WO1999004546A1 - Telecommunications systems - Google Patents

Telecommunications systems Download PDF

Info

Publication number
WO1999004546A1
WO1999004546A1 PCT/EP1998/004276 EP9804276W WO9904546A1 WO 1999004546 A1 WO1999004546 A1 WO 1999004546A1 EP 9804276 W EP9804276 W EP 9804276W WO 9904546 A1 WO9904546 A1 WO 9904546A1
Authority
WO
WIPO (PCT)
Prior art keywords
call
called party
anonymous
calls
cli
Prior art date
Application number
PCT/EP1998/004276
Other languages
French (fr)
Inventor
Robert David Tyler
Original Assignee
Telefonaktiebolaget Lm Ericsson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson filed Critical Telefonaktiebolaget Lm Ericsson
Priority to AU89744/98A priority Critical patent/AU8974498A/en
Publication of WO1999004546A1 publication Critical patent/WO1999004546A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/78Temporary storage of information of calling or called subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • H04M1/571Blocking transmission of caller identification to called party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/55Aspects of automatic or semi-automatic exchanges related to network data storage and management
    • H04M2203/558Databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13091CLI, identification of calling line
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13103Memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13175Graphical user interface [GUI], WWW interface, visual indication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13204Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1324Conference call
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13284Call tracing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13377Recorded announcement

Definitions

  • the present invention relates to a telecommunications system, and in particular to a telecommunications system in which anonymous and nuisance calls can be traced.
  • an anonymous call rejection system simply rejects any calls made to a subscriber with the service active when the caller withholds their number.
  • Service interception diverts all incoming calls from a subscriber with the service to an operator.
  • the present invention seeks to provide a system which allows an occasional nuisance caller to be traced. Specifically, whenever a calling line identifier is withheld from the called party, details of the call are stored, and can be accessed if the called party subsequently complains that the call was a nuisance call .
  • Figure 1 shows a schematic diagram of a telecommunications network
  • FIG. 2 shows a schematic diagram of an exchange unit used in the network of Figure 1;
  • FIGS. 3 and 4 are flowcharts showing steps in the use of a system embodying the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • FIG. 1 shows a schematic view of a telecommunications system 1 in which a caller 11 makes a call to a called party 12 by way of a network 13 including a local exchange 14.
  • the called party 12 is connected to its local exchange 14 in order to connect to the network.
  • Each caller 11 and called party 12 has an individual calling line identifier (CLI) associated with it so that they can be identified, for example for billing purposes.
  • CLI calling line identifier
  • the calling line identifier (CLI) also enables the call to be correctly routed through the network 13 between the two parties.
  • the CLI of the caller may be displayed to the called party before the call is answered, or may be announced to the called party (on request) after the call is determined. However, the caller may withhold his CLI, so that it is neither displayed nor announced by the called party.
  • a call is usually set up between the caller 11 and the called party 12 through many nodes of the network, the last node being the local exchange 14.
  • Such a local exchange 14 is shown schematically in Figure 2, and includes an input line 20 which is connected to a call routing unit 21.
  • the routing unit 21 operates to connect the incoming call to the correct outgoing line 24, in order to set up the call.
  • the outgoing line 24 is connected to the called party.
  • the exchange also includes a calling line identifier processing unit 22 and an anonymous call trace database 23.
  • an anonymous call trace (ACT) record is created for the called party 12 and the anonymous call data (for example CLI date and time) is stored in the ACT database 23.
  • ACT anonymous call trace
  • a call is received, step 32, and then checked (step 33) to confirm that the CLI is to be withheld from the called party 12. If this is not the case, then the call is set up immediately (step 34) . If the call is to be anonymous, however, the call details are stored in the database (step 35) . The call is then set up (step 34) as usual.
  • the stored records in the database can be deleted if they are unmarked and over a predetermined age (step 36) . For example, call records can usefully be kept for 24 hours, or more.
  • the service provider receives a call report (step 42) and then searches the database using the called party's CLI (step 43) . This will enable any anonymous calls to be traced that have been made to the called party within the predetermined time limit. If no anonymous call records exist (step 44), then the procedure ends. However, if anonymous call records do exist, then those records are marked so that they can be retained in the database.
  • step 46 the decision regarding further searching is made. If a further search is required, for example so that the database can be searched using the CLI of one or all of the found calling parties (step 47) in order to cross check anonymous call instances. Any records found are again marked (step 48) .
  • Call data relating to anonymous calls is stored for a predetermined data retention period, for example 24 hours. However, if the record has been marked as relating to an anonymous nuisance call, then the record is retained until deleted by an operator command. Call data for all subsequent anonymous calls to the same subscriber can also be stored, marked and retained.
  • the system thus stores calling line identifier data of calls made in which the CLI data is not to be supplied to the called party, the so-called anonymous calls.
  • a subscriber receives a nuisance call it should be reported directly to the service provide or via the local authority. Then if the calls continue the subscriber concerned may request that the ACT data be made available through appropriate channels if legal action is to be taken. As described above, when a nuisance call is reported, the service provider searches for ACT data on the basis of the called party's identifier so as to validate the data.
  • the ACT database is readily searchable, for example, by way of the called party's identifier, or by way of the calling party's identifier. For example, if a nuisance call has been received by one called party the database can be interrogated so as to discover whether the same nuisance caller has called any other users of the network. If a nuisance caller persists in calling a particular subscriber, then call data from previously reported calls may be used to create a conference call between the two subscribers and a recording device, thus providing further evidence of nuisance calls.
  • the advantages of the embodiments of the present invention are as follows:
  • Random nuisance calls by a single offender are more readily traced to a single source, since details of all anonymous calls are stored; Nuisance callers who may be aware of special subscriber services such as customer originated trace and malicious call trace, and therefore may only make a small number of infrequent calls to a single number, can be traced easily; and No specific subscriber action is required to enable call data to be stored since call data is recorded automatically for those calls in which the CLI is withheld from the called party. Subscriber action is only needed when an anonymous nuisance call is received. That single call can be traced instead of waiting for further nuisance calls.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Details of all anonymous calls (calls in which the caller's CLI is withheld from the called party) are stored for a predetermined time. If a called party reports that an anonymous call was a nuisance call, details thereof (including the CLI) can be accessed by the system operator.

Description

TELECOMMUNICATIONS SYSTEMS
TECHNICAL FIELD
The present invention relates to a telecommunications system, and in particular to a telecommunications system in which anonymous and nuisance calls can be traced.
DESCRIPTION OF THE RELATED ART
In conventional telecommunications networks, if a subscriber receives a one-off or unexpected nuisance or malicious call, and the caller withholds their calling line identifier (CLI) , it is not possible to identify the origin of the call.
Several systems have been proposed in order to overcome this problem. Even if the caller's CLI is withheld, it will be stored, and can be accessed at the exchange the subscriber has a caller return service provided. However, only the most recently received CLI is stored, and so the number is overwritten with each subsequent incoming call and can therefore be quickly lost.
Alternatively, an anonymous call rejection system simply rejects any calls made to a subscriber with the service active when the caller withholds their number.
This creates problems where legitimate callers withhold their numbers as standard practice, for example in the case of an ex-directory caller.
Service interception diverts all incoming calls from a subscriber with the service to an operator.
After the operator has investigated and approved the nature of the call, it is forwarded to the called subscriber. The disadvantage is that the service is not appropriate for occasional nuisance calls.
SUMMARY OF THE INVENTION
The present invention seeks to provide a system which allows an occasional nuisance caller to be traced. Specifically, whenever a calling line identifier is withheld from the called party, details of the call are stored, and can be accessed if the called party subsequently complains that the call was a nuisance call .
It is an object of the present invention to allow an occasional random nuisance call to be traced back to the caller.
BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 shows a schematic diagram of a telecommunications network;
Figure 2 shows a schematic diagram of an exchange unit used in the network of Figure 1; and
Figures 3 and 4 are flowcharts showing steps in the use of a system embodying the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Figure 1 shows a schematic view of a telecommunications system 1 in which a caller 11 makes a call to a called party 12 by way of a network 13 including a local exchange 14. The called party 12 is connected to its local exchange 14 in order to connect to the network. Each caller 11 and called party 12 has an individual calling line identifier (CLI) associated with it so that they can be identified, for example for billing purposes. The calling line identifier (CLI) also enables the call to be correctly routed through the network 13 between the two parties. Depending on the type of telephone apparatus used by the called party, the CLI of the caller may be displayed to the called party before the call is answered, or may be announced to the called party (on request) after the call is determined. However, the caller may withhold his CLI, so that it is neither displayed nor announced by the called party. A call is usually set up between the caller 11 and the called party 12 through many nodes of the network, the last node being the local exchange 14.
Such a local exchange 14 is shown schematically in Figure 2, and includes an input line 20 which is connected to a call routing unit 21. The routing unit 21 operates to connect the incoming call to the correct outgoing line 24, in order to set up the call. The outgoing line 24 is connected to the called party.
The exchange also includes a calling line identifier processing unit 22 and an anonymous call trace database 23.
With reference to Figures 2 and 3, each time an anonymous call (that is, a call in which the calling party has requested that his CLI should be withheld from the called party) is received in the local exchange 14, an anonymous call trace (ACT) record is created for the called party 12 and the anonymous call data (for example CLI date and time) is stored in the ACT database 23. As shown in Figure 3, a call is received, step 32, and then checked (step 33) to confirm that the CLI is to be withheld from the called party 12. If this is not the case, then the call is set up immediately (step 34) . If the call is to be anonymous, however, the call details are stored in the database (step 35) . The call is then set up (step 34) as usual. Optionally, the stored records in the database can be deleted if they are unmarked and over a predetermined age (step 36) . For example, call records can usefully be kept for 24 hours, or more.
If the called party 12 subsequently reports the receipt of an anonymous nuisance call, then the ACT call record can be found and marked so that the complaint is registered. As shown in Figure 4, the service provider receives a call report (step 42) and then searches the database using the called party's CLI (step 43) . This will enable any anonymous calls to be traced that have been made to the called party within the predetermined time limit. If no anonymous call records exist (step 44), then the procedure ends. However, if anonymous call records do exist, then those records are marked so that they can be retained in the database.
At step 46, the decision regarding further searching is made. If a further search is required, for example so that the database can be searched using the CLI of one or all of the found calling parties (step 47) in order to cross check anonymous call instances. Any records found are again marked (step 48) .
Call data relating to anonymous calls is stored for a predetermined data retention period, for example 24 hours. However, if the record has been marked as relating to an anonymous nuisance call, then the record is retained until deleted by an operator command. Call data for all subsequent anonymous calls to the same subscriber can also be stored, marked and retained. The system thus stores calling line identifier data of calls made in which the CLI data is not to be supplied to the called party, the so-called anonymous calls.
If a subscriber receives a nuisance call it should be reported directly to the service provide or via the local authority. Then if the calls continue the subscriber concerned may request that the ACT data be made available through appropriate channels if legal action is to be taken. As described above, when a nuisance call is reported, the service provider searches for ACT data on the basis of the called party's identifier so as to validate the data.
The ACT database is readily searchable, for example, by way of the called party's identifier, or by way of the calling party's identifier. For example, if a nuisance call has been received by one called party the database can be interrogated so as to discover whether the same nuisance caller has called any other users of the network. If a nuisance caller persists in calling a particular subscriber, then call data from previously reported calls may be used to create a conference call between the two subscribers and a recording device, thus providing further evidence of nuisance calls. The advantages of the embodiments of the present invention are as follows:
Random nuisance calls by a single offender are more readily traced to a single source, since details of all anonymous calls are stored; Nuisance callers who may be aware of special subscriber services such as customer originated trace and malicious call trace, and therefore may only make a small number of infrequent calls to a single number, can be traced easily; and No specific subscriber action is required to enable call data to be stored since call data is recorded automatically for those calls in which the CLI is withheld from the called party. Subscriber action is only needed when an anonymous nuisance call is received. That single call can be traced instead of waiting for further nuisance calls.

Claims

1. A telecommunications system in which a calling party can withhold its calling line identifier from a called party, wherein the system includes storage means for exclusively storing call information relating to all calls connected by the system in which the calling line identifier is withheld.
2. A system as claimed in claim 1, wherein the storage means is searchable by way of a called or calling party's identifier.
3. A system as claimed in claim 1 or 2 , wherein the stored call information is held for a predefined amount of time.
4. A system as claimed in claim 1, 2 or 3, wherein the stored call information relating to a particular call in which the calling line identifier has been withheld, is accessible on receipt of a request for information from a user of the network.
PCT/EP1998/004276 1997-07-14 1998-07-09 Telecommunications systems WO1999004546A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU89744/98A AU8974498A (en) 1997-07-14 1998-07-09 Telecommunications systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9714787.0 1997-07-14
GB9714787A GB2327318A (en) 1997-07-14 1997-07-14 A method of tracing anonymous telephone calls

Publications (1)

Publication Number Publication Date
WO1999004546A1 true WO1999004546A1 (en) 1999-01-28

Family

ID=10815817

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1998/004276 WO1999004546A1 (en) 1997-07-14 1998-07-09 Telecommunications systems

Country Status (3)

Country Link
AU (1) AU8974498A (en)
GB (1) GB2327318A (en)
WO (1) WO1999004546A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001069901A1 (en) * 2000-03-17 2001-09-20 Nokia Corporation Tracing of a malicious call

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001258840A1 (en) * 2000-05-26 2001-12-03 Telefonaktiebolaget Lm Ericsson (Publ) Mobile radio communication system
GB2600105A (en) * 2020-10-19 2022-04-27 Vodafone Group Services Ltd Method of reporting an unsolicited call to a network operator, and user equipment, network entities and telecommunications networks for performing the method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5001710A (en) * 1989-10-24 1991-03-19 At&T Bell Laboratories Customer programmable automated integrated voice/data technique for communication systems
US5274699A (en) * 1992-07-24 1993-12-28 Motorola, Inc. Method for providing caller identification to a call recipient
EP0618713A2 (en) * 1993-03-31 1994-10-05 AT&T Corp. Real-time fraud monitoring system in a telecommunication network
US5361295A (en) * 1989-12-12 1994-11-01 The Telephone Connection Anonymous interactive telephone system
US5497414A (en) * 1994-05-04 1996-03-05 Bell Atlantic Network Services, Inc. Telephone system processing of designated caller ID private calls
US5555290A (en) * 1990-04-23 1996-09-10 Mci Communications Corporation Long distance telephone switching system with enhanced subscriber services

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5033076A (en) * 1990-01-31 1991-07-16 At&T Bell Laboratories Enhanced privacy feature for telephone systems
WO1995001037A1 (en) * 1993-06-18 1995-01-05 The Telephone Connection, Inc. Anonymous interactive telephone system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5001710A (en) * 1989-10-24 1991-03-19 At&T Bell Laboratories Customer programmable automated integrated voice/data technique for communication systems
US5361295A (en) * 1989-12-12 1994-11-01 The Telephone Connection Anonymous interactive telephone system
US5555290A (en) * 1990-04-23 1996-09-10 Mci Communications Corporation Long distance telephone switching system with enhanced subscriber services
US5274699A (en) * 1992-07-24 1993-12-28 Motorola, Inc. Method for providing caller identification to a call recipient
EP0618713A2 (en) * 1993-03-31 1994-10-05 AT&T Corp. Real-time fraud monitoring system in a telecommunication network
US5497414A (en) * 1994-05-04 1996-03-05 Bell Atlantic Network Services, Inc. Telephone system processing of designated caller ID private calls

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001069901A1 (en) * 2000-03-17 2001-09-20 Nokia Corporation Tracing of a malicious call
US7162225B2 (en) 2000-03-17 2007-01-09 Nokia Corporation Tracing of a malicious call

Also Published As

Publication number Publication date
GB9714787D0 (en) 1997-09-17
AU8974498A (en) 1999-02-10
GB2327318A (en) 1999-01-20

Similar Documents

Publication Publication Date Title
US5930344A (en) Method and apparatus for tracing a specific communication
US6483898B2 (en) System and method for providing visual indication of caller and telephony platform information on customer premises equipment
US6301608B1 (en) Method and apparatus providing personalized mailbox filters
US7933394B2 (en) Method and apparatus for routing calls based on the identification of the calling party or calling line
US5892820A (en) Directory assistance access to intercept telephone numbers
CA2199573C (en) Organization chart based call information routing
US6662006B2 (en) Method and apparatus for providing calling number identification alias in communications system
US8311204B2 (en) Automatic complaint registration for violations of telephonic communication regulations with call rejection
JPH0936965A (en) System and method for processing call to network subscriber with changed telephone number
WO1997042784A1 (en) Method and apparatus for facilitating law enforcement agency monitoring of cellular telephone calls
KR930007167A (en) System provides personalized phone call features
US20050111635A1 (en) Systems and methods for providing voicemail services
JP2000069147A (en) Method for taking caller identification information out of telephone call
US20060233320A1 (en) Method and system for canceling unwanted calls
JP2002300290A (en) Method and system for managing communication history information, program therefor and recording medium
US7756258B2 (en) Communications system with direct access mailbox
US7352855B2 (en) Method and system for providing a privacy management service
US8577009B2 (en) Automatic complaint registration for violations of telephonic communication regulations
US5991369A (en) System and method for message delivery for non-published directory numbers to voice mail boxes
US6754312B1 (en) Method for monitoring a subscriber of an intelligent network
WO1999004546A1 (en) Telecommunications systems
US7624191B2 (en) Transmission of call-related data in a communications system
US7646860B2 (en) Enhanced private call screening
JP2000041109A (en) Multiplex telephone number management method
KR20050046886A (en) System and method for providing call controlling service using 030 temporary number

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: KR

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA