Key word programmable caller ID

Information

  • Patent Grant
  • 8160226
  • Patent Number
    8,160,226
  • Date Filed
    Wednesday, August 22, 2007
    17 years ago
  • Date Issued
    Tuesday, April 17, 2012
    12 years ago
Abstract
Methods and systems are disclosed for providing Key Word Programmable Caller ID Screening services. One method monitors a telephone call for a key word call screening request. The telephone call is from a calling telephone number to a called telephone number. An action is taken in response to the key word call screening request. The action could be playing an announcement, terminating the connection, forwarding to voice mail, storing, adding, updating, and or blocking incoming communications matching the ICLID information and/or subscriber identified alphanumeric information. The call screening request may comprise a Dual-Tone Multi-Frequency, a softkey entry, and/or a data message. Subsequent incoming calls from the calling telephone number are characterized as undesirable and are screened from alerting or otherwise establishing a communications connection to the called telephone number.
Description
CROSS REFERENCE TO RELATED APPLICATION

This application relates to applicants' co-pending application Ser. No. 11/895,008 entitled “Programmable Caller ID”, filed simultaneously herewith, and of which is incorporated herein by this reference.


This application relates to applicants' co-pending U.S. patent application Ser. No. 11/390,768, entitled “Privacy Screening Services”, filed Mar. 28, 2006, and of which is incorporated herein by this reference.


COPYRIGHT NOTIFICATION

A portion of the disclosure of this patent document and its attachments contain material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyrights whatsoever.


BACKGROUND

The exemplary embodiments relate to the field of telephony and of computers and, more particularly, to methods and systems for providing communications screening services.


Communications has experienced explosive growth, and more growth is planned as communication access and numerous communications devices improve. This explosive growth is revolutionizing special services offered to subscribing customers. Of the special service offerings, the most relevant to this invention is the caller identification or Caller ID services. A customer or a user of a telephone (or alternate communications device) that is served by the Caller ID service is provided with a calling party's directory information. Presently available Caller ID systems provide the calling party's telephone number and billing name associated with the calling party's telephone number (if available) when an incoming communication line identification (ICLID) signal can be detected, decoded, and transmitted to the called telephone or other display device associated with the called telephone (e.g., a Caller ID device). The Caller ID services also allow a receiving party to receive directory information for other incoming communications while the receiving party's phone is used (e.g., during a conversation with another party); this service is sometimes referred to as Caller ID communication Waiting service. A customer may use the Caller ID information to make a decision whether to answer and/or to prepare for the incoming communication.


In addition, the customer may use Caller ID information to block incoming communications associated with one or more ICLID signals including specific telephone numbers selected by the customer and/or privacy screening services for unidentifiable telephone numbers of incoming communications (e.g., telemarketers). If the customer wants to selectively answer incoming communications using Caller ID information, the customer has several choices—block the communication or ignore the ringing (or other communication handling system), or until the caller hangs up. If the communication is blocked, then the customer may not have immediate notification of the incoming blocked communication to re-evaluate whether to accept the communication since circumstances for accepting the communication may change. If the customer ignores the communication and listens to unwanted ringing, then the customer may be annoyed with the repetitive noise alerting the customer of the call. In recent years, telephony providers and manufacturers have tried to provide alternate systems and methods to alert the customer of selective incoming communications that minimizes interruptions for unwanted calls.


Companies and governments are trying to prevent or otherwise filter telemarketing calls. Nearly everyone has experienced an annoying telemarketing call, and every year many people are defrauded by telemarketers. Many products, such as the TELEZAPPER™, attempt to reduce telemarketing calls (TELEZAPPER is a trademark of the Royal Appliance Manufacturing Company, www.royalappliance.com). The United States Federal Trade Commission and many state governments have created “Do Not Call” lists/registries that make it illegal for telemarketers to communication a phone number on the list.


Communications service providers also offer services that reduce telemarketing communications. BellSouth Corporation, for example, offers PRIVACY DIRECTOR® service (PRIVACY DIRECTOR® is a registered trademark of BellSouth Intellectual Property Corporation). This service tries to prevent unwanted calls, such as telemarketing calls, from ringing a subscriber's phone. This PRIVACY DIRECTOR® service does not connect a communication when the ICLID information is private. That is, the telecommunications switch recognizes when the ICLID information is marked private, so Caller ID cannot recognize the ICLID information. The PRIVACY DIRECTOR® service requires the calling party to i) unblock their telephone number or ii) announce their name. If the calling party unblocks their telephone number, then the ICLID information is delivered with the communication and the subscriber's Caller ID displays the number. If the calling party decides to announce their name, the telephone communication is routed to a media server. The media server plays an announcement that asks the calling party to record their name. The recorded name is delivered to the called party. The called party, prior to acceptance of the call, hears the recorded name of the calling party. The called party then has the option to accept the call. This PRIVACY DIRECTOR® service puts the called party in control as the recipient of the calls.


Now, however, telemarketers have learned to bypass the PRIVACY DIRECTOR service. For example, telemarketers have begun to use public communications addresses to get around the PRIVACY DIRECTOR service by unblocking their caller ID. The telemarketer's telephone number, then, is public as opposed to private. Because the telemarketer's telephone number is public, the PRIVACY DIRECTOR service does not prevent a connection to the called party. The Caller ID service displays the ICLID information, the subscriber answers the incoming communication, and the subscriber is then subjected to the telemarketer's unwanted proposal.


There is, accordingly, a need in the art for identifying and processing undesirable incoming communications. For example, consumers want a quick and convenient way of disposing of incoming telemarketing and/or unsolicited communications.


SUMMARY

The exemplary embodiments include methods, systems, computer programs, and/or computer program products for screening unsolicited communications, such as incoming calls from telemarketers, surveys, and/or other communications. According to some of the embodiments, a communications service provider (e.g., a telecommunications provider, a data communications provider such as America Online, a cable communications provider, and other communications providers) provides this privacy screening service. According to some of the exemplary embodiments, a key word programmable caller identification service (also referred to herein as “Key Word Programmable Caller ID Screening,” “Key Word Programmable Calling Party Screening,” or “Privacy Screening”) automatically identifies if an incoming communication is from a desirable caller, if the incoming communication is from an undesirable caller, or if service is unable to determine the communication is from a desirable caller.


According to some of the exemplary embodiments, if the communication is from a desirable caller, then the communication may be selectively processed. For example, key words associated with an incoming line identification (ICLID) signal may be matched with key words selected or otherwise identified, programmed, and associated by the subscriber to characterize the incoming call as desirable or undesirable. According to an exemplary embodiment, if the subscriber's surname is “Forsberg,” then the subscriber may associate “Forsberg” with a desirable subscribes such that each communication from a calling party's communications device matching “Forsberg” is automatically connected, processed, or prioritized for call handling. Further, the subscriber may enter a communications address having ICLID information unassociated with “Forsberg,” and subsequently program, reset, or define the communications address with a naming or key work convention that includes “Forsberg,” such as “Rowdy Forsberg” to identify a family member affectionately know as “Rowdy Forsberg,” and thereafter automatically connect, process, or prioritize incoming calls from this programmed family member's communication address. Similarly, if an incoming call from a calling party is associated with an undesirable caller, such as an incoming communication that has “Private” ICLID signal, the subscriber may use the Key Word Programmable Caller ID Screening Module to route this call to a Do Not Disturb announcement and thereafter terminate the call or provide alternative call handling options.


According to exemplary embodiments, if an incoming communication is from a desirable caller, then the communications device may produce a distinct notification (e.g., selected ring tone, audible alert, or other alert). If the communication is from an undesirable caller, then terminate the communication to the subscriber's communications device and route the undesirable communication to a voice messaging and/or do not call service. Or, if the desirability of the caller is unknown, then provide an alternate distinctive alert to the subscriber.


And, according to further exemplary embodiments, the Key Word Programmable Caller ID Screening service may prompt the subscriber (or alternatively receive a communication screening request) to enter or otherwise identify ICLID information associated with a desirable incoming communication or associated with an undesirable incoming communication. For example, the communications screening request may comprise a Dual-Tone Multi-Frequency key (e.g., “Touch Tones”) on a telephone keypad, a softkey entry on a communications device, and/or a data message from an Internet Protocol phone or client application. The communication screening request is accepted and sent to the intelligence controlling a communications switch coupled with the communications device. The intelligence controlling the communications switch interprets the communication screening request and determines what action is required. As an example, heretofore when a party depressed a touch-tone key during a communication, a tone was generated, yet the communications network my not have recognized that tone as requiring an action. This invention, however, implements an action in response to the communications screening request. For example, the action may include playing an announcement, terminating the connection, forwarding the incoming communication to voice mail, forwarding a party of an ongoing communication to a voice messaging system to interrupt and terminate the communication, storing a desirable ICLID signal to the Key Word Programmable Caller ID Screening profile of the subscriber, storing an undesirable ICLID signal to the Key Word Programmable Caller ID Screening profile of the subscriber, adding undesirable ICLID information to a Do Not Call list associated with the subscriber, and/or storing an undesirable ICLID signal in a subscriber's blocked communications list. The Do Not Call list, the subscriber's Key Word Programmable Caller ID Screening profile, and/or the subscriber's blocked communications list may include communications instructions for a called number (e.g., a communications address input by the subscriber or user) as well as include communications instructions for other registered communications addresses (e.g., other telephone numbers associated with the subscriber, an email address of the subscriber, and other communications addresses of the subscriber).


Other systems, methods, and/or computer program products according to the exemplary embodiments will be or become apparent to one with ordinary skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or computer program products be included within this description, be within the scope of the claims, and be protected by the accompanying claims.





DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages of the exemplary embodiments are better understood when the following Description is read with reference to the accompanying drawings, wherein:



FIG. 1 is a block diagram showing a Key Word Programmable Caller ID Module residing in a computer system according to some of the exemplary embodiments;



FIG. 2 is a schematic showing the Key Work Programmable Caller ID Module operating within an intelligently-controlled telecommunications network according to some of the exemplary embodiments;



FIG. 3 is a schematic showing the Key Word Programmable Caller ID Screening Module operating within a packet network architecture according to some of the exemplary embodiments;



FIG. 4 is a schematic illustrating an exemplary embodiment of providing Key Word Programmable Caller ID Screening services;



FIG. 5 is a schematic illustrating an exemplary embodiment of storing ICLID information of the incoming communication in a database;



FIG. 6 is a schematic illustrating another exemplary embodiment for updating a subscriber's profile information with the ICLID information;



FIG. 7 is a schematic illustrating still another exemplary embodiment for updating the subscriber's profile information with the ICLID information;



FIG. 8 is a flowchart showing an exemplary method of providing Key Word Programmable Caller ID Screening services;



FIG. 9 is a flowchart showing another exemplary method of providing Key Word Programmable Caller ID Screening services;



FIG. 10 is a flowchart showing still another exemplary method of providing Key Word Programmable Caller ID Screening services; and



FIG. 11 is a flowchart showing yet another exemplary method of providing Key Word Programmable Caller ID Screening services.





DESCRIPTION

The exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings. The exemplary embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the exemplary embodiments to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).


Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating the exemplary embodiments. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.


As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms “includes,” “comprises,” “including,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Furthermore, “connected” or “coupled” as used herein may include wirelessly connected or coupled. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.


It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first device could be termed a second device, and, similarly, a second device could be termed a first device without departing from the teachings of the disclosure.


The exemplary embodiments include methods, systems, computer programs, and/or computer program products for providing Key Word Programmable Caller Identification screening services. According to some of the exemplary embodiments, a Key Word Programmable Caller ID Screening service allows a subscriber to selectively receive screened incoming communications or to send a Key Word Programmable Caller ID Screening query for ICLID information during an interactive communication (e.g., telephone conversation). The Key Word Programmable Caller ID Screening query may comprise a Dual-Tone Multi-Frequency key (e.g., “Touch Tones”) on a telephone keypad, a softkey entry on a communications device, and/or a data message from an Internet Protocol phone or client application. The Key Word Programmable Caller ID Screening query is accepted and sent to the intelligence controlling the communications switch (and/or communications network). The intelligence controlling the communications switch interprets the Key Word Programmable Caller ID Screening query and determines what action is required. As an example, heretofore when a party depressed a touch-tone key during a live telephone call, a tone was generated, yet the telecommunications network did not recognize that tone as requiring an action. This invention, however, implements an action in response to the Key Word Programmable Caller ID Screening query. The action could include interrupting the conversation, playing an announcement, terminating the connection, forwarding to voice mail, storing incoming line identification (ICLID) information of the communications signal in a Key Word Programmable Caller ID Screening database, adding the ICLID information to a Do Not Call list, updating a subscriber's profile with the ICLID information, and/or storing the ICLID information in a subscriber's blocked communications list. The Do Not Call list, the subscriber's profile, and/or the subscriber's blocked communications list may include communications instructions for the called number (i.e., the subscriber's communications address engaged in a conversation or receiving notification of an incoming communication) as well as include communications instructions for other registered communications addresses (e.g., other telephone numbers associated with the subscriber, an email address of the subscriber, and other communications addresses of the subscriber). According to some of the exemplary embodiments, the incoming communication may be initially filtered by examining key words (e.g., “INC”, “Private”, “Unknown”, and other subscriber identified or network identified key words) and matching key words to words in a subscriber's profile database to determine if the incoming communication is desirable or undesirable, and in some embodiments to further process the incoming communication (e.g., route to voicemail, connect to called party (subscriber's communications address), etc.).



FIGS. 1-3 depict possible operating environments for exemplary embodiments of this invention. A Key Word Programmable Caller ID Screening Module 20 includes computer programs, computer systems, and communications systems that initially screen a call according to a subscriber's screening profile as well as allow a subscriber, in real time during a live telephone call to take actions during the call. The Key Word Programmable Caller ID Screening Module 20, for example, allows the subscriber to hit a Dual-Tone Multi-Frequency key, a softkey, and/or data message to play an announcement to the other party. This announcement may be a recording that rejects the caller, and the Key Word Programmable Caller ID Screening Module 20 could then automatically terminate the telephone call. Because the announcement may be personalized, the wording and tone of the announcement can be tailored to the subscriber's personality (e.g., a “soft” rejection or a “hard” rejection). The call screening request could alternatively forward the call to voice mail, thus still allowing the calling party to leave a message. The Key Word Programmable Caller ID Screening Module 20, however, also offers the subscriber the ability to add selective key word information to associate with the ICLID (or other network associated communications address) signal of the incoming communication.



FIG. 1 is a block diagram showing the Key Word Programmable Caller ID Screening Module 20 residing in a computer system 22. The Key Word Programmable Caller ID Screening Module 20 operates within a system memory device. The Key Word Programmable Caller ID Screening Module 20, for example, is shown residing in a memory subsystem 24. The Key Word Programmable Caller ID Screening Module 20, however, could also reside in flash memory 26 or peripheral storage device 28. The computer system 22 also has one or more central processors 30 executing an operating system. The operating system, as is well known, has a set of instructions that control the internal functions of the computer system 22. A system bus 32 communicates signals, such as data signals, control signals, and address signals, between the central processor 30 and a system controller 34 (typically called a “Northbridge”). The system controller 34 provides a bridging function between the one or more central processors 30, a graphics subsystem 36, the memory subsystem 24, and a PCI (Peripheral Controller Interface) bus 38. The PCI bus 38 is controlled by a Peripheral Bus Controller 40. The Peripheral Bus Controller 40 (typically called a “Southbridge”) is an integrated circuit that serves as an input/output hub for various peripheral ports. These peripheral ports could include, for example, a keyboard port 42, a mouse port 44, a serial port 46 and/or a parallel port 48 for a video display unit, on or more external device ports 50, and networking ports 52 (such as SCSI or Ethernet). The Peripheral bus Controller 40 could also include an audio subsystem 54. Those of ordinary skill in the art understand that the program, processes, methods, and systems described in this patent are not limited to any particular computer system or computer hardware.


The central processor 30 is typically a microprocessor. Advanced Micro Devices, Inc. for example, manufactures a full line of ATHLON® microprocessors (ATHLON® is a trademark of Advanced Micro Devices, Inc., One AMD Place, P.O. Box 3453, Sunnyvale, Calif. 94088-3453, 408.732.2400, 800.538.8450, www.amd.com). The Intel Corporation also manufactures a family of X86 and P86 microprocessors (Intel Corporation, 2200 Mission College Blvd., Santa Cara, Calif. 95052-8119, 408.765.8080, www.intel.com). Other manufactures also offer microprocessors. Such other manufacturers include Motorola, Inc. (1301 East Algonquin Road, P.O. Box A3309 Schaumburg, Ill. 60196, www.Motorola.com), International Business Machines Corp. (New Orchard Road, Armonk, N.Y. 10504, (914 499-1900, www.ibm.com), and Transmeta Corp. (3940 Freedom Circle, Santa Clara, Calif. 95054, www.transmeta.com). Those skilled in the art further understand that the program, processes, methods, and systems described in this patent are not limited to any particular manufacturer's central processor.


An exemplary operating system is WINDOWS® (WINDOWS® is a registered trademark of Microsoft Corporation, One Microsoft Way, Redmond Wash. 98052-6399, 425.882.8080, www.Microsoft.com). Other operating system (UNIX® is a registered trademark of the Open Source Group, www. Opensource.org), the UNIX-based Linux operating system, WINDOWS NT®, and Mac® OS (Mac® is a registered Trademark of Apple Computer, Inc., 1 Infinite Loop, Cupertino, Calif. 95014, 408.996.1010, www.apple.com). Those of ordinary skill in the art again understand that the program, processes, methods, and systems described in this patent are not limited to any particular operating system.


The system memory device (shown as memory subsystem 24, flash memory 26, or peripheral storage device 28) may also contain an application program. The application program cooperates with the operating system and with a video display unit (via the serial port 46 and/or the parallel port 48) to provide a Graphical User Interface (GUI). The Graphical User Interface typically includes a combination of signals communicated along the keyboard port 42 and the mouse port 44. The Graphical User Interface provides a convenient visual and/or audible interface with a user of the computer system 22.



FIG. 2 is a schematic showing the Key Word Programmable Caller ID Screening Module 20 operating within an intelligently-controlled communications network 56. This communications network 56 further represents an operating environment for the Key Word Programmable Caller ID Screening Module 20. The communications network 56 includes a communications switch 60 that may includes Advanced Intelligent Network (AIN) componentry 64 controlling many features of the communications switch 60. The Advanced Intelligent Network (AIN) componentry 64 would include the Key Word Programmable Caller ID Screening Module 20 operating within the computer system (shown as reference numeral 22 in FIG. 1). The communications switch 60 and the Advanced Intelligent Network (AIN) componentry 64 may also interface with a data network 66. The signaling between the communications switch 60, the communications network 62 (e.g., Public Switched Telecommunications Network), the Advanced Intelligent Network 64, and the data network 66, however, is well understood in the art and will not be further described. If a reader desires a more detailed explanation, the reader is directed to U.S. Pat. No. 5,430,719 issued to Weisser (Jul. 4, 1995), with the “Summary of the Invention” and the “Detailed Description of the Preferred Embodiment” sections incorporated herein by reference. The reader is also directed to U.S. Pat. No. 5,917,817 issued to Dunn et al. (Jun. 29, 1999), with the “Summary of the Invention” and the “Detailed Description” sections incorporated herein by reference.



FIG. 3 is similar to FIG. 2, yet FIG. 3 illustrates an exemplary packet network architecture. This exemplary packet network represents an alternative operating environment for the Key Word Programmable Caller ID Screening Module 20. Here the communications switch 60 includes a packet-based “softswitch.” This softswitch uses software control to provide voice, data, and video services by dynamically changing its connection data rates and protocols types. An application server 68 interfaces with the softswitch via a packet protocol, such as Session Initiation Protocol (SIP). This application server 68 includes voice service protocols, triggers, and operations that allow the communications network 62 and the data network 66 to interoperate.



FIG. 4 is a schematic illustrating an exemplary embodiment of providing Key Word Programmable Caller ID Screening services upon receiving an incoming call or during telephone calls. Here the Key Word Programmable Caller ID Screening Module 20 may initially screen a call using information in the Key Word Programmable Caller ID Screening Module 20, such as, ICLID information identifying an alphanumeric directory listing associated with the incoming call, or alternatively, subscriber programmed alphanumeric key words, phrases, and/or symbols associated with the ICLID information. This alternative, subscriber programmed alphanumeric information may be displayed to the subscriber's communications device 72 or alternative Caller ID display device (not shown). For example, key words associated with an incoming line identification (ICLID) signal may be matched with key words selected or otherwise identified, programmed, and associated by the subscriber to characterize the incoming call as desirable or undesirable. According to an exemplary embodiment, if the subscriber's surname is “Forsberg,” then the subscriber may associate “Forsberg” with a desirable subscribes such that each communication form a calling party's communications device matching “Forsberg” is automatically connected, processed, or prioritized for call handling. Further, the subscriber may enter a communications address having ICLID information unassociated with “Forsberg,” and subsequently program, reset, or define the communications address with a naming or key work convention that includes “Forsberg,” such as “Rowdy Forsberg” to identify a family member affectionately know as “Rowdy Forsberg,” and thereafter automatically connect, process, or prioritize incoming calls from this programmed family member's communications address. However, if an incoming call from a calling party is associated with an undesirable caller, such as an incoming communication that has a “Private” ICLID signal, then the Key Word Programmable Caller ID Screening Module may be programmed to automatically route incoming calls having this matched key word to a Do Not Disturb announcement and thereafter terminate the call or provide alternative call handling options.


In addition, the Key Word Programmable Caller ID Screening Module 20 allows a subscriber, in real time during a live telephone call, to take actions during the call. If either party to the telephone call is a subscriber to this Key Word Programmable Caller ID Screening service, then the Key Word Programmable Caller ID Screening Module 20 allows the subscriber to utilize a key word call screening request during the actual telephone call. The key word call screening request may comprise a Dual-Tone Multi-Frequency tone on a telephone keypad, a softkey on a similar keypad, and/or a data message (e.g., an SIP message). As FIG. 4 shows, a telephone call is placed from a calling telephone number 70 (hence the calling party) to a called telephone number 72 (the called party). The telephone call is processed from the calling party (the incoming communications signal with the incoming line identification information 70), into the communications network 62, and to the destination communications switch 60 serving the called party (the called telephone number 72). The intelligence controlling the destination communications switch 60 detects a trigger that identifies either party as a subscriber to this Key Word Programmable Caller ID Screening service. The destination communications switch 60 is then instructed to establish a connection between the ICLID information and the called telephone number, thus allowing the parties to converse.


Once the connection is established, the live telephone call is monitored for the key word call screening request. The live telephone call is monitored for the next event, and that event is entry of the key word call screening request. The terms “monitor,” “monitoring,” and “monitored” mean the communications network 56 listens for, and/or is able to detect, a Dual-Tone Multi-Frequency tone signal, entry of a softkey, or receipt of a data message. The communications switch 60, for example, may listen for the Dual-Tone Multi-Frequency tone, or the communications switch 60 may be instructed to listen for the Dual-Tone Multi-Frequency tone. The terms “monitor,” “monitoring,” and “monitored” may also mean the Advanced Intelligent Network componentry 64, or the application server 68, listens for the Dual-Tone Multi-Frequency tone. The Advanced Intelligent Network componentry 64, or the application server 68, could instruct or command some portion of the communications network 56 to listen for the Dual-Tone Multi-Frequency tone. As those of ordinary skill in the art understand, Dual-Tone Multi-Frequency signaling is a means of transferring information from a party to the communications network 56 through the use of in-band audio tones. Each digit of information is assigned a simultaneous combination of one of a lower group of frequencies and one of a higher group of frequencies to represent each digit or character. The communications network 56 monitors the telephone call for the next event to happen-in this case, the next event is entry of a Dual-Tone Multi-Frequency tone. The Dual-Tone Multi-Frequency tone is accepted and sent to the intelligence controlling the communications switch 60 (such as the Advanced Intelligent Network componentry 64 or the application server 68) for interpretation and for an action.


Upon entry of a Dual-Tone Multi-Frequency tone, the communications network 56 takes an action. This invention allows the subscriber to utilize the touch-tone keys 74 on the telephone keypad 76 during the telephone call. Heretofore when a party depressed a touch-tone key 74 during a live telephone call, a tone was generated, yet the communications network 56 did not recognize that tone as requiring a key word call screening action. This invention, however, implements an action in response to the Dual-Tone Multi-Frequency tone. This invention, for example, launches a next event list and arms the T_DTMF_ENTERED event in the authorize termination message. This event could make the communications switch 60 listen in on the telephone call and wait for a DTMF event. When the subscriber presses any key 74 on the keypad 76, and hangs up, the Key Word Programmable Caller ID Screening Module 20 launches an event back to the Advanced Intelligent Network 64 (e.g., a Service Control Point). The Advanced Intelligent Network 64 checks the digit that was entered by the subscriber and takes the appropriate action. The action could include playing an announcement, terminating the connection, forwarding to voice mail, storing the ICLID information in a database, adding the ICLID information (or other line identification information) to a Do Not Call list, updating a subscriber's profile with selected alphanumeric portions of the ICLID information, and/or storing selected alphanumeric portions of the ICLID information in a subscriber's blocked communications list.


A call screening request, for example, could be used to reject incoming marketing communications such as solicitations. For example, when a subscriber receives a telemarketing call, the subscriber may, in real time during the live telephone call, enter the key word call screening request. The subscriber, for example, could hit a Dual-Tone Multi-Frequency key 74 on the keypad 76, hit a softkey on the keypad, or send a data message from a computer device. The communications network 56 recognizes that key word call screening request tone as requiring an action. Here, for example, that action might be playing an announcement 78 to the calling party. This announcement might be a network-based “telemarketing slam” that rejects the telemarketer. Once the announcement is played, the communications network 56 could also be instructed to terminate the connection between the calling party and the called telephone number. This method of rejecting telemarketing calls (i.e., playing the announcement and then terminating the call) would appeal to those subscriber's who desire a quick, convenient and, yet, polite method of disposing of telemarketers.


Another action might be voicemail. When a subscriber receives a telephone call, the subscriber may, in real time during the live telephone call, enter the key word call screening request. The subscriber, for example, could hit the Dual-Tone Multi-Frequency key 74 on the keypad 76, hit a softkey on the keypad, or send a data message from a computer device. The communications network 56 recognizes that call screening request as requiring an action. Here the action is forwarding the telephone call to voicemail. At any time during the telephone call the subscriber could forward the other party to voicemail. The other party would hear the subscriber's voicemail announcement. The other party to the telephone call could then record a voicemail message to a voicemail database (shown as reference numerals 78, 84 in FIG. 5), and the subscriber could retrieve this voicemail message at a later time. If, for example, a subscriber is intrigued by a telemarketing proposal, yet does not want to talk with the telemarketer, the subscriber could enter a Dual-Tone Multi-Frequency tone and forward the telemarketer to voicemail. The subscriber could then retrieve the voicemail message at a more convenient time.


This voicemail feature, however, is not only for telemarketing. This voicemail feature would also appeal to anyone requiring voicemail during a live telephone call. When, for example, a more important situation arises during the telephone call, the subscriber may forward the other party to voicemail, tend to the important situation, and later retrieve the voicemail message.


The announcement could be personalized. The subscriber could access the intelligence controlling the communications switch 60 and record a personalized announcement. The subscriber, for example, could access a media server using a toll-free administrative telephone number. The media server could utilize Caller ID to recognize the subscriber's home telephone number, or the media server could prompt for a subscribing telephone number. The media server steps the subscriber through a series of prompts and allows the subscriber to record the personalized announcement. The personalized announcement could be any greeting, message, or telemarketing rejection. The personalized announcement could be stored as a specific file in the media server. When the subscriber then enters a DTMF during a live telephone call, the communications switch 60 could then play the personalized announcement. The communications switch 60, instead, could be instructed to forward the telephone call to the media server for the personalized announcement. The subscriber might have a number of different personalized announcements, and the particular announcement depends upon which DTMF is entered. If the subscriber, for example, enters a “4” on the keypad 76, the communications switch 60 sends the telephone call to the intelligence (e.g., the AIN 64 or the application server 68). The intelligence recognizes that Dual-Tone Multi-Frequency tone as requiring action, and this action is playing the particular personalized announcement corresponding to the DTMF. The intelligence returns instructions to the communications switch 60 to forward that call to the media server. The media server accesses the particular personalized announcement corresponding to the called telephone number and the DTMF. The media server then plays the particular personalized announcement.



FIG. 5 is a schematic illustrating another exemplary embodiment for providing Key Word Programmable Caller ID Screening service during telephone calls. Here the action taken is storing the ICLID information as well as subscriber identified alphanumeric information (e.g., “Mom Home” to associate with the home phone number of the subscriber's mother) associated with the incoming marketing communication in a database. When the subscriber enters the call screening request, for example, the communications network 56 could add the ICLID information and/or the subscriber identified alphanumeric information to a Do Not Call list/database 80. This Do Not Call list/database 80 could contain one or more telephone numbers and/or other communications addresses (e.g., email address, IP address, and other communications addresses) of a subscriber that do not wish to receive telemarketing calls. As used herein, the term “subscriber” includes customers, consumers, and users of a communications device at a communications address (e.g., the called number, an email address, a cell phone number, etc.). Because the subscriber need only enter the call screening request to add/register a communications address (e.g., telephone number) to the Do Not Call list/database 80, the Key Word Programmable Caller ID Screening service provides a very quick and convenient method of preventing subsequent marketing communications. Further, the call screening request could also update other Do Not Call lists, such as wireless versions, wireline versions, electronic communications addresses, a spouse's version, a kid's version, and/or combined versions. When the call screening request is entered, the ICLID information and/or subscriber identified alphanumeric information of the incoming undesired communication could be forwarded to a remote database 82 via the data network 66. The remote database 82, for example, could be a government Do Not Call list. The ICLID information and/or subscriber identified alphanumeric information, for example, could be communicated to a subscriber's Do Not Call database 82, voicemail 84, or a governmental Do Not Call database 86 via the data network 66. The governmental Do Not Call database 86 could be provided by a state governmental agency (e.g., the state attorney general), a federal governmental agency (e.g., FCC), and others. The federal Do Not Call database 86 could be provided by a federal agency (e.g., the Federal Trade Commission). When the subscriber enters the call screening request, the communications network 56 could automatically add the ICLID information and/or subscriber identified alphanumeric information to various databases, thus further reducing unwanted telemarketing calls.


This Key Word Programmable Caller ID Screening service also helps the subscriber prove violations of Do Not Call lists and/or monitoring services. Some state and federal laws prohibit telemarketing calls to telephone numbers on these Do Not Call lists. Because the communications network 56 maintains a date and a time of any telephone call, the communications network 56 could “tag” each telemarketing call. When the subscriber enters the call screening request, and the communications network 56 adds/communicates the ICLID information and/or subscriber identified alphanumeric information to a Do Not Call list/database 80, the communication could also include the date and time of the undesired telephone call as well as other line identification information. When future telephone calls are received, the communications network 56 could query the Do Not Call list/database for the line identification information, ICLID information and/or subscriber identified alphanumeric information. If a match is found, the Key Word Programmable Caller ID Screening service could alert the subscriber and provide dates and times of the matching telephone numbers. The subscriber would then have evidence to pursue legal action against the telemarketer.



FIG. 6 is a schematic illustrating still another exemplary embodiment for providing Key Word Programmable Caller ID Screening service during telephone calls. When the subscriber sends the call screening request during a live telephone call, the communications network 56 recognizes that call screening request (such as a Dual-Tone Multi-Frequency tone) as requiring an action. Here the action comprises updating a subscriber's profile information 88 with the ICLID information and/or subscriber identified alphanumeric information of the incoming marketing communication. The subscriber's profile information 88 is stored in a database 90 of subscriber profiles. The database 90 of customer profiles may be maintained on the Advanced Intelligent Network 64 or the application server 68, or as FIGS. 6 and 7 show, a communications service server 92 communicates with the Advanced Intelligent Network 64 or the application server 68. The database 90 of customer profiles could also be maintained on a computer/server operating on the data network 66. As shown in FIGS. 5, 6, and 7, the customer profiles may include key words associated with allowing an incoming call to be connected, such as for incoming calls having alphanumeric ICLID and/or subscriber identified alphanumeric information matching the key words “Forsberg”, “Mom”, “Dad”, and/or “Boss”. Similarly, the customer profiles may include key words, such as, “Brother”, “Mobile”, “MGMT” and/or “INC” that trigger automatic routing of the incoming call to voicemail. And, the customer profiles may include key words, such as “*Dial”, “Private”, and/or “Unknown” that trigger automatic routing of the incoming call to the do not disturb call processing features.


According to an exemplary embodiment, the profile information 88 may be updated with the ICLID information and/or subscriber identified alphanumeric information. That is, when the subscriber enters the call screening request during a live telephone call, the action taken comprises storing the ICLID information and/or subscriber identified alphanumeric information in a subscriber's blocked communications list. The subscriber's blocked communications list contains calling telephone numbers (and other potential marketing communications addresses, such as an identifier of that the incoming call is from a cell phone in Florida) that the subscriber wishes to block or otherwise route to voice mail 94. When the communications switch 60 receives a subsequent telephone call, the intelligence controlling the switch 60 (the Advanced Intelligent Network 64 or the application server 68) suspends processing of the telephone call. A query is sent to determine if the ICLID information and/or subscriber identified alphanumeric information is found in the customer's profile information 88 and, hence, blocked from receipt. If the ICLID information and/or subscriber identified alphanumeric information is blocked, the caller is offered no additional opportunity to bypass the block. The ICLID information and/or subscriber identified alphanumeric information could also be added to related profiles, such as a spouse's profile, a child's profile, a wireless profile, and a wireline profile. Further, the profile information 88 may also include other associated subscriber communications addresses (e.g., a cell phone number, an identifier that the call is from a residential communications address, an identifier that the call is from a business address, an email address, and other communications addresses) that the subscriber wants to prevent subsequent communications from the calling party. That is, the undesired caller would be blocked from calling multiple communications addresses from the subscriber.



FIG. 7 is a schematic illustrating an exemplary embodiment for providing Key Word Programmable Caller ID Screening services to one or more other registered subscriber telecommunications addresses 102 and/or one or more other registered subscriber data communications addresses 112. These other registered communications addresses 102, 112 are stored with the profile information 88 in the database of customer profiles 90. When a subsequent incoming communication is placed from the calling party to one of the registered subscriber communications addresses 102, 112, the subsequent incoming communication to the registered subscriber communications address 102, 112 is also blocked from receipt (or alternatively, the incoming communication is processed according to the profile information, such as routing to voice mail 94, updating a government database, etc.). The registered telecommunications addresses 102 may include communications addresses for a cellular phone 104, another telephone 106, and another personal computer 108. Similarly, the registered data communications addresses 112 may include another cellular phone 114, another telephone 116, and another personal computer 118. Still further, these associated communications devices may also include a Voice over Internet Protocol (VoIP) phone and other communications devices.


As those of ordinary skill understand, the subscriber's profile information 88 relates to the subscriber's Key Word Programmable Caller ID Screening services. The specific information related to the provision, presence, and/or availability of these communication services is termed the “profile information” 88. This profile information 88 may include information related to the subscriber's calendar (e.g., appointments and activities), travel itinerary information, presence and availability information, other associated subscriber communications addresses, the subscriber's patterns of behavior, and most important to alphanumeric information that the subscriber associates with a calling party's communications address—the alphanumeric information may be a portion of the ICLID information or may otherwise be selected and identified by the subscriber and associated with the communications address. If the reader wishes to learn more about the profile information 88, and how the subscriber may view, add, delete, and otherwise define the subscriber's communications services and the profile information 88, the reader is referred to the commonly-assigned U.S. application Ser. No. 10/012,746, filed Dec. 7, 2001, and which the “Summary” and “Detailed Description” sections are incorporated herein by reference. The reader is also directed to the commonly assigned U.S. application Ser. No. 10/107,616, filed Mar. 27, 2002, and which the “Brief Summary of the Invention” and “Detailed Description of the Invention” sections are incorporated herein by reference.


The profile information 88 may also be accessed by the subscriber. The subscriber may use a computer system 94 to access the communications service server 92 via a connection to the communications switch 60 and a connection to the data network 66. The computer system 94 allows the subscriber to access the subscriber's profile information 88 and view/edit/delete information. Although the call screening request causes an automatic update of the blocked communications list, the subscriber could also access the profile information 88 and add telephone numbers to the list of blocked telephone numbers.



FIG. 8 is a flowchart showing a method of providing Key Word Programmable Caller ID Screening service. A telephone call is processed from a calling telephone number to a called telephone number (Block 800). The term “processing,” as used herein, encompasses every event from the time the ICLID information and/or subscriber identified alphanumeric information (shown as reference numeral 70 in FIGS. 4-7) goes off-hook to the termination of the telephone call. “Processing” of the telephone call includes routing a voice path and signaling setup and intelligence (e.g., Local Number Portability queries, queries to retrieve Calling Name/Number information, intelligence queries by the AIN 64 or the applications server 68, and standard signaling messages to determine call routing paths). The term “processing” also includes monitoring an established telephone call for possible Dual-Tone Multi-Frequency tone entry, switch hook flash, other events that indicate a party on the telephone call has requested an action, and delivery of call-waiting tones and data. “Processing,” however, also encompasses billing activities and measurements at the communications switch 60 or other communications network 56 element.


After a connection between the ICLID information and/or subscriber identified alphanumeric information and the called telephone number, the telephone call is monitored for an event (Block 802). Here, that event is entry of a call screening request, such as a Dual-Tone Multi-Frequency tone. Upon entry of the Dual-Tone Multi-Frequency tone, an action is taken in response to the Dual-Tone Multi-Frequency tone (Block 804). The action might comprise playing an announcement (Block 806), forwarding the telephone call to voice mail (Block 808), and updating a subscriber's profile with the ICLID information and/or subscriber identified alphanumeric information (Block 810). The action might also comprise storing the ICLID information and/or subscriber identified alphanumeric information in a database (Block 812), storing the ICLID information and/or subscriber identified alphanumeric information in the subscriber's blocked communications list for the called phone and for other associated communications addresses (Block 814), and/or communicating the ICLID information and/or subscriber identified alphanumeric information to a Do Not Call list (Block 816). The Do Not Call list could be maintained by a telecommunications service provider, a third party, a state government entity, and/or a federal government entity. The action could also comprise terminating the connection (Block 818).



FIG. 9 is a flowchart showing another method of providing Key Word Programmable Caller ID Screening service. A telephone call is detected, decoded, and deciphered in a communications network (Block 900). The telephone call is from a calling telephone number to a called telephone number. The ICLID or other incoming line identification information of the calling telephone number is compared with the subscriber profile to match screening fields. For example, if the incoming call is from a screened cellular phone in Canada matching the profile information, then the Key Word Programmable Caller ID Screening service may play an announcement (Block 904), take an action (Block 906), and terminate the connection (Block 930). If, however, the incoming call is not initially identified as an undesirable call, then the telephone call is connected to the called telephone number (Block 910). A call screening request, such as a Dual-Tone Multi-Frequency tone, is received from the called telephone number (Block 912), and an action is taken in response to the call screening request (Block 914). The action might comprise playing an announcement (Block 926), forwarding the telephone call to voice mail (Block 918), and updating a subscriber's profile with the ICLID information and/or subscriber identified alphanumeric information (Block 920). The action could also comprise storing the ICLID information and/or subscriber identified alphanumeric information in a database (Block 922), storing the ICLID information and/or subscriber identified alphanumeric information in a subscriber's blocked communications list for the called phone and for other associated communications addresses (Block 924), and communicating the ICLID information and/or subscriber identified alphanumeric to a Do Not Call list (Block 926). Thereafter, the connection with the incoming call may be terminated (Block 930).



FIGS. 10 and 11 are flowcharts showing other methods of providing Key Word Programmable Caller ID Screening service. A telephone call is processed from a calling telephone number to a called telephone number (Block 1002) or other associated, registered communications addresses (Block 1102). For example, the other associated, registered communications addresses may include other registered subscriber telecommunications addresses 102 (e.g., cellular phone, DSL, etc.) and/or one or more other registered subscriber data communications addresses 112 (e.g. email). After a connection between the ICLID information and/or subscriber identified alphanumeric information and the called telephone number, the telephone call is monitored for entry of a Dual-Tone Multi-Frequency (Blocks 1004, 1104). Upon entry of the Dual-Tone Multi-Frequency, an announcement is played (Block 1006, 1106). The announcement may be network-based (Block 1008, 1108) or a personalized prerecorded announcement of either party to the telephone call (Block 1010, 1110). The connection is then terminated (Block 1012, 1112).


According to some of the exemplary embodiments, the Key Word Programmable Caller ID Screening service may also be available after termination of the telephone call. After the subscriber hangs up the phone, the subscriber could still have an opportunity to screen the calling telephone. Assume the subscriber accepted the call and, after terminating the call, decides to block receipt of future calls from the same calling telephone number. The call screening request could also be recognized after termination of the call. The Key Word Programmable Caller ID Screening Module (shown as reference numeral 20 in FIGS. 1-7) could query the subscriber's profile information. The subscriber's profile information could contain a “last call received” data field. This “last call received” data field stores the ICLID information and/or subscriber identified alphanumeric information of the last received call. When the subscriber's telephone is offline, and then when the subscriber enters a predetermined call screening request, this call screening request instructs the Key Word Programmable Caller ID Screening Module (or some other application) to add the ICLID information and/or subscriber identified alphanumeric information of the last received call to the customer's profile. The “last call received” data field could even be temporary and change after each incoming call to avoid maintaining a long list of previously received calls. The subscriber could, for example, enter a Dual Tone Multi-Frequency tone to add the last received calling telephone number to the subscriber's profile. The subscriber could then, after termination of the call, add the ICLID information and/or subscriber identified alphanumeric information to the Do Not Call list or blocked communications list.


The Key Word Programmable Caller ID Screening Module (shown as reference numeral 20 in FIGS. 1-7) may be physically embodied on or in a computer-readable medium. This computer-readable medium may include CD-ROM, DVD, tape, cassette, floppy disk, memory card, and large-capacity disk (such as IOMEGA®, ZIP®, and other large-capacity memory products (IOMEGA®, ZIP®, and JAZZ® are registered trademarks of Iomega Corporation, 1821 W. Iomega Way, Roy, Utah 84067, 801.332.1000, www.iomega.com). This computer-readable medium, or media, could be distributed to end-users, licensees, and assignees. These types of computer-readable, media, and other types not mention here but considered within the scope of the present invention, allow the Key Word Programmable Caller ID Screening Module to be easily disseminated. A computer program product for providing Key Word Programmable Caller ID Screening during a telephone call comprises the computer-readable medium and the Key Word Programmable Caller ID Screening Module. The Key Word Programmable Caller ID Screening Module is stored on the computer-readable medium.


The Key Word Programmable Caller ID Screening Module (shown as reference numeral 20 in FIGS. 1-7) may be physically embodied on or in any addressable (e.g., HTTP, I.E.E.E. 802.11, Wireless Application Protocol (WAP)) wireless device capable of presenting an IP address. Examples could include a computer, a wireless personal digital assistant (PDA), an Internet Protocol mobile phone, or a wireless pager.


While this invention has been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize this invention is not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of this invention.

Claims
  • 1. A method, comprising: detecting a telephone call at a telecommunications switch, the telephone call from a calling telephone number to a called telephone number;decoding the calling telephone number for the line identification information, the line identification information compared with a subscriber's profile;if the line identification information matches subscriber identified keyword data of the subscriber's profile to identify the calling telephone number as an undesirable calling party, then; automatically playing an announcement,storing a date and time of the undesired telephone call; andterminating the connection;if the line identification information does not match the subscriber identified keyword data then:establishing a connection between the calling telephone number and the called telephone number;after the connection between the calling telephone number and the called telephone number, monitoring the telephone call for an alphanumeric call screening request associated with the calling telephone number, the alphanumeric call screening request comprising subscriber identified keyword information associated with the calling number identifying the calling telephone number as an undesirable calling party;upon entry of the call screening request, taking an action in response to the call screening request;wherein the taking an action comprises storing the subscriber identified keyword information in a database.
  • 2. A method according to claim 1, wherein taking an action comprises playing an announcement.
  • 3. A method according to claim 1, wherein taking an action comprises terminating the connection.
  • 4. A method according to claim 1, wherein taking an action comprises forwarding the telephone call to voice mail.
  • 5. A method according to claim 1, wherein taking an action comprises storing incoming line identification information of the calling telephone number in a database.
  • 6. A method according to claim 1, wherein taking an action comprises communicating the incoming line identification information to a Do Not Call list, the Do Not Call list associated with the called telephone number.
  • 7. A method according to claim 1, wherein taking an action comprises updating a subscriber's profile with the incoming line identification information, the subscriber's profile associated with the called telephone number.
  • 8. A method according to claim 1, wherein taking an action comprises storing the incoming line identification information in a subscriber's blocked communications list.
  • 9. A method according to claim 1, wherein receiving the alphanumeric call screening request comprises receiving a data message.
US Referenced Citations (566)
Number Name Date Kind
4266098 Novak May 1981 A
4268722 Little et al. May 1981 A
4277649 Sheinbein Jul 1981 A
4582956 Doughty Apr 1986 A
4649433 Verhoeven Mar 1987 A
4649533 Chorley et al. Mar 1987 A
4663777 Szeto May 1987 A
4674115 Kaleita et al. Jun 1987 A
4698839 DeVaney et al. Oct 1987 A
4791664 Lutz et al. Dec 1988 A
4797911 Szlam et al. Jan 1989 A
4802202 Takahashi et al. Jan 1989 A
4817133 Takahashi et al. Mar 1989 A
4823304 Frantz et al. Apr 1989 A
4845743 Lutz Jul 1989 A
4850013 Rose Jul 1989 A
4850103 Takemoto et al. Jul 1989 A
4995075 Angiolillo-Bent et al. Feb 1991 A
5029196 Morganstein Jul 1991 A
5109405 Morganstein Apr 1992 A
5121423 Morihiro et al. Jun 1992 A
5151929 Wolf Sep 1992 A
5157712 Wallen, Jr. Oct 1992 A
5161181 Zwick Nov 1992 A
5200994 Sasano et al. Apr 1993 A
5206901 Harlow et al. Apr 1993 A
D338889 Fuqua et al. Aug 1993 S
5260987 Mauger Nov 1993 A
5263084 Chaput et al. Nov 1993 A
5265145 Lim Nov 1993 A
5274699 Ranz Dec 1993 A
5278894 Shaw Jan 1994 A
5289542 Kessler Feb 1994 A
5315650 Smith et al. May 1994 A
5329578 Brennan et al. Jul 1994 A
5333152 Wilber Jul 1994 A
5333186 Gupta Jul 1994 A
5338889 Vora et al. Aug 1994 A
5341411 Hashimoto Aug 1994 A
5347574 Morganstein Sep 1994 A
5361295 Solomon et al. Nov 1994 A
5383466 Partika Jan 1995 A
5386460 Boakes et al. Jan 1995 A
5388150 Schneyer et al. Feb 1995 A
5413605 Ashby et al. May 1995 A
5420910 Rudokas et al. May 1995 A
5420914 Blumhardt May 1995 A
5420920 Capper et al. May 1995 A
5425076 Knippelmier Jun 1995 A
5425089 Chan et al. Jun 1995 A
5430719 Weisser, Jr. Jul 1995 A
5446785 Hirai Aug 1995 A
5452089 Bushman Sep 1995 A
5452346 Miyamoto Sep 1995 A
5459779 Backaus et al. Oct 1995 A
5466785 De Framond Nov 1995 A
5467388 Redd, Jr. et al. Nov 1995 A
5475748 Jones et al. Dec 1995 A
5481594 Shen et al. Jan 1996 A
5481599 MacAllister et al. Jan 1996 A
5481602 Griffiths et al. Jan 1996 A
5490205 Kondo et al. Feb 1996 A
5497414 Bartholomew Mar 1996 A
5502762 Andrew et al. Mar 1996 A
5506893 Buscher et al. Apr 1996 A
5511111 Serbetcioglu et al. Apr 1996 A
5530741 Rubin Jun 1996 A
5533106 Blumhardt Jul 1996 A
5535265 Suwandhaputra Jul 1996 A
5537470 Lee Jul 1996 A
5539809 Mayer Jul 1996 A
5546447 Skarbo et al. Aug 1996 A
5550900 Ensor et al. Aug 1996 A
5550905 Silverman Aug 1996 A
5563935 Small Oct 1996 A
5563936 Washington Oct 1996 A
5602908 Fan Feb 1997 A
5608788 Demlow et al. Mar 1997 A
5619561 Reese Apr 1997 A
5631950 Brown May 1997 A
5636269 Eisdorfer Jun 1997 A
5644629 Chow Jul 1997 A
5646979 Knuth Jul 1997 A
5657372 Ahlberg et al. Aug 1997 A
D383466 Burrell et al. Sep 1997 S
5668852 Holmes Sep 1997 A
5696809 Voit Dec 1997 A
5696815 Smyk Dec 1997 A
5699413 Sridhar Dec 1997 A
5699523 Li et al. Dec 1997 A
5701301 Weisser, Jr. Dec 1997 A
5703934 Zicker et al. Dec 1997 A
5703943 Otto Dec 1997 A
H1714 Partridge, III Mar 1998 H
5724412 Srinivasan Mar 1998 A
5734706 Windsor et al. Mar 1998 A
5742668 Pepe et al. Apr 1998 A
5742905 Pepe et al. Apr 1998 A
5754635 Kim May 1998 A
5754636 Bayless et al. May 1998 A
5754775 Adamson et al. May 1998 A
5771281 Batten, Jr. Jun 1998 A
5771283 Chang et al. Jun 1998 A
5781621 Lim et al. Jul 1998 A
5784444 Snyder et al. Jul 1998 A
5796806 Birckbichler Aug 1998 A
5799072 Vulcan et al. Aug 1998 A
5802160 Kugell et al. Sep 1998 A
5802251 Cohen et al. Sep 1998 A
5805587 Norris et al. Sep 1998 A
5805682 Voit et al. Sep 1998 A
5805997 Farris Sep 1998 A
5809128 McMullin Sep 1998 A
5812533 Cox et al. Sep 1998 A
5812649 Shen Sep 1998 A
5838774 Weisser, Jr. Nov 1998 A
5841838 Itoh et al. Nov 1998 A
5841850 Fan Nov 1998 A
5848142 Yaker Dec 1998 A
5850435 Devillier Dec 1998 A
5850436 Rosen et al. Dec 1998 A
5857017 Ohi Jan 1999 A
5859903 Lee Jan 1999 A
5872834 Teitelbaum Feb 1999 A
5872934 Whitehouse et al. Feb 1999 A
5875239 Koralewski et al. Feb 1999 A
5875241 Chang et al. Feb 1999 A
5878036 Spartz et al. Mar 1999 A
5883942 Lim et al. Mar 1999 A
5884144 Chavez, Jr. et al. Mar 1999 A
5894504 Alfred et al. Apr 1999 A
5901209 Tannenbaum et al. May 1999 A
5901212 True et al. May 1999 A
5903636 Malik May 1999 A
5905794 Gunn et al. May 1999 A
5907596 Karnowski May 1999 A
5907604 Hsu May 1999 A
5915000 Nguyen et al. Jun 1999 A
5917817 Dunn et al. Jun 1999 A
5918213 Bernard et al. Jun 1999 A
5923744 Cheng et al. Jul 1999 A
5930701 Skog Jul 1999 A
5940484 DeFazio et al. Aug 1999 A
5943416 Gisby Aug 1999 A
5946363 Rominger et al. Aug 1999 A
5946636 Uyeno et al. Aug 1999 A
5946684 Lund Aug 1999 A
D413605 Thomas et al. Sep 1999 S
5948040 DeLorme et al. Sep 1999 A
5948061 Merriman et al. Sep 1999 A
5949865 Fusinato Sep 1999 A
5953399 Farris et al. Sep 1999 A
5953657 Ghisler Sep 1999 A
5963626 Nabkel Oct 1999 A
5969647 Mou et al. Oct 1999 A
5970127 Smith et al. Oct 1999 A
5970128 Kim Oct 1999 A
5974309 Foti Oct 1999 A
5982866 Kowalski Nov 1999 A
5991377 Malik Nov 1999 A
5999207 Rodriguez et al. Dec 1999 A
5999599 Shaffer et al. Dec 1999 A
5999613 Nabkel et al. Dec 1999 A
6005870 Leung et al. Dec 1999 A
6006087 Amin Dec 1999 A
6009321 Wang et al. Dec 1999 A
6014559 Amin Jan 2000 A
6016512 Huitema Jan 2000 A
6021188 Meg Feb 2000 A
6021427 Spagna et al. Feb 2000 A
6031899 Wu Feb 2000 A
6044148 Bleile Mar 2000 A
6049291 Kikinis Apr 2000 A
6058171 Hoopes May 2000 A
6061434 Corbett May 2000 A
6061566 Friman May 2000 A
6064876 Ishida et al. May 2000 A
6065844 Chen May 2000 A
6072859 Kong Jun 2000 A
6078581 Shtivelman et al. Jun 2000 A
6091947 Sumner et al. Jul 2000 A
6094478 Shepherd et al. Jul 2000 A
6094573 Heinonen et al. Jul 2000 A
6094574 Vance et al. Jul 2000 A
6094575 Anderson et al. Jul 2000 A
6101246 Heinmiller et al. Aug 2000 A
6104784 Robbins et al. Aug 2000 A
6104800 Benson Aug 2000 A
6108630 Kuechlet et al. Aug 2000 A
6111939 Brabanec Aug 2000 A
6134235 Goldman et al. Oct 2000 A
6134311 Ekstrom Oct 2000 A
6137870 Scherer Oct 2000 A
6137871 Maier et al. Oct 2000 A
6141341 Jones et al. Oct 2000 A
6141409 Madoch et al. Oct 2000 A
6144644 Bajzath et al. Nov 2000 A
6154531 Clapper Nov 2000 A
6160876 Moss et al. Dec 2000 A
6161021 Akpa Dec 2000 A
6163595 Parker et al. Dec 2000 A
6163607 Bogart et al. Dec 2000 A
6163691 Buettner et al. Dec 2000 A
6167254 Chavez, Jr. et al. Dec 2000 A
6169911 Wagner et al. Jan 2001 B1
6173049 Malik Jan 2001 B1
6178232 Latter et al. Jan 2001 B1
6181928 Moon Jan 2001 B1
D437879 Weinandt Feb 2001 S
6185289 Hetz et al. Feb 2001 B1
6185426 Alperovich Feb 2001 B1
6192115 Toy et al. Feb 2001 B1
6192116 Mayak Feb 2001 B1
6198480 Cotugno et al. Mar 2001 B1
6198920 Doviak et al. Mar 2001 B1
6202023 Hancock et al. Mar 2001 B1
6219407 Kanevsky et al. Apr 2001 B1
6219413 Burg Apr 2001 B1
6222826 Faynberg et al. Apr 2001 B1
6226367 Smith et al. May 2001 B1
6226369 Lim et al. May 2001 B1
6226399 Robinson May 2001 B1
6229883 Kakizaki et al. May 2001 B1
6230006 Keenan et al. May 2001 B1
6233325 Frech et al. May 2001 B1
6236975 Boe et al. May 2001 B1
6243448 Corbett et al. Jun 2001 B1
6243461 Hwang et al. Jun 2001 B1
6246976 Mukaigawa et al. Jun 2001 B1
6252952 Kung et al. Jun 2001 B1
6256671 Strentzsch et al. Jul 2001 B1
6262987 Mogul Jul 2001 B1
6266399 Weller et al. Jul 2001 B1
6278704 Creamer et al. Aug 2001 B1
6278862 Henderson Aug 2001 B1
6282275 Gurbani et al. Aug 2001 B1
6292479 Bartholomew et al. Sep 2001 B1
6292549 Lung et al. Sep 2001 B1
6295502 Hancock et al. Sep 2001 B1
6301342 Ander et al. Oct 2001 B1
6301350 Henningson et al. Oct 2001 B1
6304644 Karnowski Oct 2001 B2
6310943 Kowalski Oct 2001 B1
6311057 Barvesten Oct 2001 B1
6317488 DePond et al. Nov 2001 B1
6317781 De Boor et al. Nov 2001 B1
6324263 Sherwood et al. Nov 2001 B1
6324271 Sawyer et al. Nov 2001 B1
6327347 Gutzmann Dec 2001 B1
6332021 Latter et al. Dec 2001 B2
6333973 Smith et al. Dec 2001 B1
6337904 Gisby Jan 2002 B1
6337979 Nakayasu Jan 2002 B1
6339639 Henderson Jan 2002 B1
6341161 Latter et al. Jan 2002 B1
6345187 Berthoud et al. Feb 2002 B1
6347136 Horan Feb 2002 B1
6351637 Lee Feb 2002 B1
6353664 Cannon et al. Mar 2002 B1
6361637 Martin et al. Mar 2002 B2
6363140 Pinard Mar 2002 B1
6363411 Dugan et al. Mar 2002 B1
6363664 Brutsaert Apr 2002 B1
6366661 Devillier et al. Apr 2002 B1
6366772 Arnson Apr 2002 B1
6377807 Iparrea et al. Apr 2002 B1
6377979 Yamashita et al. Apr 2002 B1
6389124 Schnarel et al. May 2002 B1
6389132 Price May 2002 B1
6400809 Bossemeyer, Jr. et al. Jun 2002 B1
6400947 Bright et al. Jun 2002 B1
6404868 Beamish et al. Jun 2002 B1
6404875 Malik et al. Jun 2002 B2
6411692 Scherer Jun 2002 B1
6421425 Bossi et al. Jul 2002 B1
6422263 Spicer Jul 2002 B1
6427003 Corbett et al. Jul 2002 B1
6427064 Henderson Jul 2002 B1
6434394 Grundvig et al. Aug 2002 B1
6437879 Temple Aug 2002 B1
6438216 Aktas Aug 2002 B1
6438217 Huna Aug 2002 B1
6438584 Powers Aug 2002 B1
6442249 Miller, Jr. Aug 2002 B1
6442262 Moss et al. Aug 2002 B1
6442263 Beaton et al. Aug 2002 B1
6442283 Tewfik et al. Aug 2002 B1
6445781 Heinmiller et al. Sep 2002 B1
6449351 Moss et al. Sep 2002 B1
6449361 Okuda Sep 2002 B1
6462646 Helferich Oct 2002 B2
6466653 Hamrick et al. Oct 2002 B1
6477246 Dolan et al. Nov 2002 B1
6480589 Lee et al. Nov 2002 B1
6483898 Lew et al. Nov 2002 B2
6493430 Leuca et al. Dec 2002 B2
6493431 Troen-Krasnow et al. Dec 2002 B1
6493437 Olshansky Dec 2002 B1
6493439 Lung et al. Dec 2002 B2
6494953 Hayes et al. Dec 2002 B2
6496569 Pelletier et al. Dec 2002 B2
6496571 Wilson Dec 2002 B1
6496692 Shanahan Dec 2002 B1
6498841 Bull et al. Dec 2002 B2
6507737 Laham et al. Jan 2003 B1
6529500 Pandharipande Mar 2003 B1
6529591 Dosani et al. Mar 2003 B1
6532490 Lewis et al. Mar 2003 B1
6539080 Bruce et al. Mar 2003 B1
6542583 Taylor Apr 2003 B1
6542586 Helstab Apr 2003 B1
6542591 Amro et al. Apr 2003 B1
6542602 Elazar Apr 2003 B1
6542812 Obradovich et al. Apr 2003 B1
6546092 Corbett et al. Apr 2003 B2
6549621 Christie, IV et al. Apr 2003 B1
6553110 Peng Apr 2003 B1
6553221 Nakamura et al. Apr 2003 B2
6556540 Mawhinney et al. Apr 2003 B1
6560317 Quagliana May 2003 B1
6560327 McConnell May 2003 B1
6566995 Furuuchi et al. May 2003 B2
6570971 Latter et al. May 2003 B2
6570974 Gerszberg et al. May 2003 B1
6574319 Latter et al. Jun 2003 B2
6580904 Cox et al. Jun 2003 B2
6584490 Schuster et al. Jun 2003 B1
6587458 Burg et al. Jul 2003 B1
6590970 Cai et al. Jul 2003 B1
6597905 Hijii Jul 2003 B1
6603840 Fellingham et al. Aug 2003 B2
6603854 Judkins et al. Aug 2003 B1
6608891 Pelletier et al. Aug 2003 B1
6618474 Reese Sep 2003 B1
6625595 Anderson et al. Sep 2003 B1
6631181 Bates et al. Oct 2003 B1
6633633 Bedingfield Oct 2003 B1
6639979 Kim Oct 2003 B1
6650743 Heinmiller et al. Nov 2003 B2
6659597 Murata et al. Dec 2003 B2
6661785 Zhang et al. Dec 2003 B1
6665378 Spielman et al. Dec 2003 B1
6665388 Bedingfield Dec 2003 B2
6665715 Houri Dec 2003 B1
6675008 Paik et al. Jan 2004 B1
6677894 Sheynblat et al. Jan 2004 B2
6683870 Archer Jan 2004 B1
6687341 Koch et al. Feb 2004 B1
6697357 Emerson, III Feb 2004 B2
6701160 Pinder et al. Mar 2004 B1
6714519 Luzzatti et al. Mar 2004 B2
6718021 Crockett et al. Apr 2004 B2
6721407 Michelena Apr 2004 B1
6724872 Moore et al. Apr 2004 B1
6725872 Kindell et al. Apr 2004 B2
6728355 Kowalski Apr 2004 B2
6728360 Brennan Apr 2004 B1
6728365 Li et al. Apr 2004 B1
6731727 Corbett et al. May 2004 B2
6732188 Flockhart et al. May 2004 B1
6738615 Chow et al. May 2004 B1
6751457 Martin Jun 2004 B1
6757274 Bedingfield et al. Jun 2004 B1
6757530 Rouse et al. Jun 2004 B2
6757732 Sollee et al. Jun 2004 B1
6757740 Parekh et al. Jun 2004 B1
6760413 Cannon et al. Jul 2004 B2
6765998 Bruce et al. Jul 2004 B2
D494953 Leung Aug 2004 S
6771755 Simpson Aug 2004 B1
6771956 Beeler Aug 2004 B1
6775366 Cobbett et al. Aug 2004 B1
6775371 Elsey et al. Aug 2004 B2
6775540 Iyer Aug 2004 B2
6778524 Augart Aug 2004 B1
6779020 Henrick Aug 2004 B1
6785301 Chapman et al. Aug 2004 B1
6785368 Eason et al. Aug 2004 B1
6785540 Wichelman Aug 2004 B1
6792266 Masuda et al. Sep 2004 B1
6798841 Hansen Sep 2004 B2
6798876 Bala Sep 2004 B1
6798879 Beham Sep 2004 B1
6804503 Shohara et al. Oct 2004 B2
6807267 Moss et al. Oct 2004 B2
6810077 Dezonno Oct 2004 B1
6810115 Fukuda Oct 2004 B2
6813344 Lemke Nov 2004 B1
6816481 Adams et al. Nov 2004 B1
6818474 Kim et al. Nov 2004 B2
6826270 Welch et al. Nov 2004 B1
6826271 Kanabar et al. Nov 2004 B1
6826617 Ansell et al. Nov 2004 B1
6829348 Schroeder et al. Dec 2004 B1
6830595 Reynolds, III Dec 2004 B2
6831974 Watson et al. Dec 2004 B1
6842512 Pedersen Jan 2005 B2
6845151 Peng Jan 2005 B2
6845512 Horng et al. Jan 2005 B2
6853710 Harris Feb 2005 B2
6853711 Brisebois et al. Feb 2005 B2
6856677 Leijonhufvud Feb 2005 B2
6859527 Banks et al. Feb 2005 B1
6865266 Pershan Mar 2005 B1
6865384 Sagi et al. Mar 2005 B2
6868155 Cannon et al. Mar 2005 B1
6870924 Ukon Mar 2005 B1
6871076 Samn Mar 2005 B2
6888927 Cruickshank et al. May 2005 B1
6888972 Berg et al. May 2005 B2
6891940 Bhandari et al. May 2005 B1
6898275 Dolan et al. May 2005 B2
6904137 Brandt et al. Jun 2005 B2
6904276 Freeman et al. Jun 2005 B1
6907034 Begis Jun 2005 B1
6909777 Latter et al. Jun 2005 B2
6914953 Boerstler Jul 2005 B2
6917960 Decasper et al. Jul 2005 B1
6922411 Taylor Jul 2005 B1
6928154 Cheaito et al. Aug 2005 B1
6931007 Jones Aug 2005 B2
6947531 Lewis et al. Sep 2005 B1
6952469 Han Oct 2005 B2
6970546 Kent, Jr. et al. Nov 2005 B2
6977993 Starbuck et al. Dec 2005 B2
6996211 Reynolds et al. Feb 2006 B2
7012999 Ruckart Mar 2006 B2
7016482 Moss et al. Mar 2006 B2
7020250 Lew et al. Mar 2006 B2
7027408 Nabkel et al. Apr 2006 B2
7027569 Price Apr 2006 B2
7076051 Brown et al. Jul 2006 B2
7079837 Sherman et al. Jul 2006 B1
7085257 Karves et al. Aug 2006 B1
7085358 Ruckart et al. Aug 2006 B2
7085578 Barclay et al. Aug 2006 B2
7095715 Buckman et al. Aug 2006 B2
7097169 Mueller Aug 2006 B2
7103167 Brahm et al. Sep 2006 B2
7103662 Ray et al. Sep 2006 B2
7107077 Lee Sep 2006 B2
7113577 Cook et al. Sep 2006 B2
7127488 Scott et al. Oct 2006 B1
7139374 Scott et al. Nov 2006 B1
7152118 Anderson, IV et al. Dec 2006 B2
7155211 Mun et al. Dec 2006 B2
7184533 Shaffer et al. Feb 2007 B1
7200673 Augart Apr 2007 B1
7215750 Nguyen et al. May 2007 B2
7228129 Ward et al. Jun 2007 B1
7254226 Roberts et al. Aug 2007 B1
7257210 Henderson Aug 2007 B1
7313227 Jones Dec 2007 B2
7315614 Bedingfield, Sr. et al. Jan 2008 B2
7386319 Rogalski et al. Jun 2008 B2
7403768 Bedingfield, Sr. et al. Jul 2008 B2
7418096 Moton et al. Aug 2008 B2
7443964 Urban et al. Oct 2008 B2
7613810 Romero et al. Nov 2009 B2
7623645 Scott et al. Nov 2009 B1
7631047 Adamczyk et al. Dec 2009 B1
7653191 Glasser et al. Jan 2010 B1
7672444 Perrella et al. Mar 2010 B2
20010002209 Han May 2001 A1
20010005854 Murata et al. Jun 2001 A1
20010006519 Voit Jul 2001 A1
20010036174 Herring Nov 2001 A1
20010044898 Benussi et al. Nov 2001 A1
20010048737 Goldberg et al. Dec 2001 A1
20020007400 Pedersen Jan 2002 A1
20020009184 Shnier Jan 2002 A1
20020012426 Gupton Jan 2002 A1
20020016748 Emodi et al. Feb 2002 A1
20020023265 Metcalf Feb 2002 A1
20020041605 Benussi et al. Apr 2002 A1
20020055926 Dan et al. May 2002 A1
20020067816 Bushnell Jun 2002 A1
20020077102 Achuthan et al. Jun 2002 A1
20020082050 Mountney et al. Jun 2002 A1
20020085687 Contractor et al. Jul 2002 A1
20020091777 Schwartz Jul 2002 A1
20020118812 Contractor Aug 2002 A1
20020119430 Szynalski Aug 2002 A1
20020120629 Leonard Aug 2002 A1
20020122401 Xiang et al. Sep 2002 A1
20020125929 Chen et al. Sep 2002 A1
20020128033 Burgess Sep 2002 A1
20020136381 Shaffer et al. Sep 2002 A1
20020171581 Sheynblat et al. Nov 2002 A1
20020172338 Lee et al. Nov 2002 A1
20020176563 Kryvossidis et al. Nov 2002 A1
20020183098 Lee et al. Dec 2002 A1
20020188443 Reddy et al. Dec 2002 A1
20020197991 Anvekar et al. Dec 2002 A1
20030002633 Kredo et al. Jan 2003 A1
20030006912 Brescia Jan 2003 A1
20030012353 Tang et al. Jan 2003 A1
20030016143 Ghazarian Jan 2003 A1
20030016800 Fukuda Jan 2003 A1
20030021290 Jones Jan 2003 A1
20030026416 Fusco Feb 2003 A1
20030032414 Melaku et al. Feb 2003 A1
20030043974 Emerson, III Mar 2003 A1
20030050100 Dent Mar 2003 A1
20030053602 Stuckman et al. Mar 2003 A1
20030063730 Woodring Apr 2003 A1
20030063731 Woodring Apr 2003 A1
20030065776 Malik et al. Apr 2003 A1
20030068020 Hamrick et al. Apr 2003 A1
20030092384 Ross, III May 2003 A1
20030092432 Hwang May 2003 A1
20030095650 Mize May 2003 A1
20030096581 Takamine May 2003 A1
20030103608 Pearson et al. Jun 2003 A1
20030112938 Kanakubo et al. Jun 2003 A1
20030119522 Barclay et al. Jun 2003 A1
20030133543 Khakoo et al. Jul 2003 A1
20030133553 Khakoo et al. Jul 2003 A1
20030133653 Barros et al. Jul 2003 A1
20030135562 Himmel et al. Jul 2003 A1
20030148758 McMullin Aug 2003 A1
20030152207 Ryan Aug 2003 A1
20030187949 Bhatt et al. Oct 2003 A1
20030193967 Fenton et al. Oct 2003 A1
20030196206 Shusman Oct 2003 A1
20030198322 White, Jr. Oct 2003 A1
20030215070 Akhteruzzaman et al. Nov 2003 A1
20030219107 Richardson et al. Nov 2003 A1
20040049545 Lockridge et al. Mar 2004 A1
20040101118 Powell May 2004 A1
20040101124 Koch et al. May 2004 A1
20040109558 Koch Jun 2004 A1
20040114603 Suhail et al. Jun 2004 A1
20040114730 Koch et al. Jun 2004 A1
20040120475 Bauer et al. Jun 2004 A1
20040125929 Pope Jul 2004 A1
20040171370 Natarajan Sep 2004 A1
20040181587 Cao et al. Sep 2004 A1
20040202298 Lopez et al. Oct 2004 A1
20040202299 Schwartz Oct 2004 A1
20040208301 Urban et al. Oct 2004 A1
20040208302 Urban et al. Oct 2004 A1
20040209604 Urban et al. Oct 2004 A1
20040209605 Urban et al. Oct 2004 A1
20040209640 Urban et al. Oct 2004 A1
20040213207 Silver et al. Oct 2004 A1
20040213396 MacNamara et al. Oct 2004 A1
20040218743 Hussain et al. Nov 2004 A1
20040233892 Roberts et al. Nov 2004 A1
20040242212 Bacon et al. Dec 2004 A1
20040248560 Bedingfield, Sr. Dec 2004 A1
20050068166 Baker Mar 2005 A1
20050073999 Koch Apr 2005 A1
20050100158 Kreiner et al. May 2005 A1
20050107074 Zellner May 2005 A1
20050147228 Perrella et al. Jul 2005 A1
20050157861 Bossemeyer et al. Jul 2005 A1
20060002540 Kreiner et al. Jan 2006 A1
20060013375 Smith et al. Jan 2006 A1
20060029209 Moton et al. Feb 2006 A1
20060062374 Gupta Mar 2006 A1
20060152207 Riebel et al. Jul 2006 A1
20060153173 Beck et al. Jul 2006 A1
20060270392 Scott et al. Nov 2006 A1
20070064911 Bedingfield Sr. et al. Mar 2007 A1
20070121825 Walsh et al. May 2007 A1
Foreign Referenced Citations (6)
Number Date Country
0821511 Jan 1998 EP
2002014945 Feb 2002 KR
9750225 Dec 1997 WO
03030501 Apr 2003 WO
03030502 Apr 2003 WO
03090432 Oct 2003 WO
Related Publications (1)
Number Date Country
20090052647 A1 Feb 2009 US