Nothing Special   »   [go: up one dir, main page]

GB2412270A - Anonymous call rejection when caller line identification is not present - Google Patents

Anonymous call rejection when caller line identification is not present Download PDF

Info

Publication number
GB2412270A
GB2412270A GB0405896A GB0405896A GB2412270A GB 2412270 A GB2412270 A GB 2412270A GB 0405896 A GB0405896 A GB 0405896A GB 0405896 A GB0405896 A GB 0405896A GB 2412270 A GB2412270 A GB 2412270A
Authority
GB
United Kingdom
Prior art keywords
called party
caller
call
cli
interrogation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0405896A
Other versions
GB0405896D0 (en
Inventor
Joseph Abraham
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0405896A priority Critical patent/GB2412270A/en
Publication of GB0405896D0 publication Critical patent/GB0405896D0/en
Publication of GB2412270A publication Critical patent/GB2412270A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/22Automatic class or number identification arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A Network / Service Provider facility to provide to the user the callers identity and / or originating telephone number (CLI) even in circumstance when it would not be available to the user, for example (1) the CLI being restricted by the caller (2) the CLI not being made available by the originating or interconnecting networks (3) if the user does not have the ability / equipment to obtain the CLI. (Caller Line Identification). A further option enables the user, prior to being connected, to control the final destination of the call, for example, (1) the user could block the call (2) send the caller to voicemail (3) transfer the call to a different telephone number. Known as Anonymous call rejection (ACR) or Block Blocking.

Description

; . 241 2270 TITLE: "Telephone Communications"
FIELD OF THE INVENTION
This invention relates to telephone communications and more particularly Caller Line Identification (CLI).
BACKGROUND
When a caller makes a telephone call via his Telephone Network Provider (TNP), his TNP network, which is usually a public switched telephone network (PSTN), provides his CLI for billing purposes. With modern telephone networks, the CLI is also transmitted to the called party's TNP network if different from the caller's TNP network (if this is the same as the caller's TNP network, the CLI is already present in the network), and is made available lo the called party, e.g. upon subscription by the latter to this service, which subscription may require payment.
Because of the existence of Privacy Laws, the caller can choose to withhold his CLI. It is still transmitted to the called party's TNP network (and already present if the latter is the same as the caller's TNP network) but it is accompanied by a "withhold" indicator which prevents its disclosure to the called party. This choice can be made long-term or on a "switch-on, switch-of basis" or on a "per call" basis. (The withholding may also occur unintentionally due to caller error.) This does not always work, see section 16 of the reference quoted below.
In various circumstances, the CLI may not be available to the called party's TNP network. There may be various reasons, e.g. for international calls or some party calls or due to network protocol conflicts. (Both these and withheld calls will be unavailable to the called party.) 8 7 8 7 8' 8 8 8 8 8' 8 8 For various reasons, e.g. in trying to avoid receiving malicious, abusive and nuisance calls, or unwanted telephone marketing calls, the called party may wish to reject or treat differently those calls whose CLI is withheld or otherwise unavailable to the called party. Methods to do this are described in section 17 of the following reference: "Caller ID FAQ v2.31 10th April 2003", which was downloaded from the website www.ainslie.org.uk/callerid/cli_faq.htm on 11 March 2004, other parts of which reference describe generally many aspects of CLI.
These methods often fail to be satisfactory, user-friendly and/or simple.
Another problem arises, for example, as follows. A called party who has impaired vision and wishes to know the CLI can subscribe to the service providing the CLI and can be provided with a vocaliser (i.e. vocal translator) which converts the provided CLI into a voiced version of the same, but this does not work for withheld or otherwise unavailable calls. In such a case there will simply be produced a voice message stating that the number is withheld or otherwise unavailable.
THE INVENTION
According to one aspect of the invention, there is provided a system comprising a telephone facility, having means adapted to provide in relation to a telephone call an interrogation with a view to providing to the called party an identification of the caller in some form required by the called party when this is not available to the called party, and to enabling the call to continue after the interrogation.
According to another aspect of the invention, there is provided a system comprising a telephone facility, having means adapted with a view to providing to a called party in relation to a call an identification of the caller in some form required e. ce ce a:. e. :::e . : : : by the called party, when this is not initially available to the called party, and to enabling the call to continue after the identification is provided in such form.
Said means may be so operative before the call is connected or during the call.
According to another aspect of the invention, there is provided a system comprising a telephone facility, having means adapted to provide in relation to a telephone call an interrogation inviting the caller to provide the CLI or other identifier of the caller by voice transmission when this is not available to the called party's network.
In each of the above, "when" includes "in a case in which", so that said means are adapted to operate as aforesaid in at least some such cases but not necessarily in all such cases.
The called party can indicate (e.g. by subscribing to such a service) before connection of, or during, a call, a requirement for a caller identification to be revealed to the called party.
In a case which is most unlikely in practice in view of Privacy Laws, the interrogation is simply a command to reveal the CLI, e.g. by removing or overriding a "withhold" indicator, not interrogating the caller.
The enabling means are adapted to respond to a satisfactory response to an option offered by the interrogation to enable the call to continue.
In one embodiment, the interrogation means are adapted to provide an interrogation with a view to the identification being provided by voice transmission.
This is appropriate if, for example, the called party has impaired vision. The called party may at any time before or during a call press a particular key, or key in a particular code, to provide a signal which is recognised by the interrogation means as C 8 a request to provide the caller's identification by voice transmission. The interrogation means then provides an interrogation in the form of a command signal to a CLI store to provide the caller's CLI, translate this into a voice transmission, and transmit this to the called party. If the caller has requested that his CLI be withheld, interrogation means first provides an interrogation in the form of a question sent back to the caller to allow the CLI to be disclosed, and this is processed in one of the manners explained below.
This voice transmission when produced may be recorded or otherwise stored, e.g. in code, so as to be available later also, e.g. to the called party.
The interrogation may be: a request for an automatic vocalization (by the called party's TNP network) of the CLI or a PIN or a code word or phrase or the caller's name, if such has been provided but not yet vocalised; or may be a request for a voiced statement by the caller of any of these; or may be a request for any of these to be keyed in by the caller so that they can be vocalised automatically for the called party by the latter's TNP network.
There may be provided an embodiment in which the interrogation means are adapted to provide an interrogation inviting the caller to act in some way to enable the CLI to be provided or withheld. The CLI may be available in any one or more of the caller's TNP network, the called party's TNP network and/or some intermediate TNP network.
There may be provided an embodiment in which the interrogation means are adapted to provide an interrogation in substance inviting the caller to take a positive action to provide the CLI. Preferably, the system is adapted for a said positive action to comprise in substance actuating one or more keys on the caller's telephone keypad. .
:: e. e. .e The words "in substance" include the possibility that the telephone keypad is replaced by an equivalent, e.g. a computer keyboard, e.g. when the caller is initiating the telephone call from his computer, e.g. when using a computer-controlled telephone or when using the internet to make a telephone call. Usefully, the system is adapted for a said positive action to comprise a voice affirmation sent to the called party. This will usually be a voice transmission sent over the telephone system, i.e. that of the called party's TNP.
Preferably, the enabling means have a facility to divert the call in the absence of a satisfactory response to the interrogation. The call may then be diverted to another telephone or subscriber or to an answering facility, e.g. an answering machine or an answering service, e.g. one provided by the TNP. If a call comes in without a CLI, the called party can request this to be provided. If it is refused, or unavailable, a further interrogation may go out "Please provide your name" There may be provided a system in which the enabling means have a facility to block a call in the absence of a satisfactory response to the interrogation. Preferably, the enabling means, in consequence of receiving a satisfactory response from the caller, cancel or override a "withhold" marker to the CLI.
In an embodiment, the interrogation means are adapted to provide an interrogation in substance inviting the caller to hang up in order to withhold the CLI, or to take no action in which case the CLI will be provided to the called party. Consequently, the enabling means will, respectively, need to take no action since the call will already be terminated or will provide the CLI to the called party and connect the call. There will be timing means to allow the CLI to be provided to the called party and connect the call if no such action has been taken within a predetermined time.
::e c: e:e.e In a particular embodiment, the enabling means have a facility to offer the called party the choice to block or divert a call, or possibly to accept the call anyway, in the absence of a satisfactory response from the caller. The enabling means may be adapted to provide all of such diversion, blocking, choice, or choice of any other facility, to different subscribers at the same time, according to the level of service that each one pays for.
The enabling means may be adapted to recognise a code word in place of a CLI as a satisfactory response to the interrogation so as to enable the call to be connected.
The code word may, for example, be a voice signal or a string of digitally produced alphanumeric characters.
One or more of the following possibilities exist in each of various embodiments: the called party has a TNP with its telephone system and a said enabling means are located within that telephone system; the caller has a TNP with its telephone system and a said enabling means are located within that telephone system; the caller and the called party each has a TNP with its telephone system, there is a telephone system connected intermediate these, and a said enabling means are located within the intermediate telephone system.
In some embodiments, the enabling means are located within a telephone system and can distinguish between a withheld CLI (where the CLI is available within this system but withheld from the called party) and other kinds of unavailable CLI and, depending upon the distinction, will vary the interrogation. Such other kinds include the CLI of, for example, calls originating from another country, some party calls, calls whose CLI has become lost in the system, and calls originating from a computer and using the internet. Others are indicated herein. In any case in which the CLI is to be # 1 ::: : e:e ce.
revealed or otherwise provided to the called party, the CLI has to be available within the system in which the enabling means are located. If it is not available, the caller identification has to be obtained by some other means.
According to another aspect of the invention, there is provided any part of a system as mentioned above according to the invention, that is within the jurisdiction of the courts.
According to another aspect of the invention, there is provided a method of processing a telephone call, in which there is used any such system or part of a system as mentioned above embodying the invention.
According to another aspect of the invention, there is provided a method of processing a telephone call, in which there is provided an interrogation to provide an identification of the caller when this is not available to the called party in some form required by the called party, and the call is continued after the interrogalion.
There may be provided such a method in which the caller identification is not initially available to the called party, and the call is connected, diverted, blocked, or subjected to other processing, in consequence of a response lo the interrogation.
According to another aspect of the invention, there is provided a telephone call made using any such system or part of a system or any such method according to the invention.
DESCRIPTION RELATING TO THE DRAWINGS
Reference will now be made by way of example to the accompanying drawings, in which: Figures 1, 2 and 3 are flowcharts illustrating respectively three options for methods embodying invention; and I e l 'se Figure 4 is a schematic block diagram of a system comprising a telephone facility and embodying the invention.
Referring to the drawings, more particularly Figure 4, a system 10 comprising a telephone facility 12, at least at its called party side 12, comprises, connected between a caller 20 and a called party 22, a caller's TNP network or other call-originating system 14, an intermediate TNP network 16, and the called party's TNP network 18.
There are provided, in the caller's TNP system 14, the caller's CLI generator 24 and a "withhold" marker generator 26, in the called party's TNP network 18, a "withheld" marker store 28 for "withheld" markers, a "CLI required" store 30 for "CLI required" markers, an interrogation generator 32, a blocking circuit 34 and a CLI store 36. The interrogation generator 32 constitutes means 32 adapted to provide in relation to a telephone call an interrogation with a view to providing to the called party 22 an identification of the caller 20 in some form required by the called party 22 when this is not available to the called party 22, and to enabling the call to continue after the interrogation.
The call is normally routed through blocking circuit 34, under the control of units 28, 30, 32. These units 28, 30, 32 are connected so that when they receive a satisfactory response from the caller, they control circuit 34 to unblock so as to enable the call to continue after the interrogation. For example, if unit 30 indicates that the CLI is required, unit 32 interrogates unit 28 to see whether the CLI is to be withheld and, if so, sends an interrogation back to the caller 20 as described below. In another example, unit 32 first interrogates unit 36 to see whether there is a CLI in the network for this call, and if it is unavailable sends a different interrogation back to the caller as described below. ;
::: c: .:e cee The interrogation generator operates, for example, in one or more of the following ways, depending upon which servicers the called party has subscribed to.
1. To send a message to the caller: a. The called party requires to know your identification before your call can be connected: I. Unless you hang up within 30 seconds, your telephone number (CLI) will be disclosed to the called party.
II. Press the hash-key (#), or say "Yes" [i.e. provide a required voice response] to disclose your telephone number (CLI) within 30 seconds, or your call will be disconnected.
III. Please key in, or state, your telephone number (CLI) or an agreed code or phrase to identify yourself to the called party within 30 seconds, or your call will be disconnected.
b. The called party requires to be told vocally your identification before your call can be connected, so please state your telephone number (CLI) or name or an agreed code to identify yourself to the called party within 30 seconds, or your call will be disconnected.
2. To send a message to the called party: a. The caller was told that you required to know their identification code before their call could be connected. They have not agreed to reveal to you their telephone number (CLI). Do you wish lo block their call (press 1), accept their can anyway (press 2), divert their call to your answering machine service (press 3), or divert their call to your nominated alternative telephone number (press 4)? ::: c: :. e*e b. The caller's telephone number (CLI) was not indicated as "withheld" but was nevertheless unavailable. The caller was fold that you required to know their identification code before their call could be connected to you. They were asked to key in, or state, their telephone number (CLI) or an agreed code or phrase to identify themself to you within 30 seconds, but have not done so. Do you wish to block their call (press 1), accept their call anyway (press 2), divert their call to your answering machine service (press 3), or divert their call to your nominated alternative telephone number (press 4)? 3. To send a message to the called party (in the event that the CLI is available and not withheld, and for a. and b.1 the called parry simply requires a corresponding voice transmission): a. The caller's telephone number (CLI) is b. If you want: the caller's telephone number, press 1; the caller to state vocally the agreed code word or phrase, press 2; or the caller to key in the agreed PIN number, press 3.
For b.2 and b.3, the interrogation generator would send an appropriate message back to the caller.
The interrogation may be in response to a query or a service previously set up by the called party 22 requiring always to be provided with a voiced version of the CLI; when this is not a withheld item, the interrogation will effectively be a command to the CLI store 30 of the TNP network 18 of the called party 22 to provide a voiced version of the CLI; when this is a withheld item, as determined by interrogation unit 32, the latter will generate an interrogation to ask the caller 20 to provide a name or ::: c:e ë :. t*, tIs.
a code, e.g. PIN number; the same interrogation will be generated if the number is not withheld but is simply unavailable at the called party's TNP network 18.
One and the same interrogation generator means 32 may provide any or all of the above services to respective called party subscribers 22 at the same time. The units 28 to 36 may be provided in any one or more of the telephone networks 14, 16, 18 for use in relation to a call from the caller 20 to the called party 22.
The interrogation generator means 32 may be operative as aforesaid before the call is connected or during the call.
In the system 10, there are means 32 a adapted to provide in relation to a telephone call an interrogation inviting the caller 20 to provide the CLI or other identifier of the caller 20 by voice transmission when this is not available to the called party's network 18.
The called party 22 can indicate (e.g. by subscribing to such a service) before connection of, or during, a call, a requirement for a caller identification to be revealed to the called party 22 a.
The means 32 constitute the aforesaid enabling means 32 and are adapted to respond to a satisfactory response to an option offered by the interrogation to enable the call to continue.
The interrogation means 32 are adapted inter alla to provide an interrogation with a view to the identification being provided by voice transmission. This is appropriate if, for example, the called party 22 has impaired vision. The called party 22 may at any time before or during a call press a particular key 23, or key in a particular code, to provide a signal which is recognised by the interrogation means 32 as a request to provide the caller's identification by voice transmission. The interrogation means 32 ' I-; A,' :: .e;- tV It.
then provides an interrogation in the form of a command signal to a CLI store 30 to provide the caller's CLI, translate this into a voice transmission, and transmit this to the called party 22. If the caller 20 has requested that his CLI be withheld, interrogation means 32 first provides an interrogation in the form of a question sent back to the caller 20 to allow the CLI to be disclosed, and this is processed in one of the manners explained below.
This voice transmission when produced may be recorded or otherwise stored, e.g. in code, e.g. in a recordal store 38 so as to be available later also, e.g. to the called party 22.
The interrogation may be: a request for an automatic vocalization (by the called party's TNP network 18) of the CLI or a PIN or a code word or phrase or the caller's name, if such has been provided but not yet vocalised; or may be a request for a voiced statement by the caller 20 of any of these; or may be a request for any of these to be keyed in by the caller 20 so that they can be vocalised automatically for the called party 22 by the latter's TNP network 18.
There can be provided an embodiment in which the interrogation means 32 are adapted to provide an interrogation inviting the caller 20 to act in some way to enable the CLI to be provided or withheld. The CLI may be available in any one or more of the caller's TNP network 14, the called party's TNP network 16 and/or some intermediate TNP network 18.
There may be provided an embodiment in which the interrogation means 32 are adapted to provide an interrogation in substance inviting the caller 20 to take a positive action to provide the CLI. Preferably, the system 10 is adapted for a said positive action to comprise in substance actuating one or more keys 21 on the caller's :.':' . ,.' 'Jim, telephone keypad 201. The words "in substance" include the possibility that the telephone keypad 201 is replaced by an equivalent, e.g. a computer keyboard 201, e.g. when the caller 20 is initiating the telephone call from his computer 202, e.g. when using a computer-controlled telephone 20 or when using the internet lo make a telephone call. Usefully, the system is adapted for a said positive action lo comprise a voice affirmation sent to the called party 22. This will usually be a voice transmission sent over the telephone system 18, i. e. that of the called party's TNP.
Preferably, the enabling means 32 have a facility to divert the call in the absence of a satisfactory response to the interrogation. The call may then be diverted to another telephone 25 or subscriber 25 or to an answering facility 25, e.g. an answering machine 25 or an answering service, e.g. one provided by the TNP 18. If a call comes in without a CLI, the called party 22 can request this to be provided. If it is refused, or unavailable, a further interrogation may go out: "Please provide your name" In the system 10, the enabling means 32 have a facility to block a call in the absence of a satisfactory response to the interrogation. Preferably, the enabling means 32 in consequence of receiving a satisfactory response from the caller 20, cancel or override a "withhold" marker to the CLI.
In an embodiment, the interrogation means 32 are adapted to provide an interrogation in substance inviting the caller 20 to hang up in order to continue to withhold the CLI, or to take no action in which case the CLI will be provided to the called party 22. Consequently, the enabling means 20 will, in these respective cases, need to take no action since the call will already be terminated or will provide the CLI to the called party 22 and connect the call. There will be timing means 27 to allow : c *e.' s:e ll: the CLI to be provided to the called party 22 and connect the call if no such action has been taken within a predetermined time.
In a particular embodiment, the enabling means 32 have a facility to offer the called party 22 the choice to block or divert a call, or possibly lo accept the call anyway, in the absence of a satisfactory response from the caller 20. The enabling means 32 may be adapted to provide all of such diversion, blocking, choice, or choice of any other facility, to different subscribers 22 at the same time, according to the level of service that each one pays for.
The enabling means 32 may be adapted to recognise a code word in place of a CLI as a satisfactory response to the interrogation so as to enable the call to be connected. The code word may, for example, be a voice signal or a string of digitally produced alphanumeric characters.
One or more of the following possibilities exist in each of various embodiments: the called party 22 has a TNP with its telephone system 18 and a said enabling means 32 are located within that telephone system 18; the caller 20 has a TNP with its telephone system 14 and a said enabling means 32 are located within that telephone system 14; the caller 20 and the called party 22 each has a TNP with its telephone system 14, 18, there is a telephone system 16 connected intermediate these, and a said enabling means 32 are located within the intermediate telephone system 16.
In some embodiments, the enabling means 16 are located within a telephone system 18 and can distinguish between a withheld CLI (where the CLI is available within this system 18 but withheld from the called party 22) and other kinds of unavailable CLI and, depending upon the distinction, will vary the interrogation. Such other kinds include the CLI of, for example, calls originating from another country, le. be: eee: e: ce:e . some party calls, calls whose CLI has become lost in the system, and calls originating from a computer to 202 and using the internet. Others are indicated herein. In any case in which the CLI is to be revealed or otherwise provided to the called party 22, the CLI has to be available within the system 18 in which the enabling means 32 are located. If it is not available, the caller identification has to be obtained by some other means.
Three options for methods using invention are illustrated in Figures 2, 3 and 4.
These provide a method of processing a telephone call, in which there is used any such system 10 or part of a system 10 as mentioned above embodying the invention.
They further provide a method of processing a telephone call, in which there is provided an interrogation to provide an identification of the caller 20 when this is not available to the called party 22 in some form required by the called party 22, and the call is continued after the interrogation.
There may be provided such a method in which the caller identification is not initially available to the called party 22, and the call is connected, diverted, blocked, or subjected to other processing, in consequence of a response to the interrogation.
Option 1, illustrated in Figure 1, is a method to reveal a withheld CLI. The various steps indicated by respective boxes in the diagram are: Box 40 = Is CLI withheld? 42 = Provide caller with prompt; 44 = Wait for caller response or no-response; 46 = Inform network lo remove CLI block; 48 = Connect call; 50 = is CLI unavailable? 52 = Does user wish to accept unfiltered calls with unavailable CLI? 54 = Send call to voice email.
Decision 41 = Yes; 43 = No; 45 = Reveal CLI; 51 = Yes; 53 = No. ce' ed: A: . . e e:e s: :: ce.
Option 2, illustrated in Figure 2, is a method to obtain name or PIN from caller 20. The various steps indicated by respective boxes in the diagram are: Box 56 = Obtain name by recording voice response or request caller to enter dtmf PIN; 58 = Is CLI is withheld or unavailable and a dtmf PIN entered? 60 = Connect to outbound destination; 62 = Play recorded prompt and/or PIN; 64 = Wait for recipient response; 66 = Connect to caller; 68 = Forward PIN as CLI; 70 = Is PIN acceptable? 72 = Send call to voicemail or other destination.
Decision 59 = Yes; 65 = Connect; 67 = Divert; 69 = Yes; 71 = No. Option 3, illustrated in Figure 3, is a method to provide voice over network CLI for called party. The various steps indicated by respective boxes in the diagram are: Box 74 = Does recipient wish to receive voice over network CLI? 76 = Receive CLI from network; 78 = Connect to outbound destination; 80 = Convert CLI to voice and play over network. If no CLI, play appropriate message; 82 = Wait for recipient response; 84 = Connect to caller.
Decision 83 = Divert; 85 = Connect.
As seen by the subscribers 20, 22, there can be provided a telecom service to reveal all withheld CLI numbers to the called party. Callers having a withheld number will be intercepted by the relevant TNP network and: 1. warned that, unless they hang-up, their CLI number will be revealed to the called party; and/or 2. will be prompted to accept having their CLI number revealed by pressing a digit on their keypad, it and/or 3. will be prompted to accept having their CLI number revealed by voice affirmation. ee. '.: ace: c c c ce e:e.: :c: c c Where the caller does not wish to
reveal their CLI number, the called party can have an option: 1. to disconnect the call immediately, or 2. to divert the call to their voicemail.
Again, for CLI by audio, where the subscriber to the service wishes to hear the CLI, essentially the relevant TNP network will read out the number before connecting the call. The method of making the call or receiving the call is not relevant, i.e landline or mobile or Internet or otherwise. The recipient (called party's) TNP network, or an intermediate TNP network will usually provide the service, but it may be provided by the originating (caller's) TNP network.
If the caller's CLI is "withheld" (whether permanently or instigated on a per-call basis), the caller's TNP network passes the call on to the recipient's network informing this not to pass on the CLI to the called party. The called party's TNP network will inform the caller that unless a certain action is taken or not taken the CLI will be passed to the end user (a called party). This could be in a simple prompt or a dtmf interactive response or a voice activation or any other suitable method. In the event that the caller is subscribed to a service provided by a TNP other than that currently connected directly to the caller, the CLI will be passed to the TNP of the called party without requesting that the number be withheld. This may, for example, be the case when the caller's phone is a mobile phone used abroad for "roaming": it connects to a network which is not the one to which the caller is subscribed. The CLI can then be passed to the recipient or alternative action can be taken. (The recipient will have to have a CLI-obtaining facility available and a means of displaying or hearing the number.) .e te: tet: , , 8 8, 8 8 In the event that on the network level there is no CLI available, possibly in conjunction with any of the above: 1. The call could simply be connected without the CLI; 2. Alternative action could be taken, e.g. not connecting the call but forwarding it to voicemail; 3. The caller could be prompted either to enter their CLI or speak their name for recordal; patent to the use of this facility by a facility on the physical end means as well.
4. This could be then played or forwarded to the recipient as a CLI.
When the recipient (called party) then wishes to hear the CLI, the criteria of when the CLI is played will be dependent upon the recipient or the TNP service chosen.
When the called party picks up the telephone or other means of receiving a call, a prompt will play the telephone number of the caller of the incoming call or in the event that the above service has been used a prompt with the caller's identity will be played. The user will then have the option of taking the call or sending the call to voicemail (where the message can be intercepted), diverting the call or some other type of action.
Other examples of relevant messages to the caller: 1. The number you are calling does not accept calls with withheld telephone numbers. If you continue to hold, your number will be revealed.
2. The number you are calling does not accept calls with withheld telephone numbers. If you wish to be connected, press (1) so that your number can be revealed.
te' it: ale: :: it: 'ce' at: te.e:.
It will be apparent to one skilled in the art, that features of the different embodiments disclosed herein may be omitted, selected, combined or exchanged and the invention is considered to extend to any new and inventive combination thus formed. Where a preference or particularization is stated, there is implied the possibility of its negative, i.e. a case in which that preference or particularization is absent.

Claims (26)

I#e If: ale: t. ce A:: :: lll CLAIMS
1. A system comprising a telephone facility, having means adapted to provide in relation to a telephone call an interrogation with a view to providing lo the called party an identification of the caller in some form required by the called party when this is not available to the called party, and to enabling the call to continue after the interrogation.
2. A system as claimed in claim 1, in which the interrogation means are adapted to provide an interrogation with a view to the identification being provided by voice transmission.
3. A system as claimed in claim 1 or 2, in which the interrogation means are adapted to provide an interrogation inviting the caller to act in some way to enable the CLI to be provided or withheld.
4. A system as claimed in claim 3, in which the interrogation means are adapted to provide an interrogation in substance inviting the caller to take a positive action to provide the CLI.
5. A system as claimed in claim 4, adapted for a said positive action to comprise in substance actuating one or more keys on the caller's telephone keypad.
6. A system as claimed in claim 4 or 5, adapted for a said positive action to comprise a voice affirmation sent to the called party.
7. A system as claimed in any one of claims 1 to 6, in which the enabling means have a facility to divert the call in the absence of a satisfactory response to the interrogation.
e.' At: Ale: : l. 4e:: e ë I.:
8. A system as claimed in any one of claims 1 to 7, in which the enabling means have a facility to block a call in the absence of a satisfactory response to the interrogation.
9. A system as claimed in any one of claims 1 to 8, in which the enabling means, 5in consequence of receiving a satisfactory response from the caller, cancel or override a "withhold" marker to the CLI.
10. A system as claimed in claim 3, in which the interrogation means are adapted to provide an interrogation in substance inviting the caller to hang up to withhold the CLI or to take no action in which case the CLI will be provided to the called party.
1011. A system as claimed in any one of claims 1 lo 9, in which the enabling means have a facility lo offer the called party the choice to block or divert a call, or possibly to accept the call anyway, in the absence of a satisfactory response from the caller.
12. A system as claimed in any one of claims 1 to 11, in which the enabling means are adapted to recognise a code word in place of a CLI as a satisfactory 15response to the interrogation so as to enable the call to be connected.
13. A system as claimed in any one of claims 1 to 12, in which the called party has a Telephone Network Provider (TNP) with its telephone system and a said enabling means are located within that telephone system.
14. A system as claimed in any one of claims l to 13, in which the caller has a 20TNP with its telephone system and a said enabling means are located within that telephone system.
15. A system as claimed in any one of claims 1 to 14, in which the caller and the called party each has a TNP with its telephone system, there is a telephone system te' it: Act: :: I: .e e: .. :# connected intermediate these, and a said enabling means are located within the intermediate telephone system.
16. A system as claimed in any one of claims 1 to 15, in which the enabling means are located within a telephone system and can distinguish between a withheld CLI S (where the CLI is available within this system but withheld from the called party) and other kinds of unavailable CLI, and depending upon the distinction, will vary the interrogation.
17. A system comprising a telephone facility, having means adapted with a view to providing to a called party in relation lo a call an identification of the caller in some form required by the called party, when this is not initially available to the called party, and to enabling the call to continue after the identification is provided in such form.
18. A system comprising a telephone facility and adapted to provide a caller identification when this is not available to the called party in some form required by the called party, substantially according lo any example hereinbefore described.
19. A system comprising a telephone facility and adapted to provide a caller identification when this is not available to the called party in some form required by the called party, substantially according lo any example hereinbefore described with reference to the accompanying drawings.
20. Any part of a system as claimed in any one of claims 1 to l9, that is within the jurisdiction of the courts.
21. A method of processing a telephone call, in which there is used a system or part of a system as claimed in any one of claims 1 to 20.
- dI ti t- e.:w t' t:' t.. :'
22. A method of processing a telephone call, in which there is provided an interrogation to provide an identification of the caller when this is not available to the called party in some form required by the called party, and the call is continued after the interrogation.
23. A method as claimed in claim 22, in which the caller identification is not initially available to the called party, and the call is connected, diverted, blocked, or subjected to other processing, in consequence of a response to the interrogation.
24. A method of processing a telephone call, substantially according to any embodiment hereinbefore described.
25. A method of processing a telephone call, substantially according to any embodiment hereinbefore described with reference to the accompanying drawings.
26. A telephone call made using a system or part of a system or a method, as claimed in any one of claims 1 to 25.
GB0405896A 2004-03-17 2004-03-17 Anonymous call rejection when caller line identification is not present Withdrawn GB2412270A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0405896A GB2412270A (en) 2004-03-17 2004-03-17 Anonymous call rejection when caller line identification is not present

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0405896A GB2412270A (en) 2004-03-17 2004-03-17 Anonymous call rejection when caller line identification is not present

Publications (2)

Publication Number Publication Date
GB0405896D0 GB0405896D0 (en) 2004-04-21
GB2412270A true GB2412270A (en) 2005-09-21

Family

ID=32117791

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0405896A Withdrawn GB2412270A (en) 2004-03-17 2004-03-17 Anonymous call rejection when caller line identification is not present

Country Status (1)

Country Link
GB (1) GB2412270A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100438540C (en) * 2005-12-02 2008-11-26 华为技术有限公司 Method for realizing anonymous calling rejection and dialing identification cooperative service
CN101198162B (en) * 2005-12-02 2010-12-01 华为技术有限公司 Method for implementing service cooperation of anonymity call refusal and calling identification showing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0439927A2 (en) * 1990-01-31 1991-08-07 AT&T Corp. Enhanced privacy feature for telephone systems
US5533106A (en) * 1994-06-27 1996-07-02 Us West Technologies, Inc. Method and system for processing calls wherein the display of calling party ID information has been inhibited
WO1998027707A1 (en) * 1996-12-16 1998-06-25 Ericsson Inc. Method and apparatus for routing an anonymous call
US6332021B2 (en) * 1998-07-24 2001-12-18 Ameritech Corporation Convenience features in a method and system for providing enhanced caller identification
US6459780B1 (en) * 2000-02-15 2002-10-01 Verizon Services Corp. Methods and apparatus for providing a called party call disposition options in real time
US20030165224A1 (en) * 2001-12-14 2003-09-04 Moss John Wesley Method and system for providing enhanced caller identification information including screening invalid calling party numbers

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0439927A2 (en) * 1990-01-31 1991-08-07 AT&T Corp. Enhanced privacy feature for telephone systems
US5533106A (en) * 1994-06-27 1996-07-02 Us West Technologies, Inc. Method and system for processing calls wherein the display of calling party ID information has been inhibited
WO1998027707A1 (en) * 1996-12-16 1998-06-25 Ericsson Inc. Method and apparatus for routing an anonymous call
US6332021B2 (en) * 1998-07-24 2001-12-18 Ameritech Corporation Convenience features in a method and system for providing enhanced caller identification
US6459780B1 (en) * 2000-02-15 2002-10-01 Verizon Services Corp. Methods and apparatus for providing a called party call disposition options in real time
US20030165224A1 (en) * 2001-12-14 2003-09-04 Moss John Wesley Method and system for providing enhanced caller identification information including screening invalid calling party numbers

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100438540C (en) * 2005-12-02 2008-11-26 华为技术有限公司 Method for realizing anonymous calling rejection and dialing identification cooperative service
CN101198162B (en) * 2005-12-02 2010-12-01 华为技术有限公司 Method for implementing service cooperation of anonymity call refusal and calling identification showing

Also Published As

Publication number Publication date
GB0405896D0 (en) 2004-04-21

Similar Documents

Publication Publication Date Title
US9942406B2 (en) Method and apparatus for managing telephone calls
US6002749A (en) Telephone system integrated text based communication apparatus and systems to establish communication links to TDD and/or TTY devices and other telephone and text server systems
US6078650A (en) Telephone system integrated text based communication processes to enhance access for TDD and/or TTY devices
CA2380390C (en) Method and system for providing enhanced caller identification information including tailored announcements
CA2198408C (en) Interactive call identification
US5943395A (en) Telephone apparatus, systems, and processes to enhance access for TDD and/or TTY devices
US6195418B1 (en) Telephone system having a callback capability and method for connecting a recipient of a message to a caller
US6735286B1 (en) Telephone system integrated text based communication processes, apparatus and systems
US5933476A (en) TTY telephone display and related processes systems and apparatus
US20040174971A1 (en) Adjustable profile controlled and individualizeable call management system
WO1998012882A1 (en) One number voice, fax, data pbx call discrimination
US6862342B1 (en) Intelligent-networked system with service for notifying and hearing selected E-mails via a public switched telephone network
US20060205391A1 (en) Telecommunications apparatus
GB2412270A (en) Anonymous call rejection when caller line identification is not present
KR20070012974A (en) Method for messaging service

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)