The present invention relates to the field of pervasive computing and particularly to a system and method for providing telephone service access via a gateway telephone.
Current mobile phone technology requires a subscriber to a mobile phone service to utilize a phone that is compatible with the mobile phone service's wireless network protocol in order to establish a connection over the telephone network. One drawback with this requirement is that a mobile service provider may limit coverage to certain areas. Another drawback is that a mobile phone user may not be able to make a phone call, even when attempting to make the call from an area claimed to be covered by his mobile service provider. For instance, a user may experience dead spots at certain locations within the claimed coverage area from which the user is unable to access the telephone network, or has insufficient signal strength to make the call. Contrastingly, a second user, located in proximity with the first user, having a different phone or a different service provider from the first user, may not have his ability to connect to the telephone network impeded by these same dead spots.
Therefore, it may be desirable to have a system and method for providing telephone service access which addresses the above-referenced problems and limitations of the current solutions.
Accordingly, an embodiment of the present invention is directed to a method for providing telephone service. The method includes receiving a request at a first telephone from a second telephone to access the first telephone's telephone service in response to the second telephone's inability to access the second telephone's telephone service. The method further includes granting access to the first telephone's telephone service for use by the second telephone in response to receiving the request at the first telephone prompting the first telephone to grant access to the first telephone's telephone service. The request is received by the first telephone from the second telephone via a short-range wireless connection.
A further embodiment of the present invention is directed to a system, including: a first telephone configured with a short-range wireless protocol; a second telephone configured with the short-range wireless protocol and further configured for communicatively coupling with the first telephone via a short-range wireless connection, wherein the first telephone is further configured for granting the second telephone access to the first telephone's telephone service via the short-range wireless connection.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not necessarily restrictive of the invention as claimed. The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the invention and together with the general description, serve to explain the principles of the invention.
The numerous advantages of the present invention may be better understood by those skilled in the art by reference to the accompanying figures in which:
Reference will now be made in detail to the presently preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings.
In an exemplary embodiment of the present invention, the first telephone 102 is further configured for granting the second telephone 104 access to the first telephone's telephone service via the short-range wireless connection. For example, a user of the second telephone 104 may be attempting to make a phone call to the destination telephone 106. Further, the user of the second telephone 104 may be a subscriber to a telephone service, such as a wireless telephone service which provides wireless service to the second telephone 104. However, the user of the second telephone 104 may be located in an area not covered by his wireless service's subscription plan. Alternatively, the user of the second telephone 104, despite being in an area that is claimed to be covered by his subscription plan, may be located in a “dead spot” from which he may be unable to establish or sustain a telephone network connection using the second telephone 104. Contrastingly, a user of a first telephone 102, whose phone service is provided by a wireless service provider which is different than the wireless service provider which provides service to the second telephone 104, may be able to establish and sustain a telephone network connection from the same general location as the user of the second telephone 104. This may be due to the fact that, under its subscription plan, the service provider which supplies service to the first telephone 102 supplies wireless service to that area and/or that the first telephone 102 is not in a “dead spot”. Accordingly, the first telephone 102 (i.e., the gateway telephone) is configured for allowing the second telephone 104 to access the telephone service of the first telephone 102, using the short-range wireless connection between the first telephone 102 and the second telephone 104, for making the phone call to the destination telephone 106. For example, if the short-range wireless connection is a BLUETOOTH® connection, the first telephone 102 may communicatively couple (i.e., establish a connection) with the second telephone 104 via the BLUETOOTH® protocol when the second telephone 104 is within range of the first telephone 102. For a BLUETOOTH® connection between phones, the range may be, for instance, within a 35 foot radius.
As discussed above, while the user of the second phone 104 may be unable to establish/sustain a telephone network connection for making a phone call to the destination phone 106, the first telephone 102 is able to establish a telephone network connection. For example, once connected with the first phone 102 via the short-range wireless connection, the second phone 104 may be configured for transmitting a request, via the short-range connection, which requests access to the first telephone's wireless service provider. Further, the first phone 102 is configured for receiving the request from the second phone 104 (i.e., the requesting telephone) via the short-range wireless connection. In a current embodiment, the request may be transmitted and received in a manner that is transparent to both the user of the first phone 102 and the user of the second phone 104. For instance, once connected to the first phone 102 via the short-range wireless connection, the second phone 104, upon detection of a weak or non-existent signal, may automatically send the request to the first phone 102 upon discovery of the first phone 102. Further, the first phone 102 may then receive and grant the request in a transparent manner with respect to the user of the first phone. In further embodiments, the request may be selectively granted by the first phone 102. For example, an authentication and/or authorization mechanism may be implemented which limits access to the first phone 102 via the short-range wireless connection to a registered user or phone. In additional embodiments, the first phone 102 may be configured so that a user of the first phone 102 makes the determination whether or not to grant access, such as requiring the user of the first phone to respond to a prompt or signal received by the first phone 102. In still further embodiments, the user of the first phone 102 may establish the first phone 102 in an access grant or access denial mode, via manipulation of a control of the phone 102 or via an input to the phone 102. In an alternate embodiment, a prompt may be received by the second/requesting phone 104, the prompt requesting a password to be input to phone 104 in order to access the first phone 102. In additional embodiments, a prompt may be received by the second/requesting phone 104 indicating allowance or denial of access. In further embodiments, a user of the requesting/second phone 104 may receive a prompt or dialogue indicating charges that will be incurred by the user of the first phone if access is granted.
Once access has been granted, the second/requesting phone 104 transmits its dialing information via the short-range wireless connection to the first/gateway phone 102. For instance, the user of the second/requesting phone 104 may receive an indication or signal via the second phone 104 sent by the first/gateway phone 102 that access has been granted. The user of the second/requesting phone 104 may then enter a telephone number associated with the destination telephone 106 via an input to the second/requesting phone 104. The second/requesting phone 104 may then transmit dialing information, said dialing information including the telephone number associated with the destination telephone 106, to the first/gateway telephone 102 via the short-range wireless connection.
In the present embodiment, the first/gateway telephone 102 is configured for receiving the dialing information from the second/requesting telephone 104 via the short-range wireless connection. In response to receiving the dialing information, the first phone 102 is further configured for dialing the telephone number associated with the destination telephone 106 and establishing a telephone network connection with the destination telephone 106.
In the exemplary embodiment, the first/gateway telephone 102 is further configured for communicating audio stream data between the second telephone 104 and the destination telephone 106. For example, the first/gateway telephone 102 is configured for communicating audio stream data between the second/requesting telephone 104 and the first/gateway telephone 102, via the short-range wireless connection, said audio stream data being received from/directed to the destination telephone 106 via the telephone network connection. In current embodiments, the short-range wireless connection may utilize a telephone profile. For example, if the first telephone 102 and the second telephone 104 are connected via a BLUETOOTH® connection, the short-range wireless connection may utilize a telephone profile defined for BLUETOOTH®, such as the Cordless Telephony Profile (CTP).
Referring generally to
It is contemplated that the invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, and the like. Furthermore, the invention may take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium may be any apparatus that may contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
It is further contemplated that the medium may be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements may include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
Input/output or I/O devices (including but not limited to keyboards, microphone, speakers, displays, pointing devices, and the like) may be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to connect to other data processing systems or storage devices through intervening private or public networks. Telephone modems, cable or DSL modems and Ethernet cards are just a few of the currently available types of network adapters.
It is understood that the specific order or hierarchy of steps in the foregoing disclosed methods are examples of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the method can be rearranged while remaining within the scope of the present invention. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
It is believed that the present invention and many of its attendant advantages are to be understood by the foregoing description, and it is apparent that various changes may be made in the form, construction and arrangement of the components thereof without departing from the scope and spirit of the invention or without sacrificing all of its material advantages. The form herein before described being merely an explanatory embodiment thereof, it is the intention of the following claims to encompass and include such changes.