A telephone (phone) converts voice and other sound signals into transmitted electromagnetic signals, and converts received electromagnetic signals into sound. Wireless phones convert voice and other sound signals into transmitted radio waves, and convert received radio waves into sound. Cellular (cell) phones, a type of wireless phones, have become quite common.
A phone call is a connection over a telephone network between a calling party, initiating the phone call, and a called party receiving the phone call. The phone call may carry voice information or digital data (via modulator-demodulators, or modems). Many wireless or cell phones have built-in modems, and can transmit and receive both voice information and data.
To receive phone calls, a phone must have a unique phone number, typically assigned by a phone service provider. Once a phone number is assigned, it is often inconvenient to have the phone number changed, at least in part because a change of phone number typically requires notifying those one wishes to receive phone calls from of the new phone number. As a result, phone users are reluctant to change their phone numbers.
Unwanted telephone calls can be annoying and/or distracting. Common kinds of unwanted calls include telemarketing calls, prank calls, and obscene phone calls. To avoid unwanted phone calls, a person may be reluctant to give his or her phone number to strangers, or to list his or her phone number in an ad for an item for sale. It would thus be advantageous to have the ability to obtain a disposable phone number that can be released to others, and to receive phone calls directed to the disposable phone number.
The problems outlined above are at least in part addressed by a novel system and method for anonymously receiving telephone (phone) calls. A disclosed wireless phone includes a user interface having at least one button, a processor coupled to the user interface to detect a user's activation of the button, and internal software stored in memory. The software includes an acquisition process that configures the processor to obtain a secondary phone number for the wireless phone in response the user's activation of the button, and a display process that configures the processor to display the secondary phone number to the user.
The software may include a disposal process that configures the processor to disassociate a secondary phone numbers associated with the wireless phone based at least in part on the expiration of a given time period. The software may also include a disposal process that configures the processor to disassociate a secondary phone number associated with the wireless phone if the user activates a disposal button. The software may also include a detection process that configures the processor to determine the dialed number of incoming calls. The processor may determine the dialed number based at least in part on a dialed number indicator in a caller-id field.
The software may also include a ringtone process that plays a selected ringtone to announce an incoming call, where selection of the ringtone is based at least in part on the dialed number of the incoming call. The software may also include a query process that configures the processor to query the user upon completion of an incoming phone call whether the dialed number should be disassociated from the wireless phone. The query process may configure the processor to display a call history for a secondary phone number when providing the user an option to have the secondary phone number expire or be disassociated from the wireless phone.
A described method of enabling anonymous reception of phone calls includes automatically determining a programmed phone number of a wireless phone with an application that executes on the wireless phone. A first button is provided that causes the wireless phone to automatically obtain a secondary phone number for the wireless phone. The method may also include obtaining the secondary phone number in response to activation of the first button, and making the secondary phone number available to a potential caller.
The making the secondary phone number available may include displaying the secondary phone number on the wireless phone. Alternatively, or in addition, the making the secondary phone number available may include communicating the secondary phone number in an electronic message directed to the potential caller.
The method may also include, at the wireless phone, associating each incoming call with the primary or secondary phone number that was dialed to make that call. The method may also include providing a second button that causes the wireless phone to disassociate a secondary phone number from the wireless phone.
A disclosed telecommunications server includes at least one processor that receives an incoming phone call to one of multiple numbers currently associated with a receiving phone, and a memory containing software. The software includes a caller-id process that causes the processor to modify a caller-id associated with the incoming phone call to characterize a dialed number of the incoming phone call, or in some cases, to anonymize the caller, and a forwarding process that causes the processor to forward the incoming phone call to the receiving phone with the modified caller-id.
The telecommunications server may maintain a list of secondary phone numbers associated with the receiving phone, and may insert a value into the caller-id to indicate the index of the dialed number in the list. In an alternative system embodiment that anonymizes the caller, the telecommunications server maintains a list of caller-id numbers for incoming callers to a given secondary phone number. The telecommunications server then generates a new caller-id identifying the secondary phone number and an appended value to indicated the index of the incoming caller-id number. In either case, the value may be a two-digit number or an ASCII value of an alphabetic character that is appended to the phone number in the caller-id. The processor may form a checksum of the dialed number and insert the checksum into the caller-id.
A disclosed calling method includes detecting a phone call directed to a dialed number, where the dialed number is one of multiple secondary phone numbers associated with a primary phone number. The phone call is forwarded to the primary phone number with modified caller-id information, where the modified caller-id information includes an indication of the dialed number and an (optionally anonymized) identification of the caller. The calling method may also include announcing the phone call with a ringtone that is selected based at least in part on the dialed number. The calling method may also include tracking caller-id information for each of multiple secondary phone numbers, and displaying call history information for a given secondary phone number.
A described wireless phone includes a speaker, a processor that detects an incoming phone call having a caller identification field value that includes a dialed-number indicator, and a memory containing software. The software includes a ringtone selector process that configures the processor to select a ringtone based at least in part on the dialed-number indicator, and a player process that configures the processor to play the selected ringtone via the speaker to announce the incoming phone call.
The wireless phone may have a primary phone number and at least one secondary phone number. The software may also include an acquisition process that configures the processor to obtain a new secondary number. The software may also include a query process that configures the processor to query the user upon completion of an incoming phone call whether the dialed number should be disassociated from the wireless phone.
A disclosed wireless phone includes a user interface having at least one button, a processor coupled to the user interface to detect the user's activation of the button, and a memory containing software. The software includes a logging process that tracks incoming caller identification information for each of multiple phone numbers dialed to reach the wireless phone, and a query process that displays the tracked caller identification for a phone number when the user activates the button to disassociate that phone number from the wireless phone.
In at least some embodiments, the caller identification information tracked by the wireless phone includes a dialed number indicator. The dialed number indicator may be an index in a list of phone numbers associated with the wireless phone. In at least some alternative embodiments, the caller identification information tracked by the wireless phone identifies callers in a manner that renders them anonymous, e.g., as indexes to a caller list kept on a server. In either case, the index value may be a two-digit number or an ASCII value of an alphabetic character that is appended to the phone number in the caller-id. The processor may form a checksum of the dialed number and insert the checksum into the caller-id.
A better understanding of the various disclosed embodiments can be obtained when the detailed description is considered in conjunction with the following drawings, in which:
While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present invention as defined by the appended claims.
The term “button” includes physical keys, switches, sliders, contacts, touch-sensitive surfaces, and graphical representations of such items that can be activated by a user.
The term “wireless phone” includes satellite telephones (phones), cellular phones, radio phones, and other communication devices that enable telephone calls to be carried out without being physically connected to a wall jack or a remote receiver.
The term “speaker” includes all forms of audio transducers including whistles, bells, eccentric mass vibrators, piezoelectric drivers, induction coils, and vibratory surfaces coupled to any such drivers.
Turning now to the figures,
The PSTN 18 includes a hierarchy of switches 22, 24, and 26, and communication links that interconnect customer provided equipment (CPE) such as cellular or wireless telephones (e.g., the wireless phone 12), “land-line” telephones such as the telephone labeled 28 (phone 28), and communication devices including modulator-demodulators (modems).
The telecommunications server 16 couples to the PSTN 18 for receiving and initiating phone calls, and for receiving and sending data. The telecommunications server 16 may, for example, connect to the PSTN 18 via a trunk line that supports multiple simultaneous phone calls. The telecommunications server 16 also couples to the Internet 20 for receiving and sending data. As described in more detail below, the telecommunications server 16 may include one or more processors executing telephony engine software such as, for example, the Asterisk® telephony engine software (Digium®, Inc., Huntsville, Ala.).
As described in more detail below, the wireless phone 12 has a phone number assigned by a phone system provider (e.g., a “primary” or programmed phone number). For various reasons, including those described above, a user of the wireless phone 12 may wish to keep the primary phone number private, and obtain one or more other phone numbers (e.g., “secondary” phone numbers) that he or she can release to others. To this end, the user may initiate a request for a secondary telephone number in a manner described further below. In response to the request, the telecommunications server 16 assigns a secondary telephone number (from a list of available secondary phone numbers) to the wireless phone 12, and thereafter forwards phone calls directed to the secondary telephone number of the wireless phone 12 to the primary phone number of the wireless phone 12, optionally modifying the Caller ID information to include an indication of the secondary number.
The peripheral interface 58 provides ports for communicating with external devices such as keyboard, mice, universal serial bus (USB) devices, printers, cameras, speakers, etc. On many servers, these ports may be left largely unused, but they are available for configuration, diagnostic, and performance monitoring purposes. The storage device 60 is typically a nonvolatile memory for firmware and/or a hard drive for extended storage of software and data. On distributed systems with high data availability requirements, the storage device 60 is replaced or supplemented with a storage area network (SAN) card that enables shared access to a large disk array. The network interface card 62 provides access to the Internet 20 (see
The telephony engine software 70 includes software instructions for receiving and initiating phone calls. The telephony engine software 70 may be or include, for example, the Asterisk® telephony engine software (Digium®, Inc., Huntsville, Ala.). The setup and operation of the Asterisk® telephony engine software is described in Asterisk: The Future of Telephony by J. Van Meggelen, J. Smith, and L. Madsen, ©2005 O'Reilly Media, Inc, which is hereby incorporated herein by reference. During operation, the processor(s) 50 (see
The client application software 72, described in more detail below, includes downloadable software instructions for execution by the wireless phone 12. In response to a request from the wireless phone 12, the telecommunications server 16 transfers a copy of the client application software 72 to the wireless phone 12. The client application software 72 enables the user of the wireless phone 12 to obtain one or more temporary phone numbers from the telecommunications server 16, to manage the one or more secondary phone numbers, and to selectively dispose of the secondary phone numbers.
The providing process 74 includes software instructions for receiving a request for a secondary phone number and responsively providing a secondary phone number to the wireless phone 12. In some embodiments, the software instructions of the providing process 74 cause the telecommunications server 16 to first collect information about the wireless phone 12 and/or the user of the wireless phone 12, then access a list of available secondary phone numbers, select a secondary phone number from the list, assign the secondary phone number to the wireless phone 12, and send the selected secondary phone number to the wireless phone 12. For example, the providing process may send the wireless phone 12 an electronic message containing the secondary phone number.
The Caller ID process 76 includes software instructions for modifying the Caller ID information of a phone call directed to a secondary phone number associated with the wireless phone 12. As described in more detail below, the software instructions of the Caller ID process 76 modify the Caller ID information such that when the server forwards the phone call to the primary number, the Caller ID information indicates the secondary phone number to which the call was directed (i.e., the dialed number). The Caller ID process 76 also computes a new checksum for the modified Caller ID information.
The forwarding process 78 includes software instructions for receiving an incoming phone call to a secondary number, determining the primary number associated with that secondary number, and forwarding the incoming phone call to the primary phone number of the wireless phone 12 with the modified Caller ID information, where the modified Caller ID information includes an indication of the dialed number.
The secondary phone number list 80, described in more detail below, includes a list of all secondary phone numbers associated with a given primary phone number. In the list 80, the secondary phone numbers may be, for example, associated with a primary phone number of the wireless phone 12. Each of the secondary phone numbers associated with the wireless phone 12 has a corresponding index. In some embodiments, the Caller ID process 76 includes software instructions for inserting a value into the Caller ID information that indicates the index of the dialed number in the list 80. The value may be, for example, an ASCII value of an alphabetic character.
The database 82 includes information about received and forwarded phone calls. The information stored in the database 82 may include, for example, the names of calling parties, and/or the phone numbers of calling parties. The information may also include, for example, the dates the phone calls were made, the start times of the phone calls, the end times of the phone calls, and/or the durations of the phone calls. The telecommunications server 16 may send some or all of the information associated with a secondary phone number to the wireless phone 12 to help the user of the wireless phone 12 manage the one or more secondary phone numbers, and/or make decisions regarding the disposal of the secondary phone numbers.
The telecommunications server 16 of
The telecommunications server 16 of
The telecommunications server 16 of
It should be noted that the application software can make such anonymized calling more convenient. When a user invokes the application software on a wireless phone to place a new call or “call-back” a previous caller, the application software can initiate the call by first dialing the secondary number and, when the telecommunications server answers, dialing an “extension” number. The extension number for a call-back can be the two-digit index value that the application software has extracted from a modified caller-id number, or it can be other anonymized caller identifying information that the server can use to determine a phone number, e.g., a call time. For a new call, the extension number can be a ten-digit number that the user has entered into the application software.
Users of wireless phones are often able to obtain or purchase downloadable software from the internet. For example, Apple® offers a store where users can shop for iPhone® applications to download to their iPhone® devices. Such software includes games and utilities. The client application software 72 is one example of a software utility that can be made available in this manner, or made available for download from any given server on the internet, including telecommunications server 16. In some alternative embodiments, the wireless phone is sold with such software pre-installed for the customer's use.
The list 120 includes a list of all secondary phone numbers associated with the wireless phone 12. In the list 120, the secondary phone numbers may be, for example, associated with a primary phone number of the wireless phone 12. Each of the secondary phone numbers associated with the wireless phone 12 has a corresponding index.
In some embodiments, the list 120 is identical to the corresponding list 80 constructed and maintained by the telecommunications server 16 for that wireless phone (see
In other embodiments, the wireless phone tracks call history information for secondary phone numbers in a database 122. The information stored in the database 122 may include, for example, the names of calling parties, and/or the phone numbers of calling parties. The information may also include, for example, the dates the phone calls were made, the start times of the phone calls, the end times of the phone calls, and/or the durations of the phone calls.
The user of the wireless phone 12 may use information in the database 122 to manage one or more secondary phone numbers associated with the wireless phone 12, and/or make decisions regarding the disposal of one or more secondary phone numbers associated with the wireless phone 12. The client software 72 may construct and maintain the database 122 on its own, or with information provided by the telecommunications server 16. In some embodiments, the telecommunications server 16 may construct and maintain the database 82 (see
The acquisition process 90 includes software instructions for obtaining a new secondary phone number from the telecommunications server 16. The acquisition process 90 preferably works with the providing process 74 of the telecommunications server 16 (see
The display process 92 includes software instructions for displaying the secondary phone number to the user of the wireless phone 12. For example, the software instructions may cause the secondary number to be displayed on the display screen of the display screen 40 of the wireless phone 12 (see
The disposal process 94 includes software instructions for disassociating a secondary phone number associated with the wireless phone 12. The disassociating may be carried out automatically by the software instructions of the disposal process 94 at the end of a set period of time, or by the user of the wireless device 12.
The detection process 96, described in more detail below, includes software instructions for determining the dialed number of incoming calls. The logging process 98 includes software instructions for tracking incoming Caller ID information for each secondary phone number associated with the wireless phone 12.
The ringtone selector process 100 includes software instructions for playing a selected ringtone to announce an incoming call. For example, a different ringtone may be assigned to each secondary phone number associated with the wireless phone 12. When a call to one of the secondary phone numbers is received by the wireless phone 12, the software instructions of the ringtone process 100 may select the ringtone to be played dependent upon the dialed number of the incoming call. The player process 102 includes software instructions for playing a ringtone selected by the ringtone selector process 100 via the speaker 46 of the wireless phone 12 (see
The query process 104 includes software instructions for, upon completion of an incoming phone call, querying the user of the wireless phone 12 as to whether the secondary phone number to which the phone call was placed (i.e., the dialed number) should be disassociated from the wireless phone 12. If the user of the wireless phone 12 response in the affirmative, the query process 104 may invoke the disposal process 94 to disassociate the secondary phone number dialed from the wireless phone 12. The query process 104 may display a list of callers to a secondary phone number when providing the user the option to disassociate the secondary phone number from the wireless phone 12.
Referring to
For example, in both the lists 80 and 120, the first secondary phone number XXX-XXX-XXXX associated with the wireless phone 12 may have the corresponding index “1” (see
The step 138 may include, for example, displaying the secondary phone number on a display screen of the wireless phone. Alternatively, or in addition, the step 138 may include communicating the secondary phone number in an electronic message directed to the potential caller.
During a step 140, the wireless phone associates each incoming call with the primary or secondary phone number that was dialed to make that call. A second button (e.g., the button 128 of
A step 144 involves detecting activation of the second button. Caller ID information for a given secondary phone number is displayed during a step 146, and a step 148 involves obtaining confirmation for disassociating the secondary phone number.
Numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such variations and modifications.
The present application claims priority to Provisional U.S. Patent Application 61/154,787, entitled “System and Method for Anonymous Reception of Telephone Calls” filed Feb. 24, 2009.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US10/25140 | 2/24/2010 | WO | 00 | 8/24/2011 |
Number | Date | Country | |
---|---|---|---|
61154787 | Feb 2009 | US |