Systems and methods of mitigating phantom call traffic

ABSTRACT

Systems and methods for mitigating phantom call traffic in a communication system are disclosed. A call may be received at a communications exchange. A jurisdiction of the call may be determined in real-time, and egress signaling information and a route of the call to a terminating local exchange may be determined based on the jurisdiction. At least a portion of the egress signaling information may be provided to the terminating exchange in call signaling and/or in call detail billing records so that the terminating exchange is enabled to correctly charge for call termination.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Application Ser. No. 61/054,713, entitled “System and Method of Providing a Single Exchange Communications service Using a Private Network Backbone,” filed May 20, 2008, the disclosure of which is hereby expressly incorporated herein by reference.

TECHNICAL FIELD

The following disclosure relates to systems and methods for mitigating phantom call traffic in a communication system. The systems and methods may use a private network backbone exchange.

BACKGROUND

Phantom call traffic is call traffic received at a terminating local communications exchange, where associated call signaling lacks sufficient information for the terminating local exchange to determine an appropriate jurisdiction of the call or a carrier responsible for call termination charges. The terminating local exchange may not be able to bill and receive compensation from responsible originating parties. Most Local Exchange Carriers (LECs), Competitive Local Exchange Carriers (CLECs) and Independent Operating Carriers (IOCs) that terminate calls at their respective local exchanges experience some degree of phantom call traffic. In some estimates, between 20% and 30% of all terminating inter-carrier traffic cannot be billed due to insufficient information, thus resulting in significant loss of revenue for the LECs, CLECs and IOCs.

Reasons for the occurrence of phantom call traffic are many and varied. Some phantom calls may have been delivered over numerous communications exchanges, each of which may be owned and/or operated by a different service provider. Differences between architectures, signaling, call detail and billing systems of these numerous communications exchanges may result in inaccurate (and in some cases, impossible) billing of termination charges. In some cases, legacy issues may exacerbate phantom traffic. For example, legacy exchanges along a call route may be limited to routing based on destination number only, and may not be able to forward sufficient detail for billing purposes. Also, inter-exchange signaling protocols may not easily support the data required for accurate billing of calls, especially with the addition of new types of communication access technologies such as wireless, broadband, and others.

Indeed, newer communication access technologies themselves may exacerbate phantom call traffic, e.g., a roaming wireless call may have a calling number that does not correspond to an exchange from which the call originates. Furthermore, in some markets, termination charges for local calls are significantly less than termination charges for access calls, thus motivating some originating or intermediate carriers to mask their carrier identity to take advantage of the lower local termination charges. Other reasons for phantom call traffic may be possible, all of which may result in insufficient information for a terminating local exchange to correctly bill termination charges, if at all.

SUMMARY OF THE DISCLOSURE

Embodiments of a computing device for mitigating phantom call traffic in a communications system is disclosed. The computing device may be coupled to a communications exchange, and may include a processor, a memory, and a call routing application stored in the memory and executable by the processor. The call routing application may include computer-executable instructions for importing a local calling area database, receiving a call from an originating carrier, determining in real-time a jurisdiction of the call based on the local calling area database, determining egress signaling information and an egress trunk group for the call based on the jurisdiction, delivering the call and the egress signaling information to a terminating local exchange via the egress trunk group, and providing at least a portion of the egress signaling information for use in a call detail record.

Embodiments of a method of determining, in real-time, a call jurisdiction and an egress trunk group of a call received at a communications exchange are disclosed. The method may include importing a local calling area database and determining the call jurisdiction primarily based on the local calling area database and a charge number associated with the received call. The call jurisdiction may be secondarily determined based on at least one of a calling number, a called number, an ingress trunk group, an originating carrier corresponding to the ingress trunk group, or a preference of a terminating local carrier.

Embodiments of methods of mitigating phantom traffic for each of local, intra-LATA (Local Access and Transport Area) and inter-LATA or toll calls received at a communications exchange are disclosed. For a received call, information pertaining to egress signaling, an egress trunk group, and billing may be determined based on at least one of an imported local call routing database, ingress signaling information, an ingress trunk group, a preference of the terminating local carrier, or an originating carrier corresponding to the ingress trunk group. The call may be delivered to a terminating local exchange in conjunction with the determined information. At least a portion of the determined information may be provided for use in a call detail record.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an embodiment of a communications system for mitigating phantom call traffic;

FIG. 2 illustrates an exemplary embodiment of a method of mitigating phantom call traffic;

FIG. 3 depicts an exemplary method of determining, in real-time, a jurisdiction of a call;

FIG. 4 depicts an exemplary method of determining egress signaling and billing information for a call having a local jurisdiction;

FIG. 5 depicts an exemplary method of determining egress signaling and billing information for a call having an inter-LATA or toll jurisdiction;

FIG. 6 depicts an exemplary method of determining egress signaling and billing information for a call having an intra-LATA jurisdiction; and

FIG. 7 illustrates an example of a private packet network backbone exchange used for mitigating phantom call traffic.

DETAILED DESCRIPTION

FIG. 1 illustrates an embodiment of a communications system 100 for mitigating phantom call traffic. The system 100 may include a communications exchange 102 in connection with a terminating local exchange 105 at which a terminating party 108 may be reached. The communications exchange 102 may enable a reception of call traffic at the terminating local exchange 105 originating from one or more originating local exchanges 110, one or more inter-exchange carrier exchanges (IXCs) 112 or network thereof, and/or one or more tandem exchanges 115 or network thereof. Typically, the exchanges 105, 110, 112 and 115 may be connected to the communications exchange 102 via trunk groups. In this manner, the communications exchange 102 may serve as a tandem exchange through which the local exchange 105 may be accessed. A service provider or carrier that owns, operates and/or controls the terminating local exchange 105 may bill a service provider or carrier that owns, operates, and/or controls an exchange (110, 112, or 115) from which a call originated for termination charges.

As used herein, the terms “terminating local exchange,” “terminating exchange,” “terminating local service provider,” “terminating service provider,” and “customer” are used interchangeably to mean a communications service provider that owns, operates and or controls the terminating local exchange 105 to which calls are delivered. The terminating local service provider may be, for example, a LEC, a CLEC, an RBOC (Regional Bell Operating Company), an IOC, a wireless service provider, broadband or VoIP (Voice over Internet Protocol) service provider, a cable telephony service provider, or other service provider that provides communication service to end-users, such as the end-user 108. Regarding the term “customer” in particular, the terminating local service provider may be a customer of a service provider that owns, operates and/or controls the communications exchange 102.

Similarly, the terms “originating local exchange” and “originating local service provider” are used interchangeably herein to mean a communications service provider that owns, operates and or controls the originating local exchange 110 from which calls may be sent to the communications exchange. The originating local service provider may be a service provider other than the terminating local service provider.

The term “originating carrier,” is used herein to mean any exchange from which a call terminating at the terminating local exchange 105 originates or its corresponding service provider. In particular, an “originating carrier” may refer to the originating local exchange 110, the IXC 112, or the tandem exchange 115, or may refer to their respective service providers.

A service provider of the tandem exchange 115 may be a same or different service provider than the service provider of the originating local exchange 110, but the service provider of the tandem exchange 115 generally (but not necessarily) may be a different service provider than the terminating local service provider. In some embodiments, the service provider of the tandem exchange 115 may be a competitive tandem service provider.

A service provider corresponding to the IXC 112 may be a service provider that provides long distance or toll communication services.

A service provider corresponding to the communications exchange 102 may be, for example, a tandem service provider or an alternative tandem service provider. The tandem service provider may be a different service provider than the service providers of exchanges 105, 110, 112 and 115.

Each of the originating and terminating local exchanges 110, 105 may be any type of local communications exchange known in the art, and may be able to support originations and terminations of voice, data or hybrid voice/data calls. For example, the originating local exchange 110 or the terminating 105 local exchange may be a LEC or CLEC-supported wired communications exchange, or may be an exchange that supports a communications access technology provided by a communications service provider, e.g., a wireless service provider, a VoIP or broadband or VoIP service provider, a cable telephony service provider, etc. In some embodiments, the originating local exchange 110 or terminating local exchange 105 may be a private exchange, such as a PBX (Private Branch Exchange) or some other essentially private switch or exchange servicing an organization such as a corporation, university, or other entity. Generally, in the communications system 100, each of the originating and terminating local exchanges 110, 105 may support any known communication access technology known in the art.

As used herein, a “communication access technology” may be any technology by which a CPE of an end-user may gain access to communication services. Examples of communication access technologies may include standard wired telephony, wireless, broadband, VoIP, cable telephony, computing or networking protocols, and others. In some embodiments, for VoIP access technologies, the CPE may use a dedicated IP connection, the Internet or some combination of the two, for example, for load-balancing, overflow, redundancy or fail-over purposes. The originating local exchange 110 and the terminating local exchange 105 may support same or different access technologies.

Of course, the number and types of exchanges 110, 112 and 115 enabled to access the terminating local exchange 105 via the communications exchange 102, as illustrated in FIG. 1, are illustrative only. In some embodiments, no tandem exchanges 115 may be connected. In some embodiments, multiple originating local exchanges 110 may be connected. Indeed, in the communications system 100, any number of any type of exchange (local 110, IXC 112 and/or tandem 115) may be in connection with the communications exchange 102.

Calls may be terminated via the terminating local exchange 105 to the end-user 108. The end-user may have a CPE (Customer Premises Equipment) that uses a type of communication access technology supported by the terminating local exchange 105. A CPE may be, for example, a landline phone, a computer, a wireless device, or other device. The end-user may be a party who has contracted with the terminating local service provider for communications service.

The communications exchange 102 may be coupled to a computing device 118. In FIG. 1, the computing device 118 is illustrated as physically incorporated into the communications exchange 118, however, physical incorporation is not necessary. In other embodiments, the computing device 118 may be physically separate from the communications exchange 102 and may be in local or remote, wired or wireless communication with the communications exchange 102 using any known communications protocol and networking configuration.

The computing device 118 may be any known computing device or computer known in the art. In some embodiments, the computing device 118 may be a plurality of physical computing devices that are jointly networked using any known networking technology. Generally speaking, the computing device 118 may be any device or plurality of network devices having memory that includes thereon stored data and computer-executable instructions. The computing device 118 may also have a processor that may be enabled to execute the computer-executable instructions. In the system 100, the memory of the computing device 118 may include computer-executable instructions for a call routing application 120 that is executable by the processor.

In some embodiments, the communications exchange 102 may be, for example, a private packet network backbone exchange (PPNBE). Details of the PPNBE will be discussed in a separate figure, but generally, the PPNBE may be a communications exchange that has a private packet network backbone. In some embodiments, the PPNBE may include the computing device 118 and the call routing application 120, and may include respective trunk group connections to the communications exchanges 105, 110, 112 and 115.

The call routing application 120 may include computer-executable instructions for mitigating phantom call traffic. In some embodiments, the call routing application 120 may contain computer-executable instructions for performing embodiments of a method of mitigating phantom call traffic. In fact, the call routing application 120 may contain computer-executable instructions for performing embodiments of one or more of the methods 200, 300, 400, 500 or 600 of the present disclosure.

FIG. 2 illustrates an exemplary embodiment of a method 200 for mitigating phantom call traffic. The method 200 may operate in conjunction with embodiments of the communications system 100 of FIG. 1. In some embodiments, the method 200 may be performed by the communications exchange 102, by the computing device 118, or may be performed at least in part by the call routing application 120.

At the start 202, the method 200 may import or locally store at least a portion of a local calling area database from a third-party source (block 205). The imported or locally stored local calling area database may include local calling area information that may be tariff-related, such as at least one of: a distance, a city name, an office type, a TELNUM (e.g., NPA NXX), a rate center, a state, a TELCOID or OCN (Operating Company Number), a LATA (Local Access and Transport Area), a Rate Center, a dialing pattern, a calling plan, and other information. One example of a local calling area database may be the Local Calling Area Data Source (LCADS) produced by Telecordia®.

Importing the local calling area database (block 205) may not occur on a call-by-call basis, but instead may occur (block 205) when a change at the third-party source occurs. For example, if the third-party source is Telecordia's LCADS, an import of the LCADS may occur (block 205) when an updated version of the LCADS is made available by Telecordia. In some embodiments, only a portion of the local calling area database may be imported or locally stored, such as when an updated version of the third-party source only differs slightly from a currently stored copy.

Some time after the local area calling database is imported (block 205), a call may be received from an originating carrier via an ingress trunk group (block 210). The call may include ingress signaling information including, but not limited to a charge number, a calling party number and a called party number. The call may be received via any known communications protocol, such as any in-band or out-of-band communications protocol. In some embodiments, the call may be received via an SS7 (Signaling System No. 7) protocol such as ISUP (Integrated Services Digital Network User Part).

At block 212, the method 200 may determine, in real-time, a jurisdiction of the call. The jurisdiction of a call may be an indication of a relationship between an originating end of the call and a terminating end of the call. The jurisdiction of the call may be, for example, local, intra-LATA or inter-LATA/toll. The block 212 may determine the jurisdiction of the call based upon primarily the charge number of the ingress signaling information and the imported local calling area database, and secondarily, based on the calling and called party numbers, if needed.

Based on the determined jurisdiction at the block 212, a routing path or egress trunk group for the call may be determined (block 215). The egress trunk group for the call may be determined based upon the determined jurisdiction of the call and, additionally or alternatively, based on a routing preference of the terminating local exchange. In some embodiments, the terminating local exchange may have chosen to establish both a local trunk group and an access trunk group over which to receive incoming terminations. Generally, locally jurisdictionalized calls may be received over local trunk groups, and calls having a toll jurisdiction may be received over access trunk groups. However, the terminating exchange may have indicated a preference of which type of trunk group (local or access) to use for which type of call and/or jurisdiction. In some embodiments, the terminating local exchange may have chosen to establish only a single trunk group over which to receive incoming terminations of all call types and jurisdictions.

In some embodiments, the terminating local exchange may have indicated a preference to not receive a certain type or jurisdiction of call at all. For example, the terminating local exchange may have indicated a preference to receive only local but not intra-LATA or inter-LATA calls. In another example, the terminating local exchange may have indicated a preference to receive only intra-LATA toll or inter-LATA calls, but not local calls. When a preference to not receive a certain type or jurisdiction of call has been indicated by the terminating local exchange and a call having an undesired call type or jurisdiction is received (block 210), the method 200 may gracefully release the undesired call back to the originating carrier of the undesired call (not shown). For instance, the method 200 may release the call using an ISUP Release 34 or a SIP503 (Session Initiated Protocol) message. Alternatively, the method 200 may find an alternate route or means by which to terminate the call to the called party. Thus, the undesired call may not be blocked, but instead may be re-routed over an alternate pathway.

Based on the jurisdiction of the call, the method 200 may determine egress signaling information associated with the call (block 218). The egress signaling information may include one or more parameters such as the calling number, the called number, the charge number, a CIC (Carrier Identification Code), an OCN, a LRN (Local Routing Number), a JIP (Jurisdiction Information Parameter), and/or others.

In an exemplary embodiment, if a call is determined at the block 212 to have a local jurisdiction, the block 218 may determine the JIP based on the ingress trunk group of the call, and may include the JIP in the egress signaling information. The JIP may correspond to the originating carrier from which the call was received, for example, the local originating exchange 110 or the tandem exchange 112 of FIG. 1. Typically, the JIP may be the first six digits of an LRN of the originating carrier.

In the exemplary embodiment, if the call is determined at the block 212 to have an inter-LATA or toll jurisdiction, the block 218 may not blindly transfer a CIC from the ingress signaling information into the egress signaling information. Instead, the method 200 may include a CIC in the egress signaling information that corresponds to a CIC of an IXC originating carrier from which the toll call was received, such as the IXC exchange 115 of FIG. 1.

In the exemplary embodiment, if the call is determined at the block 212 to have an intra-LATA jurisdiction, the egress signaling information may be determined based on a customer-indicated intra-LATA call routing preference. Egress signaling information for intra-LATA calls desired by the customer to be received via a local trunk group at the terminating local exchange may include a JIP corresponding to the ingress trunk group. Egress signaling information for intra-LATA calls desired by the customer to be received via an access trunk group at the terminating local exchange may include a CIC of an IXC originating carrier from which the call was received. If no customer-indicated intra-LATA call routing preference is present, then the egress signaling information for an intra-LATA call may be determined in a manner similar to that of a locally jurisdictionalized call.

In some cases, the block 212 may be unable to determine a jurisdiction (not shown). In these cases, the method 200 may determine the egress trunk group to be an access egress trunk group (block 215). The method 200 may further determine a CIC of the egress signaling information (block 218) to be a CIC corresponding to the exchange performing the method 200 (for example, the CIC of the communications exchange 102 of FIG. 1). The method may then proceed to block 220.

The call and its associated egress signaling information may be delivered to the terminating local exchange via the determined egress trunk group (block 220). The egress signaling information may be delivered via in-band signaling or via an out-of-band signaling message such as an ISUP IAM (Initial Address Message). In some embodiments, the egress trunk group may be a SIP trunk group, and the method 200 may deliver some or all of the egress signaling information to the terminating local exchange via one or more SIP Invite headers. The method 200 may enable or disable sending the one or more SIP Invite headers based on a preference of the terminating local exchange. In some embodiments, a mapping of egress signaling information into the one or more SIP headers may be as follows:

-   -   Calling number: From header     -   Called number: To header     -   Charge number: P-Charge-Info header     -   CIC: CIC parameter in Request-URI

Some or all of the egress signaling information may be provided for inclusion in a call detail record, such as for inclusion in an EMI (Exchange Message Interface) call detail record (block 222). In some embodiments of the method 200, the block 222 may be optional. Finally, at block 225, the method 200 may end.

The method 200 may mitigate phantom call traffic in several ways. First, the method 200 may not take any position on a regulatory jurisdiction of any given call type based on potential compensation for the terminating carrier. The method 200 may recognize that routing a call over a particular trunk group does not alter a jurisdiction of the call, and thereby the method 200 may provide accuracy and transparency to call origination data. In particular, the method 200 may not rely solely (or blindly) on legacy, missing, masked, or otherwise unevaluated ingress signaling information to determine a route of the call to the terminating exchange. Rather, the method 200 may determine the jurisdiction of the call in real-time, based on not only ingress signaling information, but also the imported local calling area database, and in some cases, the ingress trunk group. In this manner, any legacy, missing or masked ingress signaling information may be mediated by the method 200 in real-time (i.e., during call-setup, routing and delivery) so that the call may be correctly routed to the terminating local exchange via a desired trunk group and may include as accurate egress signaling information as possible.

To the contrary, existing communication systems are generally unable to determine a call jurisdiction in real-time. Instead, any mediation of data for billing purposes based on the LCADS is typically performed using call detail records long after a call has completed. Typically, this mediation is done not in-real time but in a batch, post-processing manner for multitudes of calls at a time. Accordingly, any data or information that was available during real-time call setup may be lost for phantom traffic mitigation purposes as only a subset of available real-time data may have been recorded in the call detail records.

Moreover, the method 200 may bring further accuracy and transparency to inter-carrier compensation by providing some or all of the egress signaling information in detailed call records, such as in EMI records. Similar to the call routing, the method 200 may not automatically (and, in some cases, blindly) populate the detailed call records with legacy, missing, masked or otherwise unevaluated ingress signaling information. Rather, based on the jurisdiction and the egress signaling information, the detailed call records may be populated as accurately and as honestly possible with originating carrier information and other information available at call setup. The detailed call records may be exchanged with or delivered to the terminating local exchange so that the terminating carrier may use the detailed call records to accurately bill for inter-carrier compensation.

Note that the method 200 may enable the terminating carrier to receive accurate call detail or billing records for calls of any or all types of jurisdictions, including local, intra-LATA and inter-LATA calls. Currently, existing terminating local exchanges typically do not receive call detail records for local calls, but the method 200 may provide them to the terminating local exchange if desired. Thus, the terminating local exchange may receive additional accurate call data that was obtained and populated in real-time, with which to perform accurate billing of termination charges.

In cases where a particular call cannot be processed transparently by the method 200, the method 200 may gracefully release the call back to the originating exchange or may attempt to re-route the call. In this manner, any suspect calls may be gracefully turned away, thus further ensuring the accuracy and transparency of the calls that are actually delivered by the method 200 to the terminating local exchange, and their associated call detail records.

FIGS. 3-6 each depict embodiments of various blocks of the method 200 in greater detail. Each of the methods of FIGS. 3-6, though, is not required to be performed as a part of the method 200. In fact, each of the methods illustrated in FIGS. 3-6 may be performed independently or in a stand-alone mode. Additionally, each of the methods depicted in FIGS. 3-6 may be performed in conjunction with embodiments of the communications system 100.

FIG. 3 depicts an embodiment of a method of determining, in real-time, a jurisdiction of a call received from an originating carrier at a communications exchange for delivery to a terminating local exchange. The method 300 may be performed independently, or the method 300 may be performed in conjunction with the method 200, such as at the block 212 of the method 200.

At the start 302, the method 300 may import or locally store at least a portion of a local calling area database (block 305) from a third-party source, similar to the block 205 of the method 200. In fact, if the method 300 is performed in conjunction with the method 200, the block 305 may be omitted. The imported or locally stored local calling area database may include local calling area information that may be tariff-related, such as at least one of: a distance, a city name, an office type, a TELNUM (e.g., NPA NXX), a rate center, a state, a TELCOID or OCN (Operating Company Number), a LATA (Local Access and Transport Area), a Rate Center, a dialing pattern, a calling plan, and other information.

Next, a charge number corresponding to the call may be obtained (block 308). The charge number may be obtained (block 308), for example, from ingress signaling information corresponding to the call.

At block 310, the method 300 may evaluate the charge number for presence and validity. If the block 310 determines the charge number is missing or invalid, the method may jurisdictionalize the call to be toll or inter-LATA (block 312). Based on the toll or inter-LATA jurisdiction of the call, an access egress trunk group for the call may be selected or determined at block 315, and the method may end (block 318).

If, at the block 310, the method 300 determines the charge number to be valid, the method 300 may use information in the local calling routing database to determine a jurisdiction of the call (block 320). The a priori importation or local storage of some or all of the local calling routing database (block 305) at a computing device corresponding to a communications exchange at which the call is received may enable the call to be correctly jurisdictionalized and appropriately routed in real-time. In particular, during a set-up of the call, the computing device may quickly obtain needed information from the local calling routing database without requiring any communication with another computing device or entity.

If, at the block 320, the method 300 determines that the call has an inter-LATA or toll jurisdiction, the call may be jurisdictionalized as toll or inter-LATA (block 312), an access egress trunk group may be selected or determined (block 315), and the method may end (block 318).

If, at the block 320, the method 300 determines that the call has a local jurisdiction, the call may be jurisdictionalized as local (block 322). Based on the local jurisdiction of the call, a local egress trunk group for the call may be selected or determined at block 325, and the method may end (block 318).

If, at the block 320, the method 300 determines that the call has an intra-LATA jurisdiction, the call may be jurisdictionalized as intra-LATA (block 328). At block 330, a determination may be made as to whether or not the terminating local exchange has indicated a preference for intra-LATA call reception. The preference may indicate that the terminating local exchange desires to receive all intra-LATA calls via an access trunk group, all intra-LATA calls via a local trunk group, or some intra-LATA calls via the access trunk group and some via the local trunk group on a call-by-call or some other basis. At block 332, an appropriate egress trunk group may be selected or determined based on the preference of the terminating local exchange, and the method may then end (block 318).

If, at the block 330, no preference for routing intra-LATA calls has been indicated by the terminating local exchange or customer, generally, a local egress trunk group may be selected or determined (block 325). However, if a CIC is present in the ingress signaling information, an access trunk group for the intra-LATA call may be selected or determined (block 315). Finally, the method 300 may end (block 318).

FIG. 4 depicts an embodiment of a method 400 for determining egress signaling information of a call having a local jurisdiction, and for providing billing information for the locally jurisdictionalized call. The call may be received from an originating carrier at a communications exchange for delivery to a terminating local exchange. The method 400 may be performed independently, or the method 400 may be performed in conjunction with the method 200 and/or the method 300.

At the start 402, the method 400 may import or locally store a local calling area database (block 405) from a third-party source, similar to the block 205 of the method 200. In fact, if the method 400 is performed in conjunction with the method 200, the block 405 may be omitted. The imported or locally stored local calling area database may include local calling area information that may be tariff-related, such as at least one of: a distance, a city name, an office type, a TELNUM (e.g., NPA NXX), a rate center, a state, a TELCOID or OCN (Operating Company Number), a LATA (Local Access and Transport Area), a Rate Center, a dialing pattern, a calling plan, and other information.

At block 408, a JIP may be determined based on an ingress trunk group of the call. In particular, the method 400 may identify the ingress trunk group of the call and may use the local calling area database to determine the JIP based on an originating carrier corresponding to the ingress trunk group and the called number.

At block 410, the egress signaling information for the locally jurisdictionalized call may be determined. The egress signaling information may be determined based on at least one of the ingress trunk group, ingress signaling information, and the local calling area database. The egress signaling information for the locally jurisdictionalized call may include at least one of the calling number, the called number, the charge number, the JIP, and an LRN of the originating carrier.

Information corresponding to the call may be provided for inclusion in a call detail record, such as an EMI call detail record (block 412). The information may include the calling number, the charge number, the JIP, the LRN of the originating carrier as the originating LRN in the call detail record, and an originating OCN corresponding to the originating carrier. The provision of this information in the call detail record may allow a terminating carrier to correctly bill the originating carrier rather than an owner of the calling number, as the owner of the calling number may not always be the originator of the call.

Similar to the method 200, in some embodiments, the block 412 may be optional in the method 400. However, by providing both correct egress signaling information (block 410) and correct billing information (block 412), the method 400 may ensure that the terminating local exchange benefits from as much accurate information as possible. For example, even when a particular terminating local exchange does not look at signaling information, the particular terminating local exchange may still be enabled to mitigate phantom traffic using billing records. Finally, at block 415, the method 400 may end.

FIG. 5 depicts an embodiment of a method 500 for determining egress signaling information of a call having an inter-LATA or toll jurisdiction, and for providing billing information for the inter-LATA or toll call. The call may be received from an originating carrier (generally, but not necessarily an IXC) at a communications exchange for delivery to a terminating local exchange. The method 500 may be performed independently, or the method 500 may be performed in conjunction with the method 200, the method 300 and/or the method 400.

At the start 502, the method 500 may determine a CIC to be populated into egress signaling information based on the ingress trunk group of the toll or inter-LATA call (block 505). In particular, the method 500 may determine an IXC or originating carrier corresponding to the ingress trunk group of the call, and may use the CIC of the IXC in the egress signaling information. In some embodiments, the determined CIC of the IXC may be compared with data in a CIC field received from ingress signaling information. If the CIC of the IXC differs from the ingress signaling CIC, or if the ingress signaling CIC is missing or invalid, this fact may be recorded in a notification or in a log. The call, however, may still be delivered with the CIC of the IXC populated into the egress signaling information.

At block 508, the method 508 may determine if a customer-indicated suppression of the CIC is desired. If so, the CIC may be suppressed in the egress signaling information (block 510).

At block 512, a remainder of the egress signaling information may be determined, including the calling and the called number, among other information. The egress signaling information may be determined based on at least one of the ingress trunk group, ingress signaling information, and the local calling area database. As previously discussed, the egress signaling information may include the CIC of the IXC, if it was not requested to be suppressed by the terminating local exchange.

At block 515, billing information corresponding to the call may be provided for inclusion in a call detail record, such as in an EMI call detail record. The billing information may include the CIC of the IXC or originating carrier. Similar to the method 200, in some embodiments, the block 515 may be optional in the method 500. Finally, at block 518, the method 500 may end.

FIG. 6 depicts an embodiment of a method 600 for determining egress signaling information of a call having an intra-LATA jurisdiction, and for providing billing information for the intra-LATA call. The call may be received from an originating carrier for delivery to a terminating local exchange. The method 600 may be performed independently, or the method 600 may be performed in conjunction with the method 200, the method 300, the method 400 and/or the method 500.

An intra-LATA call may be particularly susceptible to being a phantom call, as accurate identification of an originating carrier is particularly difficult. For example, current industry standards do not support OCN information passed by a conventional tandem provider to the terminating carrier as part of SS7 call setup information. Also, most conventional tandem providers do not provide the flexibility to route such calls differently from other local calls, and most conventional tandem providers do not provide EMI call detail records to the terminating carrier for calls that originate and terminate within a LATA. Furthermore, a carrier corresponding to an OCN of the calling number may not necessarily be the originating carrier of the call, for example, when an end-user such as the end-user 108 of FIG. 1 purchases local services from multiple local service providers. The method 600 may enable mitigation of these and other types of intra-LATA phantom calls.

At the start 602, the method 600 may determine if ingress signaling information corresponding to the call includes a CIC (block 605). If the block 605 determines that a CIC is included in the ingress signaling information, the intra-LATA call may be treated similar to an inter-LATA or toll call. For example, determining the egress signaling information for the intra-LATA call may use an embodiment of the method 500 (block 606).

If the block 605 determines a valid CIC is not included in the ingress signaling information, the method 600 may import or locally store at least a portion of a local calling area database (block 608) from a third-party source, similar to the block 205 of the method 200. In fact, if the method 600 is performed in conjunction with the method 200, the block 608 may be omitted. The imported or locally stored local calling area database may include local calling area information that may be tariff-related, such as at least one of: a distance, a city name, an office type, a TELNUM (e.g., NPA NXX), a rate center, a state, a TELCOID or OCN (Operating Company Number), a LATA (Local Access and Transport Area), a Rate Center, a dialing pattern, a calling plan, and other information.

A JIP may be determined based on an ingress trunk group of the call (block 610). In particular, the method 600 may identify the ingress trunk group of the call and may use the local calling area database to determine the JIP based on an originating carrier or exchange corresponding to the ingress trunk group and the called number.

Egress signaling information for the locally jurisdictionalized call may be determined (block 612). The egress signaling information may be determined based on at least one of the ingress trunk group, ingress signaling information, and the local calling area database. The egress signaling information for the locally jurisdictionalized call may include the calling number, the charge number, the JIP, and an LRN of the originating carrier. For the intra-LATA call, however, a CIC may be omitted in the egress signaling information in order to facilitate proper mediation of the call by post-processing customer mediation systems.

Billing information corresponding to the call may be provided for inclusion in a call detail record, such as an EMI call detail record (block 615). The billing information may include the calling number, the charge number, the JIP, the LRN of the originating carrier as an originating LRN in the call detail record, and an originating OCN corresponding to the originating carrier. In order to facilitate proper medication of the call by the customer mediation systems, the billing information may include a CIC set to all zeroes. Similar to the method 200, in some embodiments, the block 615 may be optional in the method 600. Finally, at block 618, the method 600 may end.

Several phantom traffic call scenarios that commonly occur in existing communications systems are described below to illustrate how the system 100 and the methods 200-600 of the present disclosure mitigate phantom traffic by providing accuracy and transparency. Consider a first example of an incoming call having an invalid call number but a valid charge number. The systems and methods of the present disclosure may determine the jurisdiction of the call based on the charge number, so the invalid call number does not affect the routing. For such a call that is jurisdictionalized as local, the call may be terminated via a local egress trunk group, and the egress signaling information may contain both the invalid calling number and the charge number. Both the invalid calling number and the charge number may be provided to the call detail record for billing.

In a second example, a call that is received with an invalid or missing calling number and an invalid or missing charge number may be jurisdictionalized as a toll call. This call may terminate to the terminating local exchange over an access local trunk group, and the egress signaling information may include the CIC of the originating carrier from which the call was received, as determined based on the ingress trunk group. The CIC of the originating carrier may be provided to the call detail record for billing.

In a third example, an inter-LATA call that is received with a missing or invalid CIC in the ingress signaling information may be jurisdictionalized as an inter-LATA call. As such, a CIC corresponding to the originating carrier from which the call may be determined based on the ingress trunk group. The CIC of the originating carrier may then be provided in both the egress signaling information and to the call detail record.

In an existing communications, any of the calls described in the previous examples would be phantom calls, and the terminating local exchange would have been unable to bill for termination charges. With the present disclosure, however, all of the calls in the above examples may be terminated with accurate and transparent signaling and billing data. The terminating local exchange is thus enabled to bill correctly and receive its fairly due revenue.

FIG. 7 illustrates an example of an embodiment of a private packet network backbone exchange (PPNBE) 700 used in mitigating phantom call traffic. The PPNBE 700 may be an embodiment of the communications exchange 102 of FIG. 1. In fact, embodiments of the PPNBE 700 may be used in conjunction with embodiments of the system 100 of FIG. 1 and with embodiments of the methods 200-600.

In FIG. 7, the PPNBE 700 may be connected to one or more carrier entities 702 a, 702 b, 702 c, 702 d, 702 e. A carrier entity, as used herein, may be an entity that owns, controls, or operates communication equipment and/or provides communication service over the communication equipment. For example, a carrier entity may be a local exchange service provider, an inter-exchange carrier or long distance service provider, or a tandem service provider.

A carrier entity (702 a-702 e) may own, control and/or operate embodiments of one or more communications equipment or portions thereof such as the terminating local exchange 105, the originating local exchange 110, the inter-exchange carrier 112, or the tandem exchange 115 of FIG. 1. Examples of carrier entities may include, for example, wireless service providers, LECs, CLECs, RBOCs, VoIP or broadband service providers, cable telephony providers, institutions or companies owning and/or operating private communications systems, and/or other carriers/service providers. In one exemplary embodiment, the carrier entity 702 a may be the originating local exchange 110, the carrier entity 702 d may be the IXC 112, the carrier entity 702 c may be the tandem exchange 115, and the carrier entity 702 b may be the terminating local exchange 105.

Each carrier entity 702 a-702 e may connect to the PPNBE 700 using a call content path and a call signaling path. Call content paths (e.g., channels carrying communication traffic) are denoted in FIG. 7 by heavy thick lines 705 a, 705 b, 705 c, 705 d and 705 e. Communication traffic channels 705 a-705 e may carry voice traffic, data traffic, a combination of the two, or other types of communication traffic using any known communication traffic protocol. Paths carrying signaling may be an out-of-band signaling network 708, such as an SS7 network or other type of signaling network, or may be in-band signaling over connections 705 a-705 e. In some embodiments, one or more of the connections 705 a-705 d between a corresponding carrier entity 702 a-702 d and the PPNBE 700 may be a TDM (Time Division Multiplex) connection. In some embodiments, one or more of the connections (705 a-705 e) may be a VoIP (Voice over Internet Protocol) connection. For example, a specific carrier entity 702 e may be in communication with the PPNBE over a VoIP-type connection 705 e using SIP (Session Initiation Protocol).

Call traffic may access the private packet network backbone exchange 700 via a gateway 710, 712, 715, or, in the case of VoIP connection such as SIP, a network element 716 such as a session border controller gateway. As used herein, the term “PPNBE gateway” is not limited to mean a gateway of any particular technology, but may include gateways 710, 712, 715, 716 supporting any type of communication technology, for example, a TDM- and/or VoIP-supporting gateway. Call traffic may then traverse a private network backbone 718 to an appropriate terminating PPNBE gateway (710, 712, 715, 716), and be routed from the appropriate terminating PPNBE gateway (710, 712, 715, 716) of the private packet network backbone exchange 700 to the appropriate carrier entity (702 a-702 e).

In some embodiments, the private network backbone 718 may include a set of privately managed nodes (not shown) to route packet call traffic. Each PPNBE gateway (710, 712, 715, 716) may convert call traffic from the protocol or format used by the originating carrier entity (702 a-702 e) into a packet format used by the set of privately managed nodes in the private network backbone 718. In some embodiments, the set of privately managed nodes may communicate using a packet format corresponding to an Internet Protocol format (IP). IP packets may be routed across the privately managed nodes in the private network backbone 718 to the PPNBE gateway corresponding to the carrier of the called party (710, 712, 715, 716), where the packets may be converted into a format understood by the corresponding terminating carrier entity (702 a-702 e). In some embodiments, the private network backbone 718 may use other types of technologies other than IP to deliver call traffic within the private network backbone 718, such as ATM or other packet or cell switching technologies.

In the private packet network backbone exchange 700, control may be performed by a logical call control entity 720 a. The control entity 720 a may include one or more servers or cloud computing devices, or other computing devices having a memory and having the ability to interface with a signaling network 708. Control entity 720 a may provide call control as well as feature, service and other types of control needed for communication service. Control entity 720 a may be represented to the PSTN, other exchanges and other networks as a single logical point code or may be identified via information in a single logical routing database 720 b. Control entity 720 a may or may not be physically co-located with the logical routing database 720 b, but information in the logical routing database 720 b may be accessible for use by the control entity 720 a in establishing calls.

Carrier entities 702 a-702 e may transmit and receive control signals or messages via out-of-band signaling paths 708 through a signaling network. In some embodiments, the signaling network may be an SS7 signaling network, but other out-of-band signaling networks may also be used in accordance with embodiments of the disclosure. For some calls, control signals may be received in-band at a PPNBE gateway 710, 712, 715, 716. In-band control signals may be delivered to and received from the control entity 720 a via the private network backbone 718.

In the embodiment of the configuration illustrated in FIG. 7, the control entity 720 a, the routing database 720 b, and PPNBE gateway A 710 are illustrated as being physically co-located 725. Physically co-locating the control entity 720 and the routing database 720 b with other equipment such as PPNBE gateway A 710 may be beneficial for optimizing ease of maintenance and configuration of the PPNBE 700, but is not necessary. Control entity 720 a and/or routing database 720 b may be located anywhere and are not required to be physically co-located with any PPNBE gateway 710, 712, 715, 716 or any other equipment that is a part of the private packet network backbone exchange 700.

Control entity 720 a may be scalable. As the volume of aggregate traffic through the PPNBE 700 increases, the number of physical computing devices on which the control entity 720 a resides may be increased, however, the control entity 720 a may still appear as a single logical point code, and/or may be accessed by the signaling network 708 via the information in the single logical routing database. If more than one physical computing device is necessary to support the call control entity 720 a, the more than one physical computing device may be located locally, remotely or some combination of locally and remotely.

Likewise, in some embodiments, the single point code or routing database 720 b may be scalable. The logical routing database 720 b of the PPNBE 700 may be physically located across more than one local and/or remote computer-readable storage media entities, however, the logical routing database 720 b may logically appear as a single logical routing database.

A local call routing database, such as the local call routing database described in FIG. 2, may be imported or copied into the routing database 720 b or some other database (not shown) accessible by the call control entity 720 a. The local call routing database, updates to, or complete or partial copies thereof may be received from a computing entity by any data or file transfer means known in the art.

PPNBE gateways 710, 712, 715 and 716 may be scalable. As the number of available physical connections to the PPNBE 700 desired by local service providers in a geographical area increases, a capacity of an individual PPNBE gateway may be increased. Also, if desired, additional PPNBE gateways may be added to the PPNBE 700 to provide additional trunk connections (e.g., additional communication paths) to carrier entities (702 a-702 e) or to new carrier entities (not pictured). The additional gateways, however, may continue to be managed by control entity 720 a in conjunction with the routing database 720 b for servicing calls and providing features and communication services. The PPNBE 700 may maintain the same single point code for control 720 a independent of the total number and size of available PPNBE gateways 710, 712, 715, 716.

The number of nodes within the private network backbone 718 may be scalable to support a desired communication traffic volume. Similar to other elements of the PPNBE 700, the nodes within the private network backbone 718 are not required to be physically co-located, but each node merely must be in communicative connection with at least one other node in the private network backbone 718.

In one embodiment of the private packet network backbone exchange 700, the following commercial equipment may be included. Voice equipment may include:

Sonus Networks, Inc.'s Sonus PSX™ (policy server)

Sonus Networks, Inc.'s Sonus SGX (SS7 signaling gateway)

Sonus Networks, Inc.'s Sonus DSI-L0 (CDR collector)

Sonus Networks, Inc.'s Sonus DSI-L2 (Billing mediation server)

Sonus Networks, Inc.'s Sonus Insight™ EMS (element management system)

Sonus Networks, Inc.'s Sonus GSX9000 (media gateway)

Performance Technologies 6201 Mini-STP

Empirix XMS (voice monitoring system)

IP and transport equipment may include:

Force 10 (formerly Turin Networks) Traverse® 2000 (DCS)

Brocade (formerly Foundry Networks) NetIron XMR 4000 (IP router)

Brocade (formerly Foundry Networks) BigIron RX (IP router)

Brocade (formerly Foundry Networks) FastIron® Edge X448 may be used as an Ethernet switch in the private packet network backbone exchange 700.

Although the foregoing text sets forth a detailed description of numerous different embodiments, it should be understood that the scope of the patent is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possible embodiment because describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims. Accordingly, it should be understood that the methods and apparatus described herein are illustrative only and are not limiting upon the scope of the claims.

Thus, many modifications and variations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present claims. 

1. A computing device for mitigating phantom call traffic in a communications system, the computing device coupled to a communications exchange and comprising: a processor; a memory; and a call routing application maintained in the memory and executed by the processor to mitigate phantom call traffic, the call routing application including computer-executable instructions for: importing a local calling area database into the computing device; receiving a call via an ingress trunk group in connection with the communications exchange, the call originating from an originating carrier and having corresponding ingress signaling information including a charge number, a calling number and a called number; determining a jurisdiction of the call in real-time based on the charge number, the called number and the local calling area database, the jurisdiction being one of local, intra-LATA or inter-LATA; determining an egress trunk group, the egress trunk group being one of a local egress trunk group or an access egress trunk group; determining egress signaling information based on the jurisdiction of the call; delivering the call and the egress signaling information from the communications exchange to a local exchange via the egress trunk group; and providing at least a portion of the egress signaling information for inclusion in a call detail record.
 2. The computing device of claim 1: wherein the computer-executable instructions for determining the jurisdiction of the call in real-time further comprise: determining the jurisdiction of the call to be local, and determining, based on the ingress trunk group, a jurisdictional information parameter (JIP) corresponding to the originating carrier; wherein the computer-executable instructions for determining the egress trunk group further comprise determining the local egress trunk group; wherein the computer-executable instructions for determining the egress signaling information further comprise including the charge number, the calling number, the called number, the JIP, and an LRN (Local Routing Number) corresponding to the originating carrier in the egress signaling information; and wherein the computer-executable instructions for providing the at least the portion of the egress signaling information for inclusion in the call detail record further comprise providing the LRN and an operating company code (OCN) corresponding to the originating carrier for inclusion in the call detail record.
 3. The computing device of claim 1: wherein the computer-executable instructions for determining the jurisdiction of the call in real-time further comprise: determining the jurisdiction of the call to be inter-LATA, and determining, based on the ingress trunk group, a carrier identification code (CIC) of the originating carrier; wherein the computer-executable instructions for determining the egress trunk group further comprise determining the access egress trunk group; wherein the computer-executable instructions for determining the egress signaling information further comprise including the charge number, the calling number, the called number, and the CIC of the originating carrier in the egress signaling information; and wherein the computer-executable instructions for providing the at least the portion of the egress signaling information for inclusion in the call detail record further comprise providing the charge number, the calling number, the called number, and the CIC of the originating carrier for inclusion in the call detail record.
 4. The computing device of claim 3, wherein the computer-executable instructions for determining the jurisdiction of the call to be inter-LATA further comprise at least one of: determining both the charge number and the calling number of the call to be invalid, determining the charge number to be invalid and the calling number of the call to be non-local, or determining the ingress signaling information includes a filled carrier identification code field.
 5. The computing device of claim 1: wherein the computer-executable instructions for determining the jurisdiction of the call in real-time further comprise: determining the jurisdiction of the call to be intra-LATA, and determining, based on the ingress trunk group, a jurisdictional information parameter (JIP) corresponding to the originating carrier; wherein the computer-executable instructions for determining the egress signaling information further comprise, in the egress signaling information, including the charge number, the calling number, the called number, the JIP, and an LRN (Local Routing Number) corresponding to the originating carrier and excluding any carrier identification code (CIC); and wherein the computer-executable instructions for providing the at least the portion of the egress signaling information for inclusion in the call detail record further comprise providing the LRN as an originating LRN and a CIC field set to all zeroes for inclusion in the call detail record.
 6. The computing device of claim 5, wherein the computer-executable instructions for determining the egress trunk group further comprise determining the one of the local egress trunk group or the access egress trunk group based on a customer preference, and determining the local egress trunk group when no customer preference is available.
 7. The computing device of claim 1, further comprising computer-executable instructions for: obtaining a customer preference to receive only calls having a first type of jurisdiction at the local exchange, wherein the first type is one of: local, intra-LATA or inter-LATA; and for a particular call having a type of jurisdiction different than the first type, at least one of: releasing the particular call back to an originating carrier of the particular call, or re-routing the particular call.
 8. The computing device of claim 1, wherein the computer-executable instructions for determining the egress trunk group further comprise determining the egress trunk group to be the local egress trunk group for a first call having a jurisdiction of local or intra-LATA, and determining the egress trunk group to be the access egress trunk group for a second call having a jurisdiction of inter-LATA.
 9. The computing device of claim 1, wherein the originating carrier is one of: a particular local exchange, an inter-exchange carrier (IXC) exchange, or a tandem exchange.
 10. The computing device of claim 1, wherein only one type of egress trunk group is coupled between the communications exchange and the local exchange, the one type selected from local or access.
 11. The computing device of claim 1, wherein at least one of the local egress trunk group or the access egress trunk group is a SIP trunk group and a SIP invite header corresponding to the SIP trunk group includes at least the portion of the egress signaling information.
 12. The computing device of claim 11, further comprising computer-executable instructions for delivering the SIP invite header to the local exchange based on a customer preference.
 13. The computing device of claim 1, wherein the call comprises at least one of a voice or a data call.
 14. The computing device of claim 1, wherein the call is originated by an end-user using any communications access technology.
 15. The computing device of claim 1, wherein the communications exchange is a private packet network backbone exchange (PPNBE).
 16. A method of mitigating phantom local call traffic comprising, at a tandem exchange: importing a local calling area database; receiving a call via an ingress trunk group, the call including ingress signaling information including a charge number, a calling number, and a called number corresponding to a local exchange; determining, in real-time, a jurisdiction of the call to be local based on the charge number, the called number, and the local calling area database; determining, based on the ingress trunk group, a jurisdictional information parameter (JIP) corresponding to an originating carrier of the call; including the charge number, the calling number, the called number, the JIP and an LRN corresponding to the originating carrier in egress signaling information; and delivering the call and the egress signaling information from the tandem exchange to the local exchange via a local egress trunk group.
 17. The method of claim 16, further comprising providing an operating company code (OCN) corresponding to the originating carrier, the charge number, the calling number, the called number, the JIP and the LRN for inclusion in a call detail record.
 18. The method of claim 16, wherein determining the jurisdiction of the call to be local comprises determining the calling number of the ingress signaling information is invalid and the charge number of the ingress signaling information is local and valid.
 19. The method of claim 16, wherein receiving the call comprises receiving at least one of a voice or a data call originated by a user via any communications access technology.
 20. The method of claim 16, wherein the tandem exchange is a private packet network backbone exchange (PPNBE).
 21. A method of mitigating phantom inter-LATA call traffic, comprising, at a tandem exchange: importing a local calling area database; receiving a call via an ingress trunk group, the call including ingress signaling information including a charge number, a calling number, and a called number corresponding to a local exchange; determining, in real-time, a jurisdiction of the call to be inter-LATA based on the charge number, the called number, and the local calling area database; determining, based on the ingress trunk group, a carrier identification code (CIC) corresponding to an originating carrier of the call; including the charge number, the calling number, the called number, and the CIC corresponding to the originating carrier in egress signaling information; and delivering the call and the egress signaling information from the tandem exchange to the local exchange via an access egress trunk group.
 22. The method of claim 21, further comprising providing the charge number, the calling number, the called number, and the CIC corresponding to the originating carrier for inclusion in a call detail record.
 23. The method of claim 21, further comprising suppressing the CIC in the egress signaling information based on a customer preference.
 24. The method of claim 21, wherein determining the jurisdiction of the call to be inter-LATA comprises determining one of: determining the ingress signaling information includes a missing or invalid CIC; determining the ingress signaling information includes a CIC corresponding to a different originating carrier than the originating carrier corresponding to the ingress trunk group; or determining the ingress signaling information includes a CIC that matches the CIC corresponding to the originating carrier that was determined based on the ingress trunk group.
 25. The method of claim 21, wherein receiving the call comprises receiving at least one of a voice or a data call originated by a user via any communications access technology.
 26. The method of claim 21, wherein the tandem exchange is a private packet network backbone exchange (PPNBE).
 27. A method of mitigating phantom intra-LATA call traffic comprising, at a tandem exchange: importing a local calling area database; receiving a call via an ingress trunk group, the call including ingress signaling information including a charge number, a calling number, and a called number corresponding to a local exchange; determining, in real-time, a jurisdiction of the call to be intra-LATA based on the charge number, the called number, and the local calling area database; determining the ingress signaling information includes a filled carrier identification code (CIC) field, and further: determining, based on the ingress trunk group, a carrier identification code (CIC) corresponding to an originating carrier of the call; including the charge number, the calling number, the called number, and the CIC corresponding to the originating carrier in egress signaling information; delivering the call and the egress signaling information to the local exchange via an access egress trunk group; and providing the charge number, the calling number, the called number, and the CIC corresponding to the originating carrier for inclusion in a call detail record; and determining the ingress signaling information excludes any CIC, and further: determining, based on the ingress trunk group, a jurisdictional information parameter (JIP) corresponding to the originating carrier; including the charge number, the calling number, the called number, the JIP and an LRN corresponding to the originating carrier in the egress signaling information; delivering the call and the egress signaling information to the local exchange via a local egress trunk group; and providing an operating company code (OCN) corresponding to the originating carrier, the charge number, the calling number, the called number, the JIP and the LRN as an originating LRN for inclusion in an EMI call detail record.
 28. The method of claim 27, wherein receiving the call comprises receiving at least one of a voice or a data call originated by a user via any communications access technology.
 29. The method of claim 27, wherein the tandem exchange is a private packet network backbone exchange (PPNBE).
 30. A system for mitigating phantom call traffic, comprising: means for importing at least a portion of a local calling area database; means for receiving a call via an ingress trunk group, the call including ingress signaling information including a charge number, a calling number, and a called number corresponding to a local exchange; means for determining, in real-time, a jurisdiction of the call based on the charge number, the called number, and the local calling area database, wherein the call is locally jurisdictionalized when the ingress signaling information excludes any carrier identification code (CIC) and the call is toll-jurisdictionalized when the ingress signaling information includes a valid or an invalid CIC; means for determining, based on the ingress trunk group for a locally jurisdictionalized call, a jurisdictional information parameter (JIP) corresponding to an originating carrier of the call; means for including, for the locally jurisdictionalized call, the charge number, the calling number, the called number, the JIP and an LRN corresponding to the originating carrier in egress signaling information; means for determining, based on the ingress trunk group for a toll-jurisdictionalized call, a carrier identification code (CIC) corresponding to the originating carrier of the call; means for including, for the toll-jurisdictionalized call, the charge number, the calling number, the called number, and the CIC corresponding to the originating carrier in the egress signaling information; means for determining an egress trunk group; and means for delivering the call and the egress signaling information to the local exchange via the egress trunk group. 