The present invention relates to telecommunications in general, and more particularly to systems and methods for selective blocking of call attempts from a calling party who has exceeded a threshold number of attempts within a specified time period.
Telecommunications customers, such as owners of cell phones and other mobile communications devices or units are too often subjected to incoming calls which the customer would rather not receive. Depending on the mobile calling plan, these undesirable call attempts may cost the receiving party money (e.g., minutes). Such nuisance calls also occupy bandwidth and other resources in a telecommunications network or system. Examples include sales calls from telemarketers, callers conducting surveys relating to consumer behavior or political issues, wrong numbers, calls intended for fax machines, call attempts originating from automated systems that continue to redial the number many times, as well as harassing calls by parties targeting the recipient. So-called caller ID services allow communications customers to screen out some calls, but these services require action on the part of the called party to block incoming calls on a call-by-call basis. Furthermore, even if the recipient decides not to accept the call, communications system bandwidth and other resources have already been occupied up to the point the user makes their decision. Accordingly, there remains a need for improved communications apparatus and techniques by which the number of such nuisance calls reaching the customer can be reduced using minimal system resources and preferably without requiring action by the customer.
A summary of one or more aspects of the invention is now presented to facilitate a basic understanding thereof, wherein this summary is not an extensive overview of the invention, and is intended neither to identify certain elements of the invention, nor to delineate the scope of the invention. Rather, the primary purpose of the summary is to present some concepts of the invention in a simplified form prior to the more detailed description that is presented hereinafter. The invention relates to systems and methodologies for selectively blocking incoming call attempts to a communications device, in which incoming calls for subscribing customers are automatically blocked if a threshold number of call attempts have been made by the caller within a predetermined time period. The methods and systems of the invention may thus facilitate reduction in the amount of unwanted calls and associated system resource loading without interrupting, or requiring action by, the customer. The selective blocking may be available as an optional service for inclusion in a customer calling plan, and may also allow the customer to designate preferred callers, such as family members, co-workers, friends, etc., who will not be blocked.
One aspect of the invention provides a method for selectively blocking incoming call attempts to a mobile phone or other communications unit. The method includes determining whether a calling party has attempted a threshold number of calls to the communications unit within a specified time interval, and if so, selectively blocking the call attempt. Otherwise, the incoming call attempt is allowed to proceed using the normal call processing of the communications system. The method may be employed in any communications system, for example, where the communications unit is a mobile communications device with an associated mobile switching center (MSC) or other switching module that is configured to determine whether the calling party has attempted a threshold number of calls to the communications unit within a specified time interval, and to selectively allow or block the call based on the determination. Blocked callers may be provided with a tone or special announcement, for example, to discourage harassing parties from making further call attempts and/or to alert wrong number dialers to check the number they are dialing.
In one implementation, a list of calling party identity information is maintained for call attempts to the communications unit, with a determination being made from the list whether the calling party has attempted the threshold number of calls within the specified time interval. In this example, the list may be updated with a new entry for each call attempt, where the entries each include calling party identity information along with timestamp data or other information from which a determination can be made regarding the amount of attempts by a given caller within a given time interval. For a new call attempt, a threshold number is compared with a number of list entries having calling party identity information matching that of the current calling party within the specified time interval. The method may further include maintaining a list of allowed callers and allowing the incoming call attempt to proceed if the given calling party is in the allowed caller list (e.g., regardless of the number of call attempts). Another possible implementation involves determining whether a threshold based incoming call blocking service is activated for the communications unit, wherein certain customers may subscribe to the service and others may not. If a given called party does not have the service activated as part of his or her plan, the incoming call attempt is allowed to proceed without the system having to track incoming caller identity and time stamp information.
Another aspect of the invention relates to systems for selectively blocking incoming call attempts to a communications unit, including means for determining whether a calling party currently attempting to place an incoming call has previously attempted a threshold number of calls to the communications unit within a specified time interval, and means for selectively blocking the incoming call attempt if so.
Yet another aspect of the invention provides a switching system for processing incoming call attempts to a communications unit. In one example, the switching system is a mobile switching center or other switching module and the communications unit is a mobile unit. The switching system comprises a threshold based incoming call blocking system, which can be a logic system, processor based system, software, etc. that is programmed or otherwise configured or adapted to determine whether a calling party currently attempting to place an incoming call has previously attempted a threshold number of calls to the communications unit within a specified time interval. The call blocking system is also adapted to selectively block the incoming call attempt if the given calling party has attempted the threshold number of calls to the communications unit within the specified time interval.
In one exemplary implementation, the system comprises a data store with a list of calling party identity information for attempts to call the communications unit, where the call is blocking system determines from the list whether the calling party has attempted the threshold number of calls within the time interval. A list of allowed callers may also be associated with the communications unit, with the call blocking system allowing the incoming call to proceed for calling parties in the allowed caller list.
The call blocking system may also determine from subscriber information in the system whether a threshold based incoming call blocking service is activated for the mobile communications unit, and to allow the incoming call attempt to proceed if the service is not activated. In this implementation, the call will be blocked if the service is activated and the calling party has attempted the threshold number of calls to the communications unit within the specified time interval (e.g., unless the caller is an allowed caller for systems implementing the allowed caller list).
The following description and drawings set forth in detail certain illustrative implementations of the invention, which are indicative of several exemplary ways in which the principles of the invention may be carried out. Various objects, advantages, and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings, in which:
The invention relates to systems and methods for selective blocking of call attempts from a calling party who has exceeded a threshold number of attempts within a specified time period. One or more exemplary implementations of the present invention are hereinafter illustrated and described, wherein like reference numerals are used to refer to like elements throughout and wherein the invention is not limited to the illustrated examples. Although illustrated and described below in the context of mobile telecommunications networks and systems, the invention finds utility in association with any type of communications apparatus and systems.
Referring initially to
As illustrated, the method 2, as will be described in greater detail below, provides for determining at blocks 6-12 whether or not an incoming call attempt is from a calling party that has attempted to call a particular called party a threshold number of times within a specified time period or interval. The exemplary method 2 also provides for determining whether the current caller is a preferred or allowed caller and whether the called party is a subscriber with selective call blocking services activated. Based on one or more of these determinations, the call is either allowed to proceed at 20 or the call is selectively blocked and the caller is provided with a tone or special announcement at 14. The method 2 may thus be employed for reduction in the amount of unwanted calls reaching the mobile telephone customer in an automated fashion without occupying significant system resources and without interrupting the customer.
More particularly, beginning at 4 in
A determination is made at 8 as to whether the calling party is in or on a list of allowed callers. In the case of a mobile system, the determination at 8 may be made in software of the MSC or other switching module by accessing a list in a database associated with or otherwise accessible by the switching module and comparing caller identity information thereof with that of the current calling party. If a match is found in the allowed caller list (YES at 8), the subscriber is paged and the call is setup at block 20. Conversely, if the calling party is not designated as allowed (NO at 8), the method 2 proceeds to block 10 in
The calling party identity information (e.g., ID number) and calling time information (e.g., time stamp) are then logged at 10 for the current call attempt as a new entry into a list of calling party identity information for attempts to call the mobile communications unit. This list, as with the allowed caller list and subscriber data described above, can be stored or maintained at any location in the communications system that is accessible by the system implementing the method 2, for example, in a database in the home MSC memory, in the associated HLR, or elsewhere in the communications system. In one example, such a list is provided for all subscribers that have activated the threshold based call blocking service, and includes entries for all call attempts in the specified time interval other than attempts by allowed callers. Alternatively, entries can be made for allowed callers as well, in which case the information logging at 10 may be performed prior to checking the allowed caller list at 8 in
With the current call attempt logged at 10, a determination is made at 12 as to whether the calling party has attempted a threshold number of calls to the communications unit within a specified time interval. For example, software in a home or serving mobile switching module in the communications system may compare a predefined threshold number (e.g., a positive integer greater than 1) to the number of entries in the list of calling party identity information having calling party identity information matching that of the calling party associated with the current call attempt, and with call time information within the specified time interval. It is noted that the specified time interval (STI) may be any suitable time period prior to the current call attempt, and may be customer selectable. Other techniques are possible, for instance, wherein software counters are established for each calling party, which are incremented with new attempts and decremented based on attempt latency. In this regard, the illustrated list-based technique is but one of many possible examples, and any alternative implementations by which the calling activity from a certain calling party can be compared with a threshold for a specified time period for use in selective call blocking are contemplated as falling within the scope of the invention and the appended claims. In the comparison, moreover, any threshold value can be used, which may even be customer selectable, wherein the comparison can ascertain whether the number of call attempts is greater than or equal to the threshold value, or selective call blocking may be invoked when the threshold is exceeded by the counted number. In one implementation described below, for instance, a threshold value of 4 is used, wherein the fifth attempt within the specified time interval is blocked. In this example, the threshold value is not exceeded (NO at 12) for the first four call attempts, which are allowed to proceed at 20 in the method 2. However, once the fifth call attempt is made in the time interval, the threshold is exceeded (YES at 12), and the calling party is provided with a tone or special announcement at 14 before the method ends at 30. Alternatively, the call attempt can be terminated at 14 without providing any special indication to the caller, although the illustrated embodiment may advantageously serve to encourage the caller to cease further attempts to contact the communications unit.
Referring now to
In accordance with the invention, moreover, a first illustrated mobile switching center MSC1 1101 is further configured, programmed, or otherwise adapted to implement the selective threshold based call blocking functionality and features described herein. In particular, MSC1 1101 comprises a threshold based incoming call blocking system 150 implemented in MSC software along with associated data stores or lists 152, 154, and/or 116. The system 150 is configured or programmed to determine whether a calling party (e.g., a source of an incoming call directed to a communications unit 120 associated with MSC1 1101) has previously attempted a threshold number of calls to the communications unit 120 within a specified time interval, and to selectively block the incoming call attempt if so. In the illustrated example, MSC1 1101 manages a first home location register HLR1 1121 and a first visitor location register VLR1 1141, as well as the subscriber database 116, and may create and maintain the necessary lists or databases for threshold based automatic call blocking functions within any or all of the HLR 1121, the VLR 1141, the database 116, and/or within internal memory of the MSC 1101. Other implementations are possible, in which the blocking system 150 and/or the data stores or lists 152, 154, and/or 116 may be distributed as software and/or hardware modules in various locations within the communications system generally.
In the illustrated example of
Referring also to
As can be seen in
Although the invention has been illustrated and described with respect to one or more exemplary implementations or embodiments, equivalent alterations and modifications will occur to others skilled in the art upon reading and understanding this specification and the annexed drawings. In particular regard to the various functions performed by the above described components (assemblies, devices, systems, circuits, and the like), the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (i.e., that is functionally equivalent), even though not structurally equivalent to the disclosed structure which performs the function in the herein illustrated exemplary implementations of the invention. In addition, although a particular feature of the invention may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Also, to the extent that the terms “including”, “includes”, “having”, “has”, “with”, or variants therefore are used in the detailed description and/or in the claims, such terms are intended to be inclusive in a manner similar to the term “comprising”.