Sign In to Follow Application
View All Documents & Correspondence

Anonymous Call Rejection On No Reply(acrej Nr)

Abstract: A method and system for rejection of an anonymous call from a calling user to a called user. A timer may be started by the network of the called user, if the called user receives an anonymous call from the calling user. If the called user does not respond to the anonymous call before expiry of the timer, the network may reject the anonymous call. The duration of the timer may be programmed by the called user or by the network. The called user may subscribe to the service of timed rejection of anonymous calls and the called user may reject or answer the anonymous call. The calling user may be informed that the called user did not pick up the call as the call was anonymous.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
17 April 2009
Publication Number
13/2012
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

ALCATEL LUCENT
54 RUE DE LA BOETIE,75008 PARIS,

Inventors

1. RAMACHANDRAN KRISHNAMURTHY
6 KAMALAPURAM COLONY AMBATTUR CHENNAI 600 053 TAMIL NADU

Specification

COMPLETE SPECIFICATION
(SEE SECTION 10 AND RULE 13)

TITLE OF THE INVENTION

“Anonymous Call Rejection on No Reply”

APPLICANTS:

Name Nationality Address
Alcatel Lucent France 54 rue de la Boétie, 75008 Paris, France

The following specification particularly describes and ascertains the nature of this invention and the manner in which it is to be performed:-

FIELD OF INVENTION

[1] This invention relates to telecommunication networks and, more particularly but not exclusively, to the call functionality in telecommunication networks.

BACKGROUND

[2] This section introduces aspects that may be helpful in facilitating a better understanding of the invention. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art.

[3] Calling Line Identification (CLI) is a service that allows the called user to see the number of the calling user before responding to the call request. CLI may be used to track down or limit the impact of unwanted calls. Users may activate a feature wherein the network of the called user rejects call requests that do not have the identity of the calling user. Thus the called user may not have to receive call requests from anonymous users. However it may also happen that the network sometimes suppresses the identity of the calling user and does not send the CLI to the called user. In this case, although the calling user has provided the CLI, the called user may not able to know the identity of the calling user.

[4] Cell phone companies must support interconnecting trunks between wire line and Public Switched Telephone Network (PSTN) access carriers to pass CLI information between the networks. Cell phone companies, which do not have the interconnecting trunks, may not be able to pass CLI information between the networks. In such cases the called user may not be able to view the identity of the calling user although the calling user may have provided the CLI information in the call request.

SUMMARY

[5] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings.

[6] In view of the foregoing, an embodiment herein provides a method for rejection of an anonymous call from a calling user to a called user. A timer may be started by the network of the called user, if the called user receives an anonymous call from the calling user. If the called user does not respond to the anonymous call before expiry of the timer, the network may reject the anonymous call. The duration of the timer may be programmed by the called user or by the network. The called user may subscribe to the service of timed rejection of anonymous calls and the called user may reject or answer the anonymous call. The calling user may be informed that the called user did not pick up the call as the call was anonymous. The network may be a fixed line communication network, a mobile communication network or an Internet Protocol (IP) based communication network.

[7] In view of the foregoing, an embodiment herein provides a switch connected to a communications network. The switch comprises a timer module and a processing module. The processing module may start the timer module, if a user connected to the network receives an anonymous call. The call may be rejected if the user does not respond to the call before expiry of the timer. The switch may be adapted to check if the user is subscribed to for the service of timed rejection of anonymous calls. The processing module may inform the calling user that the user did not pick up the call as the call was anonymous. The timer module may be programmed by the user or by the network.

BRIEF DESCRIPTION OF THE FIGURES

[8] Some embodiments of apparatus and/or methods in accordance with embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings, in which:

[9] Figure 1 schematically illustrates a PSTN user calling another PSTN user;

[10] Figure 2 schematically illustrates a mobile user calling another mobile user;

[11] Figure 3 schematically illustrates an SIP user calling another SIP user;

[12] Figure 4 schematically illustrates a flowchart depicting a method to allow a called user to accept or reject anonymous calls; and

[13] Figure 5 schematically illustrates a sequence diagram depicting an anonymous call request.


DESCRIPTION OF EMBODIMENTS

[14] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.

[15] The embodiments herein achieve a method for adaptively allowing a called user to accept or reject incoming calls that do not present the Calling Line Identification (CLI) by permitting anonymous call requests to reach the called user. Referring now to the drawings, and more particularly to FIGS. 1 through 5, where similar reference characters denote corresponding features consistently throughout the figures, there are shown embodiments.

[16] Figure 1 schematically illustrates a PSTN user calling another PSTN user. If the calling user 101 wants to call the called user 102, the calling user 101 sends a call request to the called user 102. The request may not include the CLI number if the calling user 101 does not want to reveal the identity of the calling user 101. The request is received by the PSTN network 104 and the PSTN network 104 then sends the request further to the PSTN switch 103. On receiving the request, the PSTN switch 103 checks the database 107 to determine if the called user 102 has subscribed for the service of timed rejection of anonymous calls. The PSTN switch 103 then sends the request to the called user 102 and starts a timer 105 if the called user 102 has subscribed for the service. The timer 105 can be configured by the user 102 by contacting customer service or through the internet. The user 102 can login to a web page on the web site of the network and adjust the duration of the timer 105. The user 102 can also configure the timer 105 by sending a Short Message Service (SMS) message to the network. The SMS sent by the user 102 may be in the format “ACREJ TIMER 20”, where the term “ACREJ” indicates to the network that the user 102 wishes to modify the menu for the service of anonymous call rejection, “TIMER 20” indicates that the user 102 wants to set the duration of his timer 105 to 20 seconds. The user 102 may also configure the timer 105 by sending a Wireless Application Protocol (WAP) message to the network. If the user 102 has not configured the timer 105, then the network configures the timer to the default time. The processor 106 in the PSTN switch 103 starts the timer 105 and does various checks and processing. On receiving the call request without the identification of the calling user 101, the called user 102 may accept or reject the call. If the called user 102 does not pick up the call before the timer 105 expires then the PSTN switch 103 may terminate the call. The calling user 101 may then be informed that the call was rejected since the call was anonymous by the network using a pre-recorded voice message or any other form of intimation. The intimation may be in the form of a SMS message.

[17] Figure 2 schematically illustrates a mobile user calling another mobile user. If the calling user 101 wants to call the called user 102, the calling user 101 sends a call request to the called user 102. The request may not include the CLI number if the calling user 101 does not want to reveal the identity of the calling user 101. The request may be received by the mobile network 201 and the mobile network 201 then sends the request further to the mobile switch 202. On receiving the request, the mobile switch 202 checks the database 205 to determine if the called user 102 has subscribed for the service. The mobile switch 202 may then send the request to the called user 102 and start a timer 203 if the called user 102 has subscribed for the service. The processor 204 in the mobile switch 202 starts the timer 203 and does all the various checks and processing. On receiving the call request without the identification of the calling user 101, the called user 102 may accept or reject the call. If the called user 102 does not pick up the call before the timer 203 expires then the mobile switch 202 may terminate the call. The calling user 101 may then be informed that the call was rejected since the call was anonymous.

[18] Figure 3 schematically illustrates an SIP user calling another SIP user. The Session Initiation Protocol (SIP) calling user 101 sends a call request to the SIP called user 102 if the calling user 101 wants to call the called user 102. SIP is a signaling protocol used for multimedia communication sessions such as voice and video calls over the Internet. The request may not include the CLI number if the calling user 101 does not want to reveal the identity of the calling user 101. The request would be received by the SIP network 301 and the SIP network 301 would then send the request further to the SIP switch 302. On receiving the request, the SIP switch 302 checks the database 305 to determine if the called user 102 has subscribed for the service. The SIP switch 302 would then send the request to the called user 102 and start a timer 303 if the called user 102 has subscribed for the service. The processor 304 in the SIP switch 302 starts the timer 303 and does all the various checks and processing. On receiving the call request without the identification of the calling user 101, the called user 102 may accept or reject the call. If the called user 102 does not pick up the call before the timer 303 expires then the SIP switch 302 may terminate the call. The calling user 101 may then be informed that the call was rejected since the call was anonymous.

[19] Embodiments disclosed herein also enable a called user 102 to enable this service for any calling user 101 irrespective of the calling user’s type of network. Embodiments disclosed herein are independent of the type of network of the calling user 101.

[20] Figure 4 schematically illustrates a flowchart depicting a method to allow a called user 102 to accept or reject anonymous calls. The calling user 101 sends (401) a call request to the called user 102, if the calling user 101 wants to communicate with the called user 102. If the calling user 101 wants to remain anonymous, the CLI number is not sent with the call request. The network may also decide not to send the identity of the calling user 101 to the called user 102. Cell phone companies must support interconnecting trunks between wire line and PSTN access carriers to pass CLI information between the networks. Cell phone companies, which do not have the interconnecting trunks, may not be able to pass CLI information between the networks. In such cases the called user may not be able to view the identity of the calling user although the calling user may have provided the CLI information in the call request. The request is received (402) at the switch and the switch checks (403) to determine if the identity of the calling user 101 is present in the request. If the identity of the calling user 101 is present in the call request, then the switch forwards (405) the call request to the called user 102. If the called user 102 responds (407) to the request then the call may proceed (409) with the users communicating with each other. If the called user 102 does not respond (407) then the call may be terminated (408). If the identity of the calling user 101 is not present in the call request, then the switch checks (404) to determine if the called user 102 has subscribed for the service. If the called user 102 has not subscribed for the service the network may terminate (406) the anonymous call or forward the call request to the called user 102. If the called user 102 responds (407) to the request then the call may proceed (409) with the users communicating with each other. If the called user 102 does not respond (407) then the call may be terminated (408). If the called user 102 has subscribed for the service the switch forwards (4012) the call request to the called user 102 and starts a timer. If the called user 102 responds (4013) to the call request, the call may proceed (409) with the users communicating with each other. If the called user 102 does not respond (4013) then the timer is checked (4010) to determine if the timer has expired. If the timer has expired the call is terminated (4011). If the timer has not expired then the call is not terminated. The timer may also be set or adjusted by the called user 102 or the timer may also be set by the network. The various actions in the method may be performed in the order presented, in a different order, or simultaneously. Further, in some embodiments, some actions listed in FIG. 4 may be omitted.

[21] Figure 5 schematically illustrates a flow diagram depicting an anonymous call request. If the calling user 101 wants to communicate with the called user 102 the calling user 101 sends a call request 502 to the called user 102. If the calling user 101 wants to remain anonymous, the CLI number may not be sent with the call request 502. The call request 502 may be received at the switch 501 and the switch 501 checks to determine if the identity of the calling user 101 is present in the request. If the identity of the calling user 101 is present in the call request 502, then the switch 501 may forward the call request 502 to the called user 102. If the called user 102 responds to the request then the call may proceed with the users communicating with each other. If the called user 102 does not respond then the call may be terminated. If the identity of the calling user 101 is not present in the call request 502, then the switch checks to determine if the called user 102 has subscribed for the service. If the called user 102 has not subscribed for the service the network may terminate the anonymous call or forward the call request 502 to the called user 102. If the called user 102 responds to the request then the call may proceed with the users communicating with each other. If the called user 102 does not respond then the call may be terminated. If the called user 102 has subscribed for the service the switch forwards the call request 502 to the called user 102 and starts a timer. If the called user 102 responds to the call request 502, the call may proceed with the users communicating with each other. If the called user 102 does not respond, then the timer is checked to determine if the timer has expired. If the timer has expired the call may be terminated and the switch 501 may send the response 503 to the calling user 101. The response may also indicate the reason for terminating the call. If the timer has not expired then the call may not be terminated. The timer may also be set or adjusted by the called user 102 or the timer may also be set by the network.

[22] The functions of the various elements shown in the Figures, including any functional blocks labeled as “processors”, may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term “processor” or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non volatile storage. Other hardware, conventional and/or custom, may also be included. Similarly, any switches shown in the FIGS. are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.

[23] A person of skill in the art would readily recognize that steps of above-described method can be performed by programmed computers. Herein, some embodiments are also intended to cover program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine-executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described method. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. The embodiments are also intended to cover computers programmed to perform said steps of the above-described method.

[24] The description and drawings merely illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.

[25] It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the invention. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.


CLAIMS
What is claimed is:

1. A method for rejection of an anonymous call from a calling user to a called user, said method comprising steps of

said network starting a timer, on said called user receiving said anonymous call from said calling user; and

said network rejecting said anonymous call, on said called user not making a response to said anonymous call before expiry of said timer.

2. The method, as claimed in claim 1, wherein said called user subscribes for rejection of anonymous calls.

3. The method, as claimed in claim 1, wherein duration of said timer is set by said called user by Short Messaging Service (SMS).

4. The method, as claimed in claim 1, wherein duration of said timer is set by said called user by Internet.

5. The method, as claimed in claim 1, wherein duration of said timer is set by said called user by contacting customer service of said network.

6. The method, as claimed in claim 1, wherein duration of said timer is set by said network.

7. The method, as claimed in claim 1, wherein said calling user is informed by said network that said called user did not pick up said call as said call was anonymous.

8. The method, as claimed in claim 1, wherein said network is a fixed line communication network.

9. The method, as claimed in claim 1, wherein said network is a mobile communication network.

10. The method, as claimed in claim 1, wherein said network is an Internet Protocol (IP) based communication network.

11. A switch connected to a communications network, said switch comprising of

a timer module to time user response for an anonymous call request;

a processing module configured to start said timer module when a user connected to said network receives an anonymous call, and to reject said call when said user does not respond to said call before expiry of said timer.

12. The switch, as claimed in claim 11, wherein said switch is configured to check if said user is subscribed to a service, said service being rejection of anonymous calls after a pre-configured period of time.

13. The switch, as claimed in claim 11, wherein said processing module is configured to inform a calling user that said user did not pick up said call as said call was anonymous.

14. The switch, as claimed in claim 11, wherein duration of said timer module is configured to be set by said user.

15. The switch, as claimed in claim 11, wherein duration of said timer module is configured to be set by said network.

Documents

Application Documents

# Name Date
1 880-che-2009 form-13. 31-12-2010.pdf 2010-12-31
1 abstract880-CHE-2009.jpg 2012-03-06
2 880-CHE-2009 FORM-13 31-12-2010.pdf 2010-12-31
2 Drawings.pdf 2011-09-03
3 880-che-2009 form-3 24-02-2011.pdf 2011-02-24
3 Form-1.pdf 2011-09-03
4 Form-3.pdf 2011-09-03
4 Power of Authority.pdf 2011-09-03
5 Form-5.pdf 2011-09-03
6 Form-3.pdf 2011-09-03
6 Power of Authority.pdf 2011-09-03
7 880-che-2009 form-3 24-02-2011.pdf 2011-02-24
7 Form-1.pdf 2011-09-03
8 880-CHE-2009 FORM-13 31-12-2010.pdf 2010-12-31
8 Drawings.pdf 2011-09-03
9 880-che-2009 form-13. 31-12-2010.pdf 2010-12-31
9 abstract880-CHE-2009.jpg 2012-03-06