flow chart showing steps of monitoring outgoing calls according to the present invention.
- FIG. 6 is a flow chart showing altering incoming call controls after a call has been placed to an emergency number according to the present invention.
- FIG. 1 a system level diagram of a telecommunication system for altering incoming call controls after a call has been placed to an emergency number according to the present invention is shown.
- a telecommunications network 102 is coupled to a building 104 , such as a residence, having a telephone subscriber device 106 coupled to the telecommunications network by a telecommunications link 108 .
- the telecommunications link could be, for example, a wireline link or a wireless link.
- the telecommunication could also be any communication network, including a wireline or wireless network.
- the building also preferably comprises a computer 110 coupled to the telecommunications network 102 by way of a communication link 112 .
- the computer 110 preferably comprises a network access device such as a dialup modem for accessing the telecommunications network.
- the computer 110 could be coupled to the telecommunications network by way of a digital subscriber line connection or a cable modem.
- the operation of the computer 110 will be described in more detail in reference to FIG. 2 .
- the telephone subscriber unit 106 and the computer 110 are shown at the same location, the two devices could be employed at difference locations.
- the telecommunication network enables communication with a plurality of devices which could make a call to the telephone subscriber device 104 , including another wireline subscriber unit 114 , a cellular telephone 116 , or another computer 118 .
- FIG. 2 a block diagram of system for enabling a subscriber to establish rules for altering call controls according to the present invention is shown.
- This reference architecture shows the wireline voice network elements (SSP and STP), Parlay Gateway, Real-Time Call Processing (Parlay Client), Service Management Application Server, and the Web Portal Application Server.
- SSP and STP wireline voice network elements
- Parlay Gateway Parlay Gateway
- Real-Time Call Processing Parlay Client
- Service Management Application Server Service Management Application Server
- Web Portal Application Server the Web Portal Application Server.
- Parlay Gateways and Clients may be replaced with a pure AIN implementation utilizing SCPs instead of the Parlay components.
- the reference architecture preferably applies to any Local Exchange Carrier (LEC), where Plain Old Telephone Service (POTS) lines form the base telephone service for this complex incoming call control service.
- POTS lines preferably include 1FB and 1FR lines2.
- the complex incoming call controls according to the present invention will replace as many switch based and AIN based vertical features as possible, although Caller ID and Call Waiting features are preferably available according to the embodiment of the present invention. All other features will be implemented as capabilities using this network infrastructure.
- SSP Signal Switching Points (SSP) 202 are telephone switches which, for most switch types 3, trigger information sent on a line by line basis. Customer lines according to the present invention are preferably configured so that trigger events are sent to an assigned Parlay Gateway 204 by way of a signal transfer point (STP) 206 , and not to the normal AIN SCP.
- STP signal transfer point
- the STP 206 route SS7 messages (including AIN trigger event messages) to the correct SCP device based on the point code specified in the message.
- the STP 206 acts as a data router.
- the STP routes data being exchanged between SSPs and SCPs, such as Parlay Gateways according to the present invention.
- SCP Service Control Point
- the Parlay Gateway looks like a Service Control Point (SCP).
- SCP Service Control Point
- SCP Service Control Point
- AIN trigger event messages and responses are exchanged between SSPs and Parlay Gateways using Signal Transfer Points (STP) as an intermediate router.
- STP Signal Transfer Points
- the Parlay Gateway does not necessarily perform call control, it functions as a gateway interface allowing a Parlay Client (shown as the Real-Time Call Processing module) to perform call control functions.
- the Parlay Gateway acts as an intermediary between the legacy wireline TDM network and the Parlay Client.
- the Real-Time Call Processing module 210 i.e. Parlay Client
- a Service Management Application Server 210 interfaces with the Real-Time Call Processing (Parlay Client) to provide customer supplied rules on how calls are to be handled.
- the Real-Time Call Processing module also provides the Service Management Application Server with call information for logging purposes.
- the program logic and call control logic can be implemented, for example, in Java.
- Service Management Application Server collects call information from the Real-Time Call Processing module. It also provides the Real-Time Call Processing module with call processing rules to apply to customer calls, where persistent data is stored.
- a Web Portal Application Server 212 also uses this module for access to persistent application data.
- the Web Portal Application Server affects changes to call handling or call controls through the Service Management Application Server.
- the complex incoming call controls web interface is preferably implemented in the Web Portal Application Server.
- the Web Portal Application Server preferably uses the Service Management Application Server as a resource for call and call control information.
- the Web Portal Application Server may be integrated with other web based LEC services to provide single session and single sign-on between the complex incoming call controls and other external portals. To use this service, the end-user would preferably have a personal computer (PC) that meets the minimum requirements for DSL access, dial-up or broadband Internet access.
- PC personal computer
- FIG. 3 a block diagram shows outgoing call control according to the present invention.
- all outbound calls made from the customer's phone 302 to a called party by way of SSP 306 and SSP 308 are monitored. If a dialed number is in the list of emergency telephone numbers, the incoming call controls are suppressed/modified to an emergency call processing state for a period of time (e.g. 60 minutes).
- the SSP sends an AIN message to the Parlay Gateway 310 by way of an STP 312 .
- the Gateway translates and sends the event to the Real-Time Call Processing module 314 .
- the Real-Time Call Processing module When the Real-Time Call Processing module receives the dialed number, the number is compared against a list of emergency telephone numbers. If the number matches, then the line is set to Emergency Call Mode and a timer is started. The timer value is set by the customer to a value between 30 minutes and 24 hours. A default time, such as 60 minutes, could be set if the customer does not set a time. When the timer expires, the line is set returned from the Emergency Call Mode back to a normal state. The settings for emergency call mode will be described in more detail in reference to the flowcharts of FIGS. 5 and 6 .
- FIG. 4 is a block diagram showing incoming call control according to the present invention.
- the calling party 402 dials the customer's phone 404 by way of an SSP 406 .
- an AIN event is sent by the customer's SSP 408 to the Parlay Gateway 410 by way of STP 412 .
- the Parlay Gateway translates the event and forwards it on to a Real-Time Call Processing module 414 .
- the Real-Time Call Processing module checks to see if the line is in an Emergency Call Processing mode. If the Emergency Mode is active, then program control over call processing is given to the Emergency Mode Call Processing module. Otherwise, normal call processing through the Incoming Call Control module is performed.
- the Emergency Mode Call Processing module can be as simple as pass all calls through to the customer. It may have levels of complexity added to retain some functionality for the subscriber. For example, after 10 rings, the call might be forwarded on to voicemail.
- emergency calls are placed from a telephone, it is critically important that Incoming Call Controls don't interfere with emergency services personnel attempting to call back the original caller.
- the embodiments of the present invention ensure that customer safety is preserved while making advanced telephone features and capabilities available.
- FIG. 5 is a flow chart showing monitoring inbound calls according to the present invention.
- a list of emergency call numbers are established at a step 502 .
- the obvious emergency numbers are 911 (in areas served by 911 service) or direct calls to police, fire, or medical (ambulance) emergency services. Because emergency calls can be made by a household member or by an alarm system, it is important to consider customers with alarm service may have calls made to the alarm service by their alarm system. Depending on the customer's circumstance, emergency numbers in addition to the alarm company number may need to be configured by the subscriber as well. These might include a doctor's number, the poison control center, a hospital, etc.
- the selection of outgoing call numbers is monitored at a step 504 .
- the outgoing call numbers are compared to a list of emergency call numbers at a step 506 . It is then determined whether a call has been initiated to a number on the list of emergency numbers at a step 508 . A flag is set and the time of the outgoing call is marked at a step 502 .
- Outgoing call information may assist the incoming call controls in determining the inbound call context.
- FIG. 6 is a flow chart showing altering incoming call controls after a call has been placed to an emergency number according to the present invention.
- the network will monitor inbound call requests at a step 602 . It will then determine if an inbound call request is received at a step 604 . If so, it is then determined whether an emergency flag indicating that an outgoing call had been made to a number on the list of emergency numbers, is set at a step 608 . If not, the network will process the inbound call using normal inbound call control rules at a step 610 . If the emergency flag is set, it will then determine whether a timer is still active at a step 612 . If not, the flag is unset and the time value is set to null at a step 614 . If the timer is still active, the inbound call is processed using special emergency inbound call controls.
- a modification of a call controls could include modifications from a list comprising a privacy manager call control; an anonymous call rejection call control; a selective call forwarding call control; an interactive call screening call control; an interactive call blocking call control, or other call controls well known in the art.
- the incoming call controls may optionally not block any incoming calls for a period of time.
- some incoming call controls can remain inactive. For example, an incoming call controls may be left active that, after ten rings, directs a caller to voicemail, or specific blocked numbers, such as numbers of harassing callers, could remain blocked.
Abstract
According to the various embodiments of the present invention, an outbound call to a number on an emergency call list may change the incoming call controls to a telephone. In particular, methods of altering incoming call controls after a call has been placed to an emergency number comprises steps of performing a first modification of a first call control related to a first incoming calling number, and performing a second modification of the first call control related to the first incoming calling number after a predetermined period of time. Systems for altering incoming call controls after a call has been placed to an emergency number are also disclosed.
Description
- The present application is a continuation of U.S. patent application Ser. No. 10/837,501 (still pending), filed Apr. 29, 2004, the entirety of which is hereby incorporated by reference.
- The present invention relates generally to telecommunication systems, and in particular, to a method of and system for altering incoming call controls after a call has been placed to an emergency number.
- Currently, voice telecommunication networks apply incoming call controls (ICC) to inbound or incoming calls. Incoming call controls affect how calls are processed by the network. Complex incoming call controls may include a number of rules, which are preferably applied in order. Each incoming call control rule may be implemented using a two step call processing model. The first step of the rule is to identify the call to tell whether the rule should be applied, and the second step of the rule is to dispose of the call to which the rule should be applied. Optionally, these rules may be selected and defined by the customer on the receiving end of the calls. Such selection and definition may be implemented using a Web User Interface or other interface.
- Further, incoming call controls may be of increased sophistication as they are integrated with external sources of information like Personal Address Books (PAB), calendars, and call logs. An example of increased incoming call control complexity is when a household desires to limit calls between 10:00 PM at night and 8:00 AM in the morning to those numbers listed in their PAB. In this example, all night-time calls received from telephone numbers not listed in the PAB may be blocked by an announcement, such as “The party you have called doesn't accept calls during this time. Please try your call again later.”
- Incoming call controls may be used, for example, to make a person more accessible or less accessible. An example of an incoming call controls that may make customers more accessible is a locating service, which may attempt to find the called party at a different telephone number than the one dialed. The locating service may involve the end-user publishing a “primary” number. The primary number may be a DID number associated with a call answering service or a telephone number (wireless or wireline) with a call answering service like Plain Old Voicemail (POVM) or Unified Messaging Service (UMS) that includes a locating capability. When a caller calls and the locating service is activated, the service may say something such as, “<Name Announcement> is not available right now. Please speak your name after the tone and I will attempt to locate them or press one to go directly to voicemail. <BEEP>” The subscriber may record this name announcement during the setup for their service. Next, the caller speaks their name. Then the system may say, “Please hold while I locate them.”
- The service may dial each of the telephone numbers in the end-user's contact list. Two exemplary methods of doing this are to call each number in the contact list one at a time or to call all numbers in the contact list at the same time. The caller may be restricted from hearing what is going on with regard to the called contact numbers, such that he is effectively on hold. If any of the dialed numbers is answered, the person answering the call may hear, “<Name Announcement> has a call from <Caller's Spoken Name>. To take the call, press one. To send the call to voicemail press two.” The called party may also be required to provide a Personal Identification Number (PIN) to authenticate that they are really the subscriber. If the subscriber accepts the call, the caller is connected to the end-user on the answered phone. Otherwise, the caller may be directed to the end-user's voicemail service. However, as should be apparent, callers often endure a delay as they wait for the locating service to find the subscriber.
- An example of an incoming call controls that may make a person less accessible is a privacy failure, which may help customers avoid telemarketing calls. However, even the most well thought out incoming call control rules may reduce a customer's ability to be contacted when applied to all inbound calls, especially during emergencies. For example, a privacy feature may be activated when a caller's telephone number information is unknown or unavailable to the terminating network. When the calling party information is unavailable, the call may be directed to the privacy feature instead of ringing through to the called party's phone. The privacy feature may force the caller to provide either their name or a DTMF PIN number. When the caller doesn't have a PIN number, they may be required to state their name. The privacy feature may then call the called party and ask them if they wish to take the call. Again, such features provide significant delays for a calling party trying to reach a called party.
- Incoming call control has two ways of looking at inbound calls. The first (shown) is by telephone number. Telephone numbers can be entered manually or selected from a list of telephone numbers generated by scanning the address book. The second method (not shown) is by name. When names are used, they are matched to the address book and all telephone numbers associated with the name are treated by the same inbound call management “rule.” Matching inbound calls can be given a distinctive ring tone. The distinctive ring tone sets the call apart from other inbound calls. Inbound calls can be forwarded to different destinations based on a ring/no answer rule. The subscriber has the ability to select the number of rings the call makes on the customer's phone before being forwarded. Calls can be forwarded to another number or voicemail. Additionally, inbound calls can be directed into a locating type service. The locating capability can try each of the possible terminating numbers in sequence or in parallel. The sequential mode works like most locating implementations, while the parallel mode works like simultaneous ring feature.
- A blocking capability could also be used. Callers who are blocked hear a system announcement indicating that the called party has elected not to receive calls from the calling party. Alternatively, the caller can hear a busy signal as though the customer's line is always busy even when the line isn't busy. Another alternative would be that the caller could hear a ring tone as though the customer's line never answers. In this mode, the customer would not hear ringing on their line. Only the caller would hear ringing. The caller can be directed to different announcements, thereby providing interactive call blocking. The announcements can be the called party is unavailable, the called party doesn't accept telemarketing calls, a personal announcement recorded by the subscriber, a holiday greeting recorded by the customer, etc.
- A caller could be asked to provide the system with their name. Once a name is recorded by the system, a call is placed to the customer's phone asking the customer if they wish to take a call from the calling party. The customer can elect to direct the call to an announcement (matching the recorded announcements described in the previous paragraph), accept the call, or forward the call directly into voicemail. Blocked calls that are blocked by an announcement or interactive call blocking can be overridden by a subscriber defined PIN number. The caller would enter the PIN during the announcement and the call would be directed to the customer's number. The capabilities described above can be applied based on a schedule, such as date/time controls set by the user on a webpage.
- A shortcoming of conventional networks is that these incoming call controls may impede legitimate calls in an emergency situation. In the situation where an emergency arises in the house, one incoming call controls methodology may suggest that a phone number of an emergency service might use to call a household be included the PAB. Then, calls from this number could be passed through to the household. This may work for some known emergency services numbers, but this methodology would be impractical because it would not work in all situations. For example, emergency services personnel often carry wireless phones or call from emergency call centers. The many telephones that emergency service personnel use may render this solution infeasible. Moreover, there is no telephone line class (payphone, hotel, regular phone, etc.) that identifies emergency services in the inbound call's setup information.
- Accordingly, there is a need for an improved a method of and system for altering incoming call controls after a call has been placed to an emergency number.
- According to the various embodiments of the present invention, an outbound call to a number on an emergency call list may change the incoming call controls to a telephone. In particular, a method of altering incoming call controls after a call has been placed to an emergency number comprises steps of performing a first modification of a first call control related to a first incoming calling number; waiting a predetermined period of time after performing the first modification; performing a second modification of the first call control related to the first incoming calling number.
- According to another aspect of the present invention, a method of altering incoming call controls after a call has been placed to an emergency number comprises steps of detecting a call placed to one of a plurality of numbers on a list of emergency numbers; and performing a first modification of a first call control related to a first incoming calling number during a predetermined period of time in response to the call.
- Finally, a method of altering incoming call controls after a call has been placed to an emergency number comprises of performing a first modification of a first call control related to a first incoming calling number in response to the call; and maintaining a second call control related to a second incoming calling number.
- Systems for altering incoming call controls after a call has been placed to an emergency number are also disclosed. For example, a system according to one embodiment comprises a subscriber device coupled to a telecommunications network; a call processing module coupled to the subscriber device by way of the telecommunications network; wherein the call processing module performs a first modification of a first call control related to a first incoming calling number and performs a second modification of the first call control related to the first incoming calling number after a predetermined period of time after performing the first modification.
- According to an alternate embodiment, a system altering incoming call controls after a call has been placed to an emergency number, the system comprising a subscriber device coupled to a telecommunications network; a call processing module coupled to the subscriber device by way of the telecommunications network; and a network access module coupled to the call processing module enabling a subscriber to establish rules for performing a first modification of a first call control related to a first incoming calling number and performing a second modification of the first call control related to the first incoming calling number after a predetermined period of time after performing the first modification.
-
FIG. 1 is a system level diagram of a telecommunication system for altering incoming call controls after a call has been placed to an emergency number according to the present invention; -
FIG. 2 is a block diagram of system for enabling a subscriber to establish rules for altering call controls according to the present invention; -
FIG. 3 is a block diagram showing outgoing call control according to the present invention; -
FIG. 4 is a block diagram showing incoming call control according to the present invention; -
FIG. 5 is a flow chart showing steps of monitoring outgoing calls according to the present invention; and -
FIG. 6 is a flow chart showing altering incoming call controls after a call has been placed to an emergency number according to the present invention. - Turning first to
FIG. 1 , a system level diagram of a telecommunication system for altering incoming call controls after a call has been placed to an emergency number according to the present invention is shown. In particular, atelecommunications network 102 is coupled to abuilding 104, such as a residence, having atelephone subscriber device 106 coupled to the telecommunications network by atelecommunications link 108. The telecommunications link could be, for example, a wireline link or a wireless link. The telecommunication could also be any communication network, including a wireline or wireless network. The building also preferably comprises acomputer 110 coupled to thetelecommunications network 102 by way of acommunication link 112. Thecomputer 110 preferably comprises a network access device such as a dialup modem for accessing the telecommunications network. Alternatively, thecomputer 110 could be coupled to the telecommunications network by way of a digital subscriber line connection or a cable modem. The operation of thecomputer 110 will be described in more detail in reference toFIG. 2 . Although thetelephone subscriber unit 106 and thecomputer 110 are shown at the same location, the two devices could be employed at difference locations. Finally, the telecommunication network enables communication with a plurality of devices which could make a call to thetelephone subscriber device 104, including anotherwireline subscriber unit 114, acellular telephone 116, or anothercomputer 118. - Turning now to
FIG. 2 , a block diagram of system for enabling a subscriber to establish rules for altering call controls according to the present invention is shown. The individual elements that make up the high level reference architecture are described below. This reference architecture shows the wireline voice network elements (SSP and STP), Parlay Gateway, Real-Time Call Processing (Parlay Client), Service Management Application Server, and the Web Portal Application Server. Although this reference architecture as shown generally applies to wireline, wireless, and VoIP telephone system implementations, there are other ways to perform the same incoming call control functions. For example, in the wireline network, Parlay Gateways and Clients (Call Processing Server) may be replaced with a pure AIN implementation utilizing SCPs instead of the Parlay components. - The reference architecture preferably applies to any Local Exchange Carrier (LEC), where Plain Old Telephone Service (POTS) lines form the base telephone service for this complex incoming call control service. POTS lines preferably include 1FB and 1FR lines2. The complex incoming call controls according to the present invention will replace as many switch based and AIN based vertical features as possible, although Caller ID and Call Waiting features are preferably available according to the embodiment of the present invention. All other features will be implemented as capabilities using this network infrastructure.
- SSP Signal Switching Points (SSP) 202 are telephone switches which, for most switch types 3, trigger information sent on a line by line basis. Customer lines according to the present invention are preferably configured so that trigger events are sent to an assigned
Parlay Gateway 204 by way of a signal transfer point (STP) 206, and not to the normal AIN SCP. - The
STP 206 route SS7 messages (including AIN trigger event messages) to the correct SCP device based on the point code specified in the message. In a way, theSTP 206 acts as a data router. The STP routes data being exchanged between SSPs and SCPs, such as Parlay Gateways according to the present invention. In the legacy wireline TDM network, the Parlay Gateway looks like a Service Control Point (SCP). Like any SS7 network terminating device, it has a point code assigned to it. AIN trigger event messages and responses are exchanged between SSPs and Parlay Gateways using Signal Transfer Points (STP) as an intermediate router. Although the Parlay Gateway does not necessarily perform call control, it functions as a gateway interface allowing a Parlay Client (shown as the Real-Time Call Processing module) to perform call control functions. The Parlay Gateway acts as an intermediary between the legacy wireline TDM network and the Parlay Client. The Real-Time Call Processing module 210 (i.e. Parlay Client) implements the call control logic directing the underlying network's call handling through a Parlay Gateway. Additionally, the Parlay Client collects call information for later retrieval by end-users in the call logs. - A Service
Management Application Server 210 interfaces with the Real-Time Call Processing (Parlay Client) to provide customer supplied rules on how calls are to be handled. The Real-Time Call Processing module also provides the Service Management Application Server with call information for logging purposes. The program logic and call control logic can be implemented, for example, in Java. Service Management Application Server. The Service Management Application Server collects call information from the Real-Time Call Processing module. It also provides the Real-Time Call Processing module with call processing rules to apply to customer calls, where persistent data is stored. - A Web
Portal Application Server 212 also uses this module for access to persistent application data. The Web Portal Application Server affects changes to call handling or call controls through the Service Management Application Server. The complex incoming call controls web interface is preferably implemented in the Web Portal Application Server. The Web Portal Application Server preferably uses the Service Management Application Server as a resource for call and call control information. The Web Portal Application Server may be integrated with other web based LEC services to provide single session and single sign-on between the complex incoming call controls and other external portals. To use this service, the end-user would preferably have a personal computer (PC) that meets the minimum requirements for DSL access, dial-up or broadband Internet access. - Turning now to
FIG. 3 , a block diagram shows outgoing call control according to the present invention. In this model, all outbound calls made from the customer'sphone 302 to a called party by way ofSSP 306 andSSP 308 are monitored. If a dialed number is in the list of emergency telephone numbers, the incoming call controls are suppressed/modified to an emergency call processing state for a period of time (e.g. 60 minutes). When the customer goes off-hook and dials a telephone number, the SSP sends an AIN message to theParlay Gateway 310 by way of anSTP 312. The Gateway translates and sends the event to the Real-TimeCall Processing module 314. When the Real-Time Call Processing module receives the dialed number, the number is compared against a list of emergency telephone numbers. If the number matches, then the line is set to Emergency Call Mode and a timer is started. The timer value is set by the customer to a value between 30 minutes and 24 hours. A default time, such as 60 minutes, could be set if the customer does not set a time. When the timer expires, the line is set returned from the Emergency Call Mode back to a normal state. The settings for emergency call mode will be described in more detail in reference to the flowcharts ofFIGS. 5 and 6 . - Turning now to
FIG. 4 is a block diagram showing incoming call control according to the present invention. The callingparty 402 dials the customer'sphone 404 by way of anSSP 406. Before the customer's line ring, an AIN event is sent by the customer'sSSP 408 to theParlay Gateway 410 by way ofSTP 412. The Parlay Gateway translates the event and forwards it on to a Real-TimeCall Processing module 414. The Real-Time Call Processing module checks to see if the line is in an Emergency Call Processing mode. If the Emergency Mode is active, then program control over call processing is given to the Emergency Mode Call Processing module. Otherwise, normal call processing through the Incoming Call Control module is performed. - The Emergency Mode Call Processing module can be as simple as pass all calls through to the customer. It may have levels of complexity added to retain some functionality for the subscriber. For example, after 10 rings, the call might be forwarded on to voicemail. When emergency calls are placed from a telephone, it is critically important that Incoming Call Controls don't interfere with emergency services personnel attempting to call back the original caller. The embodiments of the present invention ensure that customer safety is preserved while making advanced telephone features and capabilities available.
- Turning now to
FIG. 5 is a flow chart showing monitoring inbound calls according to the present invention. In particular, a list of emergency call numbers are established at astep 502. The obvious emergency numbers are 911 (in areas served by 911 service) or direct calls to police, fire, or medical (ambulance) emergency services. Because emergency calls can be made by a household member or by an alarm system, it is important to consider customers with alarm service may have calls made to the alarm service by their alarm system. Depending on the customer's circumstance, emergency numbers in addition to the alarm company number may need to be configured by the subscriber as well. These might include a doctor's number, the poison control center, a hospital, etc. The selection of outgoing call numbers is monitored at astep 504. The outgoing call numbers are compared to a list of emergency call numbers at astep 506. It is then determined whether a call has been initiated to a number on the list of emergency numbers at astep 508. A flag is set and the time of the outgoing call is marked at astep 502. As will be described in more detail in reference toFIG. 6 , Outgoing call information may assist the incoming call controls in determining the inbound call context. - Turning now to
FIG. 6 is a flow chart showing altering incoming call controls after a call has been placed to an emergency number according to the present invention. In particular, the network will monitor inbound call requests at astep 602. It will then determine if an inbound call request is received at astep 604. If so, it is then determined whether an emergency flag indicating that an outgoing call had been made to a number on the list of emergency numbers, is set at astep 608. If not, the network will process the inbound call using normal inbound call control rules at astep 610. If the emergency flag is set, it will then determine whether a timer is still active at astep 612. If not, the flag is unset and the time value is set to null at astep 614. If the timer is still active, the inbound call is processed using special emergency inbound call controls. - A modification of a call controls could include modifications from a list comprising a privacy manager call control; an anonymous call rejection call control; a selective call forwarding call control; an interactive call screening call control; an interactive call blocking call control, or other call controls well known in the art. Further, if a call was placed to an emergency number on the list of emergency numbers, the incoming call controls may optionally not block any incoming calls for a period of time. Alternatively, some incoming call controls can remain inactive. For example, an incoming call controls may be left active that, after ten rings, directs a caller to voicemail, or specific blocked numbers, such as numbers of harassing callers, could remain blocked.
- It can therefore be appreciated that the new and novel system and method of a method of altering incoming call controls after a call has been placed to an emergency number has been described. It will be appreciated by those skilled in the art that, in particular to the teaching herein, numerous alternatives and equivalents will be seen to exist which incorporate the disclosed invention. As a result, the invention is not to be limited by the foregoing embodiments, but only by the following claims.
Claims (20)
1. A computer-implemented method of processing incoming calls, the method comprising the steps of:
processing, with a processor, an incoming call to a first telephone number based on whether incoming call controls associated with the first telephone number have been set to an emergency call state in response to a call from a telephone associated with the first telephone number to a second telephone number that is an emergency call number, wherein processing the incoming call to the first telephone number comprises:
determining whether an emergency flag associated with the first telephone number is set;
determining whether a timer is active in response to determining the emergency flag associated with the first telephone number is set; and
processing the incoming call based on whether the emergency flag associated with the first telephone number is set and whether the timer is active.
2. The method of claim 1 , further comprising:
modifying, with a processor, the incoming call controls associated with the first telephone number to an emergency call processing state based on a detection of a call from the telephone associated with the first telephone number to the second telephone number that is an emergency call number.
3. The method of claim 2 , wherein modifying the incoming call controls associated with the first telephone number to an emergency all processing state comprises:
setting the emergency flag associated with the first telephone number; and
starting the timer associated with the emergency flag.
4. The method of claim 2 , further comprising:
detecting, with a processor, the call from the telephone associated with the first telephone number to the second telephone number that is an emergency call number.
5. The method of claim 2 , further comprising:
modifying, with a processor, the incoming call controls associated with the first telephone number to remove the emergency call processing state, wherein the incoming call processing state is removed a predetermined time period after the detection of the call to the second telephone number that is an emergency all number.
6. The method of claim 5 , wherein modifying the incoming call controls associated with the first telephone number to remove the emergency all processing state comprises:
removing the emergency flag associated with the first telephone number; and
setting a value of the timer to null.
7. The method of claim 1 , wherein processing an incoming call to the first telephone number based on whether incoming call controls associated with the first telephone number have been set to an emergency call state comprises:
determining not to block the incoming call to the first telephone number in response to determining the incoming call controls are at an emergency all processing state.
8. A computer-readable storage medium comprising a set of instructions for processing incoming call, the set of instructions to direct a processor to perform acts of:
processing an incoming call to a first telephone number based on whether incoming call controls associated with the first telephone number have been set to an emergency call state in response to a call from a telephone associated with the first telephone number to a second telephone number that is an emergency call number, wherein processing the incoming call to the first telephone number comprises:
determining whether an emergency flag associated with the first telephone number is set;
determining whether a timer is active in response to determining the emergency flag associated with the first telephone number is set; and
processing the incoming call based on whether the emergency flag associated with the first telephone number is set and whether the timer is active.
9. The computer-readable storage medium of claim 8 , further comprising a st of instructions to direct a processor to perform acts of:
modifying the incoming call controls associated with the first telephone number to an emergency call processing state based on a detection of a call from the telephone associated with the first telephone number to the second telephone number that is an emergency call number.
10. The computer-readable storage medium of claim 9 , wherein modifying the incoming call controls associated with the first telephone number to an emergency all processing state comprises:
setting the emergency flag associated with the first telephone number; and
starting the timer associated with the emergency flag.
11. The computer-readable storage medium of claim 9 , further comprising a set of instructions to direct a processor to perform acts of:
detecting, with a processor, the call from the telephone associated with the first telephone number to the second telephone number that is an emergency all number.
12. The computer-readable storage medium of claim 9 , further comprising a set of instructions to direct a processor to perform acts of:
modifying, with a processor, the incoming call controls associated with the first telephone number to remove the emergency call processing state, wherein the incoming call processing state is removed a predetermined time period after the detection of the call to the second telephone number that is an emergency all number.
13. The computer-readable storage medium of claim 12 , wherein modifying the incoming call controls associated with the first telephone number to remove the emergency all processing state comprises:
removing the emergency flag associated with the first telephone number; and
setting a value of the timer to null.
14. The computer-readable storage medium of claim 8 , wherein processing an incoming call to the first telephone number based on whether incoming call controls associated with the first telephone number have been set to an emergency call state comprises:
determining not to block the incoming call to the first telephone number in response to determining the incoming call controls are at an emergency all processing state.
15. A system for processing an incoming call, the system comprising:
a call processing module coupled to a subscriber device by way of a telecommunications network, the call processing module configured to process an incoming call to a first telephone number based on whether incoming call controls associated with the first telephone number have been set to an emergency call state in response to a call from a telephone associated with the first telephone number to a second telephone number that is an emergency call number, wherein to process the incoming call to the first telephone number, the call processing module is configured to:
determine whether an emergency flag associated with the first telephone number is set;
determine whether a timer is active in response to determining the emergency flag associated with the first telephone number is set; and
process the incoming call based on whether the emergency flag associated with the first telephone number is set and whether the timer is active.
16. The system of claim 15 , wherein the call processing module is further configured to modify the incoming call controls associated with the first telephone number to an emergency call processing state based on a detection of a call from the telephone associated with the first telephone number to the second telephone number that is an emergency call number.
17. The system of claim 16 , wherein to modify the incoming call controls associated with the first telephone number to an emergency all processing state the call processing module is configured to:
set the emergency flag associated with the first telephone number; and
start the timer associated with the emergency flag.
18. The system of claim 16 , wherein the call processing module is further configured to detect the call from the telephone associated with the first telephone number to the second telephone number that is an emergency all number.
19. The system of claim 16 , wherein the call processing module is further configured to modify the incoming call controls associated with the first telephone number to remove the emergency call processing state, wherein the incoming call processing state is removed a predetermined time period after the detection of the call to the second telephone number that is an emergency all number.
20. The system of claim 19 , wherein to modify the incoming call controls associated with the first telephone number to remove the emergency call processing state, the call processing module is configured to:
remove the emergency flag associated with the first telephone number; and
set a value of the timer to null.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/620,958 US20100067667A1 (en) | 2004-04-29 | 2009-11-18 | Method of and system for altering incoming call controls after a call has been placed to an emergency number |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/837,501 US7643625B2 (en) | 2004-04-29 | 2004-04-29 | Method of and system for altering incoming call controls after a call has been placed to an emergency number |
US12/620,958 US20100067667A1 (en) | 2004-04-29 | 2009-11-18 | Method of and system for altering incoming call controls after a call has been placed to an emergency number |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/837,501 Continuation US7643625B2 (en) | 2004-04-29 | 2004-04-29 | Method of and system for altering incoming call controls after a call has been placed to an emergency number |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100067667A1 true US20100067667A1 (en) | 2010-03-18 |
Family
ID=35187112
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/837,501 Expired - Fee Related US7643625B2 (en) | 2004-04-29 | 2004-04-29 | Method of and system for altering incoming call controls after a call has been placed to an emergency number |
US12/620,958 Abandoned US20100067667A1 (en) | 2004-04-29 | 2009-11-18 | Method of and system for altering incoming call controls after a call has been placed to an emergency number |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/837,501 Expired - Fee Related US7643625B2 (en) | 2004-04-29 | 2004-04-29 | Method of and system for altering incoming call controls after a call has been placed to an emergency number |
Country Status (1)
Country | Link |
---|---|
US (2) | US7643625B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150063554A1 (en) * | 2013-08-29 | 2015-03-05 | Hon Hai Precision Industry Co., Ltd. | Telephone device and method for auto transferring incoming calls |
KR102006232B1 (en) | 2018-12-18 | 2019-08-01 | 한국인터넷진흥원 | Method and apparatus for detecting a device abnormality symptom through comprehensive analysis of a plurality of pieces of device information |
KR20200075725A (en) | 2019-07-26 | 2020-06-26 | 한국인터넷진흥원 | Method and apparatus for detecting a device abnormality symptom through comprehensive analysis of a plurality of pieces of device information |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7974608B2 (en) * | 2005-03-03 | 2011-07-05 | Alcatel-Lucent Usa Inc. | Anonymous call blocking in wireless networks |
US7835747B2 (en) * | 2005-05-20 | 2010-11-16 | Alcatel-Lucent Usa Inc. | Method for sending a message to a calling phone when called phone aborts an incoming call request |
US20060293022A1 (en) * | 2005-06-28 | 2006-12-28 | Lucent Technologies Inc. | Emergency session handling over a communication network |
US7991139B2 (en) * | 2006-02-13 | 2011-08-02 | At&T Intellectual Property I, L.P. | Methods and apparatus to limit ring trees in voice over internet protocol networks |
US8320529B2 (en) * | 2006-02-16 | 2012-11-27 | Verizon Services Corp. | Sending urgent messages to multiple recipients via a single call |
KR101009773B1 (en) * | 2006-03-03 | 2011-01-19 | 교세라 가부시키가이샤 | Portable information terminal |
US20070211702A1 (en) * | 2006-03-08 | 2007-09-13 | Doradla Anil K | Methods and apparatus to perform parallel ringing across communication networks |
US7657009B2 (en) | 2006-05-16 | 2010-02-02 | At&T Intellectual Property I, Lp | Call block disabler |
US8179791B2 (en) * | 2006-08-03 | 2012-05-15 | Der William C | Sequentially calling groups of multiple communication devices based on user-specified lists of communication devices having assigned priorities |
US7970116B2 (en) * | 2006-10-13 | 2011-06-28 | At&T Intellectual Property I, L.P. | Method and apparatus for notifying an end user of a messaging event in a multi-user setting |
US8244204B1 (en) * | 2007-12-11 | 2012-08-14 | Cellco Partnership | Timed override of incoming call restrictions to facilitate callback after an emergency call |
US7983652B1 (en) * | 2008-01-10 | 2011-07-19 | At&T Mobility Ii Llc | Emergency call notification for network services |
US20100267355A1 (en) * | 2009-04-17 | 2010-10-21 | Varney Douglas W | Method for allowing Reestablishment of A call to A mobile terminal that is blocked from receiving calls |
US8340629B2 (en) * | 2009-09-11 | 2012-12-25 | General Motors Llc | Method of contacting a PSAP |
US8848878B2 (en) * | 2010-09-30 | 2014-09-30 | Cox Communications, Inc. | Systems and methods for facilitating emergency callbacks |
US10109028B2 (en) * | 2014-04-16 | 2018-10-23 | Voxer Ip Llc | Embeddable communications software module |
US9930507B2 (en) * | 2015-03-06 | 2018-03-27 | Qualcomm Incorporated | Managing emergency communication session termination |
US10498892B2 (en) * | 2017-03-24 | 2019-12-03 | T-Mobile Usa, Inc. | Optimized call handling during E911 calls |
US10084914B1 (en) | 2017-03-24 | 2018-09-25 | T-Mobile Usa, Inc. | Guard timer to optimize E911 call handling |
US10498774B2 (en) * | 2017-03-24 | 2019-12-03 | T-Mobile Usa, Inc. | Systems and methods for improved E911 call handling |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5467388A (en) * | 1994-01-31 | 1995-11-14 | Bell Atlantic Network Services, Inc. | Method and apparatus for selectively blocking incoming telephone calls |
US5563935A (en) * | 1994-08-17 | 1996-10-08 | Small; J. Gordon | Telephone answering system with call screening circuit |
US5732125A (en) * | 1994-10-20 | 1998-03-24 | Fujitsu Limited | Method of capturing a control channel for calls following an emergency call |
US5995603A (en) * | 1997-05-23 | 1999-11-30 | At&T Corp | Telephone call screening device |
US6289084B1 (en) * | 1998-05-29 | 2001-09-11 | Lucent Technologies Inc. | Apparatus, method and system for personal telecommunication call screening and alerting |
US6298122B1 (en) * | 1998-12-07 | 2001-10-02 | Gregory L. Horne | Caller ID system |
US6332073B1 (en) * | 1998-10-19 | 2001-12-18 | Ericsson Inc. | Emergency number dialing from a fixed cellular terminal |
US20020009184A1 (en) * | 1999-10-22 | 2002-01-24 | J. Mitchell Shnier | Call classification indication using sonic means |
US6359970B1 (en) * | 1998-08-14 | 2002-03-19 | Maverick Consulting Services, Inc. | Communications control method and apparatus |
US6456706B1 (en) * | 1997-07-18 | 2002-09-24 | Carolyn S. Blood | Automatic telephone silent call screening system |
US6529596B1 (en) * | 2000-05-04 | 2003-03-04 | Telemaze, Inc. | Web-based control of telephone |
US20030157923A1 (en) * | 2002-02-20 | 2003-08-21 | Yasuhiro Tani | Mobile station, and apparatus, system and method for management of emergency calls |
US6690770B2 (en) * | 2001-11-08 | 2004-02-10 | Sbc Technology Resources, Inc. | TTY enhancement of busy condition prompt |
US20040086093A1 (en) * | 2002-10-29 | 2004-05-06 | Schranz Paul Steven | VoIP security monitoring & alarm system |
US20040203576A1 (en) * | 2003-03-06 | 2004-10-14 | Droste Scott T. | Emergency call-back for a wireless communication device equipped with a user removable module |
US20050243975A1 (en) * | 2004-04-28 | 2005-11-03 | International Business Machines Corporation | Method and system of determining unsolicited callers |
US7190947B2 (en) * | 2003-02-07 | 2007-03-13 | Motorola Inc. | Priority E911 call back during access class restrictions |
-
2004
- 2004-04-29 US US10/837,501 patent/US7643625B2/en not_active Expired - Fee Related
-
2009
- 2009-11-18 US US12/620,958 patent/US20100067667A1/en not_active Abandoned
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5467388A (en) * | 1994-01-31 | 1995-11-14 | Bell Atlantic Network Services, Inc. | Method and apparatus for selectively blocking incoming telephone calls |
US5563935A (en) * | 1994-08-17 | 1996-10-08 | Small; J. Gordon | Telephone answering system with call screening circuit |
US5732125A (en) * | 1994-10-20 | 1998-03-24 | Fujitsu Limited | Method of capturing a control channel for calls following an emergency call |
US5995603A (en) * | 1997-05-23 | 1999-11-30 | At&T Corp | Telephone call screening device |
US6456706B1 (en) * | 1997-07-18 | 2002-09-24 | Carolyn S. Blood | Automatic telephone silent call screening system |
US6289084B1 (en) * | 1998-05-29 | 2001-09-11 | Lucent Technologies Inc. | Apparatus, method and system for personal telecommunication call screening and alerting |
US6359970B1 (en) * | 1998-08-14 | 2002-03-19 | Maverick Consulting Services, Inc. | Communications control method and apparatus |
US6332073B1 (en) * | 1998-10-19 | 2001-12-18 | Ericsson Inc. | Emergency number dialing from a fixed cellular terminal |
US6298122B1 (en) * | 1998-12-07 | 2001-10-02 | Gregory L. Horne | Caller ID system |
US20020009184A1 (en) * | 1999-10-22 | 2002-01-24 | J. Mitchell Shnier | Call classification indication using sonic means |
US6529596B1 (en) * | 2000-05-04 | 2003-03-04 | Telemaze, Inc. | Web-based control of telephone |
US6690770B2 (en) * | 2001-11-08 | 2004-02-10 | Sbc Technology Resources, Inc. | TTY enhancement of busy condition prompt |
US20030157923A1 (en) * | 2002-02-20 | 2003-08-21 | Yasuhiro Tani | Mobile station, and apparatus, system and method for management of emergency calls |
US20040086093A1 (en) * | 2002-10-29 | 2004-05-06 | Schranz Paul Steven | VoIP security monitoring & alarm system |
US7190947B2 (en) * | 2003-02-07 | 2007-03-13 | Motorola Inc. | Priority E911 call back during access class restrictions |
US20040203576A1 (en) * | 2003-03-06 | 2004-10-14 | Droste Scott T. | Emergency call-back for a wireless communication device equipped with a user removable module |
US20050243975A1 (en) * | 2004-04-28 | 2005-11-03 | International Business Machines Corporation | Method and system of determining unsolicited callers |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150063554A1 (en) * | 2013-08-29 | 2015-03-05 | Hon Hai Precision Industry Co., Ltd. | Telephone device and method for auto transferring incoming calls |
TWI556621B (en) * | 2013-08-29 | 2016-11-01 | 鴻海精密工業股份有限公司 | Telephone device, server, and method for auto transferring incoming call |
KR102006232B1 (en) | 2018-12-18 | 2019-08-01 | 한국인터넷진흥원 | Method and apparatus for detecting a device abnormality symptom through comprehensive analysis of a plurality of pieces of device information |
KR20200075725A (en) | 2019-07-26 | 2020-06-26 | 한국인터넷진흥원 | Method and apparatus for detecting a device abnormality symptom through comprehensive analysis of a plurality of pieces of device information |
Also Published As
Publication number | Publication date |
---|---|
US7643625B2 (en) | 2010-01-05 |
US20050243974A1 (en) | 2005-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20100067667A1 (en) | Method of and system for altering incoming call controls after a call has been placed to an emergency number | |
US6122357A (en) | Providing enhanced services through double SIV and personal dial tone | |
US9392120B2 (en) | Methods and systems for call management with user intervention | |
CN100508660C (en) | Dropped call continuation | |
US8750482B2 (en) | Methods and systems for preemptive rejection of calls | |
US6055305A (en) | Method and apparatus for providing network-based customized call treatment | |
US6993355B1 (en) | Methods and apparatus for connecting family members | |
US6807272B2 (en) | System and method for providing telephony services to remote subscribers | |
US8976951B1 (en) | Methods and systems for telephony call-back processing | |
US8774380B2 (en) | Methods and systems for call management with user intervention | |
US7912193B2 (en) | Methods and systems for call management with user intervention | |
US7298833B2 (en) | Wireless device to manage cross-network telecommunication services | |
US8457113B2 (en) | Branch calling and caller ID based call routing telephone features | |
US5999611A (en) | Subscriber interface for accessing and operating personal communication services | |
US8135410B2 (en) | Method and apparatus for communicating with one of plural devices associated with a single telephone number during a disaster and disaster recovery | |
US6574328B1 (en) | Telephone call control system for the public switched telephone network | |
US20050195954A1 (en) | Informing caller of callee activity mode | |
KR20010074556A (en) | Message monitor application concept and implementation | |
JPH10327250A (en) | Telecommunication system managing method | |
CA2404004A1 (en) | Internet call waiting with voice mail system that provides monitoring during recording | |
JPH0936965A (en) | System and method for processing call to network subscriber with changed telephone number | |
US7245713B1 (en) | Call monitoring | |
WO1999051015A1 (en) | Computer telephony integration | |
US20130343205A1 (en) | Methods and apparatus for providing expanded telecommunications service | |
US20050111648A1 (en) | Multi-stage telephone number dialing system and method for providing limited access to a telephone subscriber |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |