US20140295798A1 - Method and apparatus for providing information in response to the grant of a subscriber's permission - Google Patents
Method and apparatus for providing information in response to the grant of a subscriber's permission Download PDFInfo
- Publication number
- US20140295798A1 US20140295798A1 US14/271,154 US201414271154A US2014295798A1 US 20140295798 A1 US20140295798 A1 US 20140295798A1 US 201414271154 A US201414271154 A US 201414271154A US 2014295798 A1 US2014295798 A1 US 2014295798A1
- Authority
- US
- United States
- Prior art keywords
- requesting party
- information
- mobile
- location information
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 86
- 230000004044 response Effects 0.000 title claims description 51
- 238000004891 communication Methods 0.000 claims description 62
- 238000010295 mobile communication Methods 0.000 claims description 52
- 230000003993 interaction Effects 0.000 claims description 3
- 238000012790 confirmation Methods 0.000 abstract 1
- 230000003111 delayed effect Effects 0.000 description 27
- 230000000903 blocking effect Effects 0.000 description 14
- 230000008569 process Effects 0.000 description 13
- 230000008859 change Effects 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 206010012186 Delayed delivery Diseases 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000003116 impacting effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000000865 membrane-inlet mass spectrometry Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/487—Arrangements for providing information services, e.g. recorded voice services or time announcements
- H04M3/493—Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
- H04M3/4931—Directory assistance systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/186—Processing of subscriber group data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6009—Personal information, e.g. profiles or personal directories being only provided to authorised persons
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/14—Special services or facilities with services dependent on location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/30—Determination of the location of a subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/0024—Services and arrangements where telephone services are combined with data services
- H04M7/0042—Services and arrangements where telephone services are combined with data services where the data service is a text-based messaging service
- H04M7/0048—Services and arrangements where telephone services are combined with data services where the data service is a text-based messaging service where the text-based messaging service is a Short Message Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/10—Mobility data transfer between location register and external networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/16—Mobility data transfer selectively restricting mobility data tracking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
Definitions
- the present invention relates generally to wireless networks and more particularly to the offering of directory assistance for mobile subscribers post receiving the mobile subscriber's permission to release the information.
- the invention allows the called party to grant or deny permission to release the relevant information to the requesting party as well as providing the relevant information to the requesting party in the event the subscriber's permission is delayed.
- a mobile subscriber a wirelessly connected communications device
- the mobile connection is extremely useful for instant communications and accessibility
- many mobile subscribers do not wish to publish their number in a directory or allow an information services provider, such as, the directory assistance operator, to have ready access to or disseminate their contact information.
- the mobile subscriber may desire to limit this access due to numerous reasons; e.g., privacy, limit access from telemarketers, recent changes in their life status, or a plethora of other reasons.
- directory assistance operators use a telephone number database to provide the information services and usually the service is billed to the calling or requesting party's telephone bill.
- the directory assistance databases are hours, days, weeks or even months old.
- the directory assistance usually does not provide any information indicating who is allowed to access the directory listing or any restrictions as to the use and dissemination of the subscriber's directory information. Since the directory assistance system is typically an “all or nothing” proposition, this opens up the possibility for abuse of this database or for use of the directory assistance information in a manner that may be adverse to the mobile subscriber's best interest at the time a directory request is made.
- the first being the ready access the mobile phone service provides to the user. Since most users usually carry their mobile phone with them, they can be easily contacted at any time and place using their mobile phone. Today the user can limit this access to callers who they have given their mobile phone number or to others who are trusted by the user at the current time. Since, in this modern world, relationships change at a rapid pace or they tend to be more situational, many mobile subscribers wish to have real-time control over a caller's access to their contact information and provide it to a requesting party on a case-by-case basis. The second reason the user may wish to restrict this information is that often the user is required to pay for all calls made to or from their mobile phone. The user may not wish to pay to talk with certain types of callers or the mobile subscriber may desire to screen who has access to their contact information.
- What is required is a method and apparatus that allows a mobile subscriber to control the access to their contact information in real-time or near real-time. This method and apparatus should be able to distinguish between different calling parties and should be able to restrict, limit, or allow access to the contact information, location, address, or other personal information associated with the mobile subscriber on an instance-by-instance basis. What is also needed is a method and apparatus that allows a mobile subscriber to provide a delayed or non-real-time grant of permission to release their information and to have that information routed to the person or device requesting the information.
- a query is received, typically by an MDMS server, based on a request from a requesting party for information about a mobile subscriber of a mobile telephone network.
- the requested information typically comprises directory assistance information for the mobile subscriber.
- Directory assistance information can comprise location information, identity, telephone number, address, or other information specific to the mobile subscriber.
- a permission release request is issued to a mobile communication device associated with the mobile subscriber.
- This permission release request seeks permission for release of the requested information on behalf of the requesting party.
- the requested information is distributed to the requesting party in response to receipt of a permission release response output by the mobile communication device.
- the permission release response typically initiated by an action taken by the mobile subscriber or by automated logic of the communication device, provides permission for communication of the requested information to the requesting party.
- the permission release response can be output by the mobile communication device in response to an automated decision made by logic of the mobile communication device.
- the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber, based on interactions with a user interface of the mobile communication device.
- the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber as a result of a presentation by a user interface of the mobile communication device, the presentation providing an identity of the requesting party.
- the status of the mobile communication device associated with the mobile subscriber can be obtained by requesting status information from a customer data base maintained by the mobile telephone network.
- the acquisition of this status information in advance of issuing the permission release request, can facilitate communications with the mobile communication device. For example, an appropriate manner for communicating with the mobile communication device can be identified with access to the status information for that mobile communication device.
- the requested information can distributed to the requesting party in the form one or more of the following: a text message transmitted to the a mobile communication device of the requesting party; an integrated voice response device (IVR) speaking the requested information to the requesting party, an operator calling the requesting party with the requested information; a web page presenting the requested information; a video message transmitted to the mobile communication device of the requesting party; a multimedia message transmitted to the mobile communication device of the requesting party; and an electronic mail message presenting the requested information.
- IVR integrated voice response device
- an inventive solution for information services in connection with a request made by a requesting party about a mobile subscriber who subscribes to telephony services supported by a mobile telephone network.
- a request is received from the requesting party for information about the mobile subscriber.
- a communication is initiated with a mobile subscriber, typically based on a communication to the subscriber's mobile communication device or handset, to seek permission for release of the requested information on behalf of the requesting party.
- the trigger event for this request for information is an action taken by the requesting party—an individual or entity other than the mobile subscriber—where the subject of the requested information is the mobile subscriber and/or the handset associated with that subscriber.
- a communication can be received from the mobile subscriber granting permission for release of the requested information to the requesting party.
- the requested information can be communication to the requesting party.
- a mobile subscriber can control the release of information about that subscriber based on interaction with the user interface of the subscriber's mobile communication device or handset.
- the mobile subscriber and the mobile communication device are typically associated with a “home” mobile communication network.
- the mobile communication device can receive a permission release request issued by an information system that is typically implemented as a component independent of the mobile telephone network.
- the information system can be implemented, for example, as a server, such as an MDMS server, or a part of a directory assistance platform.
- the permission release request seeks permission for release of information about the mobile subscriber to a requesting party.
- the mobile subscriber can decide whether to release the requested information based on identifying information about the requesting party, such as the telephone number or name of the requesting party, as presented by a user interface of the mobile communication device. If the mobile subscriber elects to grant permission, the subscriber can interact with the user interface to support the issuance of a permission release response from the mobile communication device to the information system.
- the mobile communications device can include logic that automatically responds to the permission release request by issuing a permission release response via the mobile telephone network. This permission release response provides permission for communication of the requested information from the information system for use by the requesting party.
- a directory assistance system or platform can receive a query from a requesting party for information about the mobile subscriber.
- the directory assistance platform may determine that the requested information is not available at the platform (as a result, for example, of the mobile subscriber being a subscriber of wireless telephony services rather than conventional landline telephony services.).
- the directory assistance platform can issue a query to an information system, typically implemented as a server or component separate from the directory assistance system, for the requested information.
- the information system described herein as an MDMS server, typically operates as equipment independent of the mobile telephone network.
- the information system can issue a permission release request from the information system to a mobile communication device associated with the mobile subscriber.
- This permission release request seeks permission for release of the requested information on behalf of the requesting party.
- the information system releases the requested information to the directory assistance system, for distribution to the requesting party, in response to receipt of a permission release response output by the mobile communication device.
- the permission release response provides permission for communication of at least a portion of the requested information to the requesting party.
- FIG. 1A is an illustration of an information system constructed in accordance with an exemplary embodiment of the present invention.
- FIG. 1B is an illustration of an information system that responds to receipt of a directory assistance query by issuing a request for permission to release information about a mobile subscriber, in accordance with an exemplary embodiment of the present invention.
- FIG. 2 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system.
- FIG. 3 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system.
- FIG. 4 is an illustration of an exemplary example of an initial screen provided to a mobile subscriber requesting permission to release their directory information.
- FIG. 5 is an illustration of an exemplary example of a time out screen provided to a mobile subscriber requesting permission to release their directory information.
- FIG. 6 is an illustration of an exemplary example of a screen providing options for allowing a mobile subscriber to contact a requesting party directly with or without revealing their identity or contact information.
- FIG. 7 is an illustration of a representative example of a flow of screens for presentation to a mobile subscriber in accordance with an exemplary embodiment of the present invention.
- FIG. 8 is an illustration presenting a process for formatting a trigger message to indicate if the telephone number of a requesting party has been screened to ensure presentation of the requesting party s identity, in accordance with an exemplary embodiment of the present invention.
- FIG. 9 is an illustration of representative logic for an application residing on the mobile subscriber's device for screening a message from a telephone number associated with a requesting party in accordance with an exemplary embodiment of the present invention.
- FIG. 10 is an illustration of network components and messages useful for providing the identity blocking code for the current network serving mobile equipment, in accordance with an exemplary embodiment of the present invention.
- FIG. 11 is an illustration of MDMS server logic flow useful for determining the appropriate method of blocking subscriber identifiable information when a mobile subscriber attempts to directly contact a requesting party, in accordance with an exemplary embodiment of the present invention.
- FIG. 12 is an illustration of mobile equipment logic flow for using the calling line identification (CLID) block code if available, in accordance with an exemplary embodiment of the present invention.
- CLID calling line identification
- FIG. 13 is an illustration of mobile equipment logic flow for providing an option to automatically add a requesting party's information to a mobile subscriber's personal phonebook, in accordance with an exemplary embodiment of the present invention.
- FIG. 14 is an illustration of a system supporting direct communications between a mobile subscriber and a requesting party, in accordance with an exemplary embodiment of the present invention.
- FIG. 15 is an illustration of a system having an MDMS server useful for determining an appropriate method for communicating an information request to a mobile subscriber, in accordance with an exemplary embodiment of the present invention.
- the present invention answers the deficiencies in the prior art by allowing a mobile subscriber user to allow, restrict, or deny access to their personal information or to alternatively contact the requesting party directly.
- the invention uses the mobile network to provide a request for information release to a mobile subscriber.
- the invention also allows the release of the information to the party originally contacting the directory assistance service (requesting party) after the permission is granted by the mobile subscriber.
- An exemplary Mobile Directory Messaging System allows for a call into a directory assistance facility to be screened to determine if the request was for a landline, mobile, or other type of number.
- the user query is handled as a normal query if the request is for a landline number; however, if it is determined the caller is attempting to ascertain the number for a mobile subscriber, the MDMS server would use the logic disclosed herein to respond to the request. For example, if the directory assistance platform determines that the requesting party is seeking a mobile number, the MDMS formats a short data message, typically a text message, for transmission to the mobile subscriber's communication device to request the mobile subscriber's permission to release the requested information to the requesting party.
- a short data message typically a text message
- the request can contain information, such as, the requesting party's name, requesting party's phone number, type of request, location information, telephone number request, address request, or any other information specific to the mobile subscriber—hereafter referred to as directory information.
- the mobile subscriber can respond to the request issued by the MDMS server by granting, limiting, or denying the requesting party access to the requested information, namely the directory information.
- the directory assistance system (or operator) can provide the directory information to the requesting party if permission is granted by the mobile subscriber.
- the directory assistance system responds to the MDMS message by transmitting a message to the requesting party to indicate that the directory information is not available. If desirable by the network operator, the requesting party can be charged according to the availability of the directory information for release.
- the requesting party's contact information can be gathered and stored.
- an exemplary embodiment of the MDMS can be programmed to automatically send the mobile subscriber's directory information to the requesting party. This allows the requesting party to receive the requested information, typically directory information, even if the mobile subscriber's permission grant was delayed by an extended period. For example, the mobile subscriber's device may be turned off or the mobile subscriber declines to promptly respond to the message.
- the transmission of requested information to the requesting party can take the form of a short message, such as a text message, sent to the requesting party's mobile device, an integrated voice response device (IVR) speaking the directory information to the requesting party or a voice mail, a live operator calling with the directory information, a web page with the relevant directory information, a simple e-mail with the contact directory information, a multimedia message, a video message, or any other appropriate delivery mechanism (hereafter referred to as “Delivery”).
- a short message such as a text message
- IVR integrated voice response device
- Delivery any other appropriate delivery mechanism
- An exemplary MDMS can be programmed to store the mobile subscriber directory information in the event the requesting party can not be immediately contacted. This allows the requesting party to receive the directory information even if the mobile subscriber is not presently available to promptly respond to the directory information request.
- the directory information can be stored indefinitely until the MDMS server determines the mobile equipment is available or alternatively the directory information can be made available based on rules defined by the directory assistance provider, mobile operator, MDMS provider, or other interested party.
- an exemplary MDMS can be programmed to capture the identification of the calling number, query a database, and perform an analysis to determine what type of device the requesting party is using to contact the MDMS.
- the database queried can range from a listing of mobile numbers accessible by the MDMS server, analyzing the calling number to determine if it falls into a range of known mobile numbers, querying an external database such as the mobile number portability database, some combination of these methods, or similar methods to determine the type of device used by the requesting party. If the directory assistance system determines the requesting party is using a known mobile device the MDMS server can be programmed to offer delivery of the mobile subscriber's directory information in the event of a delayed permission gram. The MDMS can also be programmed to determine if the requesting party's network is a partner network and use this information in the analysis of how to provide Delivery of the directory information to the requesting party in the event of delayed permission.
- From Cingular - John Smith at 404-843-0431 is requesting your directory information. May we release it? Yes No If a predetermined period of time elapsed and the mobile subscriber did not respond to the initial message or the MDMS server sent a continua- tion message (e.g., the requesting party had terminated the call), the display would be changed.
- the second display message would be (also illustrated in FIG. 5): From Cingular - John Smith at 404-843-0431 requested your directory information at 2:30 on Tuesday September 22nd 2005. You can call him back or alternatively we can provide him your directory information directly.
- This string of messages will be dynamic and programmed to change dependant on time and/or user feedback.
- the message type and extent of the message displayed could also be dependant on the type of mobile device that is being used by the mobile subscriber. For example if the mobile device has the capability to process applications, such as Java or Brew, then the displays could allow for many more choices and could provide more information dependant on elapsed time and/or mobile subscriber input. If however, the mobile device only provided short messaging the message could be formatted to best fit this type of delivery. Also, if the mobile device did not have any signaling capabilities the MDMS could be programmed to deliver the message via a voice channel utilizing an IVR, an operator, or some combination of these methods.
- the different portions of the message can be variable and provided to the application on the mobile equipment in the trigger or subsequent message(s).
- the name of the mobile network operator can be dynamic and defined by the trigger message. This would allow the mobile operator to change their name or corporate identity/image or to provide this type of service to a mobile virtual network operator (MVNO) without altering the basic software for the application on the mobile equipment.
- MVNO mobile virtual network operator
- Other examples of fields on the user screens that may be desirable to make dynamic in nature are requesting party's name, requesting party's contact number, date of request, time of request, call block codes, textual information regarding current features available, options available to the mobile subscriber, or other similar fields. It should also be understood that this type information can alternatively be stored on the mobile device, default information can be stored on the mobile device, or the mobile device may be able to ascertain this information independently; e.g., date and time of the request from the clock on the mobile.
- the mobile subscriber can set up the application on the mobile equipment to automatically respond any future messages of a similar type.
- the mobile subscriber can configure their mobile equipment to automatically accept or alternatively automatically reject all permission requests from the MDMS.
- the mobile subscriber can configure their mobile equipment to always accept or reject a request from a certain requesting party or a certain class of requesting parties such as all international requests, all requests from unidentified parties, or all requests from parties not stored in the phonebook on the mobile equipment. If a request is automatically accepted or rejected the mobile equipment can be alternatively configured to provide the mobile subscriber with an alert message stating the request has been automatically handled or the mobile equipment can be configured to hide these alerts from the mobile subscriber. If the mobile equipment was configured to display the automatic handling information the mobile subscriber could then be provided with the option to connect with the requesting party directly as described in this disclosure.
- an exemplary MDMS server can be programmed to determine the type of mobile device prior to sending any messaging to the mobile subscriber. This information can either be programmed into the MDMS server or the MDMS server can query a database for the relevant information prior to determining how to format and transmit the message to the mobile subscriber. This allows a MDMS to tailor the delivery of the information to match the features and functionality available on the mobile device.
- the information indicating that the call has been screened by a trusted party may be obtained from the call set up message received from the network when the requesting party calls the directory assistance service center. Since most of these calls will be received from users that are subscribers when they dial a predetermined code, such as 411, on the network offering the directory assistance service, the requesting party identity should be known to the directory assistance center serving that network and can be verified, and used to validate the identification of the requesting party or their equipment.
- the directory assistance service can provide the option to the requesting party to present or validate their personal contact information for use when requesting release of the mobile subscriber's directory information.
- the requesting party can release restrictions on use of their identity, validate their identity with the network or directory assistance provider, or continue to restrict the information. If the requesting party releases the information the MDMS server can forward this information on to the subscriber application and the application can present the information to the user with the calling name, phone number, and other data that may be used to identify the requesting party.
- the directory assistance provider MDMS server can choose to not allow the message to the mobile subscriber or to request the permission to release the contact information.
- the MDMS server can alter the message to the MDMS application to indicate that the call is from an unscreened or unavailable number. The subscriber application could then be altered to indicate that the message was received from a non-screened number or from a requesting party that chose to keep their identity from the mobile subscriber.
- the code to restrict the transmission of the calling line identity to the calling party is often “*67” dialed before the telephone number; however, it may be different in other countries or networks.
- This code or method can be transmitted to the application on the phone so it may be displayed to the mobile subscriber or alternatively used in the application on the mobile phone when placing an outbound communications attempt directly from the application on the mobile equipment. This will enable the mobile subscriber to initiate a communications path directly to the requesting party without divulging their identity or contact information.
- the code to block or hide the identity of the mobile equipment's or mobile subscriber's identity may change depending on the current serving network. It also might not be possible or necessary to block the identity of the mobile equipment or mobile subscriber. If this were the case the subscriber application could be programmed not to offer this option or alternatively to alert the mobile subscriber to this restriction or modification in the operation of the application.
- the mobile equipment may change networks, locations, or countries before the mobile subscriber views the message or attempts to communicate directly with the requesting party. It is possible for the mobile equipment to move into another network where the identity block or code originally provided to the application does not work as expected, may not be valid, or may cause an error in providing the service. In this instance it is desirable for the subscriber application to monitor the network serving the mobile equipment when it receives the identity block code and to determine if the mobile equipment has entered a subsequent network where the current code or method may not be valid.
- the subscriber application can be programmed in such a manner as to not offer the option of blocking the identity, inform the mobile subscriber that blocking the identify is not an option, remove the menu choice that allows the mobile subscriber to directly contact the requesting party, or other similar methods that will become obvious to those skilled in the art when taking into account this disclosure.
- the application on the mobile equipment had the information as to the contact number and possibly the name of the requesting party, it would be helpful if the application on the mobile equipment would allow the mobile subscriber the option to automatically edit and store this information into their existing personal phonebook, mobile equipment phonebook, or subscriber identity module phonebook.
- the preferred method to accomplish this would be for the application on the mobile equipment to be programmed to offer this option to the subscriber if a message contained at least the contact number of the requesting party.
- the application on the mobile equipment should provide the mobile subscriber with the opportunity to edit the information prior to storing it into the phonebook to allow the mobile subscriber to add any missing information, change the format of the phonebook name to better fit their current phonebook format, to change the name of the requesting party to be more recognizable, or to allow the entry to be saved with a name that is easier for the mobile subscriber to find at a later date (e.g., allow the entry to be saved under nicknames or as a relationship to the mobile subscriber).
- the application on the mobile equipment can be programmed to not allow the mobile subscriber to automatically contact the requesting party directly; however, it may still be desirable to allow the mobile subscriber to automatically store the requesting party's contact information into their personal phonebook. This would allow the mobile subscriber to contact the requesting party outside of the MDMS application on the mobile phone.
- the number used by the application on the mobile equipment may contact the requesting to be different from the direct contact number of the requesting party.
- the directory assistance provider desires to allow the mobile subscriber the option to automatically connect to requesting party via a voice channel while the requesting party is holding on the directory information system and waiting for the requested information. If this were the case, it may be desirable to route the communications from the mobile subscriber through a communications system connected to the directory assistance platform where the requesting party is currently holding. This would allow the mobile subscriber to automatically contact the requesting party while they were holding for the directory information. This functionality could also be provisioned to automatically block the mobile subscriber's phone number or other identifiable information.
- the message to the mobile application would need to include the direct contact number for the requesting party so this number could be stored in the phonebook.
- the message to the mobile application would also need to include a second routing number that could be used to contact a meet me type platform where the requesting party was holding.
- the meet me conferencing system will allow the two inbound communications paths to be joined. This would allow the mobile equipment to originate a call back to the conference port where the requesting party's call was currently parked or monitoring. When the call from the mobile equipment arrived the meet me conferencing system would then recognize the incoming communications and would bridge the requesting party's and mobile subscriber's voice communications paths together.
- the direct connect functionality should be provisioned on the user screens when attempting to gain permission for the release of the requested directory information from the mobile subscriber in real time; however, it may not be desirable to allow this functionality when requesting a delayed grant of permission.
- Yet another exemplary method of providing the direct voice connection is to allow a message from the mobile subscriber to the MDMS server indicating that a voice communications path was approved. This would trigger an outbound call from the directory information system serving the requesting party to the mobile subscriber.
- the major problem with this method is that the requesting party may then see the mobile subscriber's directory information when they received their bill for this call.
- the directory information system serving the requesting party would be instructed to suppress the mobile subscriber's directory information.
- One method of performing this would be for the directory information system placing the call to the mobile subscriber to prefix a dialing code to the mobile subscriber's contact number. This prefix would cause the call to be routed over special trunks that caused the called number contact information to be suppressed.
- FIG. 1A is an illustration of an exemplary system having a network and communications path between a requesting party 110 through the directory assistance platform 130 and out to the mobile subscriber 170 with a return path to the requesting party 110 .
- the session initiates with a call 120 from the requesting party 110 to the directory assistance platform 130 .
- the directory assistance platform 130 would screen the call 120 to determine if it was destined for a mobile subscriber or mobile equipment. If it was determined the call was destined for a mobile subscriber or mobile equipment, the platform would send a message 140 to the MDMS server 150 requesting permission to release the mobile directory information. A request message 160 would then be sent to the mobile subscriber 170 in the mobile network 180 .
- FIG. 1A is an illustration of an exemplary system having a network and communications path between a requesting party 110 through the directory assistance platform 130 and out to the mobile subscriber 170 with a return path to the requesting party 110 .
- the session initiates with a call 120 from the requesting party 110 to the directory assistance platform 130
- the directory assistance platform 130 would then determine if the original calling party 110 requesting the directory information was using a device that could receive a text message or other multimedia protocol.
- the preferred method to determine how to provide the directory information to the calling party 110 is to look up the device in a database 111 of known devices and then determine the method for providing the directory information to the calling party 110 . It is even possible to perform a look up to determine the type of device and the extent of the service provisioned on the device (not shown). This functionality could be performed on the initial look up or on a subsequent look up in a second database (not shown).
- the equipment look, up 119 into database 111 would trigger an equipment type response 112 that would provide an indication if the calling party 110 was appropriately equipped to receive a delayed transmission of the requested directory information.
- This same functionality can also be achieved by determining the directory system that sent the request, facility on which the request is received, address of the directory assistance request, or other similar means that will be known to those skilled in the art. If the directory assistance system 130 determined that device 110 was served by a network that was capable of receiving a messaging protocol 100 and the device 110 was so equipped, the directory assistance platform 130 would then offer the option of providing a delayed message containing the directory information for device 170 and the directory information for the device 110 would be associated with the outstanding message to the device 170 .
- the MDMS server 150 would receive the message 114 and would then determine the mobile subscriber directory information and transmit a permission grant message 113 to the directory assistance platform 130 .
- the message 113 typically contains the mobile subscriber directory information maintained by the MDMS server 150 for the mobile subscriber 170 .
- the receipt by the directory assistance platform 130 of the message 113 would trigger the transmission of a message 115 with the directory information to the requesting party 110 .
- the exemplary method can send this message as a text message sent via short message service, the message can be implemented by multimedia, voice, video, or other similar form of conveying the information to the requesting party 110 .
- FIG. 1B is a detailed illustration of a representative operating environment for an information system operative to receive a directory assistance query from one of a number of directory assistance providers.
- the directory assistance provider 1600 determined the request for information required permission from the mobile subscriber 1607 , it would send a query message 1620 to the MDMS server 1630 .
- This query 1620 would cause the MDMS server 1630 to send out a message to the customer database (shown as a home location register—HLR 1605 ) of the mobile network 1601 .
- This query is designed to provide a routing number for the mobile equipment 1625 , the current status of the mobile account, as well as to determine certain features and functionality of the mobile equipment 1625 .
- the query would trigger an equipment lookup 1680 to be sent to an equipment functionality database (shown as the CARD platform; however, this platform is typically not defined by the standards in the industry and may be incorporated into other network elements or called by another name) 1690 in the home mobile network 1601 .
- This step may not be required in some networks that have a more homogeneous distribution of mobile phones with the enhanced functionality needed to display text and menus.
- Example of these types of network and functionality are GSM with JAVA deployed on a majority of the SIM cards and CDMA networks with BREW functionality deployed on the handsets.
- the equipment lookup 1680 is designed to provide the functionality of the mobile equipment 1625 so that the MDMS server 1630 can make a determination of the most appropriate method of formatting a message to the specific mobile equipment. 1625 . Once the MDMS server 1630 knows the location of the mobile equipment 1625 and the most appropriate method to send a data message 1670 to the mobile equipment 1625 , it can format the message 1670 and send it to the mobile equipment 1625 .
- the message 1670 is shown as a short message on a GSM network 1601 ; however, one skilled in the art, using this disclosure, can easily determine how this message 1670 may be transported on a multitude of different data or voice communications paths to the mobile equipment 1625 or can be transported across almost any type of wireless network, in this exemplary illustration the message 1670 is transported through a mobile switching system (show as the MSC) 1625 .
- MSC mobile switching system
- the mobile equipment 1625 receives the permission message 1670 and the mobile subscriber 1607 or mobile equipment 1625 indicated their preference (note—the mobile equipment 1625 may be optionally set to automatically respond to the permission message with a preconfigured response), the mobile equipment 1625 would then send a message 1660 back to the MDMS server 1630 indicating their granting/withholding of the mobile subscriber's permission.
- the MDMS server 1630 would then format and transmit the appropriate permission message 1650 to the directory assistance provider 1600 originally generating the query 1620 . If however, the originally requesting party hangs up before the permission message 1650 is received, the directory assistance provider 1600 would send an abandon message 1640 indicating that the originally requesting party has abandoned their initial request. The MDMS 1630 would than handle the session as appropriate. If the original query message 1620 indicated that the requesting party had delayed permission grant the MDMS server 1430 would forward the delayed permission grant to the directory assistance provider 1600 when and if it was received from the mobile equipment 1625 .
- FIGS. 2 and 3 are flow charts illustrating an exemplary method useful for determining how to handle the query requesting the directory information from the mobile subscriber and illustrating the an exemplary method of delayed granting of permission to release the mobile subscriber's directory information
- the exemplary process begins when the requesting party 1606 issues an incoming request for information, typically a directory information request, in step 280 .
- a directory assistance platform 1600 conducts an inquiry in step 290 to determine whether the incoming request is destined for a mobile user, such as the mobile subscriber 1607 . If the response to this query is negative, the directory assistance platform 1600 treats the incoming request as a normal directory assistance request in step 250 .
- the MIMS server 1630 conducts an inquiry in step 233 to determine if the cell number for the mobile user is known. If the mobile address is known the MDMS server 1630 then send a customer database request 1610 in step 214 to the mobile network's 1601 customer database 1605 ( FIG. 1B represents this database as an home location register or HLR). If the mobile equipment 1625 number is not known, then the directory assistance platform 1600 plays an announcement in step 260 to indicate that the mobile number for the mobile user 170 is not available. In addition, the directory assistance platform 1600 determines, in step 230 , if an alternate number is known.
- the directory assistance platform 1600 conducts an inquiry in step 220 to determine whether the requesting party 1606 wants the alternate number. If the requesting party 1606 wants the alternate number, the directory assistance platform 1600 processes the call as a normal directory assistance call in step 250 . If the requesting party 1606 does not want the alternate number, the directory assistance platform 1600 terminates the call in step 210 . If the call is terminated, the directory assistance system operator can choose not to provide answer supervision back to the telephone network so the calling party does not pay for the failed directory assistance attempt.
- the MDMS server 1630 then would receive a response to the message 1610 from the customer database 1650 indicating what is known about the mobile subscriber 1607 and the mobile equipment 1625 . If the location of the mobile equipment 1625 was not known or it was not currently attached to a network, the directory assistance system 1600 would then play announcement in step 260 indicating that the mobile subscriber 1607 is not available, determine if the alternate number is known, step 230 , and if the requesting party 1606 desires to obtain the alternate number, step 220 . If the requesting party 1606 wants the alternate number the call is handled as a normal directory assistance call, step 250 .
- the call is terminated in step 210 . If the call is terminated the director assistance system operator can optionally choose not to provide answer supervision back to the telephone network so the requesting party 1606 does not pay for the failed directory assistance attempt.
- the MDMS server 1630 would then execute logic for determining and handling a call from a screened or unscreened caller (logic flow begins at point B and returns at point C, the exemplary logic sequence is illustrated in FIG. 8 and discussed later in this disclosure) then would send out a data message to the last known location of the mobile equipment 1625 as shown in step 217 .
- the MDMS server 1630 would then start a timer in step 218 to ensure the message return from the mobile equipment 1625 was within the acceptable wait time for the requesting party 1606 .
- the MDMS server 1630 would then go into a loop of checking to see if the timer has expired, step 215 , and checking to see if a permission message was received, step 219 , from the mobile equipment 1625 . If the timer expires before the message is received, the MDMS server 1630 would then determine if the requesting party 1606 was calling from a device that was capable of receiving a delayed message, step 225 . If the requesting party was calling from a device 1606 that could receive a delayed response, the directory assistance system 1600 would then play an announcement, step 224 , and query the requesting party 1606 if they desire to receive a delayed message (point A refers to a continuation of the logic sequence in FIG.
- the directory assistance system 1600 would collect and store the requesting party's 1606 contact information, shown in step 320 , and begin monitoring to determine if the permission had been received from the mobile subscriber 1607 , step 350 .
- the MDMS server 1630 would also start a second timer, step 340 , to determine if the MDMS server 130 , should abandon the attempt to contact the mobile subscriber, step 370 , and end the process, step 380 .
- the MDMS server 1630 would send a message 1650 to the directory assistance system 1600 and the directory assistance system 1600 would then send a message to the requesting party 1606 with the directory information, step 360 , and end the process, step 380 .
- step 219 if the message 1660 from the mobile subscriber 1607 was received before the timer expired, the MDMS server 1630 would then determine if the mobile user 1625 had granted their permission, step 222 . If the user denies permission, the MDMS server 1630 and directory assistance system 1600 handles the request 1607 as described above starting at step 230 . If the mobile user granted their permission, then the directory assistance system 1600 would give answer supervision, step 229 , to ensure the requesting party 1606 was billed and then provide the mobile number to the requesting party 1606 . The session would then be terminated, step 223 .
- FIG. 4 is an illustration of an exemplary screen that can be provided by the application on the mobile equipment 1625 to the mobile subscriber requesting the release of the directory information.
- the screen in FIG. 4 is broken up into several sections.
- Section 410 consists of a statement and or a question from the mobile subscriber's network operator 1601 asking for the real-time permission to release the directory information to the requesting party 1606 .
- This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that the mobile subscriber 1607 will not be billed for this call.
- Section 420 is the default selection and in this example is the permission grant to release the directory information to the requesting party 1606 .
- Section 430 comprises other selections that can be chosen by the mobile subscriber 1607 . In this example, these selections consist of a method to decline to release the directory information to the requesting party 1606 and a selection that provides more information.
- FIG. 5 is an illustration of an exemplary screen that would be displayed in place of the screen shown in FIG. 4 in the event of encountering a time out as contemplated in 215 .
- the screen in FIG. 5 is broken tip into several sections.
- Section 510 consists of a statement and or a question from the mobile subscriber's network operator 1601 asking for the delayed permission to release the directory information to the requesting party 1606 .
- This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, time of the original request, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that the mobile subscriber 1607 will not be billed for this call.
- Section 520 is the default selection and in this example is an indication that the mobile subscriber 1607 can call the requesting party 1606 back directly.
- Section 530 comprises other selections that can be chosen by the mobile subscriber 1607 . In this example, these selections consist of a method to grant the delayed release the directory information to the requesting party 1606 , a selection that allows the mobile subscriber 1607 to ignore the message, and a selection that provides more information.
- FIG. 6 is an illustration of an exemplary screen that would be displayed if the mobile subscriber 1607 chose the “I will call” default option 520 in FIG. 5 .
- the screen in FIG. 6 is broken up into several sections.
- Section 610 consists of a statement explaining that the mobile subscriber 1607 can contact the requesting party 1606 without revealing their identity or telephone number.
- Section 610 can include information on how to manually contact the requesting party 1606 without disclosing the mobile subscriber's 1625 identity.
- Section 610 in this example also contains a question asking the mobile subscriber 1607 if they would like to call back the requesting party 1606 .
- Section 620 is the default selection and in this example instructs the mobile device 1625 to call the requesting party 1606 while blocking any mobile subscriber 1607 identifiable directory information
- Section 630 is comprised of other selections that can be chosen by the mobile subscriber 1607 . In this example these selections consist of a selection that instructs the mobile device 1625 to call back the requesting party 1606 without blocking mobile subscriber 1607 identifiable directory information and a selection that allows the mobile subscriber 1607 to ignore the message.
- FIG. 7 This Figure is an illustration of the exemplary flow of the screens displayed to the mobile subscriber 1607 .
- Screen 710 is the initial screen. If the mobile subscriber 1607 selects the “yes” choice 720 the application will send a message to the MDMS server 1630 and the directory information will be released 730 to the requesting party 1606 . If the mobile subscriber 1607 selects either the “No” 740 or “More information” 750 choice, then screen 711 will be presented explaining how to contact the requesting party 1606 while allowing the requesting party 1606 to see the mobile subscriber's 1625 directory information 713 or alternatively while blocking the mobile subscriber's 1625 directory information 712 . Screen 711 also allows an option not to call back the requesting party 714 .
- the screen will automatically timeout 760 and present as replacement screen 770 .
- This screen will present options that will allow the mobile subscriber 1607 to call the requesting party 1606 directly 790 which, if selected, will present screen 711 with the options described above.
- the mobile subscriber 1607 can also choose to provide a delayed release of their directory information 716 , ignore the message 715 , or obtain more information 733 .
- the option “Please release my information” would only be displayed if the MDMS server 1630 determined it had a valid route to send the directory information to the requesting party 1600 on a delayed basis. If the MDMS server 1630 determined that it did not have a valid route to contact the requesting party 1606 it would not display this option 780 .
- screen 711 will be presented with the choices defined above. While these screens are being presented to the mobile subscriber 1607 the other buttons and selections on the mobile device 1625 will continue to operate as normal. For example, the mobile subscriber 1607 will be able to choose to go back a screen, end the session, or interrupt the session at any point.
- FIG. 8 This Figure represents a flow diagram for an exemplary subroutine that allows the directory system 1600 or other designated entity in the network to process messages from a screened and an unscreened requesting party 1606 .
- the subroutine starts at point B and the first step is to determine if the communications attempt 1606 is from a screened address, step 810 .
- a requesting party 1606 can be screened by several methods. The requesting party 1606 can be screened by originating a call from a device 1606 that is known by a trusted partner or network provider, by identifying themselves via the answer to queries or challenges from the network, or by other means known to those skilled in the art.
- the directory system 1600 will set the screened number flag to unscreened in the message to be sent to the application on the user device, step 820 . If the directory assistance system determines requesting party's 1606 address is from a screened number the directory assistance system 1600 will set the screened number flag to screened, step 830 , and pass a query message 1620 to the MDMS server 1630 . The MDMS server 1630 will then determine the serving mobile network 1601 for the mobile subscriber 1607 whose directory information is being requested, step 840 . The MDMS server 1630 will then lookup the algorithm or dialing sequence needed to block the identity of the mobile subscriber 1607 originating the call from the particular network 1601 , step 850 . The MDMS server 1630 then includes this code into the trigger message to be transmitted to the mobile subscriber whose directory information is being requested, step 860 .
- this illustration presents an exemplary process that allows the application on the mobile subscriber's equipment 1625 to process details regarding a screened message.
- the application begins with the application on the mobile equipment 1625 determining if the trigger message indicates if the requesting party 1606 is originating their communications 1607 from a screened or unscreened device or location 910 . If the trigger message 1670 indicates the call is not from a screened caller, the mobile equipment application 1625 can be configured to present the mobile subscriber 1607 with screens that only allows the mobile subscriber 1607 to call back while not revealing their identity, step 920 .
- the mobile subscriber 1607 might not be allowed to release their directory information or to provide unique identifiable information if they chose to contact the requesting party 1606 directly.
- the application can also be configured to not reveal the calling number or name of an unscreened requesting party 1606 . This will ensure that the mobile subscriber 1607 can readily identify an unscreened requesting party 1606 and will assist the mobile subscriber 1607 to only reveal as much information as desired to an unscreened party.
- the application on the mobile subscriber's device 1625 can be configured to display the address of the requesting party 1606 , display the name of the requesting party 1606 , provide the option to contact the requesting party 1606 while displaying their identity, step 950 , and place any other indicators in the message indicating that the requesting party 1606 identity was screened or trusted, step 960 .
- this illustration presents an exemplary network architecture having an MDMS platform 1070 that can determine the location of mobile equipment 1010 in either a home network 1020 or a visited network 1000 in order to determine a usable method of blocking the mobile equipment's 1010 or mobile subscriber's identity for a communications session.
- the mobile equipment first sends out a signal when arriving at a new network location 1030 .
- This signal 1030 updates the location of the mobile equipment 1010 in the mobile subscriber database 1040 .
- the MDMS platform 1070 then can query 1050 the mobile subscriber database 1040 .
- the mobile subscriber database 1040 would then reply 1060 to the query with a number of parameters that may include the current location or network 1000 where the mobile equipment 1010 is located.
- the MDMS platform 1070 launches a query 1080 to a database 1090 that maps the location of the mobile equipment 1010 with the code to block or hide the identity of the mobile equipment or mobile subscriber when communicating with another point on the network.
- the database 10 . 9 can be internal or external to the MDMS platform 1070 or may alternatively be a part of another network element.
- the MDMS platform 1070 could then either send a separate message 1011 to the mobile equipment containing this code or could include this code into the message 1011 sent to request permission to release the directory information to the requesting party.
- FIG. 11 presents an exemplary logic flow used by the MDMS server 1630 to determine the appropriate method for the application on the mobile device 1625 to use to block their identification from another network user when contacting them directly.
- the exemplary logic implemented by a subroutine, starts by looking up the mobile subscriber 1607 whose directory information is being requested on the mobile subscriber database 1605 in the home network 1601 and determining if a serving network, location, or country code is available from this lookup, step 1110 . If the network code is not available the subroutine will continue with sending a permission message 1670 without an identity block code, step 1130 , or with a generic identity block code.
- the application on the mobile device 1625 may have a generic identity block code stored to be used if the trigger message 1670 does not contain a valid identity block code. If the country code, network code, location information, or other similar information is available in step 1110 , then the MDMS server 1630 would look up the identification block code for the given network, step 1120 . The MDMS server 1630 would then determine if the identification block code was available in the database, step 1140 . If this code was not available, the subroutine will continue with sending the message without an identity block code, step 1130 , or with a generic identity block code.
- the MDMS server 1630 would then include the appropriate network block code in a trigger message 1670 , step 1150 , to the application on the mobile equipment, subscriber identification module, or other similar device (all of these devices are represented by 1625 ) that would present the information to the mobile subscriber 1607 .
- this illustration presents an exemplary subroutine describing the mobile equipment 1625 logic flow for using the calling line identification (CLID) block code, if present, in the message from the MDMS server 1630 .
- the first step in this subroutine is to determine if the trigger message 1670 contains a code to block or hide the identification of the mobile equipment 1625 or the mobile subscriber 1607 when communicating directly with another network user, step 1210 . If the trigger message 1670 does not contain the identification block code, the application on the mobile equipment 1625 can withhold or limit the option to allow the mobile subscriber 1607 to contact the requesting party 1606 directly, step 1230 . If the trigger message 1670 contains the identification block code, the application on the mobile equipment 1625 can display the appropriate text and options to allow the mobile subscriber 1607 to contact the requesting party 1606 directly, step 1220 .
- CLI calling line identification
- this illustration presents an exemplary subroutine describing the mobile equipment logic flow for automatically storing the requesting party's 1606 information into the mobile subscriber's 1607 phonebook.
- the subroutine starts with determining if the number of the requesting party 1606 is available, step 1310 . If the number of the requesting party 1606 is not available then the application on the mobile equipment 1625 would not provide the option to store the information in the phone book, step 1340 . If the number of the requesting party 1606 is available the logic would then determine if the name of the requesting party 1606 is available, step 1320 .
- the logic of the mobile equipment 1625 application can then allow the mobile subscriber 1607 to edit the information, step 1360 , before saving the information into the phonebook. This would allow a mobile subscriber 1607 to save the information in a preferred form and format and it would allow the mobile subscriber 1607 to use a similar format as their other phonebook entries. If the requesting party's 1606 name was not available or was incorrect, the logic of the application on the mobile equipment 1625 would then prompt the mobile subscriber 1607 to enter the name of the requesting party 1606 , step 1330 . This will allow the mobile subscriber 1607 to enter an appropriate name for the requesting party 1606 as the phonebook entry.
- step 1330 is shown in this example as a separate step, one skilled in the art can see how this step can easily be made a part of the edit step 1350 .
- the mobile equipment 1625 application would then allow the entry to be saved into the existing mobile subscriber 1607 phonebook, step 1360 .
- the subroutine depicted in FIG. 13 can be placed at any point in the application or can be made a menu choice for the mobile subscriber 1607 to select; however, it would be more effective to execute this logic after the mobile subscriber 1607 has released their directory information 1660 and 1650 , called the requesting party directly 1480 , 1490 , or 1413 , or chosen to ignore the permission request.
- the mobile subscriber 1607 may have collected more information on the requesting party 1606 (e.g., actual name instead of network calling name identification) and may have assigned a different priority to the requesting party 1606 .
- FIG. 14 is a system diagram of an exemplary network, communications paths, and various options to provide a direct voice connection(s) 1490 , 1413 , 1480 between the requesting party 1410 and the mobile subscriber 1470 while still allowing the mobile subscriber 1470 to restrict the dissemination of their directory information and to allow the mobile subscriber 1470 to control the origination of the communication path 1490 , 1413 , 1480 .
- the session starts as a normal directory call 1420 to the directory assistance platform 1430 .
- the directory assistance system 1430 determines that the call requires approval for release of the directory information it sends a request 1440 to the MDMS server 1450 . This triggers a request for release of permission 1460 to the mobile equipment 1470 .
- the first method is to allow the mobile equipment 1470 to place a call 1480 directly to the requesting party's 1410 contact number.
- the application would prefix, to the dialing string, the outbound call with a code to block the identity of the mobile equipment 1470 .
- the second method would be for the MDMS server 1450 to transmit a meet me conference number 1411 to the application on the mobile equipment 1470 .
- the mobile equipment 1470 could then be programmed to place an outbound call 1413 to the meet me conference number 1411 and the directory assistance system 1430 serving the requesting party's 1410 call 1420 could either automatically forward the call 1420 to the same meet me conference port 1411 through voice channel 1405 or could alternatively the directory assistance system 1430 could monitor the meet me conference port 1411 to determine if an inbound call 1413 has been received and then forward the communications path 1420 through channel 1405 .
- the third method would be to allow the directory assistance system 1430 , upon receiving a permission message (not shown) from the MDMS server 1450 , to originate a call 1490 directly to the mobile equipment 1470 .
- the directory assistance system 1430 could optionally be programmed to not allow the display of the mobile subscriber's 1470 directory information when this call 1490 was placed. This could be done by appending a special code to the dialing string, routing the call over a special trunk group, replacing the billing information with another string, deleting the billing information, or other similar method known to those skilled in the art.
- FIG. 15 is a system diagram of exemplary network and communications paths to determine the appropriate method of communicating the request to the mobile equipment 1510 .
- the logic flow begins when the requesting party 1500 originates a communications path 1511 to the directory assistance platform 1520 .
- the request 1511 can be a voice communications path, digital data message over a data network, wireless data message or any other similar communications means.
- the directory assistance system 1520 receives the request 1511 it determines if the request is for a mobile subscriber's 1510 directory information that requires a permission release prior to releasing the directory information to the requesting party 1500 .
- the directory assistance system 1520 sends a directory information request 1530 to the MDMS server 1540 .
- the MDMS server 1540 In order for the MDMS server 1540 to determine the best method of communicating 1590 with the mobile equipment 1510 the permission release request with the mobile equipment 1510 , the MDMS server 1540 must first look up the mobile equipment 1510 and determine its capabilities on an a mobile equipment functionality database 1570 . The MDMS server 1540 transmits a message 1560 to the mobile equipment functionality database 1570 and receives a response 1550 as to the features of the mobile equipment 1590 . The MDMS server 1540 then formats the message 1590 in an appropriate manner to be displayed on the mobile equipment 1510 . This MDMS server 1540 can optionally have a default method to transmit the message 1590 in the event the database 1570 is unavailable or does not have data on the particular mobile equipment 1510 .
- the present invention allows a mobile subscriber to designate if a requesting party can access their directory information.
- the granting of this request can be delayed while still providing a mechanism to transmit the information to the requesting party.
- a display of information can be presented to the mobile subscriber in a dynamic manner.
- This disclosed invention can determine and handle communications sessions from trusted sources, automatically store the requesting party's information in an electronic phonebook, and allow a voice communications path between the requesting party and the mobile subscriber.
- the present invention provides an MDMS system capable of offering information services to a requesting party within the operating environment of a wireless telephony network.
- This MDMS system is capable of validating a release of information about a party of interest, typically a mobile subscriber, in advance of any release of such information to a requesting party, such as a wirelessly connected subscriber.
- the MDMS system can support the communication of requested information between the requesting party and the party of interest via the wireless telephony network.
- messaging can be transmitted over a text-based data or voice network to validate the information release.
- the status of the party of interest can be obtained by querying a customer data base prior to sending a message to that mobile subscriber.
- the MDMS system can determine the best manner for sending a message to the party of interest based on information received from a customer data base query.
- a determination to apply answer supervision to a communication session can be based on the grant or denial of permission for the information release.
- Announcements can presented to the requesting party based on the status of messaging for the interested party. In the alternative, announcements can be presented as a result of information gained from the customer data base query.
- Information released to the requesting parry can contain at least a portion of the information collected from the customer data base query.
- the present invention is capable of receiving an index number indicating a request to release contact information for a network subscriber. Permission for the information release is obtained from a network subscriber prior to releasing that information to a requesting party. Upon receiving the permission, the index number is mapped to a communications address, such as a telephone number. The communications address is then transmitted to the requesting party. Although the index number can be formatted to resemble a telephone number, the index number is not valid for reaching the network subscriber on the switched telephone network. The network subscriber can select the option of directly originating a voice conversation with the requesting party to communication the contact information. This conversation can be routed through a “meet me” conference port or number.
- the conversation can be originated by the network subscriber's mobile equipment or from a system serving the requesting party.
- the identity of the network subscriber can be blocked from the requesting party in connection with the origination of this conversation.
- the identity of the network subscriber does not necessarily appear on the requesting party's invoice in connection with that conversation.
- a query for information can be communicated via a wireless telephony network.
- a message can be transmitted to a mobile device associated with a particular mobile subscriber to gain permission to release information.
- the release of the information is controlled, based at least in part on the response received from the mobile device.
- the information is typically communicated to the original party requesting the information after the initial communications path used to make the request is terminated.
- the message requesting permission to release certain information typically includes user selectable options for automatically responding to the message. One option is to respond directly to the party making the initial query via a voice communications path while blocking subscriber contact information. Another option is to respond directly to the party making the initial query via a voice communications path while providing subscriber contact information.
- This initial message requesting permission can be replaced by a substitute message after the expiration of a time period.
- the substitute message contains at least one option to contact the party making the initial query directly via a voice communications channel.
- the substitute message contains at least one option that offers to automatically contact the party making the initial query via a voice communications path without providing the requested contact information.
- the substitute message can contain information that instructs the wireless subscriber on how to manually contact the party making the initial query without providing the wireless subscriber's contact information. The information is sent to the party making the initial query via a text message or is presented to that party via a voice communications path.
- a computer-implemented process can support a determination of whether a directory assistance query requesting information must be preauthorized by a network subscriber prior to any release of such information.
- a determination is made about the type of device used by the party that is requesting the information.
- the device of the requesting party may not be permanently connected to the network via a wired communications path.
- the information can be communicated to the requesting party information via a text message or a voice message.
- the text messaging can be delivered after the original communications path used to make the directory assistance query has been disengaged.
- Another aspect of the invention provides an MDMS system capable of offering information services to a requesting party.
- This MDMS system has the capability of supporting a request for permission from an owner of the information prior to releasing the information.
- the MDMS system supports the delayed granting of permission for the information release.
- the information can be sent to the requesting party via a text message or via a voice communications path. Messaging can be designed to offer multiple owner selectable options in response to the information release request. One option is to call the requesting party directly without providing subscriber contact information during the call set up. Another option is to call the requesting party directly while providing subscriber contact information during the call set up.
- the initial message sent to the information owner to seek permission for release of the request information can replaced by a second “replacement” message after a specified time period.
- a second set of options can be made available in this second message.
- the second message can contain at least one option to contact the requesting party directly via a voice communications channel.
- the second message can contain at least one option that offers to automatically contact the requesting party via a voice communications path without providing the requested contact information.
- the second message can contain information that instructs the wireless subscriber how to manually contact the requesting party without providing the wireless subscriber's contact information.
- a process if provided for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
- a determination is made whether the requesting party is a “trusted” source.
- the request for release of information is communicated to the network subscriber at least in part via a messaging means.
- the requesting party can be queried to release a restriction on their contact information.
- the textual information presented to the network subscriber can be altered if the requesting party is a trusted source.
- the textual information can include at least one menu choice.
- the determination that the requesting party is a trusted source can be made at least in part from network signaling information. In the alternative, the determination that the requesting party is a trusted source can be made at least in part from querying the requesting party directly.
- the requesting party can elect to respond to the query by deciding not to share their contact information.
- the invention can provide a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
- a determination is made whether the requesting party is a trusted source.
- At least two alternative options are communicated to the network subscriber to respond to the request for release of information. If applicable, at least one of the options presented to the network subscriber is presented as a result of the requesting party's status as a trusted source.
- the network subscriber can respond to the query by directly responding to the requesting party. For example, the network subscriber can respond to the query by releasing at least a portion of the subscriber's information. In the alternative, the network subscriber can respond to the query by electing to not allow a release of requested information.
- the requesting party can indicate that their communications address should not be shared with other network users. In the alternative, the requesting party can release their communications address to the network subscriber.
- An alternative aspect of the invention provides a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
- the current location of the network subscriber is identified.
- At least one method of blocking the identity of the network subscriber is identified when an outbound communications attempt is placed from the current location.
- the method to block the identity of the network subscriber is transmitted to the network subscriber.
- the transmission of the identity block is included with a request for permission to release the directory information.
- the subscriber screens can be changed in response to the mobile equipment changing networks after receiving the network block code. In the alternative, the subscriber screens can be changed in response to the mobile equipment changing locations after receiving the network block code.
- the location of the network subscriber contains a code corresponding to the country of the network currently serving the network subscriber.
- the method of blocking the identity of the network subscriber can be determined at least in part by using the country identification.
- the method of blocking the identity of the network subscriber can comprise prefixing a code, such as *67, to the network address when initiating the communications attempt.
- a default code can be stored on in the application on the network subscriber's mobile device.
- a method for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information.
- the requesting party's information is transmitted to the mobile equipment.
- the requesting party's information is typically stored in the mobile subscriber's phonebook.
- the requesting party's information can be edited by the network subscriber prior to storing it in the phonebook.
- the option to store the requesting party's information can be presented to the network subscriber after the network subscriber has attempted to contact the requesting party.
- the requesting party's contact information can differ from the network address provided to the application to contact the requesting party.
- the network address to directly contact the requesting party can change if a delayed grant of permission screen is displayed.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
- Priority is claimed as a continuation application to U.S. patent application Ser. No. 11/336,071, filed Jan. 20, 2006 and entitled “Method And Apparatus For Providing Information in Response To The Grant Of A Subscriber's Permission” (now U.S. Pat. No. 8,718,605), which claims priority under 35 U.S.C. §119 to U.S. Provisional Patent Application No. 60/645,687, filed Jan. 21, 2005, entitled “Methods and Apparatuses for Providing User Authorized Contact Information for a Cellphone Subscriber,” and U.S. Provisional Patent Application Ser. No. 60/723,702, filed Oct. 5, 2005, entitled “Methods and Apparatuses for Providing Directory Information Following the Receipt of Delayed Granting of Subscriber Permission.” The disclosures of the aforementioned priority applications are incorporated herein by reference in their entirety.
- The present invention relates generally to wireless networks and more particularly to the offering of directory assistance for mobile subscribers post receiving the mobile subscriber's permission to release the information. The invention allows the called party to grant or deny permission to release the relevant information to the requesting party as well as providing the relevant information to the requesting party in the event the subscriber's permission is delayed.
- Currently a large percentage of the population own and use a cellular phone, mobile telephone, voice over wireless IP, or other wirelessly connected communications device (hereafter referred to as a mobile subscriber) as their primary method of communication. While the mobile connection is extremely useful for instant communications and accessibility, many mobile subscribers do not wish to publish their number in a directory or allow an information services provider, such as, the directory assistance operator, to have ready access to or disseminate their contact information. The mobile subscriber may desire to limit this access due to numerous reasons; e.g., privacy, limit access from telemarketers, recent changes in their life status, or a plethora of other reasons.
- Currently directory assistance operators use a telephone number database to provide the information services and usually the service is billed to the calling or requesting party's telephone bill. Typically the directory assistance databases are hours, days, weeks or even months old. The directory assistance usually does not provide any information indicating who is allowed to access the directory listing or any restrictions as to the use and dissemination of the subscriber's directory information. Since the directory assistance system is typically an “all or nothing” proposition, this opens up the possibility for abuse of this database or for use of the directory assistance information in a manner that may be adverse to the mobile subscriber's best interest at the time a directory request is made.
- There are two major reasons the mobile subscriber user may wish to restrict certain parties' access to their contact information in real-time. The first being the ready access the mobile phone service provides to the user. Since most users usually carry their mobile phone with them, they can be easily contacted at any time and place using their mobile phone. Today the user can limit this access to callers who they have given their mobile phone number or to others who are trusted by the user at the current time. Since, in this modern world, relationships change at a rapid pace or they tend to be more situational, many mobile subscribers wish to have real-time control over a caller's access to their contact information and provide it to a requesting party on a case-by-case basis. The second reason the user may wish to restrict this information is that often the user is required to pay for all calls made to or from their mobile phone. The user may not wish to pay to talk with certain types of callers or the mobile subscriber may desire to screen who has access to their contact information.
- Typically the method used in landline communications networks to restrict access to directory assistance information has been to allow the user to have an unlisted number. This allows for an opt-out method for the users to restrict their contact information. Another method that has been suggested far disseminating mobile subscriber's contact information is a method where the mobile subscriber can opt-in to a directory or add their number to the directory assistance listing. The problem with both of these methods is that they treat all callers who are requesting directory information with the same level of importance. For instance a mobile subscriber may wish to opt-out (or not opt-in) to a directory in order to limit access by telemarketers; however, the mobile subscriber would like their babysitter to be able get their number from directly assistance in the event of an emergency. There have been numerous efforts to get an opt-in or opt-out mobile phone directory into the market, but these efforts have met with little success in the United States.
- What is required is a method and apparatus that allows a mobile subscriber to control the access to their contact information in real-time or near real-time. This method and apparatus should be able to distinguish between different calling parties and should be able to restrict, limit, or allow access to the contact information, location, address, or other personal information associated with the mobile subscriber on an instance-by-instance basis. What is also needed is a method and apparatus that allows a mobile subscriber to provide a delayed or non-real-time grant of permission to release their information and to have that information routed to the person or device requesting the information.
- The present invention solves the needs of the prior art by providing an inventive solution for offering information services. For one aspect of the invention, a query is received, typically by an MDMS server, based on a request from a requesting party for information about a mobile subscriber of a mobile telephone network. The requested information typically comprises directory assistance information for the mobile subscriber. Directory assistance information can comprise location information, identity, telephone number, address, or other information specific to the mobile subscriber.
- In response to the query, a permission release request is issued to a mobile communication device associated with the mobile subscriber. This permission release request seeks permission for release of the requested information on behalf of the requesting party. The requested information is distributed to the requesting party in response to receipt of a permission release response output by the mobile communication device. The permission release response, typically initiated by an action taken by the mobile subscriber or by automated logic of the communication device, provides permission for communication of the requested information to the requesting party.
- For example, the permission release response can be output by the mobile communication device in response to an automated decision made by logic of the mobile communication device. In the alternative, the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber, based on interactions with a user interface of the mobile communication device. More specifically, the permission release response can be output by the mobile communication device in response to a decision made by the mobile subscriber as a result of a presentation by a user interface of the mobile communication device, the presentation providing an identity of the requesting party.
- The status of the mobile communication device associated with the mobile subscriber can be obtained by requesting status information from a customer data base maintained by the mobile telephone network. The acquisition of this status information, in advance of issuing the permission release request, can facilitate communications with the mobile communication device. For example, an appropriate manner for communicating with the mobile communication device can be identified with access to the status information for that mobile communication device.
- The requested information can distributed to the requesting party in the form one or more of the following: a text message transmitted to the a mobile communication device of the requesting party; an integrated voice response device (IVR) speaking the requested information to the requesting party, an operator calling the requesting party with the requested information; a web page presenting the requested information; a video message transmitted to the mobile communication device of the requesting party; a multimedia message transmitted to the mobile communication device of the requesting party; and an electronic mail message presenting the requested information.
- For another aspect of the invention, an inventive solution is provided for information services in connection with a request made by a requesting party about a mobile subscriber who subscribes to telephony services supported by a mobile telephone network. A request is received from the requesting party for information about the mobile subscriber. In response to the request, a communication is initiated with a mobile subscriber, typically based on a communication to the subscriber's mobile communication device or handset, to seek permission for release of the requested information on behalf of the requesting party. The trigger event for this request for information is an action taken by the requesting party—an individual or entity other than the mobile subscriber—where the subject of the requested information is the mobile subscriber and/or the handset associated with that subscriber. A communication can be received from the mobile subscriber granting permission for release of the requested information to the requesting party. In response to the permission gram, the requested information can be communication to the requesting party.
- For yet another aspect of the invention, a mobile subscriber can control the release of information about that subscriber based on interaction with the user interface of the subscriber's mobile communication device or handset. The mobile subscriber and the mobile communication device are typically associated with a “home” mobile communication network. The mobile communication device can receive a permission release request issued by an information system that is typically implemented as a component independent of the mobile telephone network. The information system can be implemented, for example, as a server, such as an MDMS server, or a part of a directory assistance platform.
- The permission release request seeks permission for release of information about the mobile subscriber to a requesting party. The mobile subscriber can decide whether to release the requested information based on identifying information about the requesting party, such as the telephone number or name of the requesting party, as presented by a user interface of the mobile communication device. If the mobile subscriber elects to grant permission, the subscriber can interact with the user interface to support the issuance of a permission release response from the mobile communication device to the information system. In the alternative, the mobile communications device can include logic that automatically responds to the permission release request by issuing a permission release response via the mobile telephone network. This permission release response provides permission for communication of the requested information from the information system for use by the requesting party.
- Another aspect of the invention supports the communication of information about a mobile subscriber associated with a mobile communications telephone and a mobile telephone network. A directory assistance system or platform can receive a query from a requesting party for information about the mobile subscriber. The directory assistance platform may determine that the requested information is not available at the platform (as a result, for example, of the mobile subscriber being a subscriber of wireless telephony services rather than conventional landline telephony services.). The directory assistance platform can issue a query to an information system, typically implemented as a server or component separate from the directory assistance system, for the requested information. The information system, described herein as an MDMS server, typically operates as equipment independent of the mobile telephone network. In response to the query issued by the directory assistance system, the information system can issue a permission release request from the information system to a mobile communication device associated with the mobile subscriber. This permission release request seeks permission for release of the requested information on behalf of the requesting party. The information system releases the requested information to the directory assistance system, for distribution to the requesting party, in response to receipt of a permission release response output by the mobile communication device. The permission release response provides permission for communication of at least a portion of the requested information to the requesting party.
-
FIG. 1A is an illustration of an information system constructed in accordance with an exemplary embodiment of the present invention. -
FIG. 1B is an illustration of an information system that responds to receipt of a directory assistance query by issuing a request for permission to release information about a mobile subscriber, in accordance with an exemplary embodiment of the present invention. -
FIG. 2 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system. -
FIG. 3 is a flow chart detailing a decision process for determining call handling in an exemplary embodiment of the system. -
FIG. 4 is an illustration of an exemplary example of an initial screen provided to a mobile subscriber requesting permission to release their directory information. -
FIG. 5 is an illustration of an exemplary example of a time out screen provided to a mobile subscriber requesting permission to release their directory information. -
FIG. 6 is an illustration of an exemplary example of a screen providing options for allowing a mobile subscriber to contact a requesting party directly with or without revealing their identity or contact information. -
FIG. 7 is an illustration of a representative example of a flow of screens for presentation to a mobile subscriber in accordance with an exemplary embodiment of the present invention. -
FIG. 8 is an illustration presenting a process for formatting a trigger message to indicate if the telephone number of a requesting party has been screened to ensure presentation of the requesting party s identity, in accordance with an exemplary embodiment of the present invention. -
FIG. 9 is an illustration of representative logic for an application residing on the mobile subscriber's device for screening a message from a telephone number associated with a requesting party in accordance with an exemplary embodiment of the present invention. -
FIG. 10 is an illustration of network components and messages useful for providing the identity blocking code for the current network serving mobile equipment, in accordance with an exemplary embodiment of the present invention. -
FIG. 11 is an illustration of MDMS server logic flow useful for determining the appropriate method of blocking subscriber identifiable information when a mobile subscriber attempts to directly contact a requesting party, in accordance with an exemplary embodiment of the present invention. -
FIG. 12 is an illustration of mobile equipment logic flow for using the calling line identification (CLID) block code if available, in accordance with an exemplary embodiment of the present invention. -
FIG. 13 is an illustration of mobile equipment logic flow for providing an option to automatically add a requesting party's information to a mobile subscriber's personal phonebook, in accordance with an exemplary embodiment of the present invention. -
FIG. 14 is an illustration of a system supporting direct communications between a mobile subscriber and a requesting party, in accordance with an exemplary embodiment of the present invention. -
FIG. 15 is an illustration of a system having an MDMS server useful for determining an appropriate method for communicating an information request to a mobile subscriber, in accordance with an exemplary embodiment of the present invention. - Additional aspects, features and advantages of the invention will become apparent to those skilled in the art upon consideration of the following detailed description of illustrated embodiments exemplifying the best mode for carrying out the invention as presently perceived.
- The present invention answers the deficiencies in the prior art by allowing a mobile subscriber user to allow, restrict, or deny access to their personal information or to alternatively contact the requesting party directly. The invention uses the mobile network to provide a request for information release to a mobile subscriber. The invention also allows the release of the information to the party originally contacting the directory assistance service (requesting party) after the permission is granted by the mobile subscriber.
- An exemplary Mobile Directory Messaging System (MDMS), otherwise described as an information system, allows for a call into a directory assistance facility to be screened to determine if the request was for a landline, mobile, or other type of number. The user query is handled as a normal query if the request is for a landline number; however, if it is determined the caller is attempting to ascertain the number for a mobile subscriber, the MDMS server would use the logic disclosed herein to respond to the request. For example, if the directory assistance platform determines that the requesting party is seeking a mobile number, the MDMS formats a short data message, typically a text message, for transmission to the mobile subscriber's communication device to request the mobile subscriber's permission to release the requested information to the requesting party. The request can contain information, such as, the requesting party's name, requesting party's phone number, type of request, location information, telephone number request, address request, or any other information specific to the mobile subscriber—hereafter referred to as directory information. The mobile subscriber can respond to the request issued by the MDMS server by granting, limiting, or denying the requesting party access to the requested information, namely the directory information. Based on messaging from the MDMS server, the directory assistance system (or operator) can provide the directory information to the requesting party if permission is granted by the mobile subscriber. Alternatively, if the MDMS server determines that permission is withheld by the mobile subscriber or if the mobile subscriber failed to respond to the request, the directory assistance system responds to the MDMS message by transmitting a message to the requesting party to indicate that the directory information is not available. If desirable by the network operator, the requesting party can be charged according to the availability of the directory information for release.
- If however, the mobile subscriber has delayed a grant of permission to release their directory information, the requesting party's contact information can be gathered and stored. When and if the permission grant is eventually received from the mobile subscriber, an exemplary embodiment of the MDMS can be programmed to automatically send the mobile subscriber's directory information to the requesting party. This allows the requesting party to receive the requested information, typically directory information, even if the mobile subscriber's permission grant was delayed by an extended period. For example, the mobile subscriber's device may be turned off or the mobile subscriber declines to promptly respond to the message. The transmission of requested information to the requesting party can take the form of a short message, such as a text message, sent to the requesting party's mobile device, an integrated voice response device (IVR) speaking the directory information to the requesting party or a voice mail, a live operator calling with the directory information, a web page with the relevant directory information, a simple e-mail with the contact directory information, a multimedia message, a video message, or any other appropriate delivery mechanism (hereafter referred to as “Delivery”).
- An exemplary MDMS can be programmed to store the mobile subscriber directory information in the event the requesting party can not be immediately contacted. This allows the requesting party to receive the directory information even if the mobile subscriber is not presently available to promptly respond to the directory information request. The directory information can be stored indefinitely until the MDMS server determines the mobile equipment is available or alternatively the directory information can be made available based on rules defined by the directory assistance provider, mobile operator, MDMS provider, or other interested party.
- In order to facilitate the delayed delivery of the mobile subscriber directory information to the requesting party, an exemplary MDMS can be programmed to capture the identification of the calling number, query a database, and perform an analysis to determine what type of device the requesting party is using to contact the MDMS. The database queried can range from a listing of mobile numbers accessible by the MDMS server, analyzing the calling number to determine if it falls into a range of known mobile numbers, querying an external database such as the mobile number portability database, some combination of these methods, or similar methods to determine the type of device used by the requesting party. If the directory assistance system determines the requesting party is using a known mobile device the MDMS server can be programmed to offer delivery of the mobile subscriber's directory information in the event of a delayed permission gram. The MDMS can also be programmed to determine if the requesting party's network is a partner network and use this information in the analysis of how to provide Delivery of the directory information to the requesting party in the event of delayed permission.
- If the permission grant is not received in real-time from the mobile subscriber, it may be desirable to change the look and feel of the display or information provided to the mobile subscriber. An example of how the messages may change over time is as follows:
-
- The initial message to the mobile subscriber can consist of text similar to (also illustrated in
FIG. 4 ):
- The initial message to the mobile subscriber can consist of text similar to (also illustrated in
-
From Cingular - John Smith at 404-843-0431 is requesting your directory information. May we release it? Yes No If a predetermined period of time elapsed and the mobile subscriber did not respond to the initial message or the MDMS server sent a continua- tion message (e.g., the requesting party had terminated the call), the display would be changed. The second display message would be (also illustrated in FIG. 5): From Cingular - John Smith at 404-843-0431 requested your directory information at 2:30 on Tuesday September 22nd 2005. You can call him back or alternatively we can provide him your directory information directly. I will call Please release my information If the mobile subscriber selected the “No” option on the first screen or the “I will call” option on the second screen, a display similar to the following could then be presented: You can call John Smith at 404-843-0431 while blocking your calling identification. To do this you must dial *67 before the telephone number. Would you like to call now? Yes Yes and block my number No - This string of messages will be dynamic and programmed to change dependant on time and/or user feedback. The message type and extent of the message displayed could also be dependant on the type of mobile device that is being used by the mobile subscriber. For example if the mobile device has the capability to process applications, such as Java or Brew, then the displays could allow for many more choices and could provide more information dependant on elapsed time and/or mobile subscriber input. If however, the mobile device only provided short messaging the message could be formatted to best fit this type of delivery. Also, if the mobile device did not have any signaling capabilities the MDMS could be programmed to deliver the message via a voice channel utilizing an IVR, an operator, or some combination of these methods.
- The different portions of the message can be variable and provided to the application on the mobile equipment in the trigger or subsequent message(s). For example, the name of the mobile network operator can be dynamic and defined by the trigger message. This would allow the mobile operator to change their name or corporate identity/image or to provide this type of service to a mobile virtual network operator (MVNO) without altering the basic software for the application on the mobile equipment. Other examples of fields on the user screens that may be desirable to make dynamic in nature are requesting party's name, requesting party's contact number, date of request, time of request, call block codes, textual information regarding current features available, options available to the mobile subscriber, or other similar fields. It should also be understood that this type information can alternatively be stored on the mobile device, default information can be stored on the mobile device, or the mobile device may be able to ascertain this information independently; e.g., date and time of the request from the clock on the mobile.
- It is also possible for the mobile subscriber to set up the application on the mobile equipment to automatically respond any future messages of a similar type. The mobile subscriber can configure their mobile equipment to automatically accept or alternatively automatically reject all permission requests from the MDMS. Also it is possible for the mobile subscriber to configure their mobile equipment to always accept or reject a request from a certain requesting party or a certain class of requesting parties such as all international requests, all requests from unidentified parties, or all requests from parties not stored in the phonebook on the mobile equipment. If a request is automatically accepted or rejected the mobile equipment can be alternatively configured to provide the mobile subscriber with an alert message stating the request has been automatically handled or the mobile equipment can be configured to hide these alerts from the mobile subscriber. If the mobile equipment was configured to display the automatic handling information the mobile subscriber could then be provided with the option to connect with the requesting party directly as described in this disclosure.
- In order to determine what type of messaging should be sent to the mobile device, an exemplary MDMS server can be programmed to determine the type of mobile device prior to sending any messaging to the mobile subscriber. This information can either be programmed into the MDMS server or the MDMS server can query a database for the relevant information prior to determining how to format and transmit the message to the mobile subscriber. This allows a MDMS to tailor the delivery of the information to match the features and functionality available on the mobile device.
- It may also desirable to determine if the requesting party's information is available and if the requesting party is calling from a number that has been screened by a trusted partner. The information indicating that the call has been screened by a trusted party may be obtained from the call set up message received from the network when the requesting party calls the directory assistance service center. Since most of these calls will be received from users that are subscribers when they dial a predetermined code, such as 411, on the network offering the directory assistance service, the requesting party identity should be known to the directory assistance center serving that network and can be verified, and used to validate the identification of the requesting party or their equipment. However, if the requesting party's information is not available, not screened by a trusted party, the requesting party does not wish to offer their calling information (e.g., unlisted number, or has marked their number as private and not to be released when placing a call), the directory assistance service can provide the option to the requesting party to present or validate their personal contact information for use when requesting release of the mobile subscriber's directory information. The requesting party can release restrictions on use of their identity, validate their identity with the network or directory assistance provider, or continue to restrict the information. If the requesting party releases the information the MDMS server can forward this information on to the subscriber application and the application can present the information to the user with the calling name, phone number, and other data that may be used to identify the requesting party.
- If however, the requesting party indicates their preference to restrict the dissemination of their contact information or maintain the privacy of their information, the directory assistance provider MDMS server, or other device in the network can choose to not allow the message to the mobile subscriber or to request the permission to release the contact information. Alternatively the MDMS server can alter the message to the MDMS application to indicate that the call is from an unscreened or unavailable number. The subscriber application could then be altered to indicate that the message was received from a non-screened number or from a requesting party that chose to keep their identity from the mobile subscriber. This can be done by altering all or part of the user screens, presenting new user screens, altering the sequence of the user screens, offering new user selections, altering existing user selections, any combination of these methods, or other methods that will be obvious to those skilled in the art when taking into account this disclosure.
- It may also desirable to determine the current location, country, or network serving the mobile subscriber whose directory information is being requested and then determine the appropriate code or method to hide or block the calling information associated with the mobile equipment or mobile subscriber. In the United States the code to restrict the transmission of the calling line identity to the calling party is often “*67” dialed before the telephone number; however, it may be different in other countries or networks. This code or method can be transmitted to the application on the phone so it may be displayed to the mobile subscriber or alternatively used in the application on the mobile phone when placing an outbound communications attempt directly from the application on the mobile equipment. This will enable the mobile subscriber to initiate a communications path directly to the requesting party without divulging their identity or contact information. The code to block or hide the identity of the mobile equipment's or mobile subscriber's identity may change depending on the current serving network. It also might not be possible or necessary to block the identity of the mobile equipment or mobile subscriber. If this were the case the subscriber application could be programmed not to offer this option or alternatively to alert the mobile subscriber to this restriction or modification in the operation of the application.
- One potential problem in providing the application on the phone with the code to block, the identity of the mobile equipment or mobile subscriber is that the mobile equipment may change networks, locations, or countries before the mobile subscriber views the message or attempts to communicate directly with the requesting party. It is possible for the mobile equipment to move into another network where the identity block or code originally provided to the application does not work as expected, may not be valid, or may cause an error in providing the service. In this instance it is desirable for the subscriber application to monitor the network serving the mobile equipment when it receives the identity block code and to determine if the mobile equipment has entered a subsequent network where the current code or method may not be valid. If this occurs the subscriber application can be programmed in such a manner as to not offer the option of blocking the identity, inform the mobile subscriber that blocking the identify is not an option, remove the menu choice that allows the mobile subscriber to directly contact the requesting party, or other similar methods that will become obvious to those skilled in the art when taking into account this disclosure.
- Once the application on the mobile equipment had the information as to the contact number and possibly the name of the requesting party, it would be helpful if the application on the mobile equipment would allow the mobile subscriber the option to automatically edit and store this information into their existing personal phonebook, mobile equipment phonebook, or subscriber identity module phonebook. The preferred method to accomplish this would be for the application on the mobile equipment to be programmed to offer this option to the subscriber if a message contained at least the contact number of the requesting party. The application on the mobile equipment should provide the mobile subscriber with the opportunity to edit the information prior to storing it into the phonebook to allow the mobile subscriber to add any missing information, change the format of the phonebook name to better fit their current phonebook format, to change the name of the requesting party to be more recognizable, or to allow the entry to be saved with a name that is easier for the mobile subscriber to find at a later date (e.g., allow the entry to be saved under nicknames or as a relationship to the mobile subscriber).
- If the mobile number is unscreened by the network the application on the mobile equipment can be programmed to not allow the mobile subscriber to automatically contact the requesting party directly; however, it may still be desirable to allow the mobile subscriber to automatically store the requesting party's contact information into their personal phonebook. This would allow the mobile subscriber to contact the requesting party outside of the MDMS application on the mobile phone.
- It is also possible for the number used by the application on the mobile equipment to contact the requesting to be different from the direct contact number of the requesting party. An example of this is if the directory assistance provider desires to allow the mobile subscriber the option to automatically connect to requesting party via a voice channel while the requesting party is holding on the directory information system and waiting for the requested information. If this were the case, it may be desirable to route the communications from the mobile subscriber through a communications system connected to the directory assistance platform where the requesting party is currently holding. This would allow the mobile subscriber to automatically contact the requesting party while they were holding for the directory information. This functionality could also be provisioned to automatically block the mobile subscriber's phone number or other identifiable information.
- If it were desirable to allow the voice connection while the requesting party was holding the message to the mobile application would need to include the direct contact number for the requesting party so this number could be stored in the phonebook. The message to the mobile application would also need to include a second routing number that could be used to contact a meet me type platform where the requesting party was holding. The meet me conferencing system will allow the two inbound communications paths to be joined. This would allow the mobile equipment to originate a call back to the conference port where the requesting party's call was currently parked or monitoring. When the call from the mobile equipment arrived the meet me conferencing system would then recognize the incoming communications and would bridge the requesting party's and mobile subscriber's voice communications paths together. This would allow these parties to communicate without divulging any of the mobile subscriber's directory information to the requesting party. A third option of making this connection. The direct connect functionality should be provisioned on the user screens when attempting to gain permission for the release of the requested directory information from the mobile subscriber in real time; however, it may not be desirable to allow this functionality when requesting a delayed grant of permission.
- Yet another exemplary method of providing the direct voice connection is to allow a message from the mobile subscriber to the MDMS server indicating that a voice communications path was approved. This would trigger an outbound call from the directory information system serving the requesting party to the mobile subscriber. The major problem with this method is that the requesting party may then see the mobile subscriber's directory information when they received their bill for this call. In order to hide the mobile subscriber's directory information the directory information system serving the requesting party would be instructed to suppress the mobile subscriber's directory information. One method of performing this would be for the directory information system placing the call to the mobile subscriber to prefix a dialing code to the mobile subscriber's contact number. This prefix would cause the call to be routed over special trunks that caused the called number contact information to be suppressed.
- Turning now to the drawing set,
FIG. 1A is an illustration of an exemplary system having a network and communications path between a requestingparty 110 through thedirectory assistance platform 130 and out to themobile subscriber 170 with a return path to the requestingparty 110. The session initiates with acall 120 from the requestingparty 110 to thedirectory assistance platform 130. Once thecall 120 arrived thedirectory assistance platform 130 would screen thecall 120 to determine if it was destined for a mobile subscriber or mobile equipment. If it was determined the call was destined for a mobile subscriber or mobile equipment, the platform would send amessage 140 to theMDMS server 150 requesting permission to release the mobile directory information. Arequest message 160 would then be sent to themobile subscriber 170 in themobile network 180. In the case illustrated inFIG. 1A if the mobile subscriber does not immediately respond to the permission request message, it would cause a time out in theMDMS server 150 and would trigger a time outmessage 190 to thedirectory assistance platform 130. Thedirectory assistance platform 130 would then determine if the original callingparty 110 requesting the directory information was using a device that could receive a text message or other multimedia protocol. The preferred method to determine how to provide the directory information to the callingparty 110 is to look up the device in adatabase 111 of known devices and then determine the method for providing the directory information to the callingparty 110. It is even possible to perform a look up to determine the type of device and the extent of the service provisioned on the device (not shown). This functionality could be performed on the initial look up or on a subsequent look up in a second database (not shown). The equipment look, up 119 intodatabase 111 would trigger anequipment type response 112 that would provide an indication if the callingparty 110 was appropriately equipped to receive a delayed transmission of the requested directory information. This same functionality can also be achieved by determining the directory system that sent the request, facility on which the request is received, address of the directory assistance request, or other similar means that will be known to those skilled in the art. If thedirectory assistance system 130 determined thatdevice 110 was served by a network that was capable of receiving amessaging protocol 100 and thedevice 110 was so equipped, thedirectory assistance platform 130 would then offer the option of providing a delayed message containing the directory information fordevice 170 and the directory information for thedevice 110 would be associated with the outstanding message to thedevice 170. - If the
mobile subscriber 170 responded to the query to release thedirectory information 114 or the mobile equipment was programmed to automatically respond to the message, theMDMS server 150 would receive themessage 114 and would then determine the mobile subscriber directory information and transmit apermission grant message 113 to thedirectory assistance platform 130. Themessage 113 typically contains the mobile subscriber directory information maintained by theMDMS server 150 for themobile subscriber 170. The receipt by thedirectory assistance platform 130 of themessage 113 would trigger the transmission of amessage 115 with the directory information to the requestingparty 110. While the exemplary method can send this message as a text message sent via short message service, the message can be implemented by multimedia, voice, video, or other similar form of conveying the information to the requestingparty 110. - One skilled in the art, using this disclosure, can see how the delayed permission to release mobile subscriber's directory information method described above can be modified to combine functionality into one platform or further split out among multiple different components and databases. One skilled in the art, using this disclosure, can also see how it is possible to provide the same functionality by placing the messaging means to contact the requesting
party 110 directly into the mobile subscriber'sdevice 170. This would allow themobile subscriber 170 to message the requestingparty 110 at their leisure and perhaps even include additional user defined information (not shown). -
FIG. 1B is a detailed illustration of a representative operating environment for an information system operative to receive a directory assistance query from one of a number of directory assistance providers. Once thedirectory assistance provider 1600 determined the request for information required permission from themobile subscriber 1607, it would send aquery message 1620 to theMDMS server 1630. Thisquery 1620 would cause theMDMS server 1630 to send out a message to the customer database (shown as a home location register—HLR 1605) of themobile network 1601. This query is designed to provide a routing number for themobile equipment 1625, the current status of the mobile account, as well as to determine certain features and functionality of themobile equipment 1625. At approximately the same time, the query would trigger anequipment lookup 1680 to be sent to an equipment functionality database (shown as the CARD platform; however, this platform is typically not defined by the standards in the industry and may be incorporated into other network elements or called by another name) 1690 in thehome mobile network 1601. This step may not be required in some networks that have a more homogeneous distribution of mobile phones with the enhanced functionality needed to display text and menus. Example of these types of network and functionality are GSM with JAVA deployed on a majority of the SIM cards and CDMA networks with BREW functionality deployed on the handsets. Theequipment lookup 1680 is designed to provide the functionality of themobile equipment 1625 so that theMDMS server 1630 can make a determination of the most appropriate method of formatting a message to the specific mobile equipment. 1625. Once theMDMS server 1630 knows the location of themobile equipment 1625 and the most appropriate method to send adata message 1670 to themobile equipment 1625, it can format themessage 1670 and send it to themobile equipment 1625. In this exemplary illustration themessage 1670 is shown as a short message on aGSM network 1601; however, one skilled in the art, using this disclosure, can easily determine how thismessage 1670 may be transported on a multitude of different data or voice communications paths to themobile equipment 1625 or can be transported across almost any type of wireless network, in this exemplary illustration themessage 1670 is transported through a mobile switching system (show as the MSC) 1625. Once themobile equipment 1625 receives thepermission message 1670 and themobile subscriber 1607 ormobile equipment 1625 indicated their preference (note—themobile equipment 1625 may be optionally set to automatically respond to the permission message with a preconfigured response), themobile equipment 1625 would then send amessage 1660 back to theMDMS server 1630 indicating their granting/withholding of the mobile subscriber's permission. TheMDMS server 1630 would then format and transmit theappropriate permission message 1650 to thedirectory assistance provider 1600 originally generating thequery 1620. If however, the originally requesting party hangs up before thepermission message 1650 is received, thedirectory assistance provider 1600 would send anabandon message 1640 indicating that the originally requesting party has abandoned their initial request. TheMDMS 1630 would than handle the session as appropriate. If theoriginal query message 1620 indicated that the requesting party had delayed permission grant theMDMS server 1430 would forward the delayed permission grant to thedirectory assistance provider 1600 when and if it was received from themobile equipment 1625. -
FIGS. 2 and 3 are flow charts illustrating an exemplary method useful for determining how to handle the query requesting the directory information from the mobile subscriber and illustrating the an exemplary method of delayed granting of permission to release the mobile subscriber's directory information Turning now toFIGS. 1A , 1B, 2 and 3, the exemplary process begins when the requestingparty 1606 issues an incoming request for information, typically a directory information request, instep 280. In response to the incoming request, adirectory assistance platform 1600 conducts an inquiry instep 290 to determine whether the incoming request is destined for a mobile user, such as themobile subscriber 1607. If the response to this query is negative, thedirectory assistance platform 1600 treats the incoming request as a normal directory assistance request instep 250. If the incoming request is destined for a mobile user, however, theMIMS server 1630 conducts an inquiry instep 233 to determine if the cell number for the mobile user is known. If the mobile address is known theMDMS server 1630 then send acustomer database request 1610 instep 214 to the mobile network's 1601 customer database 1605 (FIG. 1B represents this database as an home location register or HLR). If themobile equipment 1625 number is not known, then thedirectory assistance platform 1600 plays an announcement instep 260 to indicate that the mobile number for themobile user 170 is not available. In addition, thedirectory assistance platform 1600 determines, instep 230, if an alternate number is known. If so, thedirectory assistance platform 1600 conducts an inquiry instep 220 to determine whether the requestingparty 1606 wants the alternate number. If the requestingparty 1606 wants the alternate number, thedirectory assistance platform 1600 processes the call as a normal directory assistance call instep 250. If the requestingparty 1606 does not want the alternate number, thedirectory assistance platform 1600 terminates the call instep 210. If the call is terminated, the directory assistance system operator can choose not to provide answer supervision back to the telephone network so the calling party does not pay for the failed directory assistance attempt. - Picking up the exemplary sequence just after the customer data base query,
step 214, theMDMS server 1630 then would receive a response to themessage 1610 from thecustomer database 1650 indicating what is known about themobile subscriber 1607 and themobile equipment 1625. If the location of themobile equipment 1625 was not known or it was not currently attached to a network, thedirectory assistance system 1600 would then play announcement instep 260 indicating that themobile subscriber 1607 is not available, determine if the alternate number is known,step 230, and if the requestingparty 1606 desires to obtain the alternate number,step 220. If the requestingparty 1606 wants the alternate number the call is handled as a normal directory assistance call,step 250. If the requestingparty 1606 does not want the alternate number the call is terminated instep 210. If the call is terminated the director assistance system operator can optionally choose not to provide answer supervision back to the telephone network so the requestingparty 1606 does not pay for the failed directory assistance attempt. - Picking up the sequence just after the mobile system customer
database query return 1610,step 213, theMDMS server 1630 would then execute logic for determining and handling a call from a screened or unscreened caller (logic flow begins at point B and returns at point C, the exemplary logic sequence is illustrated inFIG. 8 and discussed later in this disclosure) then would send out a data message to the last known location of themobile equipment 1625 as shown instep 217. TheMDMS server 1630 would then start a timer instep 218 to ensure the message return from themobile equipment 1625 was within the acceptable wait time for the requestingparty 1606. TheMDMS server 1630 would then go into a loop of checking to see if the timer has expired,step 215, and checking to see if a permission message was received,step 219, from themobile equipment 1625. If the timer expires before the message is received, theMDMS server 1630 would then determine if the requestingparty 1606 was calling from a device that was capable of receiving a delayed message,step 225. If the requesting party was calling from adevice 1606 that could receive a delayed response, thedirectory assistance system 1600 would then play an announcement,step 224, and query the requestingparty 1606 if they desire to receive a delayed message (point A refers to a continuation of the logic sequence inFIG. 3 ) provided themobile subscriber 1607 provides permission releasing the directory information,step 310. If the requesting party did not desire delayed notification thecommunications session 1607 would be terminated; however, if the requestingparty 1606 chose to be notified in the event of a delayed permission grant, thedirectory assistance system 1600 would collect and store the requesting party's 1606 contact information, shown instep 320, and begin monitoring to determine if the permission had been received from themobile subscriber 1607,step 350. TheMDMS server 1630 would also start a second timer,step 340, to determine if theMDMS server 130, should abandon the attempt to contact the mobile subscriber,step 370, and end the process,step 380. If however, the delayedpermission 1660 is received from themobile subscriber 1607, theMDMS server 1630 would send amessage 1650 to thedirectory assistance system 1600 and thedirectory assistance system 1600 would then send a message to the requestingparty 1606 with the directory information,step 360, and end the process,step 380. - Looking now to step 219, if the
message 1660 from themobile subscriber 1607 was received before the timer expired, theMDMS server 1630 would then determine if themobile user 1625 had granted their permission,step 222. If the user denies permission, theMDMS server 1630 anddirectory assistance system 1600 handles therequest 1607 as described above starting atstep 230. If the mobile user granted their permission, then thedirectory assistance system 1600 would give answer supervision,step 229, to ensure the requestingparty 1606 was billed and then provide the mobile number to the requestingparty 1606. The session would then be terminated,step 223. -
FIG. 4 is an illustration of an exemplary screen that can be provided by the application on themobile equipment 1625 to the mobile subscriber requesting the release of the directory information. The screen inFIG. 4 is broken up into several sections.Section 410 consists of a statement and or a question from the mobile subscriber'snetwork operator 1601 asking for the real-time permission to release the directory information to the requestingparty 1606. This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that themobile subscriber 1607 will not be billed for this call.Section 420 is the default selection and in this example is the permission grant to release the directory information to the requestingparty 1606.Section 430 comprises other selections that can be chosen by themobile subscriber 1607. In this example, these selections consist of a method to decline to release the directory information to the requestingparty 1606 and a selection that provides more information. -
FIG. 5 is an illustration of an exemplary screen that would be displayed in place of the screen shown inFIG. 4 in the event of encountering a time out as contemplated in 215. The screen inFIG. 5 is broken tip into several sections.Section 510 consists of a statement and or a question from the mobile subscriber'snetwork operator 1601 asking for the delayed permission to release the directory information to the requestingparty 1606. This section can contain information such as the requesting party's 1606 name, requesting party's 1606 contact information, time of the original request, the mobile network operator's 1601 identification, an explanation of the request, and even possibly a statement indicating that themobile subscriber 1607 will not be billed for this call.Section 520 is the default selection and in this example is an indication that themobile subscriber 1607 can call the requestingparty 1606 back directly.Section 530 comprises other selections that can be chosen by themobile subscriber 1607. In this example, these selections consist of a method to grant the delayed release the directory information to the requestingparty 1606, a selection that allows themobile subscriber 1607 to ignore the message, and a selection that provides more information. -
FIG. 6 is an illustration of an exemplary screen that would be displayed if themobile subscriber 1607 chose the “I will call”default option 520 inFIG. 5 . The screen inFIG. 6 is broken up into several sections.Section 610 consists of a statement explaining that themobile subscriber 1607 can contact the requestingparty 1606 without revealing their identity or telephone number.Section 610 can include information on how to manually contact the requestingparty 1606 without disclosing the mobile subscriber's 1625 identity.Section 610 in this example also contains a question asking themobile subscriber 1607 if they would like to call back the requestingparty 1606.Section 620 is the default selection and in this example instructs themobile device 1625 to call the requestingparty 1606 while blocking anymobile subscriber 1607 identifiabledirectory information Section 630 is comprised of other selections that can be chosen by themobile subscriber 1607. In this example these selections consist of a selection that instructs themobile device 1625 to call back the requestingparty 1606 without blockingmobile subscriber 1607 identifiable directory information and a selection that allows themobile subscriber 1607 to ignore the message. - Turning now to
FIG. 7 . This Figure is an illustration of the exemplary flow of the screens displayed to themobile subscriber 1607.Screen 710 is the initial screen. If themobile subscriber 1607 selects the “yes”choice 720 the application will send a message to theMDMS server 1630 and the directory information will be released 730 to the requestingparty 1606. If themobile subscriber 1607 selects either the “No” 740 or “More information” 750 choice, then screen 711 will be presented explaining how to contact the requestingparty 1606 while allowing the requestingparty 1606 to see the mobile subscriber's 1625directory information 713 or alternatively while blocking the mobile subscriber's 1625directory information 712.Screen 711 also allows an option not to call back the requestingparty 714. - If the
mobile subscriber 1607 does not choose an option onscreen 710 the screen will automaticallytimeout 760 and present asreplacement screen 770. This screen will present options that will allow themobile subscriber 1607 to call the requestingparty 1606 directly 790 which, if selected, will presentscreen 711 with the options described above. Themobile subscriber 1607 can also choose to provide a delayed release of theirdirectory information 716, ignore themessage 715, or obtainmore information 733. The option “Please release my information” would only be displayed if theMDMS server 1630 determined it had a valid route to send the directory information to the requestingparty 1600 on a delayed basis. If theMDMS server 1630 determined that it did not have a valid route to contact the requestingparty 1606 it would not display thisoption 780. If themobile subscriber 1607 chooses “More information” 733 onscreen 770, then screen 711 will be presented with the choices defined above. While these screens are being presented to themobile subscriber 1607 the other buttons and selections on themobile device 1625 will continue to operate as normal. For example, themobile subscriber 1607 will be able to choose to go back a screen, end the session, or interrupt the session at any point. - Turning now to
FIG. 8 . This Figure represents a flow diagram for an exemplary subroutine that allows thedirectory system 1600 or other designated entity in the network to process messages from a screened and an unscreened requestingparty 1606. The subroutine starts at point B and the first step is to determine if the communications attempt 1606 is from a screened address,step 810. A requestingparty 1606 can be screened by several methods. The requestingparty 1606 can be screened by originating a call from adevice 1606 that is known by a trusted partner or network provider, by identifying themselves via the answer to queries or challenges from the network, or by other means known to those skilled in the art. If the requesting party's 1606 address is not from a screened address thedirectory system 1600 will set the screened number flag to unscreened in the message to be sent to the application on the user device, step 820. If the directory assistance system determines requesting party's 1606 address is from a screened number thedirectory assistance system 1600 will set the screened number flag to screened,step 830, and pass aquery message 1620 to theMDMS server 1630. TheMDMS server 1630 will then determine the servingmobile network 1601 for themobile subscriber 1607 whose directory information is being requested,step 840. TheMDMS server 1630 will then lookup the algorithm or dialing sequence needed to block the identity of themobile subscriber 1607 originating the call from theparticular network 1601,step 850. TheMDMS server 1630 then includes this code into the trigger message to be transmitted to the mobile subscriber whose directory information is being requested,step 860. - Turning now to
FIG. 9 , this illustration presents an exemplary process that allows the application on the mobile subscriber'sequipment 1625 to process details regarding a screened message. The application begins with the application on themobile equipment 1625 determining if the trigger message indicates if the requestingparty 1606 is originating theircommunications 1607 from a screened or unscreened device orlocation 910. If thetrigger message 1670 indicates the call is not from a screened caller, themobile equipment application 1625 can be configured to present themobile subscriber 1607 with screens that only allows themobile subscriber 1607 to call back while not revealing their identity,step 920. If theoriginal request 1607 is from anunscreened party 1606, themobile subscriber 1607 might not be allowed to release their directory information or to provide unique identifiable information if they chose to contact the requestingparty 1606 directly. The application can also be configured to not reveal the calling number or name of an unscreened requestingparty 1606. This will ensure that themobile subscriber 1607 can readily identify an unscreened requestingparty 1606 and will assist themobile subscriber 1607 to only reveal as much information as desired to an unscreened party. If theoriginal request 1607 is from a screened or trusted source, the application on the mobile subscriber'sdevice 1625 can be configured to display the address of the requestingparty 1606, display the name of the requestingparty 1606, provide the option to contact the requestingparty 1606 while displaying their identity,step 950, and place any other indicators in the message indicating that the requestingparty 1606 identity was screened or trusted,step 960. - Turning now to
FIG. 10 , this illustration presents an exemplary network architecture having anMDMS platform 1070 that can determine the location ofmobile equipment 1010 in either ahome network 1020 or a visitednetwork 1000 in order to determine a usable method of blocking the mobile equipment's 1010 or mobile subscriber's identity for a communications session. The mobile equipment first sends out a signal when arriving at anew network location 1030. Thissignal 1030 updates the location of themobile equipment 1010 in themobile subscriber database 1040. TheMDMS platform 1070 then can query 1050 themobile subscriber database 1040. Themobile subscriber database 1040 would then reply 1060 to the query with a number of parameters that may include the current location ornetwork 1000 where themobile equipment 1010 is located. Once this information is obtained from themobile subscriber database 1040 in thehome mobile network 1020, theMDMS platform 1070 launches aquery 1080 to adatabase 1090 that maps the location of themobile equipment 1010 with the code to block or hide the identity of the mobile equipment or mobile subscriber when communicating with another point on the network. The database 10.9 can be internal or external to theMDMS platform 1070 or may alternatively be a part of another network element. Once theresponse 1013 identity blocking or hiding code was determined, theMDMS platform 1070 could then either send aseparate message 1011 to the mobile equipment containing this code or could include this code into themessage 1011 sent to request permission to release the directory information to the requesting party. - Turning now to
FIG. 11 , this illustration presents an exemplary logic flow used by theMDMS server 1630 to determine the appropriate method for the application on themobile device 1625 to use to block their identification from another network user when contacting them directly. The exemplary logic, implemented by a subroutine, starts by looking up themobile subscriber 1607 whose directory information is being requested on themobile subscriber database 1605 in thehome network 1601 and determining if a serving network, location, or country code is available from this lookup,step 1110. If the network code is not available the subroutine will continue with sending apermission message 1670 without an identity block code,step 1130, or with a generic identity block code. Alternatively, the application on themobile device 1625 may have a generic identity block code stored to be used if thetrigger message 1670 does not contain a valid identity block code. If the country code, network code, location information, or other similar information is available instep 1110, then theMDMS server 1630 would look up the identification block code for the given network,step 1120. TheMDMS server 1630 would then determine if the identification block code was available in the database,step 1140. If this code was not available, the subroutine will continue with sending the message without an identity block code,step 1130, or with a generic identity block code. If the identification block code was available theMDMS server 1630 would then include the appropriate network block code in atrigger message 1670,step 1150, to the application on the mobile equipment, subscriber identification module, or other similar device (all of these devices are represented by 1625) that would present the information to themobile subscriber 1607. - Turning now to
FIG. 12 , this illustration presents an exemplary subroutine describing themobile equipment 1625 logic flow for using the calling line identification (CLID) block code, if present, in the message from theMDMS server 1630. The first step in this subroutine is to determine if thetrigger message 1670 contains a code to block or hide the identification of themobile equipment 1625 or themobile subscriber 1607 when communicating directly with another network user,step 1210. If thetrigger message 1670 does not contain the identification block code, the application on themobile equipment 1625 can withhold or limit the option to allow themobile subscriber 1607 to contact the requestingparty 1606 directly,step 1230. If thetrigger message 1670 contains the identification block code, the application on themobile equipment 1625 can display the appropriate text and options to allow themobile subscriber 1607 to contact the requestingparty 1606 directly,step 1220. - Turning now to
FIG. 13 , this illustration presents an exemplary subroutine describing the mobile equipment logic flow for automatically storing the requesting party's 1606 information into the mobile subscriber's 1607 phonebook. The subroutine starts with determining if the number of the requestingparty 1606 is available,step 1310. If the number of the requestingparty 1606 is not available then the application on themobile equipment 1625 would not provide the option to store the information in the phone book,step 1340. If the number of the requestingparty 1606 is available the logic would then determine if the name of the requestingparty 1606 is available,step 1320. If the name of the requestingparty 1606 is available, the logic of themobile equipment 1625 application can then allow themobile subscriber 1607 to edit the information,step 1360, before saving the information into the phonebook. This would allow amobile subscriber 1607 to save the information in a preferred form and format and it would allow themobile subscriber 1607 to use a similar format as their other phonebook entries. If the requesting party's 1606 name was not available or was incorrect, the logic of the application on themobile equipment 1625 would then prompt themobile subscriber 1607 to enter the name of the requestingparty 1606,step 1330. This will allow themobile subscriber 1607 to enter an appropriate name for the requestingparty 1606 as the phonebook entry. Althoughstep 1330 is shown in this example as a separate step, one skilled in the art can see how this step can easily be made a part of theedit step 1350. Once the mobile subscriber has been given the opportunity to edit the information,step 1350, themobile equipment 1625 application would then allow the entry to be saved into the existingmobile subscriber 1607 phonebook,step 1360. - The subroutine depicted in
FIG. 13 can be placed at any point in the application or can be made a menu choice for themobile subscriber 1607 to select; however, it would be more effective to execute this logic after themobile subscriber 1607 has released theirdirectory information party 1606 directly themobile subscriber 1607 may have collected more information on the requesting party 1606 (e.g., actual name instead of network calling name identification) and may have assigned a different priority to the requestingparty 1606. -
FIG. 14 is a system diagram of an exemplary network, communications paths, and various options to provide a direct voice connection(s) 1490, 1413, 1480 between the requestingparty 1410 and themobile subscriber 1470 while still allowing themobile subscriber 1470 to restrict the dissemination of their directory information and to allow themobile subscriber 1470 to control the origination of thecommunication path normal directory call 1420 to thedirectory assistance platform 1430. When thedirectory assistance system 1430 determines that the call requires approval for release of the directory information it sends arequest 1440 to theMDMS server 1450. This triggers a request for release ofpermission 1460 to themobile equipment 1470. One of the options that could be displayed on themobile equipment 1470 to the mobile subscriber would be to establish a voice path directly to the requestingparty 1410. There are three different methods illustrated inFIG. 14 to achieve this goal. The first method is to allow themobile equipment 1470 to place acall 1480 directly to the requesting party's 1410 contact number. In order to not disclose the identity of the mobile subscriber or themobile equipment 1470 the application would prefix, to the dialing string, the outbound call with a code to block the identity of themobile equipment 1470. The second method would be for theMDMS server 1450 to transmit a meet meconference number 1411 to the application on themobile equipment 1470. Themobile equipment 1470 could then be programmed to place anoutbound call 1413 to the meet meconference number 1411 and thedirectory assistance system 1430 serving the requesting party's 1410call 1420 could either automatically forward thecall 1420 to the same meet meconference port 1411 through voice channel 1405 or could alternatively thedirectory assistance system 1430 could monitor the meet meconference port 1411 to determine if aninbound call 1413 has been received and then forward thecommunications path 1420 through channel 1405. The third method would be to allow thedirectory assistance system 1430, upon receiving a permission message (not shown) from theMDMS server 1450, to originate acall 1490 directly to themobile equipment 1470. Thedirectory assistance system 1430, or other network component, could optionally be programmed to not allow the display of the mobile subscriber's 1470 directory information when thiscall 1490 was placed. This could be done by appending a special code to the dialing string, routing the call over a special trunk group, replacing the billing information with another string, deleting the billing information, or other similar method known to those skilled in the art. -
FIG. 15 is a system diagram of exemplary network and communications paths to determine the appropriate method of communicating the request to themobile equipment 1510. The logic flow begins when the requestingparty 1500 originates acommunications path 1511 to thedirectory assistance platform 1520. One skilled in the art can determine, based on the teachings of this disclosure, how therequest 1511 can be a voice communications path, digital data message over a data network, wireless data message or any other similar communications means. When thedirectory assistance system 1520 receives therequest 1511 it determines if the request is for a mobile subscriber's 1510 directory information that requires a permission release prior to releasing the directory information to the requestingparty 1500. If therequest 1511 requires the mobile subscriber's permission, thedirectory assistance system 1520 sends adirectory information request 1530 to theMDMS server 1540. In order for theMDMS server 1540 to determine the best method of communicating 1590 with themobile equipment 1510 the permission release request with themobile equipment 1510, theMDMS server 1540 must first look up themobile equipment 1510 and determine its capabilities on an a mobileequipment functionality database 1570. TheMDMS server 1540 transmits amessage 1560 to the mobileequipment functionality database 1570 and receives aresponse 1550 as to the features of themobile equipment 1590. TheMDMS server 1540 then formats themessage 1590 in an appropriate manner to be displayed on themobile equipment 1510. ThisMDMS server 1540 can optionally have a default method to transmit themessage 1590 in the event thedatabase 1570 is unavailable or does not have data on the particularmobile equipment 1510. - One skilled in the art, when considering this disclosure, can determine how the functionality illustrated in the figures and described in the disclosure can be readily performed by the other platform or elements in the described network, be incorporated into existing platforms in the network, be incorporated into new platforms, or other similar implementations without impacting the overall intent or functionality of the invention disclosed. In view of the foregoing, it can be seen that the present invention allows a mobile subscriber to designate if a requesting party can access their directory information. The granting of this request can be delayed while still providing a mechanism to transmit the information to the requesting party. A display of information can be presented to the mobile subscriber in a dynamic manner. This disclosed invention can determine and handle communications sessions from trusted sources, automatically store the requesting party's information in an electronic phonebook, and allow a voice communications path between the requesting party and the mobile subscriber.
- For one aspect, the present invention provides an MDMS system capable of offering information services to a requesting party within the operating environment of a wireless telephony network. This MDMS system is capable of validating a release of information about a party of interest, typically a mobile subscriber, in advance of any release of such information to a requesting party, such as a wirelessly connected subscriber. The MDMS system can support the communication of requested information between the requesting party and the party of interest via the wireless telephony network. For example, messaging can be transmitted over a text-based data or voice network to validate the information release. The status of the party of interest can be obtained by querying a customer data base prior to sending a message to that mobile subscriber. Indeed, the MDMS system can determine the best manner for sending a message to the party of interest based on information received from a customer data base query. A determination to apply answer supervision to a communication session can be based on the grant or denial of permission for the information release. Announcements can presented to the requesting party based on the status of messaging for the interested party. In the alternative, announcements can be presented as a result of information gained from the customer data base query. Information released to the requesting parry can contain at least a portion of the information collected from the customer data base query.
- For an alternative aspect, the present invention is capable of receiving an index number indicating a request to release contact information for a network subscriber. Permission for the information release is obtained from a network subscriber prior to releasing that information to a requesting party. Upon receiving the permission, the index number is mapped to a communications address, such as a telephone number. The communications address is then transmitted to the requesting party. Although the index number can be formatted to resemble a telephone number, the index number is not valid for reaching the network subscriber on the switched telephone network. The network subscriber can select the option of directly originating a voice conversation with the requesting party to communication the contact information. This conversation can be routed through a “meet me” conference port or number. In the alternative, the conversation can be originated by the network subscriber's mobile equipment or from a system serving the requesting party. Significantly, the identity of the network subscriber can be blocked from the requesting party in connection with the origination of this conversation. Dependent on the implementation for the conversation, the identity of the network subscriber does not necessarily appear on the requesting party's invoice in connection with that conversation.
- For another aspect of the present invention, a query for information can be communicated via a wireless telephony network. A message can be transmitted to a mobile device associated with a particular mobile subscriber to gain permission to release information. The release of the information is controlled, based at least in part on the response received from the mobile device. The information is typically communicated to the original party requesting the information after the initial communications path used to make the request is terminated. The message requesting permission to release certain information typically includes user selectable options for automatically responding to the message. One option is to respond directly to the party making the initial query via a voice communications path while blocking subscriber contact information. Another option is to respond directly to the party making the initial query via a voice communications path while providing subscriber contact information. This initial message requesting permission can be replaced by a substitute message after the expiration of a time period. The substitute message contains at least one option to contact the party making the initial query directly via a voice communications channel. In the alternative, the substitute message contains at least one option that offers to automatically contact the party making the initial query via a voice communications path without providing the requested contact information. Or the substitute message can contain information that instructs the wireless subscriber on how to manually contact the party making the initial query without providing the wireless subscriber's contact information. The information is sent to the party making the initial query via a text message or is presented to that party via a voice communications path.
- For yet another aspect of the invention, a computer-implemented process can support a determination of whether a directory assistance query requesting information must be preauthorized by a network subscriber prior to any release of such information. A determination is made about the type of device used by the party that is requesting the information. For example, the device of the requesting party may not be permanently connected to the network via a wired communications path. The information can be communicated to the requesting party information via a text message or a voice message. The text messaging can be delivered after the original communications path used to make the directory assistance query has been disengaged.
- Another aspect of the invention provides an MDMS system capable of offering information services to a requesting party. This MDMS system has the capability of supporting a request for permission from an owner of the information prior to releasing the information. The MDMS system supports the delayed granting of permission for the information release. The information can be sent to the requesting party via a text message or via a voice communications path. Messaging can be designed to offer multiple owner selectable options in response to the information release request. One option is to call the requesting party directly without providing subscriber contact information during the call set up. Another option is to call the requesting party directly while providing subscriber contact information during the call set up. The initial message sent to the information owner to seek permission for release of the request information can replaced by a second “replacement” message after a specified time period. A second set of options can be made available in this second message. For example, the second message can contain at least one option to contact the requesting party directly via a voice communications channel. Or, the second message can contain at least one option that offers to automatically contact the requesting party via a voice communications path without providing the requested contact information. In the alternative, the second message can contain information that instructs the wireless subscriber how to manually contact the requesting party without providing the wireless subscriber's contact information.
- For yet another aspect of the invention, a process if provided for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. A determination is made whether the requesting party is a “trusted” source. The request for release of information is communicated to the network subscriber at least in part via a messaging means. For example, the requesting party can be queried to release a restriction on their contact information. The textual information presented to the network subscriber can be altered if the requesting party is a trusted source. The textual information can include at least one menu choice. The determination that the requesting party is a trusted source can be made at least in part from network signaling information. In the alternative, the determination that the requesting party is a trusted source can be made at least in part from querying the requesting party directly. The requesting party can elect to respond to the query by deciding not to share their contact information.
- For yet a further aspect, the invention can provide a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. A determination is made whether the requesting party is a trusted source. At least two alternative options are communicated to the network subscriber to respond to the request for release of information. If applicable, at least one of the options presented to the network subscriber is presented as a result of the requesting party's status as a trusted source. The network subscriber can respond to the query by directly responding to the requesting party. For example, the network subscriber can respond to the query by releasing at least a portion of the subscriber's information. In the alternative, the network subscriber can respond to the query by electing to not allow a release of requested information. The requesting party can indicate that their communications address should not be shared with other network users. In the alternative, the requesting party can release their communications address to the network subscriber.
- An alternative aspect of the invention provides a method of determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. The current location of the network subscriber is identified. At least one method of blocking the identity of the network subscriber is identified when an outbound communications attempt is placed from the current location. The method to block the identity of the network subscriber is transmitted to the network subscriber. The transmission of the identity block is included with a request for permission to release the directory information. The subscriber screens can be changed in response to the mobile equipment changing networks after receiving the network block code. In the alternative, the subscriber screens can be changed in response to the mobile equipment changing locations after receiving the network block code. The location of the network subscriber contains a code corresponding to the country of the network currently serving the network subscriber. The method of blocking the identity of the network subscriber can be determined at least in part by using the country identification. In the alternative, the method of blocking the identity of the network subscriber can comprise prefixing a code, such as *67, to the network address when initiating the communications attempt. A default code can be stored on in the application on the network subscriber's mobile device.
- For yet another aspect of the invention, a method is provided for determining if a directory assistance query is requesting information that must be preauthorized by the network subscriber prior to the release of the information. The requesting party's information is transmitted to the mobile equipment. The requesting party's information is typically stored in the mobile subscriber's phonebook. The requesting party's information can be edited by the network subscriber prior to storing it in the phonebook. The option to store the requesting party's information can be presented to the network subscriber after the network subscriber has attempted to contact the requesting party. The requesting party's contact information can differ from the network address provided to the application to contact the requesting party. The network address to directly contact the requesting party can change if a delayed grant of permission screen is displayed.
- Other modifications, features and embodiments of the present invention will become evident to those of skill in the art. It should be appreciated, therefore, that many aspects of the present invention were described above by way of example only and are not intended as required or essential elements of the invention unless explicitly stated otherwise. Accordingly, it should be understood that the foregoing relates only to certain embodiments of the invention and that numerous changes may be made therein without departing from the spirit and scope of the invention as defined by the following claims. It should also be understood that the invention is not restricted to the illustrated embodiments and that various modifications can be made within the scope of the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/271,154 US20140295798A1 (en) | 2005-01-21 | 2014-05-06 | Method and apparatus for providing information in response to the grant of a subscriber's permission |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US64568705P | 2005-01-21 | 2005-01-21 | |
US72370205P | 2005-10-05 | 2005-10-05 | |
US11/336,071 US8718605B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for providing information in response to the grant of a subscriber's permission |
US14/271,154 US20140295798A1 (en) | 2005-01-21 | 2014-05-06 | Method and apparatus for providing information in response to the grant of a subscriber's permission |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/336,071 Continuation US8718605B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for providing information in response to the grant of a subscriber's permission |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140295798A1 true US20140295798A1 (en) | 2014-10-02 |
Family
ID=36693009
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/336,697 Abandoned US20060166649A1 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for screening and retaining the identity of a party requesting information |
US11/336,380 Active 2026-11-30 US7460857B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for providing information in response to a delayed grant of subscriber permission |
US11/336,086 Abandoned US20060166666A1 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for hiding the identity of a mobile subscriber in response to a permission request |
US11/336,071 Active 2031-04-24 US8718605B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for providing information in response to the grant of a subscriber's permission |
US11/336,379 Active 2027-03-28 US7496351B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber |
US12/355,381 Expired - Fee Related US8131261B2 (en) | 2005-01-21 | 2009-01-16 | Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber |
US14/271,154 Abandoned US20140295798A1 (en) | 2005-01-21 | 2014-05-06 | Method and apparatus for providing information in response to the grant of a subscriber's permission |
Family Applications Before (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/336,697 Abandoned US20060166649A1 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for screening and retaining the identity of a party requesting information |
US11/336,380 Active 2026-11-30 US7460857B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for providing information in response to a delayed grant of subscriber permission |
US11/336,086 Abandoned US20060166666A1 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for hiding the identity of a mobile subscriber in response to a permission request |
US11/336,071 Active 2031-04-24 US8718605B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for providing information in response to the grant of a subscriber's permission |
US11/336,379 Active 2027-03-28 US7496351B2 (en) | 2005-01-21 | 2006-01-20 | Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber |
US12/355,381 Expired - Fee Related US8131261B2 (en) | 2005-01-21 | 2009-01-16 | Method and apparatus for obtaining information about the status of a party requesting information about a mobile subscriber |
Country Status (2)
Country | Link |
---|---|
US (7) | US20060166649A1 (en) |
WO (1) | WO2006079070A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9288647B2 (en) * | 2014-08-08 | 2016-03-15 | Verizon Patent And Licensing Inc. | Method for sending contact note during call establishment |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9177476B2 (en) | 1997-10-22 | 2015-11-03 | American Vehicular Sciences Llc | Method and system for guiding a person to a location |
EP2247086B1 (en) * | 2001-08-10 | 2017-08-02 | Siemens Aktiengesellschaft | Method, device and software program for expanding the information flow when transferring a message |
DE602004028121D1 (en) | 2003-01-31 | 2010-08-26 | Visto Corp | ASYNCHRONOUS REAL-TIME RECALLING DATA |
US7451113B1 (en) | 2003-03-21 | 2008-11-11 | Mighty Net, Inc. | Card management system and method |
US8175889B1 (en) | 2005-04-06 | 2012-05-08 | Experian Information Solutions, Inc. | Systems and methods for tracking changes of address based on service disconnect/connect data |
US20070027842A1 (en) * | 2005-07-27 | 2007-02-01 | Sbc Knowledge Ventures L.P. | Information-paging delivery |
US7711391B2 (en) * | 2005-07-29 | 2010-05-04 | Varia Holdings Llc | Multiple processor communication circuit cards and communication devices that employ such cards |
US8774381B1 (en) * | 2005-09-15 | 2014-07-08 | Aol Inc. | Messaging gateway for directory and anonymous services |
US7509124B2 (en) | 2005-09-16 | 2009-03-24 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for providing multimedia information services over a communication network |
KR101085700B1 (en) * | 2005-09-16 | 2011-11-22 | 삼성전자주식회사 | Method for providing location information service in lbs provider and method for receiving location information service in requester terminal |
US8873555B1 (en) * | 2006-02-02 | 2014-10-28 | Marvell Israel (M.I.S.L.) Ltd. | Privilege-based access admission table |
KR100746213B1 (en) * | 2006-07-20 | 2007-08-03 | 삼성전자주식회사 | Apparatus and method for preventing multimedia message retrieving in mobile communication system |
JP2008109223A (en) * | 2006-10-23 | 2008-05-08 | Fujitsu Ltd | Portable terminal device, request transmission and reception control method, and request transmission and reception control program |
US20080167959A1 (en) * | 2007-01-04 | 2008-07-10 | Sybase 365, Inc. | System and Method for Enhanced Content Distribution |
CN101031102B (en) * | 2007-03-20 | 2010-05-26 | 华为技术有限公司 | System, device and method for processing SMS |
US8285656B1 (en) | 2007-03-30 | 2012-10-09 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
US9485322B2 (en) * | 2007-07-07 | 2016-11-01 | Qualcomm Incorporated | Method and system for providing targeted information using profile attributes with variable confidence levels in a mobile environment |
US8572216B2 (en) * | 2007-08-08 | 2013-10-29 | Yahoo! Inc. | Social network building |
US7983652B1 (en) * | 2008-01-10 | 2011-07-19 | At&T Mobility Ii Llc | Emergency call notification for network services |
ES2393521T3 (en) * | 2008-02-26 | 2012-12-26 | Vodafone Holding Gmbh | Management method and unit for data access management of a personal network |
US8605650B2 (en) * | 2008-06-10 | 2013-12-10 | Motorola Solutions, Inc. | System and method for interrupting a transmitting device in a communication system |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9112707B2 (en) * | 2008-08-15 | 2015-08-18 | International Business Machines Corporation | System and method for providing location based services using collaborative networks |
US8855615B2 (en) * | 2008-08-25 | 2014-10-07 | International Business Machines Corporation | Short messaging service for extending customer service delivery channels |
WO2010132492A2 (en) | 2009-05-11 | 2010-11-18 | Experian Marketing Solutions, Inc. | Systems and methods for providing anonymized user profile data |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US9621405B2 (en) | 2010-08-24 | 2017-04-11 | Good Technology Holdings Limited | Constant access gateway and de-duplicated data cache server |
US8930262B1 (en) | 2010-11-02 | 2015-01-06 | Experian Technology Ltd. | Systems and methods of assisted strategy design |
US8484186B1 (en) | 2010-11-12 | 2013-07-09 | Consumerinfo.Com, Inc. | Personalized people finder |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US9558519B1 (en) | 2011-04-29 | 2017-01-31 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
US9665854B1 (en) | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
CN102647705B (en) * | 2012-05-08 | 2014-12-10 | 中兴通讯股份有限公司 | Method and system for mobile terminal parameter configuration |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US9697263B1 (en) | 2013-03-04 | 2017-07-04 | Experian Information Solutions, Inc. | Consumer data request fulfillment system |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US10102536B1 (en) | 2013-11-15 | 2018-10-16 | Experian Information Solutions, Inc. | Micro-geographic aggregation system |
US9529851B1 (en) | 2013-12-02 | 2016-12-27 | Experian Information Solutions, Inc. | Server architecture for electronic data quality processing |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US9826001B2 (en) | 2015-10-13 | 2017-11-21 | International Business Machines Corporation | Real-time synchronous communication with persons appearing in image and video files |
US10757154B1 (en) | 2015-11-24 | 2020-08-25 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US11227001B2 (en) | 2017-01-31 | 2022-01-18 | Experian Information Solutions, Inc. | Massive scale heterogeneous data ingestion and user resolution |
US10735183B1 (en) | 2017-06-30 | 2020-08-04 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10963434B1 (en) | 2018-09-07 | 2021-03-30 | Experian Information Solutions, Inc. | Data architecture for supporting multiple search models |
US11062700B1 (en) * | 2018-12-13 | 2021-07-13 | Amazon Technologies, Inc. | Query answering with controlled access knowledge graph |
WO2020146667A1 (en) | 2019-01-11 | 2020-07-16 | Experian Information Solutions, Inc. | Systems and methods for secure data aggregation and computation |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US20220038795A1 (en) * | 2019-12-10 | 2022-02-03 | Medal B.V. | Capturing content in a mobile computing platform |
US11188760B2 (en) * | 2019-12-10 | 2021-11-30 | Medal B.V. | Method and system for gaming segment generation in a mobile computing platform |
US11507695B2 (en) | 2020-05-27 | 2022-11-22 | At&T Intellectual Property I, L.P. | Trusted system for sharing user data with internet content providers |
US11483397B2 (en) | 2021-03-19 | 2022-10-25 | At&T Intellectual Property I, L.P. | Trusted system for providing customized content to internet service provider subscribers |
US11611623B2 (en) | 2021-03-19 | 2023-03-21 | At&T Intellectual Property I, L.P. | Trusted system for providing customized content to internet service provider subscribers |
US11880377B1 (en) | 2021-03-26 | 2024-01-23 | Experian Information Solutions, Inc. | Systems and methods for entity resolution |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020049907A1 (en) * | 2000-08-16 | 2002-04-25 | Woods Christopher E. | Permission based data exchange |
US20020055351A1 (en) * | 1999-11-12 | 2002-05-09 | Elsey Nicholas J. | Technique for providing personalized information and communications services |
US20020072352A1 (en) * | 2000-12-13 | 2002-06-13 | Rittwik Jana | Method and apparatus for querying the status of mobile subscibers |
US20020110096A1 (en) * | 2001-02-13 | 2002-08-15 | Hans Carlsson | Wireless network architechture and protocol for location services in GPRS packet data network |
US20030016804A1 (en) * | 2001-07-17 | 2003-01-23 | Sheha Michael A. | Position determination system |
US20030182425A1 (en) * | 2002-03-01 | 2003-09-25 | Docomo Communications Laboratories Usa, Inc. | Communication system capable of executing a communication task in a manner adaptable to available distributed resources |
US20040166832A1 (en) * | 2001-10-03 | 2004-08-26 | Accenture Global Services Gmbh | Directory assistance with multi-modal messaging |
US20040226775A1 (en) * | 2003-01-17 | 2004-11-18 | Nec Corporation | First-order drive through system, merchandise order receiving method, and program of the same |
US7269428B1 (en) * | 1999-11-23 | 2007-09-11 | Nokia Coporation | Method for enabling a user to be notified of his/her positioning requests |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5926754A (en) * | 1995-12-21 | 1999-07-20 | At&T Corporation | Directory assistance call processing systems and related methods |
US20040199402A1 (en) | 1996-09-06 | 2004-10-07 | Walker Jay S. | Method and system for anonymous communication of information about a home |
US6529491B1 (en) * | 1997-11-05 | 2003-03-04 | Nortel Networks Ltd. | Private/residential code division multiple access wireless communication system |
US7836011B2 (en) * | 1998-10-01 | 2010-11-16 | Onepin, Inc. | Phone to phone data exchange |
US6311069B1 (en) * | 1999-03-18 | 2001-10-30 | Ericsson Inc. | System and method for alerting a mobile subscriber being positioned |
DE19932737A1 (en) * | 1999-07-14 | 2001-01-18 | Alcatel Sa | Procedure for position monitoring of a mobile radio subscriber as well as IN server (Intelligent Network) and WEB server for carrying out the procedure |
GB2359461A (en) | 2000-02-21 | 2001-08-22 | Nokia Mobile Phones Ltd | Personalised information from a phone is backed up and/or transferred between phones using a computer |
US6687504B1 (en) * | 2000-07-28 | 2004-02-03 | Telefonaktiebolaget L. M. Ericsson | Method and apparatus for releasing location information of a mobile communications device |
JP2002057807A (en) * | 2000-08-08 | 2002-02-22 | Nec Corp | Telephone directory management system for portable telephone |
US20020077897A1 (en) * | 2000-12-19 | 2002-06-20 | Zellner Samuel N. | Identity blocking service from a web advertiser |
US6928291B2 (en) * | 2001-01-25 | 2005-08-09 | Openwave Systems Inc. | Method and apparatus for dynamically controlling release of private information over a network from a wireless device |
US6964787B2 (en) * | 2001-02-01 | 2005-11-15 | Ecolab Inc. | Method and system for reducing microbial burden on a food product |
JP4487443B2 (en) * | 2001-05-29 | 2010-06-23 | 日本電気株式会社 | Position information display system and display method thereof |
EP1436746A4 (en) * | 2001-10-17 | 2007-10-10 | Npx Technologies Ltd | Verification of a person identifier received online |
US20030078993A1 (en) * | 2001-10-22 | 2003-04-24 | Jesse Hull | Data synchronization mechanism for information browsing systems |
US7319858B2 (en) * | 2001-11-16 | 2008-01-15 | Cingular Wireless Ii, Llc | System and method for querying message information |
WO2003058994A1 (en) | 2002-01-08 | 2003-07-17 | Siemens Aktiengesellschaft | Improved data protection for position-dependent services |
JP3871201B2 (en) * | 2002-01-29 | 2007-01-24 | ソニー株式会社 | Content provision acquisition system |
JP4209131B2 (en) | 2002-04-23 | 2009-01-14 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile terminal and access control method |
US7236799B2 (en) * | 2002-06-14 | 2007-06-26 | Cingular Wireless Ii, Llc | Apparatus and systems for providing location-based services within a wireless network |
US6750681B2 (en) * | 2002-08-27 | 2004-06-15 | Sirific Wireless Corporation | High speed current mode logic gate circuit architecture |
US20040198311A1 (en) * | 2002-11-15 | 2004-10-07 | Naveen Aerrabotu | Method and system for processing a service access request for a mobile communication device |
US20040192340A1 (en) * | 2002-12-23 | 2004-09-30 | 422, Inc. | Method and system for database content security in directory assistance & information services systems |
US20040199768A1 (en) * | 2003-04-04 | 2004-10-07 | Nail Robert A. | System and method for enabling enterprise application security |
KR100590863B1 (en) * | 2003-04-29 | 2006-06-19 | 삼성전자주식회사 | Apparatus and method for processing a terminal authentication and a call in a private wireless high-speed data system |
EP1652368B1 (en) * | 2003-07-14 | 2018-04-04 | Cisco Technology, Inc. | System and method for active mobile collaboration |
CN1879439A (en) * | 2003-09-12 | 2006-12-13 | 北方电讯网络有限公司 | Over-the-air provisioning of a mobile station for multi-media service |
US7412050B2 (en) * | 2003-10-01 | 2008-08-12 | Aol Llc, A Delaware Limited Liability Company | Conference calls via an intelligent call waiting interface |
US20060126814A1 (en) * | 2004-01-27 | 2006-06-15 | Wilfred Weidmark | AIN enabled automated directory assistance in a telecommunications network |
KR101021277B1 (en) * | 2004-02-06 | 2011-03-11 | 삼성전자주식회사 | Method of processing data service of network including wireless public network and private network and system thereof |
US7454623B2 (en) * | 2004-06-16 | 2008-11-18 | Blame Canada Holdings Inc | Distributed hierarchical identity management system authentication mechanisms |
US20060046742A1 (en) | 2004-08-25 | 2006-03-02 | Nokia Corporation | Enabling access to private information |
US10510214B2 (en) | 2005-07-08 | 2019-12-17 | Cfph, Llc | System and method for peer-to-peer wireless gaming |
US8190636B2 (en) * | 2008-09-30 | 2012-05-29 | Nokia Corporation | Method, apparatus and computer program product for providing object privilege modification |
-
2006
- 2006-01-20 WO PCT/US2006/002447 patent/WO2006079070A2/en active Application Filing
- 2006-01-20 US US11/336,697 patent/US20060166649A1/en not_active Abandoned
- 2006-01-20 US US11/336,380 patent/US7460857B2/en active Active
- 2006-01-20 US US11/336,086 patent/US20060166666A1/en not_active Abandoned
- 2006-01-20 US US11/336,071 patent/US8718605B2/en active Active
- 2006-01-20 US US11/336,379 patent/US7496351B2/en active Active
-
2009
- 2009-01-16 US US12/355,381 patent/US8131261B2/en not_active Expired - Fee Related
-
2014
- 2014-05-06 US US14/271,154 patent/US20140295798A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020055351A1 (en) * | 1999-11-12 | 2002-05-09 | Elsey Nicholas J. | Technique for providing personalized information and communications services |
US7269428B1 (en) * | 1999-11-23 | 2007-09-11 | Nokia Coporation | Method for enabling a user to be notified of his/her positioning requests |
US20020049907A1 (en) * | 2000-08-16 | 2002-04-25 | Woods Christopher E. | Permission based data exchange |
US20020072352A1 (en) * | 2000-12-13 | 2002-06-13 | Rittwik Jana | Method and apparatus for querying the status of mobile subscibers |
US20020110096A1 (en) * | 2001-02-13 | 2002-08-15 | Hans Carlsson | Wireless network architechture and protocol for location services in GPRS packet data network |
US20030016804A1 (en) * | 2001-07-17 | 2003-01-23 | Sheha Michael A. | Position determination system |
US20040166832A1 (en) * | 2001-10-03 | 2004-08-26 | Accenture Global Services Gmbh | Directory assistance with multi-modal messaging |
US20030182425A1 (en) * | 2002-03-01 | 2003-09-25 | Docomo Communications Laboratories Usa, Inc. | Communication system capable of executing a communication task in a manner adaptable to available distributed resources |
US20040226775A1 (en) * | 2003-01-17 | 2004-11-18 | Nec Corporation | First-order drive through system, merchandise order receiving method, and program of the same |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9288647B2 (en) * | 2014-08-08 | 2016-03-15 | Verizon Patent And Licensing Inc. | Method for sending contact note during call establishment |
Also Published As
Publication number | Publication date |
---|---|
US7496351B2 (en) | 2009-02-24 |
US20060166646A1 (en) | 2006-07-27 |
WO2006079070A2 (en) | 2006-07-27 |
US20060166647A1 (en) | 2006-07-27 |
US20090156168A1 (en) | 2009-06-18 |
US7460857B2 (en) | 2008-12-02 |
US20060166649A1 (en) | 2006-07-27 |
WO2006079070A3 (en) | 2008-07-31 |
US20060166666A1 (en) | 2006-07-27 |
US8131261B2 (en) | 2012-03-06 |
US20060166648A1 (en) | 2006-07-27 |
US8718605B2 (en) | 2014-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8718605B2 (en) | Method and apparatus for providing information in response to the grant of a subscriber's permission | |
US8195163B2 (en) | Client device method and apparatus for routing a call | |
EP1482758B1 (en) | Real time administration of shared communication plan arrangements | |
CN110999341A (en) | Optimized call handling during E911 calls | |
US9253319B1 (en) | Methods and systems for call connecting calls | |
US20070190956A1 (en) | Wireless unit status notification system for communication network | |
US20040198344A1 (en) | Integrated wireless voice and data services using mobile switching centers | |
EP1758359B1 (en) | A telephone calling method | |
US20020107003A1 (en) | Method and apparatus for leaving a multimedia mail message without ringing a wireless phone | |
US7751855B2 (en) | Private routing control numbers | |
EP2151982B1 (en) | Telephony services | |
US9615230B2 (en) | Method to manage multiple caller identities in a telecommunication system | |
US7477732B2 (en) | Method and system for multiple-channel automatic recall | |
US20070133519A1 (en) | Method and apparatus for network-based call screening for interrupting packet data calls | |
EP2113156B1 (en) | Unstructured supplementary services data application within a wireless network | |
US20060270393A1 (en) | System and method using SMS messaging for wireless conference calls | |
US7715544B1 (en) | Method and apparatus for selective call waiting treatment | |
US20050025296A1 (en) | Wireless terminal priority call alerting | |
GB2460630A (en) | Informing a calling terminal when a called mobile terminal is back in service | |
EP1119168A2 (en) | Internet call waiting service for wireless connections | |
US20100130186A1 (en) | System and method for directory assistance including sms supported privacy features | |
WO2007000460A1 (en) | Method and system for communicates annymously in a telecommunication network | |
KR20140117404A (en) | Unestablished communication links in communication systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RESOURCE CONSORTIUM LIMITED, VIRGIN ISLANDS, BRITI Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROACH, PETER O., JR.;REEL/FRAME:032848/0243 Effective date: 20090902 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: RESOURCE CONSORTIUM LIMITED, LLC, DELAWARE Free format text: RE-DOMESTICATION AND ENTITY CONVERSION;ASSIGNOR:RESOURCE CONSORTIUM LIMITED;REEL/FRAME:050091/0297 Effective date: 20190621 |