Nothing Special   »   [go: up one dir, main page]

US20140295798A1 - Method and apparatus for providing information in response to the grant of a subscriber's permission - Google Patents

Method and apparatus for providing information in response to the grant of a subscriber's permission Download PDF

Info

Publication number
US20140295798A1
US20140295798A1 US14/271,154 US201414271154A US2014295798A1 US 20140295798 A1 US20140295798 A1 US 20140295798A1 US 201414271154 A US201414271154 A US 201414271154A US 2014295798 A1 US2014295798 A1 US 2014295798A1
Authority
US
United States
Prior art keywords
requesting party
information
mobile
location information
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/271,154
Inventor
Peter O. Roach, Jr.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Resource Consortium Ltd
Original Assignee
Resource Consortium Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Resource Consortium Ltd filed Critical Resource Consortium Ltd
Priority to US14/271,154 priority Critical patent/US20140295798A1/en
Assigned to RESOURCE CONSORTIUM LIMITED reassignment RESOURCE CONSORTIUM LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ROACH, PETER O., JR.
Publication of US20140295798A1 publication Critical patent/US20140295798A1/en
Assigned to RESOURCE CONSORTIUM LIMITED, LLC reassignment RESOURCE CONSORTIUM LIMITED, LLC RE-DOMESTICATION AND ENTITY CONVERSION Assignors: RESOURCE CONSORTIUM LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
    • H04M3/4931Directory assistance systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/186Processing of subscriber group data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6009Personal information, e.g. profiles or personal directories being only provided to authorised persons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/18Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/14Special services or facilities with services dependent on location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/30Determination of the location of a subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/0024Services and arrangements where telephone services are combined with data services
    • H04M7/0042Services and arrangements where telephone services are combined with data services where the data service is a text-based messaging service
    • H04M7/0048Services and arrangements where telephone services are combined with data services where the data service is a text-based messaging service where the text-based messaging service is a Short Message Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/10Mobility data transfer between location register and external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/16Mobility data transfer selectively restricting mobility data tracking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Definitions

  • the present invention relates generally to wireless networks and more particularly to the offering of directory assistance for mobile subscribers post receiving the mobile subscriber's permission to release the information.
  • the invention allows the called party to grant or deny permission to release the relevant information to the requesting party as well as providing the relevant information to the requesting party in the event the subscriber's permission is delayed.
  • a mobile subscriber a wirelessly connected communications device
  • the mobile connection is extremely useful for instant communications and accessibility
  • many mobile subscribers do not wish to publish their number in a directory or allow an information services provider, such as, the directory assistance operator, to have ready access to or disseminate their contact information.
  • the mobile subscriber may desire to limit this access due to numerous reasons; e.g., privacy, limit access from telemarketers, recent changes in their life status, or a plethora of other reasons.
  • directory assistance operators use a telephone number database to provide the information services and usually the service is billed to the calling or requesting party's telephone bill.
  • the directory assistance databases are hours, days, weeks or even months old.
  • the directory assistance usually does not provide any information indicating who is allowed to access the directory listing or any restrictions as to the use and dissemination of the subscriber's directory information. Since the directory assistance system is typically an “all or nothing” proposition, this opens up the possibility for abuse of this database or for use of the directory assistance information in a manner that may be adverse to the mobile subscriber's best interest at the time a directory request is made.
  • the first being the ready access the mobile phone service provides to the user. Since most users usually carry their mobile phone with them, they can be easily contacted at any time and place using their mobile phone. Today the user can limit this access to callers who they have given their mobile phone number or to others who are trusted by the user at the current time. Since, in this modern world, relationships change at a rapid pace or they tend to be more situational, many mobile subscribers wish to have real-time control over a caller's access to their contact information and provide it to a requesting party on a case-by-case basis. The second reason the user may wish to restrict this information is that often the user is required to pay for all calls made to or from their mobile phone. The user may not wish to pay to talk with certain types of callers or the mobile subscriber may desire to screen who has access to their contact information.
  • What is required is a method and apparatus that allows a mobile subscriber to control the access to their contact information in real-time or near real-time. This method and apparatus should be able to distinguish between different calling parties and should be able to restrict, limit, or allow access to the contact information, location, address, or other personal information associated with the mobile subscriber on an instance-by-instance basis. What is also needed is a method and apparatus that allows a mobile subscriber to provide a delayed or non-real-time grant of permission to release their information and to have that information routed to the person or device requesting the information.
  • a query is received, typically by an MDMS server, based on a request from a requesting party for information about a mobile subscriber of a mobile telephone network.
  • the requested information typically comprises directory assistance information for the mobile subscriber.
  • Directory assistance information can comprise location information, identity, telephone number, address, or other information specific to the mobile subscriber.
  • a permission release request is issued to a mobile communication device associated with the mobile subscriber.
  • This permission release request seeks permission for release of the requested information on behalf of the requesting party.
  • the requested information is distributed to the requesting party in response to receipt of a permission release response output by the mobile communication device.
  • the permission release response typically initiated by an action taken by the mobile subscriber or by automated logic of the communication device, provides permission for communication of the requested information to the requesting party.
  • the permission release response can be output by the mobile communication device in response to an automated decision made by logic of the mobile communication device.
  • the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber, based on interactions with a user interface of the mobile communication device.
  • the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber as a result of a presentation by a user interface of the mobile communication device, the presentation providing an identity of the requesting party.
  • the status of the mobile communication device associated with the mobile subscriber can be obtained by requesting status information from a customer data base maintained by the mobile telephone network.
  • the acquisition of this status information in advance of issuing the permission release request, can facilitate communications with the mobile communication device. For example, an appropriate manner for communicating with the mobile communication device can be identified with access to the status information for that mobile communication device.
  • the requested information can distributed to the requesting party in the form one or more of the following: a text message transmitted to the a mobile communication device of the requesting party; an integrated voice response device (IVR) speaking the requested information to the requesting party, an operator calling the requesting party with the requested information; a web page presenting the requested information; a video message transmitted to the mobile communication device of the requesting party; a multimedia message transmitted to the mobile communication device of the requesting party; and an electronic mail message presenting the requested information.
  • IVR integrated voice response device
  • an inventive solution for information services in connection with a request made by a requesting party about a mobile subscriber who subscribes to telephony services supported by a mobile telephone network.
  • a request is received from the requesting party for information about the mobile subscriber.
  • a communication is initiated with a mobile subscriber, typically based on a communication to the subscriber's mobile communication device or handset, to seek permission for release of the requested information on behalf of the requesting party.
  • the trigger event for this request for information is an action taken by the requesting party—an individual or entity other than the mobile subscriber—where the subject of the requested information is the mobile subscriber and/or the handset associated with that subscriber.
  • a communication can be received from the mobile subscriber granting permission for release of the requested information to the requesting party.
  • the requested information can be communication to the requesting party.
  • a mobile subscriber can control the release of information about that subscriber based on interaction with the user interface of the subscriber's mobile communication device or handset.
  • the mobile subscriber and the mobile communication device are typically associated with a “home” mobile communication network.
  • the mobile communication device can receive a permission release request issued by an information system that is typically implemented as a component independent of the mobile telephone network.
  • the information system can be implemented, for example, as a server, such as an MDMS server, or a part of a directory assistance platform.
  • the permission release request seeks permission for release of information about the mobile subscriber to a requesting party.
  • the mobile subscriber can decide whether to release the requested information based on identifying information about the requesting party, such as the telephone number or name of the requesting party, as presented by a user interface of the mobile communication device. If the mobile subscriber elects to grant permission, the subscriber can interact with the user interface to support the issuance of a permission release response from the mobile communication device to the information system.
  • the mobile communications device can include logic that automatically responds to the permission release request by issuing a permission release response via the mobile telephone network. This permission release response provides permission for communication of the requested information from the information system for use by the requesting party.
  • a directory assistance system or platform can receive a query from a requesting party for information about the mobile subscriber.
  • the directory assistance platform may determine that the requested information is not available at the platform (as a result, for example, of the mobile subscriber being a subscriber of wireless telephony services rather than conventional landline telephony services.).
  • the directory assistance platform can issue a query to an information system, typically implemented as a server or component separate from the directory assistance system, for the requested information.
  • the information system described herein as an MDMS server, typically operates as equipment independent of the mobile telephone network.
  • the information system can issue a permission release request from the information system to a mobile communication device associated with the mobile subscriber.
  • This permission release request seeks permission for release of the requested information on behalf of the requesting party.
  • the information system releases the requested information to the directory assistance system, for distribution to the requesting party, in response to receipt of a permission release response output by the mobile communication device.
  • the permission release response provides permission for communication of at least a portion of the requested information to the requesting party.
  • FIG. 1A is an illustration of an information system constructed in accordance with an exemplary embodiment of the present invention.
  • FIG. 1B is an illustration of an information system that responds to receipt of a directory assistance query by issuing a request for permission to release information about a mobile subscriber, in accordance with an exemplary embodiment of the present invention.
  • FIG. 2 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system.
  • FIG. 3 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system.
  • FIG. 4 is an illustration of an exemplary example of an initial screen provided to a mobile subscriber requesting permission to release their directory information.
  • FIG. 5 is an illustration of an exemplary example of a time out screen provided to a mobile subscriber requesting permission to release their directory information.
  • FIG. 6 is an illustration of an exemplary example of a screen providing options for allowing a mobile subscriber to contact a requesting party directly with or without revealing their identity or contact information.
  • FIG. 7 is an illustration of a representative example of a flow of screens for presentation to a mobile subscriber in accordance with an exemplary embodiment of the present invention.
  • FIG. 8 is an illustration presenting a process for formatting a trigger message to indicate if the telephone number of a requesting party has been screened to ensure presentation of the requesting party s identity, in accordance with an exemplary embodiment of the present invention.
  • FIG. 9 is an illustration of representative logic for an application residing on the mobile subscriber's device for screening a message from a telephone number associated with a requesting party in accordance with an exemplary embodiment of the present invention.
  • FIG. 10 is an illustration of network components and messages useful for providing the identity blocking code for the current network serving mobile equipment, in accordance with an exemplary embodiment of the present invention.
  • FIG. 11 is an illustration of MDMS server logic flow useful for determining the appropriate method of blocking subscriber identifiable information when a mobile subscriber attempts to directly contact a requesting party, in accordance with an exemplary embodiment of the present invention.
  • FIG. 12 is an illustration of mobile equipment logic flow for using the calling line identification (CLID) block code if available, in accordance with an exemplary embodiment of the present invention.
  • CLID calling line identification
  • FIG. 13 is an illustration of mobile equipment logic flow for providing an option to automatically add a requesting party's information to a mobile subscriber's personal phonebook, in accordance with an exemplary embodiment of the present invention.
  • FIG. 14 is an illustration of a system supporting direct communications between a mobile subscriber and a requesting party, in accordance with an exemplary embodiment of the present invention.
  • FIG. 15 is an illustration of a system having an MDMS server useful for determining an appropriate method for communicating an information request to a mobile subscriber, in accordance with an exemplary embodiment of the present invention.
  • the present invention answers the deficiencies in the prior art by allowing a mobile subscriber user to allow, restrict, or deny access to their personal information or to alternatively contact the requesting party directly.
  • the invention uses the mobile network to provide a request for information release to a mobile subscriber.
  • the invention also allows the release of the information to the party originally contacting the directory assistance service (requesting party) after the permission is granted by the mobile subscriber.
  • An exemplary Mobile Directory Messaging System allows for a call into a directory assistance facility to be screened to determine if the request was for a landline, mobile, or other type of number.
  • the user query is handled as a normal query if the request is for a landline number; however, if it is determined the caller is attempting to ascertain the number for a mobile subscriber, the MDMS server would use the logic disclosed herein to respond to the request. For example, if the directory assistance platform determines that the requesting party is seeking a mobile number, the MDMS formats a short data message, typically a text message, for transmission to the mobile subscriber's communication device to request the mobile subscriber's permission to release the requested information to the requesting party.
  • a short data message typically a text message
  • the request can contain information, such as, the requesting party's name, requesting party's phone number, type of request, location information, telephone number request, address request, or any other information specific to the mobile subscriber—hereafter referred to as directory information.
  • the mobile subscriber can respond to the request issued by the MDMS server by granting, limiting, or denying the requesting party access to the requested information, namely the directory information.
  • the directory assistance system (or operator) can provide the directory information to the requesting party if permission is granted by the mobile subscriber.
  • the directory assistance system responds to the MDMS message by transmitting a message to the requesting party to indicate that the directory information is not available. If desirable by the network operator, the requesting party can be charged according to the availability of the directory information for release.
  • the requesting party's contact information can be gathered and stored.
  • an exemplary embodiment of the MDMS can be programmed to automatically send the mobile subscriber's directory information to the requesting party. This allows the requesting party to receive the requested information, typically directory information, even if the mobile subscriber's permission grant was delayed by an extended period. For example, the mobile subscriber's device may be turned off or the mobile subscriber declines to promptly respond to the message.
  • the transmission of requested information to the requesting party can take the form of a short message, such as a text message, sent to the requesting party's mobile device, an integrated voice response device (IVR) speaking the directory information to the requesting party or a voice mail, a live operator calling with the directory information, a web page with the relevant directory information, a simple e-mail with the contact directory information, a multimedia message, a video message, or any other appropriate delivery mechanism (hereafter referred to as “Delivery”).
  • a short message such as a text message
  • IVR integrated voice response device
  • Delivery any other appropriate delivery mechanism
  • An exemplary MDMS can be programmed to store the mobile subscriber directory information in the event the requesting party can not be immediately contacted. This allows the requesting party to receive the directory information even if the mobile subscriber is not presently available to promptly respond to the directory information request.
  • the directory information can be stored indefinitely until the MDMS server determines the mobile equipment is available or alternatively the directory information can be made available based on rules defined by the directory assistance provider, mobile operator, MDMS provider, or other interested party.
  • an exemplary MDMS can be programmed to capture the identification of the calling number, query a database, and perform an analysis to determine what type of device the requesting party is using to contact the MDMS.
  • the database queried can range from a listing of mobile numbers accessible by the MDMS server, analyzing the calling number to determine if it falls into a range of known mobile numbers, querying an external database such as the mobile number portability database, some combination of these methods, or similar methods to determine the type of device used by the requesting party. If the directory assistance system determines the requesting party is using a known mobile device the MDMS server can be programmed to offer delivery of the mobile subscriber's directory information in the event of a delayed permission gram. The MDMS can also be programmed to determine if the requesting party's network is a partner network and use this information in the analysis of how to provide Delivery of the directory information to the requesting party in the event of delayed permission.
  • From Cingular - John Smith at 404-843-0431 is requesting your directory information. May we release it? Yes No If a predetermined period of time elapsed and the mobile subscriber did not respond to the initial message or the MDMS server sent a continua- tion message (e.g., the requesting party had terminated the call), the display would be changed.
  • the second display message would be (also illustrated in FIG. 5): From Cingular - John Smith at 404-843-0431 requested your directory information at 2:30 on Tuesday September 22nd 2005. You can call him back or alternatively we can provide him your directory information directly.
  • This string of messages will be dynamic and programmed to change dependant on time and/or user feedback.
  • the message type and extent of the message displayed could also be dependant on the type of mobile device that is being used by the mobile subscriber. For example if the mobile device has the capability to process applications, such as Java or Brew, then the displays could allow for many more choices and could provide more information dependant on elapsed time and/or mobile subscriber input. If however, the mobile device only provided short messaging the message could be formatted to best fit this type of delivery. Also, if the mobile device did not have any signaling capabilities the MDMS could be programmed to deliver the message via a voice channel utilizing an IVR, an operator, or some combination of these methods.
  • the different portions of the message can be variable and provided to the application on the mobile equipment in the trigger or subsequent message(s).
  • the name of the mobile network operator can be dynamic and defined by the trigger message. This would allow the mobile operator to change their name or corporate identity/image or to provide this type of service to a mobile virtual network operator (MVNO) without altering the basic software for the application on the mobile equipment.
  • MVNO mobile virtual network operator
  • Other examples of fields on the user screens that may be desirable to make dynamic in nature are requesting party's name, requesting party's contact number, date of request, time of request, call block codes, textual information regarding current features available, options available to the mobile subscriber, or other similar fields. It should also be understood that this type information can alternatively be stored on the mobile device, default information can be stored on the mobile device, or the mobile device may be able to ascertain this information independently; e.g., date and time of the request from the clock on the mobile.
  • the mobile subscriber can set up the application on the mobile equipment to automatically respond any future messages of a similar type.
  • the mobile subscriber can configure their mobile equipment to automatically accept or alternatively automatically reject all permission requests from the MDMS.
  • the mobile subscriber can configure their mobile equipment to always accept or reject a request from a certain requesting party or a certain class of requesting parties such as all international requests, all requests from unidentified parties, or all requests from parties not stored in the phonebook on the mobile equipment. If a request is automatically accepted or rejected the mobile equipment can be alternatively configured to provide the mobile subscriber with an alert message stating the request has been automatically handled or the mobile equipment can be configured to hide these alerts from the mobile subscriber. If the mobile equipment was configured to display the automatic handling information the mobile subscriber could then be provided with the option to connect with the requesting party directly as described in this disclosure.
  • an exemplary MDMS server can be programmed to determine the type of mobile device prior to sending any messaging to the mobile subscriber. This information can either be programmed into the MDMS server or the MDMS server can query a database for the relevant information prior to determining how to format and transmit the message to the mobile subscriber. This allows a MDMS to tailor the delivery of the information to match the features and functionality available on the mobile device.
  • the information indicating that the call has been screened by a trusted party may be obtained from the call set up message received from the network when the requesting party calls the directory assistance service center. Since most of these calls will be received from users that are subscribers when they dial a predetermined code, such as 411, on the network offering the directory assistance service, the requesting party identity should be known to the directory assistance center serving that network and can be verified, and used to validate the identification of the requesting party or their equipment.
  • the directory assistance service can provide the option to the requesting party to present or validate their personal contact information for use when requesting release of the mobile subscriber's directory information.
  • the requesting party can release restrictions on use of their identity, validate their identity with the network or directory assistance provider, or continue to restrict the information. If the requesting party releases the information the MDMS server can forward this information on to the subscriber application and the application can present the information to the user with the calling name, phone number, and other data that may be used to identify the requesting party.
  • the directory assistance provider MDMS server can choose to not allow the message to the mobile subscriber or to request the permission to release the contact information.
  • the MDMS server can alter the message to the MDMS application to indicate that the call is from an unscreened or unavailable number. The subscriber application could then be altered to indicate that the message was received from a non-screened number or from a requesting party that chose to keep their identity from the mobile subscriber.
  • the code to restrict the transmission of the calling line identity to the calling party is often “*67” dialed before the telephone number; however, it may be different in other countries or networks.
  • This code or method can be transmitted to the application on the phone so it may be displayed to the mobile subscriber or alternatively used in the application on the mobile phone when placing an outbound communications attempt directly from the application on the mobile equipment. This will enable the mobile subscriber to initiate a communications path directly to the requesting party without divulging their identity or contact information.
  • the code to block or hide the identity of the mobile equipment's or mobile subscriber's identity may change depending on the current serving network. It also might not be possible or necessary to block the identity of the mobile equipment or mobile subscriber. If this were the case the subscriber application could be programmed not to offer this option or alternatively to alert the mobile subscriber to this restriction or modification in the operation of the application.
  • the mobile equipment may change networks, locations, or countries before the mobile subscriber views the message or attempts to communicate directly with the requesting party. It is possible for the mobile equipment to move into another network where the identity block or code originally provided to the application does not work as expected, may not be valid, or may cause an error in providing the service. In this instance it is desirable for the subscriber application to monitor the network serving the mobile equipment when it receives the identity block code and to determine if the mobile equipment has entered a subsequent network where the current code or method may not be valid.
  • the subscriber application can be programmed in such a manner as to not offer the option of blocking the identity, inform the mobile subscriber that blocking the identify is not an option, remove the menu choice that allows the mobile subscriber to directly contact the requesting party, or other similar methods that will become obvious to those skilled in the art when taking into account this disclosure.
  • the application on the mobile equipment had the information as to the contact number and possibly the name of the requesting party, it would be helpful if the application on the mobile equipment would allow the mobile subscriber the option to automatically edit and store this information into their existing personal phonebook, mobile equipment phonebook, or subscriber identity module phonebook.
  • the preferred method to accomplish this would be for the application on the mobile equipment to be programmed to offer this option to the subscriber if a message contained at least the contact number of the requesting party.
  • the application on the mobile equipment should provide the mobile subscriber with the opportunity to edit the information prior to storing it into the phonebook to allow the mobile subscriber to add any missing information, change the format of the phonebook name to better fit their current phonebook format, to change the name of the requesting party to be more recognizable, or to allow the entry to be saved with a name that is easier for the mobile subscriber to find at a later date (e.g., allow the entry to be saved under nicknames or as a relationship to the mobile subscriber).
  • the application on the mobile equipment can be programmed to not allow the mobile subscriber to automatically contact the requesting party directly; however, it may still be desirable to allow the mobile subscriber to automatically store the requesting party's contact information into their personal phonebook. This would allow the mobile subscriber to contact the requesting party outside of the MDMS application on the mobile phone.
  • the number used by the application on the mobile equipment may contact the requesting to be different from the direct contact number of the requesting party.
  • the directory assistance provider desires to allow the mobile subscriber the option to automatically connect to requesting party via a voice channel while the requesting party is holding on the directory information system and waiting for the requested information. If this were the case, it may be desirable to route the communications from the mobile subscriber through a communications system connected to the directory assistance platform where the requesting party is currently holding. This would allow the mobile subscriber to automatically contact the requesting party while they were holding for the directory information. This functionality could also be provisioned to automatically block the mobile subscriber's phone number or other identifiable information.
  • the message to the mobile application would need to include the direct contact number for the requesting party so this number could be stored in the phonebook.
  • the message to the mobile application would also need to include a second routing number that could be used to contact a meet me type platform where the requesting party was holding.
  • the meet me conferencing system will allow the two inbound communications paths to be joined. This would allow the mobile equipment to originate a call back to the conference port where the requesting party's call was currently parked or monitoring. When the call from the mobile equipment arrived the meet me conferencing system would then recognize the incoming communications and would bridge the requesting party's and mobile subscriber's voice communications paths together.
  • the direct connect functionality should be provisioned on the user screens when attempting to gain permission for the release of the requested directory information from the mobile subscriber in real time; however, it may not be desirable to allow this functionality when requesting a delayed grant of permission.
  • Yet another exemplary method of providing the direct voice connection is to allow a message from the mobile subscriber to the MDMS server indicating that a voice communications path was approved. This would trigger an outbound call from the directory information system serving the requesting party to the mobile subscriber.
  • the major problem with this method is that the requesting party may then see the mobile subscriber's directory information when they received their bill for this call.
  • the directory information system serving the requesting party would be instructed to suppress the mobile subscriber's directory information.
  • One method of performing this would be for the directory information system placing the call to the mobile subscriber to prefix a dialing code to the mobile subscriber's contact number. This prefix would cause the call to be routed over special trunks that caused the called number contact information to be suppressed.
  • FIG. 1A is an illustration of an exemplary system having a network and communications path between a requesting party 110 through the directory assistance platform 130 and out to the mobile subscriber 170 with a return path to the requesting party 110 .
  • the session initiates with a call 120 from the requesting party 110 to the directory assistance platform 130 .
  • the directory assistance platform 130 would screen the call 120 to determine if it was destined for a mobile subscriber or mobile equipment. If it was determined the call was destined for a mobile subscriber or mobile equipment, the platform would send a message 140 to the MDMS server 150 requesting permission to release the mobile directory information. A request message 160 would then be sent to the mobile subscriber 170 in the mobile network 180 .
  • FIG. 1A is an illustration of an exemplary system having a network and communications path between a requesting party 110 through the directory assistance platform 130 and out to the mobile subscriber 170 with a return path to the requesting party 110 .
  • the session initiates with a call 120 from the requesting party 110 to the directory assistance platform 130
  • the directory assistance platform 130 would then determine if the original calling party 110 requesting the directory information was using a device that could receive a text message or other multimedia protocol.
  • the preferred method to determine how to provide the directory information to the calling party 110 is to look up the device in a database 111 of known devices and then determine the method for providing the directory information to the calling party 110 . It is even possible to perform a look up to determine the type of device and the extent of the service provisioned on the device (not shown). This functionality could be performed on the initial look up or on a subsequent look up in a second database (not shown).
  • the equipment look, up 119 into database 111 would trigger an equipment type response 112 that would provide an indication if the calling party 110 was appropriately equipped to receive a delayed transmission of the requested directory information.
  • This same functionality can also be achieved by determining the directory system that sent the request, facility on which the request is received, address of the directory assistance request, or other similar means that will be known to those skilled in the art. If the directory assistance system 130 determined that device 110 was served by a network that was capable of receiving a messaging protocol 100 and the device 110 was so equipped, the directory assistance platform 130 would then offer the option of providing a delayed message containing the directory information for device 170 and the directory information for the device 110 would be associated with the outstanding message to the device 170 .
  • the MDMS server 150 would receive the message 114 and would then determine the mobile subscriber directory information and transmit a permission grant message 113 to the directory assistance platform 130 .
  • the message 113 typically contains the mobile subscriber directory information maintained by the MDMS server 150 for the mobile subscriber 170 .
  • the receipt by the directory assistance platform 130 of the message 113 would trigger the transmission of a message 115 with the directory information to the requesting party 110 .
  • the exemplary method can send this message as a text message sent via short message service, the message can be implemented by multimedia, voice, video, or other similar form of conveying the information to the requesting party 110 .
  • FIG. 1B is a detailed illustration of a representative operating environment for an information system operative to receive a directory assistance query from one of a number of directory assistance providers.
  • the directory assistance provider 1600 determined the request for information required permission from the mobile subscriber 1607 , it would send a query message 1620 to the MDMS server 1630 .
  • This query 1620 would cause the MDMS server 1630 to send out a message to the customer database (shown as a home location register—HLR 1605 ) of the mobile network 1601 .
  • This query is designed to provide a routing number for the mobile equipment 1625 , the current status of the mobile account, as well as to determine certain features and functionality of the mobile equipment 1625 .
  • the query would trigger an equipment lookup 1680 to be sent to an equipment functionality database (shown as the CARD platform; however, this platform is typically not defined by the standards in the industry and may be incorporated into other network elements or called by another name) 1690 in the home mobile network 1601 .
  • This step may not be required in some networks that have a more homogeneous distribution of mobile phones with the enhanced functionality needed to display text and menus.
  • Example of these types of network and functionality are GSM with JAVA deployed on a majority of the SIM cards and CDMA networks with BREW functionality deployed on the handsets.
  • the equipment lookup 1680 is designed to provide the functionality of the mobile equipment 1625 so that the MDMS server 1630 can make a determination of the most appropriate method of formatting a message to the specific mobile equipment. 1625 . Once the MDMS server 1630 knows the location of the mobile equipment 1625 and the most appropriate method to send a data message 1670 to the mobile equipment 1625 , it can format the message 1670 and send it to the mobile equipment 1625 .
  • the message 1670 is shown as a short message on a GSM network 1601 ; however, one skilled in the art, using this disclosure, can easily determine how this message 1670 may be transported on a multitude of different data or voice communications paths to the mobile equipment 1625 or can be transported across almost any type of wireless network, in this exemplary illustration the message 1670 is transported through a mobile switching system (show as the MSC) 1625 .
  • MSC mobile switching system
  • the mobile equipment 1625 receives the permission message 1670 and the mobile subscriber 1607 or mobile equipment 1625 indicated their preference (note—the mobile equipment 1625 may be optionally set to automatically respond to the permission message with a preconfigured response), the mobile equipment 1625 would then send a message 1660 back to the MDMS server 1630 indicating their granting/withholding of the mobile subscriber's permission.
  • the MDMS server 1630 would then format and transmit the appropriate permission message 1650 to the directory assistance provider 1600 originally generating the query 1620 . If however, the originally requesting party hangs up before the permission message 1650 is received, the directory assistance provider 1600 would send an abandon message 1640 indicating that the originally requesting party has abandoned their initial request. The MDMS 1630 would than handle the session as appropriate. If the original query message 1620 indicated that the requesting party had delayed permission grant the MDMS server 1430 would forward the delayed permission grant to the directory assistance provider 1600 when and if it was received from the mobile equipment 1625 .
  • FIGS. 2 and 3 are flow charts illustrating an exemplary method useful for determining how to handle the query requesting the directory information from the mobile subscriber and illustrating the an exemplary method of delayed granting of permission to release the mobile subscriber's directory information
  • the exemplary process begins when the requesting party 1606 issues an incoming request for information, typically a directory information request, in step 280 .
  • a directory assistance platform 1600 conducts an inquiry in step 290 to determine whether the incoming request is destined for a mobile user, such as the mobile subscriber 1607 . If the response to this query is negative, the directory assistance platform 1600 treats the incoming request as a normal directory assistance request in step 250 .
  • the MIMS server 1630 conducts an inquiry in step 233 to determine if the cell number for the mobile user is known. If the mobile address is known the MDMS server 1630 then send a customer database request 1610 in step 214 to the mobile network's 1601 customer database 1605 ( FIG. 1B represents this database as an home location register or HLR). If the mobile equipment 1625 number is not known, then the directory assistance platform 1600 plays an announcement in step 260 to indicate that the mobile number for the mobile user 170 is not available. In addition, the directory assistance platform 1600 determines, in step 230 , if an alternate number is known.
  • the directory assistance platform 1600 conducts an inquiry in step 220 to determine whether the requesting party 1606 wants the alternate number. If the requesting party 1606 wants the alternate number, the directory assistance platform 1600 processes the call as a normal directory assistance call in step 250 . If the requesting party 1606 does not want the alternate number, the directory assistance platform 1600 terminates the call in step 210 . If the call is terminated, the directory assistance system operator can choose not to provide answer supervision back to the telephone network so the calling party does not pay for the failed directory assistance attempt.
  • the MDMS server 1630 then would receive a response to the message 1610 from the customer database 1650 indicating what is known about the mobile subscriber 1607 and the mobile equipment 1625 . If the location of the mobile equipment 1625 was not known or it was not currently attached to a network, the directory assistance system 1600 would then play announcement in step 260 indicating that the mobile subscriber 1607 is not available, determine if the alternate number is known, step 230 , and if the requesting party 1606 desires to obtain the alternate number, step 220 . If the requesting party 1606 wants the alternate number the call is handled as a normal directory assistance call, step 250 .
  • the call is terminated in step 210 . If the call is terminated the director assistance system operator can optionally choose not to provide answer supervision back to the telephone network so the requesting party 1606 does not pay for the failed directory assistance attempt.
  • the MDMS server 1630 would then execute logic for determining and handling a call from a screened or unscreened caller (logic flow begins at point B and returns at point C, the exemplary logic sequence is illustrated in FIG. 8 and discussed later in this disclosure) then would send out a data message to the last known location of the mobile equipment 1625 as shown in step 217 .
  • the MDMS server 1630 would then start a timer in step 218 to ensure the message return from the mobile equipment 1625 was within the acceptable wait time for the requesting party 1606 .
  • the MDMS server 1630 would then go into a loop of checking to see if the timer has expired, step 215 , and checking to see if a permission message was received, step 219 , from the mobile equipment 1625 . If the timer expires before the message is received, the MDMS server 1630 would then determine if the requesting party 1606 was calling from a device that was capable of receiving a delayed message, step 225 . If the requesting party was calling from a device 1606 that could receive a delayed response, the directory assistance system 1600 would then play an announcement, step 224 , and query the requesting party 1606 if they desire to receive a delayed message (point A refers to a continuation of the logic sequence in FIG.
  • the directory assistance system 1600 would collect and store the requesting party's 1606 contact information, shown in step 320 , and begin monitoring to determine if the permission had been received from the mobile subscriber 1607 , step 350 .
  • the MDMS server 1630 would also start a second timer, step 340 , to determine if the MDMS server 130 , should abandon the attempt to contact the mobile subscriber, step 370 , and end the process, step 380 .
  • the MDMS server 1630 would send a message 1650 to the directory assistance system 1600 and the directory assistance system 1600 would then send a message to the requesting party 1606 with the directory information, step 360 , and end the process, step 380 .
  • step 219 if the message 1660 from the mobile subscriber 1607 was received before the timer expired, the MDMS server 1630 would then determine if the mobile user 1625 had granted their permission, step 222 . If the user denies permission, the MDMS server 1630 and directory assistance system 1600 handles the request 1607 as described above starting at step 230 . If the mobile user granted their permission, then the directory assistance system 1600 would give answer supervision, step 229 , to ensure the requesting party 1606 was billed and then provide the mobile number to the requesting party 1606 . The session would then be terminated, step 223 .
  • FIG. 4 is an illustration of an exemplary screen that can be provided by the application on the mobile equipment 1625 to the mobile subscriber requesting the release of the directory information.
  • the screen in FIG. 4 is broken up into several sections.
  • Section 410 consists of a statement and or a question from the mobile subscriber's network operator 1601 asking for the real-time permission to release the directory information to the requesting party 1606 .
  • This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that the mobile subscriber 1607 will not be billed for this call.
  • Section 420 is the default selection and in this example is the permission grant to release the directory information to the requesting party 1606 .
  • Section 430 comprises other selections that can be chosen by the mobile subscriber 1607 . In this example, these selections consist of a method to decline to release the directory information to the requesting party 1606 and a selection that provides more information.
  • FIG. 5 is an illustration of an exemplary screen that would be displayed in place of the screen shown in FIG. 4 in the event of encountering a time out as contemplated in 215 .
  • the screen in FIG. 5 is broken tip into several sections.
  • Section 510 consists of a statement and or a question from the mobile subscriber's network operator 1601 asking for the delayed permission to release the directory information to the requesting party 1606 .
  • This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, time of the original request, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that the mobile subscriber 1607 will not be billed for this call.
  • Section 520 is the default selection and in this example is an indication that the mobile subscriber 1607 can call the requesting party 1606 back directly.
  • Section 530 comprises other selections that can be chosen by the mobile subscriber 1607 . In this example, these selections consist of a method to grant the delayed release the directory information to the requesting party 1606 , a selection that allows the mobile subscriber 1607 to ignore the message, and a selection that provides more information.
  • FIG. 6 is an illustration of an exemplary screen that would be displayed if the mobile subscriber 1607 chose the “I will call” default option 520 in FIG. 5 .
  • the screen in FIG. 6 is broken up into several sections.
  • Section 610 consists of a statement explaining that the mobile subscriber 1607 can contact the requesting party 1606 without revealing their identity or telephone number.
  • Section 610 can include information on how to manually contact the requesting party 1606 without disclosing the mobile subscriber's 1625 identity.
  • Section 610 in this example also contains a question asking the mobile subscriber 1607 if they would like to call back the requesting party 1606 .
  • Section 620 is the default selection and in this example instructs the mobile device 1625 to call the requesting party 1606 while blocking any mobile subscriber 1607 identifiable directory information
  • Section 630 is comprised of other selections that can be chosen by the mobile subscriber 1607 . In this example these selections consist of a selection that instructs the mobile device 1625 to call back the requesting party 1606 without blocking mobile subscriber 1607 identifiable directory information and a selection that allows the mobile subscriber 1607 to ignore the message.
  • FIG. 7 This Figure is an illustration of the exemplary flow of the screens displayed to the mobile subscriber 1607 .
  • Screen 710 is the initial screen. If the mobile subscriber 1607 selects the “yes” choice 720 the application will send a message to the MDMS server 1630 and the directory information will be released 730 to the requesting party 1606 . If the mobile subscriber 1607 selects either the “No” 740 or “More information” 750 choice, then screen 711 will be presented explaining how to contact the requesting party 1606 while allowing the requesting party 1606 to see the mobile subscriber's 1625 directory information 713 or alternatively while blocking the mobile subscriber's 1625 directory information 712 . Screen 711 also allows an option not to call back the requesting party 714 .
  • the screen will automatically timeout 760 and present as replacement screen 770 .
  • This screen will present options that will allow the mobile subscriber 1607 to call the requesting party 1606 directly 790 which, if selected, will present screen 711 with the options described above.
  • the mobile subscriber 1607 can also choose to provide a delayed release of their directory information 716 , ignore the message 715 , or obtain more information 733 .
  • the option “Please release my information” would only be displayed if the MDMS server 1630 determined it had a valid route to send the directory information to the requesting party 1600 on a delayed basis. If the MDMS server 1630 determined that it did not have a valid route to contact the requesting party 1606 it would not display this option 780 .
  • screen 711 will be presented with the choices defined above. While these screens are being presented to the mobile subscriber 1607 the other buttons and selections on the mobile device 1625 will continue to operate as normal. For example, the mobile subscriber 1607 will be able to choose to go back a screen, end the session, or interrupt the session at any point.
  • FIG. 8 This Figure represents a flow diagram for an exemplary subroutine that allows the directory system 1600 or other designated entity in the network to process messages from a screened and an unscreened requesting party 1606 .
  • the subroutine starts at point B and the first step is to determine if the communications attempt 1606 is from a screened address, step 810 .
  • a requesting party 1606 can be screened by several methods. The requesting party 1606 can be screened by originating a call from a device 1606 that is known by a trusted partner or network provider, by identifying themselves via the answer to queries or challenges from the network, or by other means known to those skilled in the art.
  • the directory system 1600 will set the screened number flag to unscreened in the message to be sent to the application on the user device, step 820 . If the directory assistance system determines requesting party's 1606 address is from a screened number the directory assistance system 1600 will set the screened number flag to screened, step 830 , and pass a query message 1620 to the MDMS server 1630 . The MDMS server 1630 will then determine the serving mobile network 1601 for the mobile subscriber 1607 whose directory information is being requested, step 840 . The MDMS server 1630 will then lookup the algorithm or dialing sequence needed to block the identity of the mobile subscriber 1607 originating the call from the particular network 1601 , step 850 . The MDMS server 1630 then includes this code into the trigger message to be transmitted to the mobile subscriber whose directory information is being requested, step 860 .
  • this illustration presents an exemplary process that allows the application on the mobile subscriber's equipment 1625 to process details regarding a screened message.
  • the application begins with the application on the mobile equipment 1625 determining if the trigger message indicates if the requesting party 1606 is originating their communications 1607 from a screened or unscreened device or location 910 . If the trigger message 1670 indicates the call is not from a screened caller, the mobile equipment application 1625 can be configured to present the mobile subscriber 1607 with screens that only allows the mobile subscriber 1607 to call back while not revealing their identity, step 920 .
  • the mobile subscriber 1607 might not be allowed to release their directory information or to provide unique identifiable information if they chose to contact the requesting party 1606 directly.
  • the application can also be configured to not reveal the calling number or name of an unscreened requesting party 1606 . This will ensure that the mobile subscriber 1607 can readily identify an unscreened requesting party 1606 and will assist the mobile subscriber 1607 to only reveal as much information as desired to an unscreened party.
  • the application on the mobile subscriber's device 1625 can be configured to display the address of the requesting party 1606 , display the name of the requesting party 1606 , provide the option to contact the requesting party 1606 while displaying their identity, step 950 , and place any other indicators in the message indicating that the requesting party 1606 identity was screened or trusted, step 960 .
  • this illustration presents an exemplary network architecture having an MDMS platform 1070 that can determine the location of mobile equipment 1010 in either a home network 1020 or a visited network 1000 in order to determine a usable method of blocking the mobile equipment's 1010 or mobile subscriber's identity for a communications session.
  • the mobile equipment first sends out a signal when arriving at a new network location 1030 .
  • This signal 1030 updates the location of the mobile equipment 1010 in the mobile subscriber database 1040 .
  • the MDMS platform 1070 then can query 1050 the mobile subscriber database 1040 .
  • the mobile subscriber database 1040 would then reply 1060 to the query with a number of parameters that may include the current location or network 1000 where the mobile equipment 1010 is located.
  • the MDMS platform 1070 launches a query 1080 to a database 1090 that maps the location of the mobile equipment 1010 with the code to block or hide the identity of the mobile equipment or mobile subscriber when communicating with another point on the network.
  • the database 10 . 9 can be internal or external to the MDMS platform 1070 or may alternatively be a part of another network element.
  • the MDMS platform 1070 could then either send a separate message 1011 to the mobile equipment containing this code or could include this code into the message 1011 sent to request permission to release the directory information to the requesting party.
  • FIG. 11 presents an exemplary logic flow used by the MDMS server 1630 to determine the appropriate method for the application on the mobile device 1625 to use to block their identification from another network user when contacting them directly.
  • the exemplary logic implemented by a subroutine, starts by looking up the mobile subscriber 1607 whose directory information is being requested on the mobile subscriber database 1605 in the home network 1601 and determining if a serving network, location, or country code is available from this lookup, step 1110 . If the network code is not available the subroutine will continue with sending a permission message 1670 without an identity block code, step 1130 , or with a generic identity block code.
  • the application on the mobile device 1625 may have a generic identity block code stored to be used if the trigger message 1670 does not contain a valid identity block code. If the country code, network code, location information, or other similar information is available in step 1110 , then the MDMS server 1630 would look up the identification block code for the given network, step 1120 . The MDMS server 1630 would then determine if the identification block code was available in the database, step 1140 . If this code was not available, the subroutine will continue with sending the message without an identity block code, step 1130 , or with a generic identity block code.
  • the MDMS server 1630 would then include the appropriate network block code in a trigger message 1670 , step 1150 , to the application on the mobile equipment, subscriber identification module, or other similar device (all of these devices are represented by 1625 ) that would present the information to the mobile subscriber 1607 .
  • this illustration presents an exemplary subroutine describing the mobile equipment 1625 logic flow for using the calling line identification (CLID) block code, if present, in the message from the MDMS server 1630 .
  • the first step in this subroutine is to determine if the trigger message 1670 contains a code to block or hide the identification of the mobile equipment 1625 or the mobile subscriber 1607 when communicating directly with another network user, step 1210 . If the trigger message 1670 does not contain the identification block code, the application on the mobile equipment 1625 can withhold or limit the option to allow the mobile subscriber 1607 to contact the requesting party 1606 directly, step 1230 . If the trigger message 1670 contains the identification block code, the application on the mobile equipment 1625 can display the appropriate text and options to allow the mobile subscriber 1607 to contact the requesting party 1606 directly, step 1220 .
  • CLI calling line identification
  • this illustration presents an exemplary subroutine describing the mobile equipment logic flow for automatically storing the requesting party's 1606 information into the mobile subscriber's 1607 phonebook.
  • the subroutine starts with determining if the number of the requesting party 1606 is available, step 1310 . If the number of the requesting party 1606 is not available then the application on the mobile equipment 1625 would not provide the option to store the information in the phone book, step 1340 . If the number of the requesting party 1606 is available the logic would then determine if the name of the requesting party 1606 is available, step 1320 .
  • the logic of the mobile equipment 1625 application can then allow the mobile subscriber 1607 to edit the information, step 1360 , before saving the information into the phonebook. This would allow a mobile subscriber 1607 to save the information in a preferred form and format and it would allow the mobile subscriber 1607 to use a similar format as their other phonebook entries. If the requesting party's 1606 name was not available or was incorrect, the logic of the application on the mobile equipment 1625 would then prompt the mobile subscriber 1607 to enter the name of the requesting party 1606 , step 1330 . This will allow the mobile subscriber 1607 to enter an appropriate name for the requesting party 1606 as the phonebook entry.
  • step 1330 is shown in this example as a separate step, one skilled in the art can see how this step can easily be made a part of the edit step 1350 .
  • the mobile equipment 1625 application would then allow the entry to be saved into the existing mobile subscriber 1607 phonebook, step 1360 .
  • the subroutine depicted in FIG. 13 can be placed at any point in the application or can be made a menu choice for the mobile subscriber 1607 to select; however, it would be more effective to execute this logic after the mobile subscriber 1607 has released their directory information 1660 and 1650 , called the requesting party directly 1480 , 1490 , or 1413 , or chosen to ignore the permission request.
  • the mobile subscriber 1607 may have collected more information on the requesting party 1606 (e.g., actual name instead of network calling name identification) and may have assigned a different priority to the requesting party 1606 .
  • FIG. 14 is a system diagram of an exemplary network, communications paths, and various options to provide a direct voice connection(s) 1490 , 1413 , 1480 between the requesting party 1410 and the mobile subscriber 1470 while still allowing the mobile subscriber 1470 to restrict the dissemination of their directory information and to allow the mobile subscriber 1470 to control the origination of the communication path 1490 , 1413 , 1480 .
  • the session starts as a normal directory call 1420 to the directory assistance platform 1430 .
  • the directory assistance system 1430 determines that the call requires approval for release of the directory information it sends a request 1440 to the MDMS server 1450 . This triggers a request for release of permission 1460 to the mobile equipment 1470 .
  • the first method is to allow the mobile equipment 1470 to place a call 1480 directly to the requesting party's 1410 contact number.
  • the application would prefix, to the dialing string, the outbound call with a code to block the identity of the mobile equipment 1470 .
  • the second method would be for the MDMS server 1450 to transmit a meet me conference number 1411 to the application on the mobile equipment 1470 .
  • the mobile equipment 1470 could then be programmed to place an outbound call 1413 to the meet me conference number 1411 and the directory assistance system 1430 serving the requesting party's 1410 call 1420 could either automatically forward the call 1420 to the same meet me conference port 1411 through voice channel 1405 or could alternatively the directory assistance system 1430 could monitor the meet me conference port 1411 to determine if an inbound call 1413 has been received and then forward the communications path 1420 through channel 1405 .
  • the third method would be to allow the directory assistance system 1430 , upon receiving a permission message (not shown) from the MDMS server 1450 , to originate a call 1490 directly to the mobile equipment 1470 .
  • the directory assistance system 1430 could optionally be programmed to not allow the display of the mobile subscriber's 1470 directory information when this call 1490 was placed. This could be done by appending a special code to the dialing string, routing the call over a special trunk group, replacing the billing information with another string, deleting the billing information, or other similar method known to those skilled in the art.
  • FIG. 15 is a system diagram of exemplary network and communications paths to determine the appropriate method of communicating the request to the mobile equipment 1510 .
  • the logic flow begins when the requesting party 1500 originates a communications path 1511 to the directory assistance platform 1520 .
  • the request 1511 can be a voice communications path, digital data message over a data network, wireless data message or any other similar communications means.
  • the directory assistance system 1520 receives the request 1511 it determines if the request is for a mobile subscriber's 1510 directory information that requires a permission release prior to releasing the directory information to the requesting party 1500 .
  • the directory assistance system 1520 sends a directory information request 1530 to the MDMS server 1540 .
  • the MDMS server 1540 In order for the MDMS server 1540 to determine the best method of communicating 1590 with the mobile equipment 1510 the permission release request with the mobile equipment 1510 , the MDMS server 1540 must first look up the mobile equipment 1510 and determine its capabilities on an a mobile equipment functionality database 1570 . The MDMS server 1540 transmits a message 1560 to the mobile equipment functionality database 1570 and receives a response 1550 as to the features of the mobile equipment 1590 . The MDMS server 1540 then formats the message 1590 in an appropriate manner to be displayed on the mobile equipment 1510 . This MDMS server 1540 can optionally have a default method to transmit the message 1590 in the event the database 1570 is unavailable or does not have data on the particular mobile equipment 1510 .
  • the present invention allows a mobile subscriber to designate if a requesting party can access their directory information.
  • the granting of this request can be delayed while still providing a mechanism to transmit the information to the requesting party.
  • a display of information can be presented to the mobile subscriber in a dynamic manner.
  • This disclosed invention can determine and handle communications sessions from trusted sources, automatically store the requesting party's information in an electronic phonebook, and allow a voice communications path between the requesting party and the mobile subscriber.
  • the present invention provides an MDMS system capable of offering information services to a requesting party within the operating environment of a wireless telephony network.
  • This MDMS system is capable of validating a release of information about a party of interest, typically a mobile subscriber, in advance of any release of such information to a requesting party, such as a wirelessly connected subscriber.
  • the MDMS system can support the communication of requested information between the requesting party and the party of interest via the wireless telephony network.
  • messaging can be transmitted over a text-based data or voice network to validate the information release.
  • the status of the party of interest can be obtained by querying a customer data base prior to sending a message to that mobile subscriber.
  • the MDMS system can determine the best manner for sending a message to the party of interest based on information received from a customer data base query.
  • a determination to apply answer supervision to a communication session can be based on the grant or denial of permission for the information release.
  • Announcements can presented to the requesting party based on the status of messaging for the interested party. In the alternative, announcements can be presented as a result of information gained from the customer data base query.
  • Information released to the requesting parry can contain at least a portion of the information collected from the customer data base query.
  • the present invention is capable of receiving an index number indicating a request to release contact information for a network subscriber. Permission for the information release is obtained from a network subscriber prior to releasing that information to a requesting party. Upon receiving the permission, the index number is mapped to a communications address, such as a telephone number. The communications address is then transmitted to the requesting party. Although the index number can be formatted to resemble a telephone number, the index number is not valid for reaching the network subscriber on the switched telephone network. The network subscriber can select the option of directly originating a voice conversation with the requesting party to communication the contact information. This conversation can be routed through a “meet me” conference port or number.
  • the conversation can be originated by the network subscriber's mobile equipment or from a system serving the requesting party.
  • the identity of the network subscriber can be blocked from the requesting party in connection with the origination of this conversation.
  • the identity of the network subscriber does not necessarily appear on the requesting party's invoice in connection with that conversation.
  • a query for information can be communicated via a wireless telephony network.
  • a message can be transmitted to a mobile device associated with a particular mobile subscriber to gain permission to release information.
  • the release of the information is controlled, based at least in part on the response received from the mobile device.
  • the information is typically communicated to the original party requesting the information after the initial communications path used to make the request is terminated.
  • the message requesting permission to release certain information typically includes user selectable options for automatically responding to the message. One option is to respond directly to the party making the initial query via a voice communications path while blocking subscriber contact information. Another option is to respond directly to the party making the initial query via a voice communications path while providing subscriber contact information.
  • This initial message requesting permission can be replaced by a substitute message after the expiration of a time period.
  • the substitute message contains at least one option to contact the party making the initial query directly via a voice communications channel.
  • the substitute message contains at least one option that offers to automatically contact the party making the initial query via a voice communications path without providing the requested contact information.
  • the substitute message can contain information that instructs the wireless subscriber on how to manually contact the party making the initial query without providing the wireless subscriber's contact information. The information is sent to the party making the initial query via a text message or is presented to that party via a voice communications path.
  • a computer-implemented process can support a determination of whether a directory assistance query requesting information must be preauthorized by a network subscriber prior to any release of such information.
  • a determination is made about the type of device used by the party that is requesting the information.
  • the device of the requesting party may not be permanently connected to the network via a wired communications path.
  • the information can be communicated to the requesting party information via a text message or a voice message.
  • the text messaging can be delivered after the original communications path used to make the directory assistance query has been disengaged.
  • Another aspect of the invention provides an MDMS system capable of offering information services to a requesting party.
  • This MDMS system has the capability of supporting a request for permission from an owner of the information prior to releasing the information.
  • the MDMS system supports the delayed granting of permission for the information release.
  • the information can be sent to the requesting party via a text message or via a voice communications path. Messaging can be designed to offer multiple owner selectable options in response to the information release request. One option is to call the requesting party directly without providing subscriber contact information during the call set up. Another option is to call the requesting party directly while providing subscriber contact information during the call set up.
  • the initial message sent to the information owner to seek permission for release of the request information can replaced by a second “replacement” message after a specified time period.
  • a second set of options can be made available in this second message.
  • the second message can contain at least one option to contact the requesting party directly via a voice communications channel.
  • the second message can contain at least one option that offers to automatically contact the requesting party via a voice communications path without providing the requested contact information.
  • the second message can contain information that instructs the wireless subscriber how to manually contact the requesting party without providing the wireless subscriber's contact information.
  • a process if provided for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
  • a determination is made whether the requesting party is a “trusted” source.
  • the request for release of information is communicated to the network subscriber at least in part via a messaging means.
  • the requesting party can be queried to release a restriction on their contact information.
  • the textual information presented to the network subscriber can be altered if the requesting party is a trusted source.
  • the textual information can include at least one menu choice.
  • the determination that the requesting party is a trusted source can be made at least in part from network signaling information. In the alternative, the determination that the requesting party is a trusted source can be made at least in part from querying the requesting party directly.
  • the requesting party can elect to respond to the query by deciding not to share their contact information.
  • the invention can provide a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
  • a determination is made whether the requesting party is a trusted source.
  • At least two alternative options are communicated to the network subscriber to respond to the request for release of information. If applicable, at least one of the options presented to the network subscriber is presented as a result of the requesting party's status as a trusted source.
  • the network subscriber can respond to the query by directly responding to the requesting party. For example, the network subscriber can respond to the query by releasing at least a portion of the subscriber's information. In the alternative, the network subscriber can respond to the query by electing to not allow a release of requested information.
  • the requesting party can indicate that their communications address should not be shared with other network users. In the alternative, the requesting party can release their communications address to the network subscriber.
  • An alternative aspect of the invention provides a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
  • the current location of the network subscriber is identified.
  • At least one method of blocking the identity of the network subscriber is identified when an outbound communications attempt is placed from the current location.
  • the method to block the identity of the network subscriber is transmitted to the network subscriber.
  • the transmission of the identity block is included with a request for permission to release the directory information.
  • the subscriber screens can be changed in response to the mobile equipment changing networks after receiving the network block code. In the alternative, the subscriber screens can be changed in response to the mobile equipment changing locations after receiving the network block code.
  • the location of the network subscriber contains a code corresponding to the country of the network currently serving the network subscriber.
  • the method of blocking the identity of the network subscriber can be determined at least in part by using the country identification.
  • the method of blocking the identity of the network subscriber can comprise prefixing a code, such as *67, to the network address when initiating the communications attempt.
  • a default code can be stored on in the application on the network subscriber's mobile device.
  • a method for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
  • the requesting party's information is transmitted to the mobile equipment.
  • the requesting party's information is typically stored in the mobile subscriber's phonebook.
  • the requesting party's information can be edited by the network subscriber prior to storing it in the phonebook.
  • the option to store the requesting party's information can be presented to the network subscriber after the network subscriber has attempted to contact the requesting party.
  • the requesting party's contact information can differ from the network address provided to the application to contact the requesting party.
  • the network address to directly contact the requesting party can change if a delayed grant of permission screen is displayed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

Confirmation of a mobile subscriber's permission to release their personal information is completed prior to transmitting the information to a requesting party. The mobile subscriber can view the requesting party's identity prior to making a decision to release their directory information. In the alternative, the mobile subscriber can contact the requesting party directly without a release of their personal information. Other types of information, such as location information, can also be communicated to a requesting party by this permission grant methodology.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • Priority is claimed as a continuation application to U.S. patent application Ser. No. 11/336,071, filed Jan. 20, 2006 and entitled “Method And Apparatus For Providing Information in Response To The Grant Of A Subscriber's Permission” (now U.S. Pat. No. 8,718,605), which claims priority under 35 U.S.C. §119 to U.S. Provisional Patent Application No. 60/645,687, filed Jan. 21, 2005, entitled “Methods and Apparatuses for Providing User Authorized Contact Information for a Cellphone Subscriber,” and U.S. Provisional Patent Application Ser. No. 60/723,702, filed Oct. 5, 2005, entitled “Methods and Apparatuses for Providing Directory Information Following the Receipt of Delayed Granting of Subscriber Permission.” The disclosures of the aforementioned priority applications are incorporated herein by reference in their entirety.
  • FIELD OF THE INVENTION
  • The present invention relates generally to wireless networks and more particularly to the offering of directory assistance for mobile subscribers post receiving the mobile subscriber's permission to release the information. The invention allows the called party to grant or deny permission to release the relevant information to the requesting party as well as providing the relevant information to the requesting party in the event the subscriber's permission is delayed.
  • BACKGROUND OF THE INVENTION
  • Currently a large percentage of the population own and use a cellular phone, mobile telephone, voice over wireless IP, or other wirelessly connected communications device (hereafter referred to as a mobile subscriber) as their primary method of communication. While the mobile connection is extremely useful for instant communications and accessibility, many mobile subscribers do not wish to publish their number in a directory or allow an information services provider, such as, the directory assistance operator, to have ready access to or disseminate their contact information. The mobile subscriber may desire to limit this access due to numerous reasons; e.g., privacy, limit access from telemarketers, recent changes in their life status, or a plethora of other reasons.
  • Currently directory assistance operators use a telephone number database to provide the information services and usually the service is billed to the calling or requesting party's telephone bill. Typically the directory assistance databases are hours, days, weeks or even months old. The directory assistance usually does not provide any information indicating who is allowed to access the directory listing or any restrictions as to the use and dissemination of the subscriber's directory information. Since the directory assistance system is typically an “all or nothing” proposition, this opens up the possibility for abuse of this database or for use of the directory assistance information in a manner that may be adverse to the mobile subscriber's best interest at the time a directory request is made.
  • There are two major reasons the mobile subscriber user may wish to restrict certain parties' access to their contact information in real-time. The first being the ready access the mobile phone service provides to the user. Since most users usually carry their mobile phone with them, they can be easily contacted at any time and place using their mobile phone. Today the user can limit this access to callers who they have given their mobile phone number or to others who are trusted by the user at the current time. Since, in this modern world, relationships change at a rapid pace or they tend to be more situational, many mobile subscribers wish to have real-time control over a caller's access to their contact information and provide it to a requesting party on a case-by-case basis. The second reason the user may wish to restrict this information is that often the user is required to pay for all calls made to or from their mobile phone. The user may not wish to pay to talk with certain types of callers or the mobile subscriber may desire to screen who has access to their contact information.
  • Typically the method used in landline communications networks to restrict access to directory assistance information has been to allow the user to have an unlisted number. This allows for an opt-out method for the users to restrict their contact information. Another method that has been suggested far disseminating mobile subscriber's contact information is a method where the mobile subscriber can opt-in to a directory or add their number to the directory assistance listing. The problem with both of these methods is that they treat all callers who are requesting directory information with the same level of importance. For instance a mobile subscriber may wish to opt-out (or not opt-in) to a directory in order to limit access by telemarketers; however, the mobile subscriber would like their babysitter to be able get their number from directly assistance in the event of an emergency. There have been numerous efforts to get an opt-in or opt-out mobile phone directory into the market, but these efforts have met with little success in the United States.
  • What is required is a method and apparatus that allows a mobile subscriber to control the access to their contact information in real-time or near real-time. This method and apparatus should be able to distinguish between different calling parties and should be able to restrict, limit, or allow access to the contact information, location, address, or other personal information associated with the mobile subscriber on an instance-by-instance basis. What is also needed is a method and apparatus that allows a mobile subscriber to provide a delayed or non-real-time grant of permission to release their information and to have that information routed to the person or device requesting the information.
  • SUMMARY OF THE INVENTION
  • The present invention solves the needs of the prior art by providing an inventive solution for offering information services. For one aspect of the invention, a query is received, typically by an MDMS server, based on a request from a requesting party for information about a mobile subscriber of a mobile telephone network. The requested information typically comprises directory assistance information for the mobile subscriber. Directory assistance information can comprise location information, identity, telephone number, address, or other information specific to the mobile subscriber.
  • In response to the query, a permission release request is issued to a mobile communication device associated with the mobile subscriber. This permission release request seeks permission for release of the requested information on behalf of the requesting party. The requested information is distributed to the requesting party in response to receipt of a permission release response output by the mobile communication device. The permission release response, typically initiated by an action taken by the mobile subscriber or by automated logic of the communication device, provides permission for communication of the requested information to the requesting party.
  • For example, the permission release response can be output by the mobile communication device in response to an automated decision made by logic of the mobile communication device. In the alternative, the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber, based on interactions with a user interface of the mobile communication device. More specifically, the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber as a result of a presentation by a user interface of the mobile communication device, the presentation providing an identity of the requesting party.
  • The status of the mobile communication device associated with the mobile subscriber can be obtained by requesting status information from a customer data base maintained by the mobile telephone network. The acquisition of this status information, in advance of issuing the permission release request, can facilitate communications with the mobile communication device. For example, an appropriate manner for communicating with the mobile communication device can be identified with access to the status information for that mobile communication device.
  • The requested information can distributed to the requesting party in the form one or more of the following: a text message transmitted to the a mobile communication device of the requesting party; an integrated voice response device (IVR) speaking the requested information to the requesting party, an operator calling the requesting party with the requested information; a web page presenting the requested information; a video message transmitted to the mobile communication device of the requesting party; a multimedia message transmitted to the mobile communication device of the requesting party; and an electronic mail message presenting the requested information.
  • For another aspect of the invention, an inventive solution is provided for information services in connection with a request made by a requesting party about a mobile subscriber who subscribes to telephony services supported by a mobile telephone network. A request is received from the requesting party for information about the mobile subscriber. In response to the request, a communication is initiated with a mobile subscriber, typically based on a communication to the subscriber's mobile communication device or handset, to seek permission for release of the requested information on behalf of the requesting party. The trigger event for this request for information is an action taken by the requesting party—an individual or entity other than the mobile subscriber—where the subject of the requested information is the mobile subscriber and/or the handset associated with that subscriber. A communication can be received from the mobile subscriber granting permission for release of the requested information to the requesting party. In response to the permission gram, the requested information can be communication to the requesting party.
  • For yet another aspect of the invention, a mobile subscriber can control the release of information about that subscriber based on interaction with the user interface of the subscriber's mobile communication device or handset. The mobile subscriber and the mobile communication device are typically associated with a “home” mobile communication network. The mobile communication device can receive a permission release request issued by an information system that is typically implemented as a component independent of the mobile telephone network. The information system can be implemented, for example, as a server, such as an MDMS server, or a part of a directory assistance platform.
  • The permission release request seeks permission for release of information about the mobile subscriber to a requesting party. The mobile subscriber can decide whether to release the requested information based on identifying information about the requesting party, such as the telephone number or name of the requesting party, as presented by a user interface of the mobile communication device. If the mobile subscriber elects to grant permission, the subscriber can interact with the user interface to support the issuance of a permission release response from the mobile communication device to the information system. In the alternative, the mobile communications device can include logic that automatically responds to the permission release request by issuing a permission release response via the mobile telephone network. This permission release response provides permission for communication of the requested information from the information system for use by the requesting party.
  • Another aspect of the invention supports the communication of information about a mobile subscriber associated with a mobile communications telephone and a mobile telephone network. A directory assistance system or platform can receive a query from a requesting party for information about the mobile subscriber. The directory assistance platform may determine that the requested information is not available at the platform (as a result, for example, of the mobile subscriber being a subscriber of wireless telephony services rather than conventional landline telephony services.). The directory assistance platform can issue a query to an information system, typically implemented as a server or component separate from the directory assistance system, for the requested information. The information system, described herein as an MDMS server, typically operates as equipment independent of the mobile telephone network. In response to the query issued by the directory assistance system, the information system can issue a permission release request from the information system to a mobile communication device associated with the mobile subscriber. This permission release request seeks permission for release of the requested information on behalf of the requesting party. The information system releases the requested information to the directory assistance system, for distribution to the requesting party, in response to receipt of a permission release response output by the mobile communication device. The permission release response provides permission for communication of at least a portion of the requested information to the requesting party.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A is an illustration of an information system constructed in accordance with an exemplary embodiment of the present invention.
  • FIG. 1B is an illustration of an information system that responds to receipt of a directory assistance query by issuing a request for permission to release information about a mobile subscriber, in accordance with an exemplary embodiment of the present invention.
  • FIG. 2 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system.
  • FIG. 3 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system.
  • FIG. 4 is an illustration of an exemplary example of an initial screen provided to a mobile subscriber requesting permission to release their directory information.
  • FIG. 5 is an illustration of an exemplary example of a time out screen provided to a mobile subscriber requesting permission to release their directory information.
  • FIG. 6 is an illustration of an exemplary example of a screen providing options for allowing a mobile subscriber to contact a requesting party directly with or without revealing their identity or contact information.
  • FIG. 7 is an illustration of a representative example of a flow of screens for presentation to a mobile subscriber in accordance with an exemplary embodiment of the present invention.
  • FIG. 8 is an illustration presenting a process for formatting a trigger message to indicate if the telephone number of a requesting party has been screened to ensure presentation of the requesting party s identity, in accordance with an exemplary embodiment of the present invention.
  • FIG. 9 is an illustration of representative logic for an application residing on the mobile subscriber's device for screening a message from a telephone number associated with a requesting party in accordance with an exemplary embodiment of the present invention.
  • FIG. 10 is an illustration of network components and messages useful for providing the identity blocking code for the current network serving mobile equipment, in accordance with an exemplary embodiment of the present invention.
  • FIG. 11 is an illustration of MDMS server logic flow useful for determining the appropriate method of blocking subscriber identifiable information when a mobile subscriber attempts to directly contact a requesting party, in accordance with an exemplary embodiment of the present invention.
  • FIG. 12 is an illustration of mobile equipment logic flow for using the calling line identification (CLID) block code if available, in accordance with an exemplary embodiment of the present invention.
  • FIG. 13 is an illustration of mobile equipment logic flow for providing an option to automatically add a requesting party's information to a mobile subscriber's personal phonebook, in accordance with an exemplary embodiment of the present invention.
  • FIG. 14 is an illustration of a system supporting direct communications between a mobile subscriber and a requesting party, in accordance with an exemplary embodiment of the present invention.
  • FIG. 15 is an illustration of a system having an MDMS server useful for determining an appropriate method for communicating an information request to a mobile subscriber, in accordance with an exemplary embodiment of the present invention.
  • Additional aspects, features and advantages of the invention will become apparent to those skilled in the art upon consideration of the following detailed description of illustrated embodiments exemplifying the best mode for carrying out the invention as presently perceived.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention answers the deficiencies in the prior art by allowing a mobile subscriber user to allow, restrict, or deny access to their personal information or to alternatively contact the requesting party directly. The invention uses the mobile network to provide a request for information release to a mobile subscriber. The invention also allows the release of the information to the party originally contacting the directory assistance service (requesting party) after the permission is granted by the mobile subscriber.
  • An exemplary Mobile Directory Messaging System (MDMS), otherwise described as an information system, allows for a call into a directory assistance facility to be screened to determine if the request was for a landline, mobile, or other type of number. The user query is handled as a normal query if the request is for a landline number; however, if it is determined the caller is attempting to ascertain the number for a mobile subscriber, the MDMS server would use the logic disclosed herein to respond to the request. For example, if the directory assistance platform determines that the requesting party is seeking a mobile number, the MDMS formats a short data message, typically a text message, for transmission to the mobile subscriber's communication device to request the mobile subscriber's permission to release the requested information to the requesting party. The request can contain information, such as, the requesting party's name, requesting party's phone number, type of request, location information, telephone number request, address request, or any other information specific to the mobile subscriber—hereafter referred to as directory information. The mobile subscriber can respond to the request issued by the MDMS server by granting, limiting, or denying the requesting party access to the requested information, namely the directory information. Based on messaging from the MDMS server, the directory assistance system (or operator) can provide the directory information to the requesting party if permission is granted by the mobile subscriber. Alternatively, if the MDMS server determines that permission is withheld by the mobile subscriber or if the mobile subscriber failed to respond to the request, the directory assistance system responds to the MDMS message by transmitting a message to the requesting party to indicate that the directory information is not available. If desirable by the network operator, the requesting party can be charged according to the availability of the directory information for release.
  • If however, the mobile subscriber has delayed a grant of permission to release their directory information, the requesting party's contact information can be gathered and stored. When and if the permission grant is eventually received from the mobile subscriber, an exemplary embodiment of the MDMS can be programmed to automatically send the mobile subscriber's directory information to the requesting party. This allows the requesting party to receive the requested information, typically directory information, even if the mobile subscriber's permission grant was delayed by an extended period. For example, the mobile subscriber's device may be turned off or the mobile subscriber declines to promptly respond to the message. The transmission of requested information to the requesting party can take the form of a short message, such as a text message, sent to the requesting party's mobile device, an integrated voice response device (IVR) speaking the directory information to the requesting party or a voice mail, a live operator calling with the directory information, a web page with the relevant directory information, a simple e-mail with the contact directory information, a multimedia message, a video message, or any other appropriate delivery mechanism (hereafter referred to as “Delivery”).
  • An exemplary MDMS can be programmed to store the mobile subscriber directory information in the event the requesting party can not be immediately contacted. This allows the requesting party to receive the directory information even if the mobile subscriber is not presently available to promptly respond to the directory information request. The directory information can be stored indefinitely until the MDMS server determines the mobile equipment is available or alternatively the directory information can be made available based on rules defined by the directory assistance provider, mobile operator, MDMS provider, or other interested party.
  • In order to facilitate the delayed delivery of the mobile subscriber directory information to the requesting party, an exemplary MDMS can be programmed to capture the identification of the calling number, query a database, and perform an analysis to determine what type of device the requesting party is using to contact the MDMS. The database queried can range from a listing of mobile numbers accessible by the MDMS server, analyzing the calling number to determine if it falls into a range of known mobile numbers, querying an external database such as the mobile number portability database, some combination of these methods, or similar methods to determine the type of device used by the requesting party. If the directory assistance system determines the requesting party is using a known mobile device the MDMS server can be programmed to offer delivery of the mobile subscriber's directory information in the event of a delayed permission gram. The MDMS can also be programmed to determine if the requesting party's network is a partner network and use this information in the analysis of how to provide Delivery of the directory information to the requesting party in the event of delayed permission.
  • If the permission grant is not received in real-time from the mobile subscriber, it may be desirable to change the look and feel of the display or information provided to the mobile subscriber. An example of how the messages may change over time is as follows:
      • The initial message to the mobile subscriber can consist of text similar to (also illustrated in FIG. 4):
  • From Cingular - John Smith at
    404-843-0431 is requesting your
    directory information. May we release it?
    Yes No
    If a predetermined period of time elapsed and the mobile subscriber did
    not respond to the initial message or the MDMS server sent a continua-
    tion message (e.g., the requesting party had terminated the call), the
    display would be changed. The second display message would be (also
    illustrated in FIG. 5):
    From Cingular - John Smith at
    404-843-0431 requested your
    directory information at 2:30 on
    Tuesday September 22nd 2005.
    You can call him back or alternatively
    we can provide him your directory
    information directly.
    I will call Please release my information
    If the mobile subscriber selected the “No” option on the first screen or
    the “I will call” option on the second screen, a display similar to the
    following could then be presented:
    You can call John Smith
    at 404-843-0431
    while blocking your calling
    identification. To do this you must
    dial *67 before the telephone
    number. Would you like to call now?
    Yes Yes and block my number No
  • This string of messages will be dynamic and programmed to change dependant on time and/or user feedback. The message type and extent of the message displayed could also be dependant on the type of mobile device that is being used by the mobile subscriber. For example if the mobile device has the capability to process applications, such as Java or Brew, then the displays could allow for many more choices and could provide more information dependant on elapsed time and/or mobile subscriber input. If however, the mobile device only provided short messaging the message could be formatted to best fit this type of delivery. Also, if the mobile device did not have any signaling capabilities the MDMS could be programmed to deliver the message via a voice channel utilizing an IVR, an operator, or some combination of these methods.
  • The different portions of the message can be variable and provided to the application on the mobile equipment in the trigger or subsequent message(s). For example, the name of the mobile network operator can be dynamic and defined by the trigger message. This would allow the mobile operator to change their name or corporate identity/image or to provide this type of service to a mobile virtual network operator (MVNO) without altering the basic software for the application on the mobile equipment. Other examples of fields on the user screens that may be desirable to make dynamic in nature are requesting party's name, requesting party's contact number, date of request, time of request, call block codes, textual information regarding current features available, options available to the mobile subscriber, or other similar fields. It should also be understood that this type information can alternatively be stored on the mobile device, default information can be stored on the mobile device, or the mobile device may be able to ascertain this information independently; e.g., date and time of the request from the clock on the mobile.
  • It is also possible for the mobile subscriber to set up the application on the mobile equipment to automatically respond any future messages of a similar type. The mobile subscriber can configure their mobile equipment to automatically accept or alternatively automatically reject all permission requests from the MDMS. Also it is possible for the mobile subscriber to configure their mobile equipment to always accept or reject a request from a certain requesting party or a certain class of requesting parties such as all international requests, all requests from unidentified parties, or all requests from parties not stored in the phonebook on the mobile equipment. If a request is automatically accepted or rejected the mobile equipment can be alternatively configured to provide the mobile subscriber with an alert message stating the request has been automatically handled or the mobile equipment can be configured to hide these alerts from the mobile subscriber. If the mobile equipment was configured to display the automatic handling information the mobile subscriber could then be provided with the option to connect with the requesting party directly as described in this disclosure.
  • In order to determine what type of messaging should be sent to the mobile device, an exemplary MDMS server can be programmed to determine the type of mobile device prior to sending any messaging to the mobile subscriber. This information can either be programmed into the MDMS server or the MDMS server can query a database for the relevant information prior to determining how to format and transmit the message to the mobile subscriber. This allows a MDMS to tailor the delivery of the information to match the features and functionality available on the mobile device.
  • It may also desirable to determine if the requesting party's information is available and if the requesting party is calling from a number that has been screened by a trusted partner. The information indicating that the call has been screened by a trusted party may be obtained from the call set up message received from the network when the requesting party calls the directory assistance service center. Since most of these calls will be received from users that are subscribers when they dial a predetermined code, such as 411, on the network offering the directory assistance service, the requesting party identity should be known to the directory assistance center serving that network and can be verified, and used to validate the identification of the requesting party or their equipment. However, if the requesting party's information is not available, not screened by a trusted party, the requesting party does not wish to offer their calling information (e.g., unlisted number, or has marked their number as private and not to be released when placing a call), the directory assistance service can provide the option to the requesting party to present or validate their personal contact information for use when requesting release of the mobile subscriber's directory information. The requesting party can release restrictions on use of their identity, validate their identity with the network or directory assistance provider, or continue to restrict the information. If the requesting party releases the information the MDMS server can forward this information on to the subscriber application and the application can present the information to the user with the calling name, phone number, and other data that may be used to identify the requesting party.
  • If however, the requesting party indicates their preference to restrict the dissemination of their contact information or maintain the privacy of their information, the directory assistance provider MDMS server, or other device in the network can choose to not allow the message to the mobile subscriber or to request the permission to release the contact information. Alternatively the MDMS server can alter the message to the MDMS application to indicate that the call is from an unscreened or unavailable number. The subscriber application could then be altered to indicate that the message was received from a non-screened number or from a requesting party that chose to keep their identity from the mobile subscriber. This can be done by altering all or part of the user screens, presenting new user screens, altering the sequence of the user screens, offering new user selections, altering existing user selections, any combination of these methods, or other methods that will be obvious to those skilled in the art when taking into account this disclosure.
  • It may also desirable to determine the current location, country, or network serving the mobile subscriber whose directory information is being requested and then determine the appropriate code or method to hide or block the calling information associated with the mobile equipment or mobile subscriber. In the United States the code to restrict the transmission of the calling line identity to the calling party is often “*67” dialed before the telephone number; however, it may be different in other countries or networks. This code or method can be transmitted to the application on the phone so it may be displayed to the mobile subscriber or alternatively used in the application on the mobile phone when placing an outbound communications attempt directly from the application on the mobile equipment. This will enable the mobile subscriber to initiate a communications path directly to the requesting party without divulging their identity or contact information. The code to block or hide the identity of the mobile equipment's or mobile subscriber's identity may change depending on the current serving network. It also might not be possible or necessary to block the identity of the mobile equipment or mobile subscriber. If this were the case the subscriber application could be programmed not to offer this option or alternatively to alert the mobile subscriber to this restriction or modification in the operation of the application.
  • One potential problem in providing the application on the phone with the code to block, the identity of the mobile equipment or mobile subscriber is that the mobile equipment may change networks, locations, or countries before the mobile subscriber views the message or attempts to communicate directly with the requesting party. It is possible for the mobile equipment to move into another network where the identity block or code originally provided to the application does not work as expected, may not be valid, or may cause an error in providing the service. In this instance it is desirable for the subscriber application to monitor the network serving the mobile equipment when it receives the identity block code and to determine if the mobile equipment has entered a subsequent network where the current code or method may not be valid. If this occurs the subscriber application can be programmed in such a manner as to not offer the option of blocking the identity, inform the mobile subscriber that blocking the identify is not an option, remove the menu choice that allows the mobile subscriber to directly contact the requesting party, or other similar methods that will become obvious to those skilled in the art when taking into account this disclosure.
  • Once the application on the mobile equipment had the information as to the contact number and possibly the name of the requesting party, it would be helpful if the application on the mobile equipment would allow the mobile subscriber the option to automatically edit and store this information into their existing personal phonebook, mobile equipment phonebook, or subscriber identity module phonebook. The preferred method to accomplish this would be for the application on the mobile equipment to be programmed to offer this option to the subscriber if a message contained at least the contact number of the requesting party. The application on the mobile equipment should provide the mobile subscriber with the opportunity to edit the information prior to storing it into the phonebook to allow the mobile subscriber to add any missing information, change the format of the phonebook name to better fit their current phonebook format, to change the name of the requesting party to be more recognizable, or to allow the entry to be saved with a name that is easier for the mobile subscriber to find at a later date (e.g., allow the entry to be saved under nicknames or as a relationship to the mobile subscriber).
  • If the mobile number is unscreened by the network the application on the mobile equipment can be programmed to not allow the mobile subscriber to automatically contact the requesting party directly; however, it may still be desirable to allow the mobile subscriber to automatically store the requesting party's contact information into their personal phonebook. This would allow the mobile subscriber to contact the requesting party outside of the MDMS application on the mobile phone.
  • It is also possible for the number used by the application on the mobile equipment to contact the requesting to be different from the direct contact number of the requesting party. An example of this is if the directory assistance provider desires to allow the mobile subscriber the option to automatically connect to requesting party via a voice channel while the requesting party is holding on the directory information system and waiting for the requested information. If this were the case, it may be desirable to route the communications from the mobile subscriber through a communications system connected to the directory assistance platform where the requesting party is currently holding. This would allow the mobile subscriber to automatically contact the requesting party while they were holding for the directory information. This functionality could also be provisioned to automatically block the mobile subscriber's phone number or other identifiable information.
  • If it were desirable to allow the voice connection while the requesting party was holding the message to the mobile application would need to include the direct contact number for the requesting party so this number could be stored in the phonebook. The message to the mobile application would also need to include a second routing number that could be used to contact a meet me type platform where the requesting party was holding. The meet me conferencing system will allow the two inbound communications paths to be joined. This would allow the mobile equipment to originate a call back to the conference port where the requesting party's call was currently parked or monitoring. When the call from the mobile equipment arrived the meet me conferencing system would then recognize the incoming communications and would bridge the requesting party's and mobile subscriber's voice communications paths together. This would allow these parties to communicate without divulging any of the mobile subscriber's directory information to the requesting party. A third option of making this connection. The direct connect functionality should be provisioned on the user screens when attempting to gain permission for the release of the requested directory information from the mobile subscriber in real time; however, it may not be desirable to allow this functionality when requesting a delayed grant of permission.
  • Yet another exemplary method of providing the direct voice connection is to allow a message from the mobile subscriber to the MDMS server indicating that a voice communications path was approved. This would trigger an outbound call from the directory information system serving the requesting party to the mobile subscriber. The major problem with this method is that the requesting party may then see the mobile subscriber's directory information when they received their bill for this call. In order to hide the mobile subscriber's directory information the directory information system serving the requesting party would be instructed to suppress the mobile subscriber's directory information. One method of performing this would be for the directory information system placing the call to the mobile subscriber to prefix a dialing code to the mobile subscriber's contact number. This prefix would cause the call to be routed over special trunks that caused the called number contact information to be suppressed.
  • Turning now to the drawing set, FIG. 1A is an illustration of an exemplary system having a network and communications path between a requesting party 110 through the directory assistance platform 130 and out to the mobile subscriber 170 with a return path to the requesting party 110. The session initiates with a call 120 from the requesting party 110 to the directory assistance platform 130. Once the call 120 arrived the directory assistance platform 130 would screen the call 120 to determine if it was destined for a mobile subscriber or mobile equipment. If it was determined the call was destined for a mobile subscriber or mobile equipment, the platform would send a message 140 to the MDMS server 150 requesting permission to release the mobile directory information. A request message 160 would then be sent to the mobile subscriber 170 in the mobile network 180. In the case illustrated in FIG. 1A if the mobile subscriber does not immediately respond to the permission request message, it would cause a time out in the MDMS server 150 and would trigger a time out message 190 to the directory assistance platform 130. The directory assistance platform 130 would then determine if the original calling party 110 requesting the directory information was using a device that could receive a text message or other multimedia protocol. The preferred method to determine how to provide the directory information to the calling party 110 is to look up the device in a database 111 of known devices and then determine the method for providing the directory information to the calling party 110. It is even possible to perform a look up to determine the type of device and the extent of the service provisioned on the device (not shown). This functionality could be performed on the initial look up or on a subsequent look up in a second database (not shown). The equipment look, up 119 into database 111 would trigger an equipment type response 112 that would provide an indication if the calling party 110 was appropriately equipped to receive a delayed transmission of the requested directory information. This same functionality can also be achieved by determining the directory system that sent the request, facility on which the request is received, address of the directory assistance request, or other similar means that will be known to those skilled in the art. If the directory assistance system 130 determined that device 110 was served by a network that was capable of receiving a messaging protocol 100 and the device 110 was so equipped, the directory assistance platform 130 would then offer the option of providing a delayed message containing the directory information for device 170 and the directory information for the device 110 would be associated with the outstanding message to the device 170.
  • If the mobile subscriber 170 responded to the query to release the directory information 114 or the mobile equipment was programmed to automatically respond to the message, the MDMS server 150 would receive the message 114 and would then determine the mobile subscriber directory information and transmit a permission grant message 113 to the directory assistance platform 130. The message 113 typically contains the mobile subscriber directory information maintained by the MDMS server 150 for the mobile subscriber 170. The receipt by the directory assistance platform 130 of the message 113 would trigger the transmission of a message 115 with the directory information to the requesting party 110. While the exemplary method can send this message as a text message sent via short message service, the message can be implemented by multimedia, voice, video, or other similar form of conveying the information to the requesting party 110.
  • One skilled in the art, using this disclosure, can see how the delayed permission to release mobile subscriber's directory information method described above can be modified to combine functionality into one platform or further split out among multiple different components and databases. One skilled in the art, using this disclosure, can also see how it is possible to provide the same functionality by placing the messaging means to contact the requesting party 110 directly into the mobile subscriber's device 170. This would allow the mobile subscriber 170 to message the requesting party 110 at their leisure and perhaps even include additional user defined information (not shown).
  • FIG. 1B is a detailed illustration of a representative operating environment for an information system operative to receive a directory assistance query from one of a number of directory assistance providers. Once the directory assistance provider 1600 determined the request for information required permission from the mobile subscriber 1607, it would send a query message 1620 to the MDMS server 1630. This query 1620 would cause the MDMS server 1630 to send out a message to the customer database (shown as a home location register—HLR 1605) of the mobile network 1601. This query is designed to provide a routing number for the mobile equipment 1625, the current status of the mobile account, as well as to determine certain features and functionality of the mobile equipment 1625. At approximately the same time, the query would trigger an equipment lookup 1680 to be sent to an equipment functionality database (shown as the CARD platform; however, this platform is typically not defined by the standards in the industry and may be incorporated into other network elements or called by another name) 1690 in the home mobile network 1601. This step may not be required in some networks that have a more homogeneous distribution of mobile phones with the enhanced functionality needed to display text and menus. Example of these types of network and functionality are GSM with JAVA deployed on a majority of the SIM cards and CDMA networks with BREW functionality deployed on the handsets. The equipment lookup 1680 is designed to provide the functionality of the mobile equipment 1625 so that the MDMS server 1630 can make a determination of the most appropriate method of formatting a message to the specific mobile equipment. 1625. Once the MDMS server 1630 knows the location of the mobile equipment 1625 and the most appropriate method to send a data message 1670 to the mobile equipment 1625, it can format the message 1670 and send it to the mobile equipment 1625. In this exemplary illustration the message 1670 is shown as a short message on a GSM network 1601; however, one skilled in the art, using this disclosure, can easily determine how this message 1670 may be transported on a multitude of different data or voice communications paths to the mobile equipment 1625 or can be transported across almost any type of wireless network, in this exemplary illustration the message 1670 is transported through a mobile switching system (show as the MSC) 1625. Once the mobile equipment 1625 receives the permission message 1670 and the mobile subscriber 1607 or mobile equipment 1625 indicated their preference (note—the mobile equipment 1625 may be optionally set to automatically respond to the permission message with a preconfigured response), the mobile equipment 1625 would then send a message 1660 back to the MDMS server 1630 indicating their granting/withholding of the mobile subscriber's permission. The MDMS server 1630 would then format and transmit the appropriate permission message 1650 to the directory assistance provider 1600 originally generating the query 1620. If however, the originally requesting party hangs up before the permission message 1650 is received, the directory assistance provider 1600 would send an abandon message 1640 indicating that the originally requesting party has abandoned their initial request. The MDMS 1630 would than handle the session as appropriate. If the original query message 1620 indicated that the requesting party had delayed permission grant the MDMS server 1430 would forward the delayed permission grant to the directory assistance provider 1600 when and if it was received from the mobile equipment 1625.
  • FIGS. 2 and 3 are flow charts illustrating an exemplary method useful for determining how to handle the query requesting the directory information from the mobile subscriber and illustrating the an exemplary method of delayed granting of permission to release the mobile subscriber's directory information Turning now to FIGS. 1A, 1B, 2 and 3, the exemplary process begins when the requesting party 1606 issues an incoming request for information, typically a directory information request, in step 280. In response to the incoming request, a directory assistance platform 1600 conducts an inquiry in step 290 to determine whether the incoming request is destined for a mobile user, such as the mobile subscriber 1607. If the response to this query is negative, the directory assistance platform 1600 treats the incoming request as a normal directory assistance request in step 250. If the incoming request is destined for a mobile user, however, the MIMS server 1630 conducts an inquiry in step 233 to determine if the cell number for the mobile user is known. If the mobile address is known the MDMS server 1630 then send a customer database request 1610 in step 214 to the mobile network's 1601 customer database 1605 (FIG. 1B represents this database as an home location register or HLR). If the mobile equipment 1625 number is not known, then the directory assistance platform 1600 plays an announcement in step 260 to indicate that the mobile number for the mobile user 170 is not available. In addition, the directory assistance platform 1600 determines, in step 230, if an alternate number is known. If so, the directory assistance platform 1600 conducts an inquiry in step 220 to determine whether the requesting party 1606 wants the alternate number. If the requesting party 1606 wants the alternate number, the directory assistance platform 1600 processes the call as a normal directory assistance call in step 250. If the requesting party 1606 does not want the alternate number, the directory assistance platform 1600 terminates the call in step 210. If the call is terminated, the directory assistance system operator can choose not to provide answer supervision back to the telephone network so the calling party does not pay for the failed directory assistance attempt.
  • Picking up the exemplary sequence just after the customer data base query, step 214, the MDMS server 1630 then would receive a response to the message 1610 from the customer database 1650 indicating what is known about the mobile subscriber 1607 and the mobile equipment 1625. If the location of the mobile equipment 1625 was not known or it was not currently attached to a network, the directory assistance system 1600 would then play announcement in step 260 indicating that the mobile subscriber 1607 is not available, determine if the alternate number is known, step 230, and if the requesting party 1606 desires to obtain the alternate number, step 220. If the requesting party 1606 wants the alternate number the call is handled as a normal directory assistance call, step 250. If the requesting party 1606 does not want the alternate number the call is terminated in step 210. If the call is terminated the director assistance system operator can optionally choose not to provide answer supervision back to the telephone network so the requesting party 1606 does not pay for the failed directory assistance attempt.
  • Picking up the sequence just after the mobile system customer database query return 1610, step 213, the MDMS server 1630 would then execute logic for determining and handling a call from a screened or unscreened caller (logic flow begins at point B and returns at point C, the exemplary logic sequence is illustrated in FIG. 8 and discussed later in this disclosure) then would send out a data message to the last known location of the mobile equipment 1625 as shown in step 217. The MDMS server 1630 would then start a timer in step 218 to ensure the message return from the mobile equipment 1625 was within the acceptable wait time for the requesting party 1606. The MDMS server 1630 would then go into a loop of checking to see if the timer has expired, step 215, and checking to see if a permission message was received, step 219, from the mobile equipment 1625. If the timer expires before the message is received, the MDMS server 1630 would then determine if the requesting party 1606 was calling from a device that was capable of receiving a delayed message, step 225. If the requesting party was calling from a device 1606 that could receive a delayed response, the directory assistance system 1600 would then play an announcement, step 224, and query the requesting party 1606 if they desire to receive a delayed message (point A refers to a continuation of the logic sequence in FIG. 3) provided the mobile subscriber 1607 provides permission releasing the directory information, step 310. If the requesting party did not desire delayed notification the communications session 1607 would be terminated; however, if the requesting party 1606 chose to be notified in the event of a delayed permission grant, the directory assistance system 1600 would collect and store the requesting party's 1606 contact information, shown in step 320, and begin monitoring to determine if the permission had been received from the mobile subscriber 1607, step 350. The MDMS server 1630 would also start a second timer, step 340, to determine if the MDMS server 130, should abandon the attempt to contact the mobile subscriber, step 370, and end the process, step 380. If however, the delayed permission 1660 is received from the mobile subscriber 1607, the MDMS server 1630 would send a message 1650 to the directory assistance system 1600 and the directory assistance system 1600 would then send a message to the requesting party 1606 with the directory information, step 360, and end the process, step 380.
  • Looking now to step 219, if the message 1660 from the mobile subscriber 1607 was received before the timer expired, the MDMS server 1630 would then determine if the mobile user 1625 had granted their permission, step 222. If the user denies permission, the MDMS server 1630 and directory assistance system 1600 handles the request 1607 as described above starting at step 230. If the mobile user granted their permission, then the directory assistance system 1600 would give answer supervision, step 229, to ensure the requesting party 1606 was billed and then provide the mobile number to the requesting party 1606. The session would then be terminated, step 223.
  • FIG. 4 is an illustration of an exemplary screen that can be provided by the application on the mobile equipment 1625 to the mobile subscriber requesting the release of the directory information. The screen in FIG. 4 is broken up into several sections. Section 410 consists of a statement and or a question from the mobile subscriber's network operator 1601 asking for the real-time permission to release the directory information to the requesting party 1606. This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that the mobile subscriber 1607 will not be billed for this call. Section 420 is the default selection and in this example is the permission grant to release the directory information to the requesting party 1606. Section 430 comprises other selections that can be chosen by the mobile subscriber 1607. In this example, these selections consist of a method to decline to release the directory information to the requesting party 1606 and a selection that provides more information.
  • FIG. 5 is an illustration of an exemplary screen that would be displayed in place of the screen shown in FIG. 4 in the event of encountering a time out as contemplated in 215. The screen in FIG. 5 is broken tip into several sections. Section 510 consists of a statement and or a question from the mobile subscriber's network operator 1601 asking for the delayed permission to release the directory information to the requesting party 1606. This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, time of the original request, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that the mobile subscriber 1607 will not be billed for this call. Section 520 is the default selection and in this example is an indication that the mobile subscriber 1607 can call the requesting party 1606 back directly. Section 530 comprises other selections that can be chosen by the mobile subscriber 1607. In this example, these selections consist of a method to grant the delayed release the directory information to the requesting party 1606, a selection that allows the mobile subscriber 1607 to ignore the message, and a selection that provides more information.
  • FIG. 6 is an illustration of an exemplary screen that would be displayed if the mobile subscriber 1607 chose the “I will call” default option 520 in FIG. 5. The screen in FIG. 6 is broken up into several sections. Section 610 consists of a statement explaining that the mobile subscriber 1607 can contact the requesting party 1606 without revealing their identity or telephone number. Section 610 can include information on how to manually contact the requesting party 1606 without disclosing the mobile subscriber's 1625 identity. Section 610 in this example also contains a question asking the mobile subscriber 1607 if they would like to call back the requesting party 1606. Section 620 is the default selection and in this example instructs the mobile device 1625 to call the requesting party 1606 while blocking any mobile subscriber 1607 identifiable directory information Section 630 is comprised of other selections that can be chosen by the mobile subscriber 1607. In this example these selections consist of a selection that instructs the mobile device 1625 to call back the requesting party 1606 without blocking mobile subscriber 1607 identifiable directory information and a selection that allows the mobile subscriber 1607 to ignore the message.
  • Turning now to FIG. 7. This Figure is an illustration of the exemplary flow of the screens displayed to the mobile subscriber 1607. Screen 710 is the initial screen. If the mobile subscriber 1607 selects the “yes” choice 720 the application will send a message to the MDMS server 1630 and the directory information will be released 730 to the requesting party 1606. If the mobile subscriber 1607 selects either the “No” 740 or “More information” 750 choice, then screen 711 will be presented explaining how to contact the requesting party 1606 while allowing the requesting party 1606 to see the mobile subscriber's 1625 directory information 713 or alternatively while blocking the mobile subscriber's 1625 directory information 712. Screen 711 also allows an option not to call back the requesting party 714.
  • If the mobile subscriber 1607 does not choose an option on screen 710 the screen will automatically timeout 760 and present as replacement screen 770. This screen will present options that will allow the mobile subscriber 1607 to call the requesting party 1606 directly 790 which, if selected, will present screen 711 with the options described above. The mobile subscriber 1607 can also choose to provide a delayed release of their directory information 716, ignore the message 715, or obtain more information 733. The option “Please release my information” would only be displayed if the MDMS server 1630 determined it had a valid route to send the directory information to the requesting party 1600 on a delayed basis. If the MDMS server 1630 determined that it did not have a valid route to contact the requesting party 1606 it would not display this option 780. If the mobile subscriber 1607 chooses “More information” 733 on screen 770, then screen 711 will be presented with the choices defined above. While these screens are being presented to the mobile subscriber 1607 the other buttons and selections on the mobile device 1625 will continue to operate as normal. For example, the mobile subscriber 1607 will be able to choose to go back a screen, end the session, or interrupt the session at any point.
  • Turning now to FIG. 8. This Figure represents a flow diagram for an exemplary subroutine that allows the directory system 1600 or other designated entity in the network to process messages from a screened and an unscreened requesting party 1606. The subroutine starts at point B and the first step is to determine if the communications attempt 1606 is from a screened address, step 810. A requesting party 1606 can be screened by several methods. The requesting party 1606 can be screened by originating a call from a device 1606 that is known by a trusted partner or network provider, by identifying themselves via the answer to queries or challenges from the network, or by other means known to those skilled in the art. If the requesting party's 1606 address is not from a screened address the directory system 1600 will set the screened number flag to unscreened in the message to be sent to the application on the user device, step 820. If the directory assistance system determines requesting party's 1606 address is from a screened number the directory assistance system 1600 will set the screened number flag to screened, step 830, and pass a query message 1620 to the MDMS server 1630. The MDMS server 1630 will then determine the serving mobile network 1601 for the mobile subscriber 1607 whose directory information is being requested, step 840. The MDMS server 1630 will then lookup the algorithm or dialing sequence needed to block the identity of the mobile subscriber 1607 originating the call from the particular network 1601, step 850. The MDMS server 1630 then includes this code into the trigger message to be transmitted to the mobile subscriber whose directory information is being requested, step 860.
  • Turning now to FIG. 9, this illustration presents an exemplary process that allows the application on the mobile subscriber's equipment 1625 to process details regarding a screened message. The application begins with the application on the mobile equipment 1625 determining if the trigger message indicates if the requesting party 1606 is originating their communications 1607 from a screened or unscreened device or location 910. If the trigger message 1670 indicates the call is not from a screened caller, the mobile equipment application 1625 can be configured to present the mobile subscriber 1607 with screens that only allows the mobile subscriber 1607 to call back while not revealing their identity, step 920. If the original request 1607 is from an unscreened party 1606, the mobile subscriber 1607 might not be allowed to release their directory information or to provide unique identifiable information if they chose to contact the requesting party 1606 directly. The application can also be configured to not reveal the calling number or name of an unscreened requesting party 1606. This will ensure that the mobile subscriber 1607 can readily identify an unscreened requesting party 1606 and will assist the mobile subscriber 1607 to only reveal as much information as desired to an unscreened party. If the original request 1607 is from a screened or trusted source, the application on the mobile subscriber's device 1625 can be configured to display the address of the requesting party 1606, display the name of the requesting party 1606, provide the option to contact the requesting party 1606 while displaying their identity, step 950, and place any other indicators in the message indicating that the requesting party 1606 identity was screened or trusted, step 960.
  • Turning now to FIG. 10, this illustration presents an exemplary network architecture having an MDMS platform 1070 that can determine the location of mobile equipment 1010 in either a home network 1020 or a visited network 1000 in order to determine a usable method of blocking the mobile equipment's 1010 or mobile subscriber's identity for a communications session. The mobile equipment first sends out a signal when arriving at a new network location 1030. This signal 1030 updates the location of the mobile equipment 1010 in the mobile subscriber database 1040. The MDMS platform 1070 then can query 1050 the mobile subscriber database 1040. The mobile subscriber database 1040 would then reply 1060 to the query with a number of parameters that may include the current location or network 1000 where the mobile equipment 1010 is located. Once this information is obtained from the mobile subscriber database 1040 in the home mobile network 1020, the MDMS platform 1070 launches a query 1080 to a database 1090 that maps the location of the mobile equipment 1010 with the code to block or hide the identity of the mobile equipment or mobile subscriber when communicating with another point on the network. The database 10.9 can be internal or external to the MDMS platform 1070 or may alternatively be a part of another network element. Once the response 1013 identity blocking or hiding code was determined, the MDMS platform 1070 could then either send a separate message 1011 to the mobile equipment containing this code or could include this code into the message 1011 sent to request permission to release the directory information to the requesting party.
  • Turning now to FIG. 11, this illustration presents an exemplary logic flow used by the MDMS server 1630 to determine the appropriate method for the application on the mobile device 1625 to use to block their identification from another network user when contacting them directly. The exemplary logic, implemented by a subroutine, starts by looking up the mobile subscriber 1607 whose directory information is being requested on the mobile subscriber database 1605 in the home network 1601 and determining if a serving network, location, or country code is available from this lookup, step 1110. If the network code is not available the subroutine will continue with sending a permission message 1670 without an identity block code, step 1130, or with a generic identity block code. Alternatively, the application on the mobile device 1625 may have a generic identity block code stored to be used if the trigger message 1670 does not contain a valid identity block code. If the country code, network code, location information, or other similar information is available in step 1110, then the MDMS server 1630 would look up the identification block code for the given network, step 1120. The MDMS server 1630 would then determine if the identification block code was available in the database, step 1140. If this code was not available, the subroutine will continue with sending the message without an identity block code, step 1130, or with a generic identity block code. If the identification block code was available the MDMS server 1630 would then include the appropriate network block code in a trigger message 1670, step 1150, to the application on the mobile equipment, subscriber identification module, or other similar device (all of these devices are represented by 1625) that would present the information to the mobile subscriber 1607.
  • Turning now to FIG. 12, this illustration presents an exemplary subroutine describing the mobile equipment 1625 logic flow for using the calling line identification (CLID) block code, if present, in the message from the MDMS server 1630. The first step in this subroutine is to determine if the trigger message 1670 contains a code to block or hide the identification of the mobile equipment 1625 or the mobile subscriber 1607 when communicating directly with another network user, step 1210. If the trigger message 1670 does not contain the identification block code, the application on the mobile equipment 1625 can withhold or limit the option to allow the mobile subscriber 1607 to contact the requesting party 1606 directly, step 1230. If the trigger message 1670 contains the identification block code, the application on the mobile equipment 1625 can display the appropriate text and options to allow the mobile subscriber 1607 to contact the requesting party 1606 directly, step 1220.
  • Turning now to FIG. 13, this illustration presents an exemplary subroutine describing the mobile equipment logic flow for automatically storing the requesting party's 1606 information into the mobile subscriber's 1607 phonebook. The subroutine starts with determining if the number of the requesting party 1606 is available, step 1310. If the number of the requesting party 1606 is not available then the application on the mobile equipment 1625 would not provide the option to store the information in the phone book, step 1340. If the number of the requesting party 1606 is available the logic would then determine if the name of the requesting party 1606 is available, step 1320. If the name of the requesting party 1606 is available, the logic of the mobile equipment 1625 application can then allow the mobile subscriber 1607 to edit the information, step 1360, before saving the information into the phonebook. This would allow a mobile subscriber 1607 to save the information in a preferred form and format and it would allow the mobile subscriber 1607 to use a similar format as their other phonebook entries. If the requesting party's 1606 name was not available or was incorrect, the logic of the application on the mobile equipment 1625 would then prompt the mobile subscriber 1607 to enter the name of the requesting party 1606, step 1330. This will allow the mobile subscriber 1607 to enter an appropriate name for the requesting party 1606 as the phonebook entry. Although step 1330 is shown in this example as a separate step, one skilled in the art can see how this step can easily be made a part of the edit step 1350. Once the mobile subscriber has been given the opportunity to edit the information, step 1350, the mobile equipment 1625 application would then allow the entry to be saved into the existing mobile subscriber 1607 phonebook, step 1360.
  • The subroutine depicted in FIG. 13 can be placed at any point in the application or can be made a menu choice for the mobile subscriber 1607 to select; however, it would be more effective to execute this logic after the mobile subscriber 1607 has released their directory information 1660 and 1650, called the requesting party directly 1480, 1490, or 1413, or chosen to ignore the permission request. By placing this logic after the attempt to call the requesting party 1606 directly the mobile subscriber 1607 may have collected more information on the requesting party 1606 (e.g., actual name instead of network calling name identification) and may have assigned a different priority to the requesting party 1606.
  • FIG. 14 is a system diagram of an exemplary network, communications paths, and various options to provide a direct voice connection(s) 1490, 1413, 1480 between the requesting party 1410 and the mobile subscriber 1470 while still allowing the mobile subscriber 1470 to restrict the dissemination of their directory information and to allow the mobile subscriber 1470 to control the origination of the communication path 1490, 1413, 1480. The session starts as a normal directory call 1420 to the directory assistance platform 1430. When the directory assistance system 1430 determines that the call requires approval for release of the directory information it sends a request 1440 to the MDMS server 1450. This triggers a request for release of permission 1460 to the mobile equipment 1470. One of the options that could be displayed on the mobile equipment 1470 to the mobile subscriber would be to establish a voice path directly to the requesting party 1410. There are three different methods illustrated in FIG. 14 to achieve this goal. The first method is to allow the mobile equipment 1470 to place a call 1480 directly to the requesting party's 1410 contact number. In order to not disclose the identity of the mobile subscriber or the mobile equipment 1470 the application would prefix, to the dialing string, the outbound call with a code to block the identity of the mobile equipment 1470. The second method would be for the MDMS server 1450 to transmit a meet me conference number 1411 to the application on the mobile equipment 1470. The mobile equipment 1470 could then be programmed to place an outbound call 1413 to the meet me conference number 1411 and the directory assistance system 1430 serving the requesting party's 1410 call 1420 could either automatically forward the call 1420 to the same meet me conference port 1411 through voice channel 1405 or could alternatively the directory assistance system 1430 could monitor the meet me conference port 1411 to determine if an inbound call 1413 has been received and then forward the communications path 1420 through channel 1405. The third method would be to allow the directory assistance system 1430, upon receiving a permission message (not shown) from the MDMS server 1450, to originate a call 1490 directly to the mobile equipment 1470. The directory assistance system 1430, or other network component, could optionally be programmed to not allow the display of the mobile subscriber's 1470 directory information when this call 1490 was placed. This could be done by appending a special code to the dialing string, routing the call over a special trunk group, replacing the billing information with another string, deleting the billing information, or other similar method known to those skilled in the art.
  • FIG. 15 is a system diagram of exemplary network and communications paths to determine the appropriate method of communicating the request to the mobile equipment 1510. The logic flow begins when the requesting party 1500 originates a communications path 1511 to the directory assistance platform 1520. One skilled in the art can determine, based on the teachings of this disclosure, how the request 1511 can be a voice communications path, digital data message over a data network, wireless data message or any other similar communications means. When the directory assistance system 1520 receives the request 1511 it determines if the request is for a mobile subscriber's 1510 directory information that requires a permission release prior to releasing the directory information to the requesting party 1500. If the request 1511 requires the mobile subscriber's permission, the directory assistance system 1520 sends a directory information request 1530 to the MDMS server 1540. In order for the MDMS server 1540 to determine the best method of communicating 1590 with the mobile equipment 1510 the permission release request with the mobile equipment 1510, the MDMS server 1540 must first look up the mobile equipment 1510 and determine its capabilities on an a mobile equipment functionality database 1570. The MDMS server 1540 transmits a message 1560 to the mobile equipment functionality database 1570 and receives a response 1550 as to the features of the mobile equipment 1590. The MDMS server 1540 then formats the message 1590 in an appropriate manner to be displayed on the mobile equipment 1510. This MDMS server 1540 can optionally have a default method to transmit the message 1590 in the event the database 1570 is unavailable or does not have data on the particular mobile equipment 1510.
  • One skilled in the art, when considering this disclosure, can determine how the functionality illustrated in the figures and described in the disclosure can be readily performed by the other platform or elements in the described network, be incorporated into existing platforms in the network, be incorporated into new platforms, or other similar implementations without impacting the overall intent or functionality of the invention disclosed. In view of the foregoing, it can be seen that the present invention allows a mobile subscriber to designate if a requesting party can access their directory information. The granting of this request can be delayed while still providing a mechanism to transmit the information to the requesting party. A display of information can be presented to the mobile subscriber in a dynamic manner. This disclosed invention can determine and handle communications sessions from trusted sources, automatically store the requesting party's information in an electronic phonebook, and allow a voice communications path between the requesting party and the mobile subscriber.
  • For one aspect, the present invention provides an MDMS system capable of offering information services to a requesting party within the operating environment of a wireless telephony network. This MDMS system is capable of validating a release of information about a party of interest, typically a mobile subscriber, in advance of any release of such information to a requesting party, such as a wirelessly connected subscriber. The MDMS system can support the communication of requested information between the requesting party and the party of interest via the wireless telephony network. For example, messaging can be transmitted over a text-based data or voice network to validate the information release. The status of the party of interest can be obtained by querying a customer data base prior to sending a message to that mobile subscriber. Indeed, the MDMS system can determine the best manner for sending a message to the party of interest based on information received from a customer data base query. A determination to apply answer supervision to a communication session can be based on the grant or denial of permission for the information release. Announcements can presented to the requesting party based on the status of messaging for the interested party. In the alternative, announcements can be presented as a result of information gained from the customer data base query. Information released to the requesting parry can contain at least a portion of the information collected from the customer data base query.
  • For an alternative aspect, the present invention is capable of receiving an index number indicating a request to release contact information for a network subscriber. Permission for the information release is obtained from a network subscriber prior to releasing that information to a requesting party. Upon receiving the permission, the index number is mapped to a communications address, such as a telephone number. The communications address is then transmitted to the requesting party. Although the index number can be formatted to resemble a telephone number, the index number is not valid for reaching the network subscriber on the switched telephone network. The network subscriber can select the option of directly originating a voice conversation with the requesting party to communication the contact information. This conversation can be routed through a “meet me” conference port or number. In the alternative, the conversation can be originated by the network subscriber's mobile equipment or from a system serving the requesting party. Significantly, the identity of the network subscriber can be blocked from the requesting party in connection with the origination of this conversation. Dependent on the implementation for the conversation, the identity of the network subscriber does not necessarily appear on the requesting party's invoice in connection with that conversation.
  • For another aspect of the present invention, a query for information can be communicated via a wireless telephony network. A message can be transmitted to a mobile device associated with a particular mobile subscriber to gain permission to release information. The release of the information is controlled, based at least in part on the response received from the mobile device. The information is typically communicated to the original party requesting the information after the initial communications path used to make the request is terminated. The message requesting permission to release certain information typically includes user selectable options for automatically responding to the message. One option is to respond directly to the party making the initial query via a voice communications path while blocking subscriber contact information. Another option is to respond directly to the party making the initial query via a voice communications path while providing subscriber contact information. This initial message requesting permission can be replaced by a substitute message after the expiration of a time period. The substitute message contains at least one option to contact the party making the initial query directly via a voice communications channel. In the alternative, the substitute message contains at least one option that offers to automatically contact the party making the initial query via a voice communications path without providing the requested contact information. Or the substitute message can contain information that instructs the wireless subscriber on how to manually contact the party making the initial query without providing the wireless subscriber's contact information. The information is sent to the party making the initial query via a text message or is presented to that party via a voice communications path.
  • For yet another aspect of the invention, a computer-implemented process can support a determination of whether a directory assistance query requesting information must be preauthorized by a network subscriber prior to any release of such information. A determination is made about the type of device used by the party that is requesting the information. For example, the device of the requesting party may not be permanently connected to the network via a wired communications path. The information can be communicated to the requesting party information via a text message or a voice message. The text messaging can be delivered after the original communications path used to make the directory assistance query has been disengaged.
  • Another aspect of the invention provides an MDMS system capable of offering information services to a requesting party. This MDMS system has the capability of supporting a request for permission from an owner of the information prior to releasing the information. The MDMS system supports the delayed granting of permission for the information release. The information can be sent to the requesting party via a text message or via a voice communications path. Messaging can be designed to offer multiple owner selectable options in response to the information release request. One option is to call the requesting party directly without providing subscriber contact information during the call set up. Another option is to call the requesting party directly while providing subscriber contact information during the call set up. The initial message sent to the information owner to seek permission for release of the request information can replaced by a second “replacement” message after a specified time period. A second set of options can be made available in this second message. For example, the second message can contain at least one option to contact the requesting party directly via a voice communications channel. Or, the second message can contain at least one option that offers to automatically contact the requesting party via a voice communications path without providing the requested contact information. In the alternative, the second message can contain information that instructs the wireless subscriber how to manually contact the requesting party without providing the wireless subscriber's contact information.
  • For yet another aspect of the invention, a process if provided for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. A determination is made whether the requesting party is a “trusted” source. The request for release of information is communicated to the network subscriber at least in part via a messaging means. For example, the requesting party can be queried to release a restriction on their contact information. The textual information presented to the network subscriber can be altered if the requesting party is a trusted source. The textual information can include at least one menu choice. The determination that the requesting party is a trusted source can be made at least in part from network signaling information. In the alternative, the determination that the requesting party is a trusted source can be made at least in part from querying the requesting party directly. The requesting party can elect to respond to the query by deciding not to share their contact information.
  • For yet a further aspect, the invention can provide a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. A determination is made whether the requesting party is a trusted source. At least two alternative options are communicated to the network subscriber to respond to the request for release of information. If applicable, at least one of the options presented to the network subscriber is presented as a result of the requesting party's status as a trusted source. The network subscriber can respond to the query by directly responding to the requesting party. For example, the network subscriber can respond to the query by releasing at least a portion of the subscriber's information. In the alternative, the network subscriber can respond to the query by electing to not allow a release of requested information. The requesting party can indicate that their communications address should not be shared with other network users. In the alternative, the requesting party can release their communications address to the network subscriber.
  • An alternative aspect of the invention provides a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. The current location of the network subscriber is identified. At least one method of blocking the identity of the network subscriber is identified when an outbound communications attempt is placed from the current location. The method to block the identity of the network subscriber is transmitted to the network subscriber. The transmission of the identity block is included with a request for permission to release the directory information. The subscriber screens can be changed in response to the mobile equipment changing networks after receiving the network block code. In the alternative, the subscriber screens can be changed in response to the mobile equipment changing locations after receiving the network block code. The location of the network subscriber contains a code corresponding to the country of the network currently serving the network subscriber. The method of blocking the identity of the network subscriber can be determined at least in part by using the country identification. In the alternative, the method of blocking the identity of the network subscriber can comprise prefixing a code, such as *67, to the network address when initiating the communications attempt. A default code can be stored on in the application on the network subscriber's mobile device.
  • For yet another aspect of the invention, a method is provided for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. The requesting party's information is transmitted to the mobile equipment. The requesting party's information is typically stored in the mobile subscriber's phonebook. The requesting party's information can be edited by the network subscriber prior to storing it in the phonebook. The option to store the requesting party's information can be presented to the network subscriber after the network subscriber has attempted to contact the requesting party. The requesting party's contact information can differ from the network address provided to the application to contact the requesting party. The network address to directly contact the requesting party can change if a delayed grant of permission screen is displayed.
  • Other modifications, features and embodiments of the present invention will become evident to those of skill in the art. It should be appreciated, therefore, that many aspects of the present invention were described above by way of example only and are not intended as required or essential elements of the invention unless explicitly stated otherwise. Accordingly, it should be understood that the foregoing relates only to certain embodiments of the invention and that numerous changes may be made therein without departing from the spirit and scope of the invention as defined by the following claims. It should also be understood that the invention is not restricted to the illustrated embodiments and that various modifications can be made within the scope of the following claims.

Claims (20)

What is claimed is:
1. A method for offering location-based information services, the method comprising:
receiving a query based on a request from a requesting party for location information about a mobile communication device associated with a mobile device user;
responsive to the query, issuing a permission release request to a mobile communication device, the permission release request seeking permission for release of the requested location information on behalf of the requesting party; and
releasing the requested location information for distribution to the requesting party in response to receipt of a permission release response output by the mobile communication device, the permission release response providing permission for communication of the requested location information to the requesting party.
2. The method of claim 1, further comprising:
requesting the location of the mobile communication device associated with the mobile device user and storing the location information in advance of issuing the permission release request.
3. The method of claim 1, further comprising:
requesting the location of the mobile communication device associated with the mobile device user and storing the location information at regular intervals.
4. The method of claim 1, wherein the requested location information comprises location information relevant to the mobile device, the location information comprising at least one of an address, location description, network, coordinates, and a mapped location specific to the mobile device user.
5. The method of claim 1, wherein the permission release request comprises at least one of an identity of the requesting party and a telephone number for the requesting party.
6. The method of claim 1, wherein the permission release response is output by the mobile communication device in response to an automated decision made by logic of the mobile communication device.
7. The method of claim 1, wherein the permission release response is output by the mobile communication device in response to a decision made by the mobile device user based on interactions with a user interface of the mobile communication device.
8. The method of claim 1, wherein the permission release response is output by the mobile communication device in response to a decision made by the mobile device user as a result of a presentation by a user interface of the mobile communication device, the presentation providing an identity of the requesting party.
9. The method of claim 1, wherein the requested location information is distributed to the requesting party in the form comprising one of the following: a text message transmitted to the mobile communication device of the requesting party; an integrated voice response device (IVR) speaking the requested location information to the requesting party; an operator calling the requesting party with the requested location information; a web page presenting the requested location information; a video message transmitted to the mobile communication device of the requesting party; a multimedia message transmitted to the mobile communication device of the requesting party; and an electronic mail message presenting the requested location information.
10. A method for offering location-based information services, comprising the steps of:
receiving a query based on a request from a requesting party for location information about a mobile communication device associated with a mobile device user;
responsive to the request, communicating with a mobile device user to seek permission for release of the requested location information on behalf of the requesting party;
receiving a communication from the mobile device user granting permission for release of the requested location information to the requesting party; and
transmitting the requested location information to the requesting party.
11. The method of claim 10, further comprising:
requesting the location of the mobile communication device associated with the mobile device user and storing the location information in advance of transmitting the requested location information.
12. The method of claim 10, further comprising:
communicating the location of the mobile communication device associated with the mobile device user at regular intervals.
13. The method of claim 10, wherein the requested location information comprises location information relevant to the mobile device, the location information comprising at least one of an address, location description, network, coordinates, and a mapped location specific to the mobile device user.
14. The method of claim 10, wherein communicating with a mobile device user to seek permission for release comprises transmitting at least one of an identity of the requesting party and a telephone number for the requesting party.
15. The method of claim 10, wherein the requested location information is distributed to the requesting party in the form comprising one of the following: a text message transmitted to the mobile communication device of the requesting party; an integrated voice response device (IVR) speaking the requested location information to the requesting party; an operator calling the requesting party with the requested location information; a web page presenting the requested location information; a video message transmitted to the mobile communication device of the requesting party; a multimedia message transmitted to the mobile communication device of the requesting party; and an electronic mail message presenting the requested location information.
16. A system for offering location-based information services, the system comprising:
a receiver configured to receive one or more queries from a requesting party for location information about a mobile communication device associated with a mobile device user,
a processor configured to generate one or more permission release requests to a mobile communication device, wherein the permission release request seeks permission for release of the requested location information on behalf of the requesting party; and
a database configured to store the information associated with the mobile device users;
an information release component configured to retrieve the requested location information from the database and further configured to transmit the location information to the requesting party in response to receipt of a permission release response output by the mobile communication device, the permission release response providing permission for communication of the requested location information to the requesting party.
17. The system of claim 16, wherein the database is configured to store the location information in the in advance of the processor generating a permission release request.
18. The system of claim 16, wherein the requested location information comprises location information relevant to the mobile device, the location information comprising at least one of an address, location description, network, coordinates, and a mapped location specific to the mobile device user.
19. The system of claim 16, wherein the permission release response is received from the mobile communication device in response to a decision made by the mobile device user as a result of a presentation by a user interface of the mobile communication device, the presentation providing an identity of the requesting party.
20. The system of claim 16, wherein the processor is configured to retrieve the location of the mobile communication device at regular intervals.
US14/271,154 2005-01-21 2014-05-06 Method and apparatus for providing information in response to the grant of a subscriber's permission Abandoned US20140295798A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/271,154 US20140295798A1 (en) 2005-01-21 2014-05-06 Method and apparatus for providing information in response to the grant of a subscriber's permission

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US64568705P 2005-01-21 2005-01-21
US72370205P 2005-10-05 2005-10-05
US11/336,071 US8718605B2 (en) 2005-01-21 2006-01-20 Method and apparatus for providing information in response to the grant of a subscriber's permission
US14/271,154 US20140295798A1 (en) 2005-01-21 2014-05-06 Method and apparatus for providing information in response to the grant of a subscriber's permission

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/336,071 Continuation US8718605B2 (en) 2005-01-21 2006-01-20 Method and apparatus for providing information in response to the grant of a subscriber's permission

Publications (1)

Publication Number Publication Date
US20140295798A1 true US20140295798A1 (en) 2014-10-02

Family

ID=36693009

Family Applications (7)

Application Number Title Priority Date Filing Date
US11/336,697 Abandoned US20060166649A1 (en) 2005-01-21 2006-01-20 Method and apparatus for screening and retaining the identity of a party requesting information
US11/336,380 Active 2026-11-30 US7460857B2 (en) 2005-01-21 2006-01-20 Method and apparatus for providing information in response to a delayed grant of subscriber permission
US11/336,086 Abandoned US20060166666A1 (en) 2005-01-21 2006-01-20 Method and apparatus for hiding the identity of a mobile subscriber in response to a permission request
US11/336,071 Active 2031-04-24 US8718605B2 (en) 2005-01-21 2006-01-20 Method and apparatus for providing information in response to the grant of a subscriber's permission
US11/336,379 Active 2027-03-28 US7496351B2 (en) 2005-01-21 2006-01-20 Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber
US12/355,381 Expired - Fee Related US8131261B2 (en) 2005-01-21 2009-01-16 Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber
US14/271,154 Abandoned US20140295798A1 (en) 2005-01-21 2014-05-06 Method and apparatus for providing information in response to the grant of a subscriber's permission

Family Applications Before (6)

Application Number Title Priority Date Filing Date
US11/336,697 Abandoned US20060166649A1 (en) 2005-01-21 2006-01-20 Method and apparatus for screening and retaining the identity of a party requesting information
US11/336,380 Active 2026-11-30 US7460857B2 (en) 2005-01-21 2006-01-20 Method and apparatus for providing information in response to a delayed grant of subscriber permission
US11/336,086 Abandoned US20060166666A1 (en) 2005-01-21 2006-01-20 Method and apparatus for hiding the identity of a mobile subscriber in response to a permission request
US11/336,071 Active 2031-04-24 US8718605B2 (en) 2005-01-21 2006-01-20 Method and apparatus for providing information in response to the grant of a subscriber's permission
US11/336,379 Active 2027-03-28 US7496351B2 (en) 2005-01-21 2006-01-20 Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber
US12/355,381 Expired - Fee Related US8131261B2 (en) 2005-01-21 2009-01-16 Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber

Country Status (2)

Country Link
US (7) US20060166649A1 (en)
WO (1) WO2006079070A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9288647B2 (en) * 2014-08-08 2016-03-15 Verizon Patent And Licensing Inc. Method for sending contact note during call establishment

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9177476B2 (en) 1997-10-22 2015-11-03 American Vehicular Sciences Llc Method and system for guiding a person to a location
EP2247086B1 (en) * 2001-08-10 2017-08-02 Siemens Aktiengesellschaft Method, device and software program for expanding the information flow when transferring a message
DE602004028121D1 (en) 2003-01-31 2010-08-26 Visto Corp ASYNCHRONOUS REAL-TIME RECALLING DATA
US7451113B1 (en) 2003-03-21 2008-11-11 Mighty Net, Inc. Card management system and method
US8175889B1 (en) 2005-04-06 2012-05-08 Experian Information Solutions, Inc. Systems and methods for tracking changes of address based on service disconnect/connect data
US20070027842A1 (en) * 2005-07-27 2007-02-01 Sbc Knowledge Ventures L.P. Information-paging delivery
US7711391B2 (en) * 2005-07-29 2010-05-04 Varia Holdings Llc Multiple processor communication circuit cards and communication devices that employ such cards
US8774381B1 (en) * 2005-09-15 2014-07-08 Aol Inc. Messaging gateway for directory and anonymous services
US7509124B2 (en) 2005-09-16 2009-03-24 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for providing multimedia information services over a communication network
KR101085700B1 (en) * 2005-09-16 2011-11-22 삼성전자주식회사 Method for providing location information service in lbs provider and method for receiving location information service in requester terminal
US8873555B1 (en) * 2006-02-02 2014-10-28 Marvell Israel (M.I.S.L.) Ltd. Privilege-based access admission table
KR100746213B1 (en) * 2006-07-20 2007-08-03 삼성전자주식회사 Apparatus and method for preventing multimedia message retrieving in mobile communication system
JP2008109223A (en) * 2006-10-23 2008-05-08 Fujitsu Ltd Portable terminal device, request transmission and reception control method, and request transmission and reception control program
US20080167959A1 (en) * 2007-01-04 2008-07-10 Sybase 365, Inc. System and Method for Enhanced Content Distribution
CN101031102B (en) * 2007-03-20 2010-05-26 华为技术有限公司 System, device and method for processing SMS
US8285656B1 (en) 2007-03-30 2012-10-09 Consumerinfo.Com, Inc. Systems and methods for data verification
US9485322B2 (en) * 2007-07-07 2016-11-01 Qualcomm Incorporated Method and system for providing targeted information using profile attributes with variable confidence levels in a mobile environment
US8572216B2 (en) * 2007-08-08 2013-10-29 Yahoo! Inc. Social network building
US7983652B1 (en) * 2008-01-10 2011-07-19 At&T Mobility Ii Llc Emergency call notification for network services
ES2393521T3 (en) * 2008-02-26 2012-12-26 Vodafone Holding Gmbh Management method and unit for data access management of a personal network
US8605650B2 (en) * 2008-06-10 2013-12-10 Motorola Solutions, Inc. System and method for interrupting a transmitting device in a communication system
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US9256904B1 (en) 2008-08-14 2016-02-09 Experian Information Solutions, Inc. Multi-bureau credit file freeze and unfreeze
US9112707B2 (en) * 2008-08-15 2015-08-18 International Business Machines Corporation System and method for providing location based services using collaborative networks
US8855615B2 (en) * 2008-08-25 2014-10-07 International Business Machines Corporation Short messaging service for extending customer service delivery channels
WO2010132492A2 (en) 2009-05-11 2010-11-18 Experian Marketing Solutions, Inc. Systems and methods for providing anonymized user profile data
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US8931058B2 (en) 2010-07-01 2015-01-06 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8744956B1 (en) 2010-07-01 2014-06-03 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US9621405B2 (en) 2010-08-24 2017-04-11 Good Technology Holdings Limited Constant access gateway and de-duplicated data cache server
US8930262B1 (en) 2010-11-02 2015-01-06 Experian Technology Ltd. Systems and methods of assisted strategy design
US8484186B1 (en) 2010-11-12 2013-07-09 Consumerinfo.Com, Inc. Personalized people finder
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US9558519B1 (en) 2011-04-29 2017-01-31 Consumerinfo.Com, Inc. Exposing reporting cycle information
US9665854B1 (en) 2011-06-16 2017-05-30 Consumerinfo.Com, Inc. Authentication alerts
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
CN102647705B (en) * 2012-05-08 2014-12-10 中兴通讯股份有限公司 Method and system for mobile terminal parameter configuration
US8856894B1 (en) 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
US9697263B1 (en) 2013-03-04 2017-07-04 Experian Information Solutions, Inc. Consumer data request fulfillment system
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US10102536B1 (en) 2013-11-15 2018-10-16 Experian Information Solutions, Inc. Micro-geographic aggregation system
US9529851B1 (en) 2013-12-02 2016-12-27 Experian Information Solutions, Inc. Server architecture for electronic data quality processing
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US9826001B2 (en) 2015-10-13 2017-11-21 International Business Machines Corporation Real-time synchronous communication with persons appearing in image and video files
US10757154B1 (en) 2015-11-24 2020-08-25 Experian Information Solutions, Inc. Real-time event-based notification system
US11227001B2 (en) 2017-01-31 2022-01-18 Experian Information Solutions, Inc. Massive scale heterogeneous data ingestion and user resolution
US10735183B1 (en) 2017-06-30 2020-08-04 Experian Information Solutions, Inc. Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US10963434B1 (en) 2018-09-07 2021-03-30 Experian Information Solutions, Inc. Data architecture for supporting multiple search models
US11062700B1 (en) * 2018-12-13 2021-07-13 Amazon Technologies, Inc. Query answering with controlled access knowledge graph
WO2020146667A1 (en) 2019-01-11 2020-07-16 Experian Information Solutions, Inc. Systems and methods for secure data aggregation and computation
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US20220038795A1 (en) * 2019-12-10 2022-02-03 Medal B.V. Capturing content in a mobile computing platform
US11188760B2 (en) * 2019-12-10 2021-11-30 Medal B.V. Method and system for gaming segment generation in a mobile computing platform
US11507695B2 (en) 2020-05-27 2022-11-22 At&T Intellectual Property I, L.P. Trusted system for sharing user data with internet content providers
US11483397B2 (en) 2021-03-19 2022-10-25 At&T Intellectual Property I, L.P. Trusted system for providing customized content to internet service provider subscribers
US11611623B2 (en) 2021-03-19 2023-03-21 At&T Intellectual Property I, L.P. Trusted system for providing customized content to internet service provider subscribers
US11880377B1 (en) 2021-03-26 2024-01-23 Experian Information Solutions, Inc. Systems and methods for entity resolution

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020049907A1 (en) * 2000-08-16 2002-04-25 Woods Christopher E. Permission based data exchange
US20020055351A1 (en) * 1999-11-12 2002-05-09 Elsey Nicholas J. Technique for providing personalized information and communications services
US20020072352A1 (en) * 2000-12-13 2002-06-13 Rittwik Jana Method and apparatus for querying the status of mobile subscibers
US20020110096A1 (en) * 2001-02-13 2002-08-15 Hans Carlsson Wireless network architechture and protocol for location services in GPRS packet data network
US20030016804A1 (en) * 2001-07-17 2003-01-23 Sheha Michael A. Position determination system
US20030182425A1 (en) * 2002-03-01 2003-09-25 Docomo Communications Laboratories Usa, Inc. Communication system capable of executing a communication task in a manner adaptable to available distributed resources
US20040166832A1 (en) * 2001-10-03 2004-08-26 Accenture Global Services Gmbh Directory assistance with multi-modal messaging
US20040226775A1 (en) * 2003-01-17 2004-11-18 Nec Corporation First-order drive through system, merchandise order receiving method, and program of the same
US7269428B1 (en) * 1999-11-23 2007-09-11 Nokia Coporation Method for enabling a user to be notified of his/her positioning requests

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5926754A (en) * 1995-12-21 1999-07-20 At&T Corporation Directory assistance call processing systems and related methods
US20040199402A1 (en) 1996-09-06 2004-10-07 Walker Jay S. Method and system for anonymous communication of information about a home
US6529491B1 (en) * 1997-11-05 2003-03-04 Nortel Networks Ltd. Private/residential code division multiple access wireless communication system
US7836011B2 (en) * 1998-10-01 2010-11-16 Onepin, Inc. Phone to phone data exchange
US6311069B1 (en) * 1999-03-18 2001-10-30 Ericsson Inc. System and method for alerting a mobile subscriber being positioned
DE19932737A1 (en) * 1999-07-14 2001-01-18 Alcatel Sa Procedure for position monitoring of a mobile radio subscriber as well as IN server (Intelligent Network) and WEB server for carrying out the procedure
GB2359461A (en) 2000-02-21 2001-08-22 Nokia Mobile Phones Ltd Personalised information from a phone is backed up and/or transferred between phones using a computer
US6687504B1 (en) * 2000-07-28 2004-02-03 Telefonaktiebolaget L. M. Ericsson Method and apparatus for releasing location information of a mobile communications device
JP2002057807A (en) * 2000-08-08 2002-02-22 Nec Corp Telephone directory management system for portable telephone
US20020077897A1 (en) * 2000-12-19 2002-06-20 Zellner Samuel N. Identity blocking service from a web advertiser
US6928291B2 (en) * 2001-01-25 2005-08-09 Openwave Systems Inc. Method and apparatus for dynamically controlling release of private information over a network from a wireless device
US6964787B2 (en) * 2001-02-01 2005-11-15 Ecolab Inc. Method and system for reducing microbial burden on a food product
JP4487443B2 (en) * 2001-05-29 2010-06-23 日本電気株式会社 Position information display system and display method thereof
EP1436746A4 (en) * 2001-10-17 2007-10-10 Npx Technologies Ltd Verification of a person identifier received online
US20030078993A1 (en) * 2001-10-22 2003-04-24 Jesse Hull Data synchronization mechanism for information browsing systems
US7319858B2 (en) * 2001-11-16 2008-01-15 Cingular Wireless Ii, Llc System and method for querying message information
WO2003058994A1 (en) 2002-01-08 2003-07-17 Siemens Aktiengesellschaft Improved data protection for position-dependent services
JP3871201B2 (en) * 2002-01-29 2007-01-24 ソニー株式会社 Content provision acquisition system
JP4209131B2 (en) 2002-04-23 2009-01-14 株式会社エヌ・ティ・ティ・ドコモ Mobile terminal and access control method
US7236799B2 (en) * 2002-06-14 2007-06-26 Cingular Wireless Ii, Llc Apparatus and systems for providing location-based services within a wireless network
US6750681B2 (en) * 2002-08-27 2004-06-15 Sirific Wireless Corporation High speed current mode logic gate circuit architecture
US20040198311A1 (en) * 2002-11-15 2004-10-07 Naveen Aerrabotu Method and system for processing a service access request for a mobile communication device
US20040192340A1 (en) * 2002-12-23 2004-09-30 422, Inc. Method and system for database content security in directory assistance & information services systems
US20040199768A1 (en) * 2003-04-04 2004-10-07 Nail Robert A. System and method for enabling enterprise application security
KR100590863B1 (en) * 2003-04-29 2006-06-19 삼성전자주식회사 Apparatus and method for processing a terminal authentication and a call in a private wireless high-speed data system
EP1652368B1 (en) * 2003-07-14 2018-04-04 Cisco Technology, Inc. System and method for active mobile collaboration
CN1879439A (en) * 2003-09-12 2006-12-13 北方电讯网络有限公司 Over-the-air provisioning of a mobile station for multi-media service
US7412050B2 (en) * 2003-10-01 2008-08-12 Aol Llc, A Delaware Limited Liability Company Conference calls via an intelligent call waiting interface
US20060126814A1 (en) * 2004-01-27 2006-06-15 Wilfred Weidmark AIN enabled automated directory assistance in a telecommunications network
KR101021277B1 (en) * 2004-02-06 2011-03-11 삼성전자주식회사 Method of processing data service of network including wireless public network and private network and system thereof
US7454623B2 (en) * 2004-06-16 2008-11-18 Blame Canada Holdings Inc Distributed hierarchical identity management system authentication mechanisms
US20060046742A1 (en) 2004-08-25 2006-03-02 Nokia Corporation Enabling access to private information
US10510214B2 (en) 2005-07-08 2019-12-17 Cfph, Llc System and method for peer-to-peer wireless gaming
US8190636B2 (en) * 2008-09-30 2012-05-29 Nokia Corporation Method, apparatus and computer program product for providing object privilege modification

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020055351A1 (en) * 1999-11-12 2002-05-09 Elsey Nicholas J. Technique for providing personalized information and communications services
US7269428B1 (en) * 1999-11-23 2007-09-11 Nokia Coporation Method for enabling a user to be notified of his/her positioning requests
US20020049907A1 (en) * 2000-08-16 2002-04-25 Woods Christopher E. Permission based data exchange
US20020072352A1 (en) * 2000-12-13 2002-06-13 Rittwik Jana Method and apparatus for querying the status of mobile subscibers
US20020110096A1 (en) * 2001-02-13 2002-08-15 Hans Carlsson Wireless network architechture and protocol for location services in GPRS packet data network
US20030016804A1 (en) * 2001-07-17 2003-01-23 Sheha Michael A. Position determination system
US20040166832A1 (en) * 2001-10-03 2004-08-26 Accenture Global Services Gmbh Directory assistance with multi-modal messaging
US20030182425A1 (en) * 2002-03-01 2003-09-25 Docomo Communications Laboratories Usa, Inc. Communication system capable of executing a communication task in a manner adaptable to available distributed resources
US20040226775A1 (en) * 2003-01-17 2004-11-18 Nec Corporation First-order drive through system, merchandise order receiving method, and program of the same

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9288647B2 (en) * 2014-08-08 2016-03-15 Verizon Patent And Licensing Inc. Method for sending contact note during call establishment

Also Published As

Publication number Publication date
US7496351B2 (en) 2009-02-24
US20060166646A1 (en) 2006-07-27
WO2006079070A2 (en) 2006-07-27
US20060166647A1 (en) 2006-07-27
US20090156168A1 (en) 2009-06-18
US7460857B2 (en) 2008-12-02
US20060166649A1 (en) 2006-07-27
WO2006079070A3 (en) 2008-07-31
US20060166666A1 (en) 2006-07-27
US8131261B2 (en) 2012-03-06
US20060166648A1 (en) 2006-07-27
US8718605B2 (en) 2014-05-06

Similar Documents

Publication Publication Date Title
US8718605B2 (en) Method and apparatus for providing information in response to the grant of a subscriber's permission
US8195163B2 (en) Client device method and apparatus for routing a call
EP1482758B1 (en) Real time administration of shared communication plan arrangements
CN110999341A (en) Optimized call handling during E911 calls
US9253319B1 (en) Methods and systems for call connecting calls
US20070190956A1 (en) Wireless unit status notification system for communication network
US20040198344A1 (en) Integrated wireless voice and data services using mobile switching centers
EP1758359B1 (en) A telephone calling method
US20020107003A1 (en) Method and apparatus for leaving a multimedia mail message without ringing a wireless phone
US7751855B2 (en) Private routing control numbers
EP2151982B1 (en) Telephony services
US9615230B2 (en) Method to manage multiple caller identities in a telecommunication system
US7477732B2 (en) Method and system for multiple-channel automatic recall
US20070133519A1 (en) Method and apparatus for network-based call screening for interrupting packet data calls
EP2113156B1 (en) Unstructured supplementary services data application within a wireless network
US20060270393A1 (en) System and method using SMS messaging for wireless conference calls
US7715544B1 (en) Method and apparatus for selective call waiting treatment
US20050025296A1 (en) Wireless terminal priority call alerting
GB2460630A (en) Informing a calling terminal when a called mobile terminal is back in service
EP1119168A2 (en) Internet call waiting service for wireless connections
US20100130186A1 (en) System and method for directory assistance including sms supported privacy features
WO2007000460A1 (en) Method and system for communicates annymously in a telecommunication network
KR20140117404A (en) Unestablished communication links in communication systems

Legal Events

Date Code Title Description
AS Assignment

Owner name: RESOURCE CONSORTIUM LIMITED, VIRGIN ISLANDS, BRITI

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROACH, PETER O., JR.;REEL/FRAME:032848/0243

Effective date: 20090902

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: RESOURCE CONSORTIUM LIMITED, LLC, DELAWARE

Free format text: RE-DOMESTICATION AND ENTITY CONVERSION;ASSIGNOR:RESOURCE CONSORTIUM LIMITED;REEL/FRAME:050091/0297

Effective date: 20190621