Network-based timed ring suppression

ABSTRACT

Systems and methods for timed ring suppression are disclosed. After a communications device receives an incoming call and the ringer is activated to produce an initial audible alert, the ringer of the communications device may be silenced for subsequent audible alerts until the calling party hangs up or until the call is further processed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application relates to applicants' co-pending application entitled“Timed Ring Suppressor,” filed simultaneously herewith and of which the“Brief Summary of the Invention” and “Detailed Description of theInvention” sections are incorporated herein by this reference.

This application relates to applicants' application entitled “CallerControlled Network-Based Timed Ring Suppression,” filed simultaneouslyherewith and of which the “Brief Summary of the Invention” and “DetailedDescription of the Invention” sections are incorporated herein by thisreference.

NOTICE OF COPYRIGHT PROTECTION

A portion of the disclosure of this patent document and its figurescontain material subject to copyright protection. The copyright ownerhas no objection to the facsimile reproduction by anyone of the patentdocument or the patent disclosure, but otherwise reserves all copyrightswhatsoever.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates generally to the field of communications. Moreparticularly, this invention relates to systems and methods for timedring suppression of communications devices.

2. Description of the Related Art

Telecommunications has experienced explosive growth, and more growth isplanned as telecommunication access and numerous communications devicesimprove. This explosive growth is revolutionizing special servicesoffered to subscribing customers. Of the special service offerings, themost relevant to this invention is the caller identification or CallerID services. A customer or a user of a telephone that is served by theCaller ID service is provided with a calling party's directoryinformation. Presently available Caller ID systems provide the callingparty's telephone number and a billing name associated with the callingparty's telephone number (if available) when an incoming caller lineidentification (ICLID) signal can be detected, decoded, and transmittedto the called telephone or other display device associated with thecalled telephone (e.g., a Caller ID device). The Caller ID services alsoallow the customer to receive directory information for other incomingcalls while the customer's phone is used (e.g., during a conversationwith another party); this service is sometimes referred to as Caller IDCall Waiting service.

A customer may use the displayed Caller ID information to make adecision to answer and/or to prepare for the call. In addition, thecustomer may use Caller ID information to block incoming callsassociated with one or more ICLID signals including specific telephonenumbers selected by the customer and/or privacy screening services forunidentifiable telephone numbers of incoming calls (e.g.,telemarketers). If the customer wants to selectively answer incomingcalls using Caller ID information, the customer has several choicesblock the call or ignore the ringing (or other audible alerts) until thecall is processed by a voice messaging system (or other call handlingsystem) or until the caller hangs up. If the call is blocked, then thecustomer may not have immediate notification of the incoming blockedcall to re-evaluate whether to accept the call since circumstances foraccepting the call may change. If the customer ignores the call andlistens to unwanted ringing, then the customer may be annoyed with therepetitive noise alerting the customer of the call. In recent years,telephony providers and manufacturers have tried to provide alternatesystems and methods to alert the customer of selective incoming callsthat minimizes interruptions for unwanted calls.

For example, U.S. Pat. No. 5,351,289 to Logsdon et al., entitled “CallerID Telephone Security Device,” discloses a caller ID telephone securitysystem that mutes the ringer of a telephone until the ICLID signal ofthe incoming call is compared with a list of telephone numbers (or otherreference data) to determine whether to activate the ringer and pass thecall to the communications device. If the call does not pass through tothe communications device, then the call is blocked, the ringer is neveractivated, and, thus, the customer is not alerted of the incoming call.Further, because this invention requires that the customer topredetermine which calls to pass through and which calls to block, ifthe customer has not identified a particular telephone number (or otherreference data) to pass through or block, then a desired call may beblocked or an unwanted call may ring and pass through.

Another example, U.S. Pat. No. 6,400,814 to Adams, entitled “Telephonewith Ringer Silencer Screening Feature,” discloses a telephone with aringer silencer that allows the customer to depress a keypad todeactivate the ringer on a call-by-call basis after activation of theringer by receipt of the incoming call. That is, the ringer produces anaudible alert until the customer is able to depress the keypad. And,once the keypad is depressed, the ringer does not produce anotheraudible alert until the next incoming call. Another embodiment disclosesa system that either deactivates the ringer or that allows the customerto depress a keypad to transfer the call to a voice messaging systemthus terminating the signal to the ringer. Again, the customer may beannoyed with the ringing until the keypad is depressed, and if thecustomer accidentally depresses the transfer keypad, then the call isrouted to voicemail and the customer can not answer the call.

BRIEF SUMMARY OF THE INVENTION

This invention addresses the above and other needs by providing systemsand methods for enabling timed ring suppression. Typically, a customerreceives an incoming call to a communications device and is alerted ofthe incoming call with an initial audible alert (e.g., a ring) producedby a ringer (or alternate noise maker) of the communications device.Thereafter, subsequent rings of the ringer may b& suppressed for aselected time period such that one or more rings are silenced during anuninterrupted on-hook state of the telephone. The time period forsilencing the ringer is controlled by a timing parameter that may havean initial default to suppress one ring (e.g., one ring cycleapproximately 5-6 seconds for a POTS phone coupled with the PublicSwitched Telephone Network (PSTN)). Alternatively, the timing parametermay be selected for predetermined periods of time by a customer (and/oruser) of the communications device, and further, the timing parametermay be set differently for different callers (also referred to ascalling party). The timed ring suppression may be controlled by customerpremise hardware and equipment including a telephone (or alternatecommunications device) with a built in (or otherwise integrated) timedring suppressor and a stand-alone timed ring suppressor coupled with thetelephone. In an alternate embodiment, the timed ring suppression may becontrolled by a communications network that detects, decodes, andprocesses timed ring suppression of the incoming call to thecommunications device. Additionally, emergency personnel, authorizedcalling parties, and other authorized entities (e.g., a technician ofthe communications network) may override the timed ring suppression tocontinuously audibly alert the customer (or another receiving party) ofthe incoming call.

In an embodiment, a communications system for timed ring suppressionincludes a communications dataserver and a timed ring suppressionapplication. The dataserver communicates with a communications networkto detect, decode, and/or communicate an incoming communications signalon a communications link from a calling party communications device to areceiving party communications device. Further, the dataserver stores atimed ring suppression profile that includes an identifier of timed ringsuppression reference data and/or a timing parameter for suppressing aringer of the receiving party communications device after the receivingparty communications device activates the ringer to produce an initialaudible alert of the incoming communications signal. The timed ringsuppression application generating a timed ring suppression signal forsilencing subsequent audible alerts of the incoming communicationssignal according to the timed ring suppression profile. Thecommunications network may include a public switched telephone network,a mobile switching telephone communications network, a satellitecommunications network, and a world wide electronic data communicationsnetwork having a timed ring suppression interface via at least one of aninternet, an intranet, or an extranet.

Another embodiment discloses a timed ring suppressor system thatincludes a first switch communicating with a calling party'scommunications device, a communications network coupling one or moreswitches, and a second switch communicating with a receiving party'scommunications device. The communications network processes an incomingcommunications signal to generate a timed ring suppression signal tosuppress a ringer of the receiving party's communications device afterthe receiving party, communications device activates the ringer toproduce an initial audible alert of the incoming communications signalsuch that subsequent audible alerts of the incoming communicationssignal are silenced according to a timing parameter. Typically, thetiming parameter ranges from approximately five seconds to greater thanfive seconds to suppress one or more subsequent rings of the ringer.

Other embodiments disclose methods for timed ring suppression. Accordingto an embodiment, a method for timed ring suppression includes (1)processing a communications signal from a calling party's communicationsdevice to a receiving party's communications device, (2) associating anincoming line identification (ICLID) signal with the communicationssignal, (3) associating a timed ring suppression profile with the ICLIDsignal, and (4) using the timed ring suppression profile to generate atimed ring suppression signal, the timed ring suppression signaloperable to silence subsequent audible alerts of the incoming callaccording to a timing parameter. The timed ring suppression signalfurther operates to reactivate the ringer to produce subsequentunsuppressed audible alerts according to the timing parameter.Typically, the timed ring suppression profile includes an identifier ofa calling party (e.g., a name of the calling party), a communicationsaddress (e.g., a telephone number of the calling party), an identifierof a calling party's communications device (e.g., a cellular phone),and/or a timing parameter for suppressing a ringer of a communicationsdevice after the communications device receives an incoming call andafter the communications device activates the ringer to produce aninitial audible alert. According to another embodiment, a timed ringsuppression method includes (1) receiving an incoming communicationssignal from a calling party's communications device to a communicationsnetwork that includes a database of one or more timed ring suppressionprofiles and (2) using the incoming communications signal and a timedring suppression profile to generate a timed ring suppression signalsimilar to the timed ring suppression signal discussed above.

Further details on these embodiments and other possible embodimentsincluding methods of timed ring suppression are set forth below. As isappreciated by those of ordinary skill in the art, this invention haswide utility in a number of areas as illustrated by the discussionbelow. These embodiments may be accomplished singularly or incombination, in one or more of the implementations of this invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other embodiments, objects, uses, advantages, and novelfeatures of this invention are more clearly understood by reference tothe following description taken in connection with the accompanyingfigures, wherein:

FIG. 1 is a block diagram of a timed ring suppressor device according toan embodiment of this invention;

FIG. 2 is a block diagram of a timed ring suppressor device according toan embodiment of this invention;

FIG. 3 is perspective front view of the timed ring suppressor device ofFIG. 2 including a screen display for inputting a communications addressfor timed ring suppression according to an embodiment of this invention;

FIG. 4 is a block diagram of a timed ring suppressor device according toan embodiment of this invention;

FIG. 5 is a schematic of a timed ring suppression system illustrating acommunications network connecting a calling party's communicationsdevice with a receiving party's communications device and a timed ringsuppressor device according to an embodiment of this invention;

FIG. 6 is a schematic of a timed ring suppression system illustrating apublic switched telephone network connecting a calling party's telephonewith a customer's telephone and a timed ring suppressor device accordingto an embodiment of this invention;

FIG. 7 is a schematic of a timed ring suppression system illustrating acommunications network connecting a calling party's communicationsdevice with a receiving party's communications device according to anembodiment of this invention;

FIG. 8 is a schematic of a timed ring suppression system illustratingthe communications connections of a calling party's telephone, one ormore communications networks, a customer's telephone, and a customer'scomputer according to an embodiment of this invention;

FIG. 9 is a schematic of a timed ring suppression system illustratingthe communications connections of a calling party's telephone, one ormore communications networks, and a plurality of various communicationsdevices according to an embodiment of this invention;

FIG. 10 is a block diagram of a timed ring suppressor device accordingto an embodiment of this invention;

FIG. 11 is a block diagram of a timed ring suppressor device accordingto an alternate embodiment of this invention; and

FIGS. 12-13 are flowcharts describing timed ring suppression accordingto embodiments of this invention.

DETAILED DESCRIPTION OF THE INVENTION

This invention now will be described more fully hereinafter withreference to the accompanying drawings, in which exemplary embodimentsare shown. This invention may, however, be embodied in many differentforms and should not be construed as limited to the embodiments setforth herein; rather, these embodiments are provided so that thisdisclosure will be thorough and complete, and will fully convey thescope of the invention to those of ordinary skill in the art. Moreover,all statements herein reciting embodiments of the invention, as well asspecific examples thereof, are intended to encompass both structural andfunctional equivalents thereof. Additionally, it is intended that suchequivalents include both currently known equivalents as well asequivalents developed in the future (i.e., any elements developed thatperform the same function, regardless of structure).

Thus, for example, it will be appreciated by those of ordinary skill inthe art that the diagrams, schematics, flowcharts, and the likerepresent conceptual views or processes illustrating systems and methodsembodying this invention. The functions of the various elements shown inthe figures may be provided through the use of dedicated hardware aswell as hardware capable of executing associated software. Similarly,any switches shown in the figures are conceptual only. Their functionmay be carried out through the operation of program logic, throughdedicated logic, through the interaction of program control anddedicated logic, or even manually, the particular technique beingselectable by the entity implementing this invention. Those of ordinaryskill in the art further understand that the exemplary hardware,software, processes, methods, and/or operating systems described hereinare for illustrative purposes and, thus, are not intended to be limitedto any particular named manufacturer.

The timed ring suppression systems and methods of this invention operatewith different communications devices and communications networks toenable, disable and/or otherwise control timed ring suppression. Thetimed ring suppressor leverages the assets of the connectedcommunications device(s) and/or communications networks in termsoptimally using the connected software, hardware, equipment, networks,and/or other information technology assets. For example, a customer'scommunications device may have a local and/or a wide area network thatutilizes Ethernet, dedicated private lines, Frame Relay, ISDN, ATM,ADSL, and the like to provide a high speed connection to a data network,such as the Internet, Intranet, and/or Extranet. Typically, the customerreceives an incoming call to the communications device and is alerted ofthe incoming call with an initial audible alert (e.g., a ring) producedby a mechanical/electrical ringer (or alternate noise maker) of thecommunications device. Thereafter, subsequent rings of the ringer may besuppressed for a selected time period such that one or more rings aresilenced during an uninterrupted on-hook state of the telephone. Thetime period for silencing the ringer is controlled by a time parameter(also referred to as a “timing parameter”) that may have an initialdefault to suppress one ring (e.g., one ring cycle approximately 5-6seconds for a POTS phone coupled with the Public Switched TelephoneNetwork (PSTN)). Alternatively, the time parameter may be selected forpredetermined periods of time by a customer (and/or user) of thecommunications device, and further, the time parameter may be setdifferently for different callers (also referred to as calling party).The timed ring suppression may be controlled by customer premisehardware and equipment including a telephone (or alternatecommunications device) with a built in (or otherwise integrated) timedring suppressor and a stand-alone timed ring suppressor coupled with thetelephone. In an alternate embodiment, the timed ring suppression may becontrolled by a communications network that detects, decodes, andprocesses timed ring suppression of the incoming call to thecommunications device. Additionally, emergency personnel, authorizedcalling parties, and other authorized entities (e.g., a technician ofthe communications network) may override the timed ring suppression tocontinuously audibly alert the customer (or another receiving party) ofthe incoming call.

As used herein, the term “communications device” includes wired andwireless communications devices, such as a plain old telephone (POTSphone), a mobile phone, a wireless phone, a WAP phone, a satellitephone, a computer, a modem, a pager, a digital music device (e.g., MP3/4player), a digital recording device, a personal digital assistant, aninteractive television, a digital signal processor, and a GlobalPositioning System device. Further, as used herein, the term “data”includes electronic information, such as, for example facsimile,electronic mail (e-mail), text, video, audio, and/or voice in a varietyof formats, such as dual tone multi-frequency, digital, analog, and/orothers. Additionally, the data may include: (1) executable programs,such as a software application, (2) an address, location, and/or otheridentifier of the storage location for the data, (3) integrated orotherwise combined files, such as a grouping of destinationcommunications addresses associated with the receiving party, and/or (4)timed ring suppression profiles, including configuration, authenticity,security, and other data. In various embodiments, the data may be storedby the communications network, a peripheral storage device connected tothe communications network, the timed ring suppressor device, thecommunications device, and/or other connected networks.

Referring now to the figures, FIG. 1 is a block diagram showing a timedring suppressor device 100 coupled with a telephone 160. The timed ringsuppressor device includes a system controller 102, a processor 104, amemory subsystem 106, a database 108, a timed ring suppressionmanagement module (also referred to as the “timed ring suppressionprogram”) 110, an input/output (“I/O”) interface 120, one or moreinput/output device(s) 122, a caller identification device 124, atelephone line connection (or connection to an alternate communicationsdevice) 130, a timed ring suppressor 140, and a circuit 145 thatconnects the timed ring suppressor with a ringer 150 of the telephone160. The system controller 102, as known in the art, provides a bridgingfunction between the processor 104, the memory subsystem 106, theinput/output interface 120, and the timed ring suppressor 140.Typically, as known in the art, a system bus communicates signals, suchas data signals, control signals, and address signals, between theprocessor 104 and the system controller 102. The processor 104 executesan operating system that controls the internal functions of the timedring suppressor device 100. The timed ring suppression program 110operates within the system memory 106; however, the timed ringsuppression program 110 could also reside in flash memory or aperipheral storage device. The I/O Interface 120 allows the timed ringsuppressor device 100 to monitor, detect, receive, and decode anincoming call identification (ICLID) signal of an incoming call via theCaller ID device 124 coupled with line 130. Alternatively, the timedring suppressor device 100 may receive the ICLID signal from aperipheral device (not shown) or via telephone 160. The timed ringsuppression program 110 compares reference data transmitted with theICLID signal to data stored in one of more timed ring suppressionprofiles stored in memory 106 to activate the timed ring suppressor 140and enable the circuit 145 to suppress the ringer 150 of telephone 160.A timing parameter of the timed ring suppression profile specifies thetime period to silence the ringer and, if applicable, to enablesubsequent ringing after the time period has passed. The timingparameter is preferably about six seconds to correspond with a ringcycle. The timing parameter could also be multiples of six secondincrements to correspond with subsequent ring cycles. The timingparameter, however, could alternatively be any duration from less thanone second to not exceeding about two minutes.

FIG. 2 is a similar block diagram of the timed ring suppressor 100 ofFIG. 1; however, the timed ring suppressor of FIG. 2 includes a digitalsignal processor 202, an internal memory system 204, an external (orperipheral) memory system 206, a power management system 208, aninput/output processor 220 interfacing with a voice/video player 231, avoice/video recorder 232, a biometrics sensor 233, a keypad 234, adisplay 235, a communications (“comm.”) port 236, the timed ringsuppression program 110, the telephone line connection 130, the timedring suppressor 140, and the circuit 145 that connects the timed ringsuppressor 140 with the ringer 150 of the telephone 160. The timed ringsuppression program 110 operates within a memory device of the digitalsignal processor 202. The memory device could include the internalmemory 204 of the digital signal processor 202, or the memory devicecould include the external memory device 206 communicating with thedigital signal processor 202. The digital signal processor 202 convertsanalog signals to digital signals and converts digital signals to analogsignals. The digital signal processor 202 could include compression anddecompression algorithms, cancellation algorithms, audio-processingcircuitry, filter circuitry, and amplifier circuitry. Although digitalsignal processors can be designed to provide differing capabilities anda variety of performance criteria, the basic functions of the digitalsignal processor are known and, thus, will not be further discussed.

The digital signal processor 202 interfaces with an input/outputprocessor 220. The input/output processor 220 controls systeminput/output and provides telephony-like control features. A busprovides a signal communication path between the digital signalprocessor 202 and the input/output processor 220. The input/outputprocessor 220 is a microprocessor that includes memory (not shown),communication controllers (not shown), and peripheral controllers (notshown). The communication controllers, for example, could controlpacket-based communications with a data network (shown as referencenumeral 860 in FIG. 8-10) through the COMM port 236. The communicationcontrollers could also control packet-based communications with atelecommunications switch (shown as reference numeral 610 in FIGS. 6,8-10) through the COMM port 236. The clock source 237 provides a systemclock for the timed ring suppressor device 100, and the clock source 237may also include higher and lower frequency multiples of the systemclock depending upon power requirements and power availability. Thepower management system 208 provides differing power control mechanisms,such as a sleep mode and a low-power mode, to efficiently utilizeavailable power and to reduce thermal management concerns. Further, thepower management system may include a power source, such as arechargeable battery to provide power and allow the timed ringsuppression device 100 to be portable.

The peripheral controllers of the input/output processor 220 provide aninterface with the attached peripherals including, for example, thevoice/video player 231, voice/video recorder 232, the biometrics sensor233, the display 235 (such as an LCD/LED/CRT display), the keypad 234,and the COMM port 130. The timed ring suppression program 110 maycooperate with the operating system and with the peripherals (e.g.,display 235 and keypad 234) to provide a graphical user interface (GUI)for the timed ring suppression program 110. The GUI provides aconvenient visual and/or audible interface with the user of the timering suppression device 100. As is apparent to those of ordinary skillin the art, the user (e.g., the customer) interacts with the timed ringsuppression program 110 over a variety of mediums, such as, for example,a stylus (shown as reference numeral 355 in FIG. 3), keyboard (shown asreference numeral 350 in FIG. 3), and punch buttons (shown as referencenumerals 330, 335, 340, 342, 344, 346, 348, and 349 of FIG. 3) of thekeyboard system, a display screen (shown as reference numeral 300 ofFIG. 3) of the graphics subsystem, and/or a voice-activated menu prompt(shown as punch button 342 and speaker 360 in FIG. 3) of the audiosubsystem. Additionally, the peripheral bus controller provides aninterface with the biometrics sensor 233, such as, for example, afingerprint ID device. The biometrics sensor 233 may provide securityfeatures that prevent unauthorized users from exploiting the timed ringsuppression device 100. The biometrics sensor 233 could also compriseretina recognition device and software DNA/RNA recognition device andsoftware, facial recognition device and software, speech recognitiondevice and software, and/or scent recognition device and software.

The timed ring suppressor device 100 enables the circuit 145 to suppressthe ringer 150 of telephone 160. If, for example, the timed ringsuppressor device 100 communicates with the telecommunications switch(shown as reference numeral 610 in FIGS. 6, 8-10), the COMM port 236receives the incoming line identification (ICLID) signal transmitted viaphone line 130 with an incoming call. The ICLID signal includestelephone network information provided by a telecommunications provider.When the ICLID signal is received, the digital signal processor 202interfaces with the timed ring suppression program 110 and with theinternal memory device 204 and/or the external memory device 206 toassociate a timed ring suppression profile that matches reference dataof the ICLID signal (e.g., a matching telephone number). The timed ringsuppression program 110 includes the timing parameter for suppressingsubsequent rings of the ringer 150 after the ringer 150 produces aninitial audible alert (e.g., a ring) of the incoming call. Thus, thecustomer (or another receiving party) is always provided an initialaudible alert of the incoming call. Once the timed ring suppressionprofile is associated, the digital signal processor 202 and the clocksource 237 operate with the timed ring suppressor 140 to suppresssubsequent rings of the ringer 150 according to the timing parameter.Alternatively, the timed ring suppressor may be manually activated by apunch button (such as reference numeral 348 in FIG. 3) to suppress oneor more subsequent rings of the ringer 150.

The timed ring suppression program 110 may be physically embodied and/orotherwise stored on or in a computer-readable medium. Thiscomputer-readable medium may include CD-ROM, DVD, tape, cassette, floppydisk, memory card, and large-capacity disk (such as IOMEGA®, ZIP®,JAZZ®, and other large-capacity memory products (IOMEGA®, ZIP®, andJAZZ® are registered trademarks of Iomega Corporation, 1821 W. IomegaWay, Roy, Utah 84067, 801.332.1000, www.iomega.com). Thiscomputer-readable medium, or media, could be distributed toend-customers, licensees, and assignees. These types ofcomputer-readable media, and other types not mention here but consideredwithin the scope of this invention, allow the timed ring suppressionprogram 10 to be easily disseminated.

The processor (such as reference numerals 104 of FIGS. 1 and 204 of FIG.2) is typically a microprocessor. Advanced Micro Devices, Inc., forexample, manufactures a full line of microprocessors, such as theATHLON™ (ATHLON™ is a trademark of Advanced Micro Devices, Inc., one AMDPlace, P.O. Box 3453, Sunnyvale, Calif. 94088-3453, 408.732.2400,800.538.8450, www.amd.com). Sun Microsystems also designs andmanufactures microprocessors (Sun Microsystems, Inc., 901 San AntonioRoad, Palo Alto Calif. 94303, www.sun.com). The Intel Corp orationmanufactures microprocessors (Intel Corporation, 2200 Mission CollegeBlvd., Santa Clara, Calif. 95052-8119, 408.765.8080, www.intel.com).Other manufacturers also offer microprocessors. Such other manufacturersinclude Motorola, Inc. (1303 East Algonquin Road, P.O. Box A3309Schaumburg, Ill. 60196, www.Motorola.com), International BusinessMachines Corp. (New Orchard Road, Armonk, N.Y. 10504, (914) 499-1900,www.ibm.com), and Transmeta Corp. (3940 Freedom Circle, Santa Clara,Calif. 95054, www.transmeta.com).

Referring now to FIG. 3, a perspective front view of the timed ringsuppression device 100 of FIG. 2 includes a display screen 300 havingdisplays for a time 302 a date 304, a numeric identifier 306 of anincoming Caller ID (e.g., ICLID signal) with an incoming call, a numericidentifier 308 of a matched timed ring suppression (TRS) Caller ID(i.e., reference data matched from the ICLID signal with data stored ina timed ring suppression profile), and a graphical user interface 320for accessing, inputting, modifying, and/or otherwise managing a timedring suppression profile. The timed ring suppression device 100 alsoincludes a lighted display panel 310 that flashes to produce a visualalert of an incoming, timed ring suppressed call in an uninterruptedon-hook state (e.g., an incoming call that has activated at least onering of the ringer and subsequently had the ringer silenced by the timedring suppression device 100 such that the call is in an uninterruptedon-hook state). Because the panel would alert the customer of theincoming, time ring suppressed call, the customer (and/or other personwanting to answer the call) would know that the call is still availableto answer even though the ringing is suppressed. Thus, the customerwould know that if they took the phone off-hook (e.g., to answer thecall or to place an outgoing call) then the incoming call would beconnected. The lighted display panel 310 may be part of graphicssubsystem 230 or may be an isolated component. The lighted display panel310, for example, could be remotely located on a wall, ceiling, or tableto provide the visual alert. The lighted display panel 310 could operatevia wireless communication (e.g., infrared and/or the I.E.E.E. 802standards) with the timed ring suppression device 100. The lighteddisplay panel 310 could also operate via a wired connection. Thekeyboard system 232 includes punch buttons 330, 335, 340, 342, 344, 346,348, 349, keyboard 350, and stylus 355. The stylus 355 is connected by acord 358 or other appropriate connection assembly (not shown) to ahousing 370 of the timed ring suppression device 100 and positioned in astorage holder 357 when not in use. The stylus 355 may be used tointeract with the keyboard 350 and/or with the display 300 to access,select, modify, and/or otherwise manage one or more timed ringsuppression profiles. Alternatively, the user could use his/her fingersor other pointed device to select each character from the keyboard 350.With regards to the punch buttons, they provide a convenient interfacefor quickly and conveniently interacting with the timed ring suppressiondevice 100. For example, the user may punch or press (1) a left arrowkey 330 to scroll through recent outgoing calls (e.g., calls dialed fromthe communications device 150) or recent incoming call to select a newtelephone number to add to a timed ring suppression profile, go back astep when interacting with the timed ring suppression program 10, and/orfor other interactions with the timed ring suppression program 110, (2)a right arrow key 335 to scroll forwards through recent outgoing callsor recent incoming call and for other interactions with the timed ringsuppression program 110, (3) a “Input/Modify” button 340 to initiatecomposing or editing one or more timed ring suppression profiles, (4) a“Voice” button 342 to record a voice or other audio message (indifferent embodiments, the audio message may be converted from aspeech-to-text message to compose and/or modify one or more timed ringsuppression profiles and/or to convert a text timed ring suppressionprofile (or a telephone number of the ICLID signal) from text-to-speech(such as with visually impaired customers), (5) a “Save” 344 button tostore one or more timed ring suppression profiles, (6) a “Delete” button346 to erase one or more timed ring suppression profiles, (6) a “SilenceRinger” button 348 to manually activate timed ring suppression of theringer (such as when the incoming call is not associated with the timedring suppression profile to automatically enable timed ringsuppression), and (7) an “Enter” button 349 to enter and/or confirmselection of information displayed on the display screen 300. Further,the “Voice” button 342 interfaces with a speaker/recorder 360 of theaudio system to audibly present and/or record data of the timed ringsuppression profile and to interact with the timed ring suppressionprogram 110 to administer and otherwise manage the timed ringsuppression device 100.

Typically, the customer creates, modifies, and/or otherwise manages oneor more timed ring suppression profiles by punching or pressing the“Input/Modify” button 340 that brings up an interactive “Input TelephoneNumber for Timed Ring Suppression” GUI (similar to GUI 320). Thecustomer may then select to (1) input a new address (e.g., telephonenumber) or (2) access a timed ring suppression caller identificationorganizer that stores and sorts data by (i) a telephone numberassociated with the incoming line identification signal, (ii) anoutgoing telephone number dialed from the communications device, and/or(iii) a name associated with a telephone number, an outgoing telephonenumber, and/or a caller control signal. After the communications addressis input, the customer presses the “Enter” button 349 to enter thecommunications address. After the address(es) is entered, the customermay be prompted by another GUI (not shown) to associate the address witha name and/or with a communications device so that when a call isreceived from that number and matched with the timed ring suppressionprofile, the display 300 provides the telephone number, name,communications device, and/or information such as a date/time of theincoming call, a geographic location identifier of the call, a callingparty control/password to override timed ring suppression, and otherinformation associated with the incoming call. Still further, thecustomer may be prompted by another GUI (not shown) to select a timingparameter that defines the time period for silencing an incoming callfrom a particular communications address. The timing parameter may alsospecify a time period to re-activate the ringer. For example, thecustomer may select to suppress a call from his/her mother after theinitial ring for 18 seconds, and thereafter, to reactivate the ringer.That way the customer knows that his mother's incoming call is stillavailable to answer, and she has not terminated the call (and, thusinfer that the call might be important enough to answer). Anotherexample may be to suppress a call from unknown or blocked numbersindefinitely, that is, after the first ring, all subsequent rings of theincoming call having the unknown or blocked number are suppressed untilthe call is terminated and/or otherwise handled (e.g., answered by voicemessaging system).

FIG. 4 is a similar block diagram of the timed ring suppressor 100 ofFIG. 2; however, the timed ring suppressor 100 of FIG. 4 includes thetelephone 160 that houses the voice/video player 231, the voice/videorecorder 232, the biometrics sensor 233, the keypad 234, the display,and the communications (“comm.”) port. That is, these components areintegral to telephone 160, and, thus are not integrated into theperipheral timed ring suppression device 100 shown in FIG. 3. Forexample, a keypad of a telephone (not shown) may be used instead of thekeypad 350, punch buttons (330, 335, 340, 342, 344, 346, 348, and 349),and stylus 355 of FIG. 2.

FIG. 5 illustrates a timed ring suppression communications systemincluding a calling party's communications device 510, at least onecommunications network 520, and a receiving party's (e.g., thecustomer's) communications device 530 having or coupled with the timedring suppression device 100. The calling party uses communicationsdevice 510 to place a call (or other communication) over communicationsnetwork 520 to the receiving party's communications device 530. A ringer(or other noise making device) of the communications device 530 producesan initial audible alert (e.g., one ring) and an incoming lineidentification (ICLID) signal associated with the incoming call isdetected, decoded, and compared with one or more timed ring suppressionprofiles by the timed ring suppression device 100. If reference data ofthe ICLID signal matches a timed ring suppression profile, then thetimed ring suppression profile specifies a timing parameter (or uses adefault timing parameter) to silence subsequent rings of the ringer forthe incoming call. As discussed above, the timed ring suppressionprofile includes data for communications addresses (incoming andoutgoing calls), names and/or other identifiers of a caller, time, date,geographic and/or other network identification information associatedwith the ICLID signal, identification of the caller's communicationsdevice (e.g., cellular phone, satellite phone, etc.), the timingparameter to suppress ringing, and/or caller control override features.FIG. 6 is similar to FIG. 5; however, the calling party's communicationsdevice is a wireless communications device, such as a cellular phone605. The call from cellular phone 605 is transmitted to an antenna (notshown), then coupled to a mobile switch (also not shown), and thenrouted via switch 610 into the Public Switched Telephone Network (PSTN)620. The PSTN 620 decodes and associates the ICLID signal with the call,and, then routes the call with the ICLID signal to the destinationaddress (e.g., the customer's telephone number) via switch 610 and theincoming call and ICLID signal are transmitted to the timed ringsuppression device 100 and telephone 160.

FIG. 7 illustrates another timed ring suppression communications systemthat includes the calling party's communications device 510 and thereceiving party's device 530 communicating with the communicationsnetwork 520. Neither the calling party's communications device 510 northe receiving party's communications device 530 integrate and/or arecoupled with the timed ring suppression device. Rather, the receivingparty (e.g., customer and/or user) makes use of an access number, webpage, and/or other medium of the telecommunications network to access,create, modify, and/or otherwise manage one or more timed ringsuppression profiles and timed ring suppression services. For example,if the customer calls an access number, the customer is prompted forauthorization and/or identification (e.g., a pin number associated witha billing number, password, and/or other verification information), andthereafter, an interactive voice-activated menu may present options forthe customer to select in order to access stored timed ring suppressionprofiles, compose and/or generate a new timed ring suppression profileincluding inputting one or more communications addresses, names, timingparameters, and/or other data. The telecommunications network 520 storesthe timed ring suppression profile and/or other preferences for timedring suppression of the customer.

Moreover, the timed ring suppression menu presented bytelecommunications network 520 may be programmed over a variety ofmediums, such as, for example, a voice-activated and/or Dual ToneMulti-Frequency (DTMF) menu prompt. The customer, for example, mightselect to access stored timed ring suppression profiles by entering a“1” on a touch-tone keypad or by speaking into a receiving audiosubsystem and stating the word “one.” This entry would then prompt thecustomer through choices such as accessing recently sent and/or recentlyreceived calls, alphanumeric, listings of names for the calling party,and so on. After making a selection, the telecommunications network 520retrieves, the stored timed ring suppression profile from a database(such as reference numeral 845 of FIG. 8). In addition, the customermight enter a code (e.g., “*99”) in order to automatically activatetimed ring suppression for all incoming calls. Similarly the customercould unblock timed ring suppression by entering another code.

FIG. 8 shows a more detailed timed ring suppression communicationssystem that makes use of the communications network to enable, disable,and/or otherwise manage timed ring suppression similar to thecommunications system shown in FIG. 7. The timed ring suppressioncommunications system of FIG. 8 includes the calling party'scommunications device 605 (shown as a cellular telephone), thecommunications switch 610 connected to the, PSTN 620 that includes aservice switching point (SSP) 820, a service control point (SCP) 830, anIntranet 835 (for the telecommunications provider to administer andprogram the telecommunications network components or for the customerto, access and program timed ring suppression services), a timed ringsuppression (TRS) Dataserver 840, a database of one or more timed ringsuppression profiles 845, an Internet Service Provider (e.g., AmericaOn-Line) 850, a data network 860, a gateway 865, a destinationcommunications switch 610, and one or more receiving partycommunications device(s) shown as telephone 160 capable ofcommunications with the telecommunications network and as modem 810 andpersonal computer 800 having the timed ring suppression program 110(referred to as the “Timed Ring Suppression Management Module” in FIG.8) and an Internet Protocol address 805 to enable communications withthe data network 860. Each switch 610 enables the connectedcommunications devices 130, 160, 605, 810, and 800 to communicateelectronic communication signals via the data network 860 (e.g., worldwide electronic data network such as an Internet, an Intranet, and/or anExtranet) and/or the telecommunications network 620 (e.g., a centraloffice (CO), a mobile telephone switching office (MTSO), and/or acombination CO/MTSO). The telecommunications network 620 may use anymeans of coupling one of the switches 610 to the telecommunicationsnetwork 620, but the coupling means is preferably high-capacity,high-bandwidth optical transport services, Gigabit Ethernet services,and/or the like; As those of ordinary skill in the art oftelecommunications understand, the telecommunications network 620 couldalso link each of the switches 610 via other appropriate means, such as,for example a Synchronous Optical Network (SONET) structure withredundant, multiple rings.

The customer may use the TRS Management Module (also referred to as thetimed ring suppression program) 110 running on personal computer 800with Intranet 835 to access and login to the TRS DataServer 840 toestablish a timed ring suppression profile in the database 845.Alternatively, an administrator of the telecommunications network 620could similarly use another personal computer (not shown) and/oralternate workstation (not shown) networked with the Intranet 835 toaccess, add, delete, store, modify, and manage the database 845 of oneor more timed ring suppression profiles. The timed ring suppressionprofiles control access, sharing, notification, routing, security,transactions, troubleshooting, management, and/or additional processingof timed ring suppression profiles exchanged to/from one or morecommunications networks-customers, users, and non-customers. Morespecifically, the timed ring suppression profiles establish preferencesfor enabling timed ring suppression including (1) archiving the timedring suppression profile to a storage device associated with thetelecommunications service provider (so that a database of timed ringsuppression profiles including one or more timed ring suppressionprofiles and/or associated communications addresses are stored), (2)encrypting the timed ring suppression profile (or a portion of the timedring suppression profile) so that only the receiving party'scommunications device can enable timed ring suppression, (3) copying thetimed ring suppression profile (e.g., copying the timed ring suppressionprofile from/to the timed ring suppression device 100 of FIG. 2 to thetelecommunications network 620), and (4) associating the timed ringsuppression profile with a variety of fields, files, and/or other datafor Timed Ring Suppression Services, such as, for example logininformation associated with the customer, user, and/or administrator,password, telephone number(s) or Service Node(s) of the customer (thismay include a plurality of addresses that are associated with a ServiceNode or other switch serving the receiving party's communicationsdevice), TCP/IP address of the customer, email address of the customer,profile of the calling party's communications device associated with thematched timed ring suppression profile (e.g., presentation formats ofvarious communications devices), a time or date identifier (e.g., day ofweek or calendar date), other information associated with the incomingline identification (ICLID) communications signal, display and/orpresentation data associated with a GUI (e.g., color, font, placement onscreen, etc.), telecommunications network defaults, and timed ringsuppression defaults. Typically, the Caller ID Messaging Profileincludes data for (1) the identifier of the calling party (e.g., a nameof the calling party), (2) the identifier of the incoming communicationsaddress (e.g., a phone number of the calling party's telephone), (3) thetime of the incoming call, (4) the date of the incoming call, (5) thegeographic region associated with the incoming call, (6) caller controlfeatures to disable timed ring suppression, (7) the identifier of thecalling party's communications device, (8) other ICLID information, (9)the timing parameter to suppress ringing, (10) other parameters thatenable selective timed ring suppression including times of day and daysof week, and (11) formatting and configuration parameters to enabletimed ring suppression for various communications devices. The data ofthe Timed Ring Suppression Services provide instructions for (1)billing, (2) identification and authentication parameters, (3)parameters to enable and to bypass the disable parameters, (4) memoryservices for stored timed ring suppression profile data, and/or (5)configuration and formatting preferences for each calling party'scommunications device communicating with each communications network. Inaddition, the data for the Timed Ring Suppression Services may includeinstructions for troubleshooting problems including error messages.Thus, TRS DataServer 840 functions as a computer server, database, andprocessor that is dedicated to managing timed ring suppression overother connected networks (e.g., data network 860) to the receivingparty's communications device.

The telecommunications network 620 may include wired, optical, and/orwireless elements and may further include private network elements, suchas private branch exchanges (PBXs), and/or other elements (not shown).The telecommunications network 620 includes Advanced Intelligent Network(AIN) componentry controlling many features of the network. Thetelecommunications network 620 and/or each of the switches 610 couldalso include a packet-based “soft switch” that uses software control toprovide voice, video, and/or data services by dynamically changing itsconnection data rates and protocols types. If the telecommunicationsnetwork 620 and/or one of the switches 610 should include a softswitch,the AIN componentry is replaced by an application server that interfaceswith the softswitch via a packet protocol, such as Session InitiationProtocol (SIP). The means of communicating the timed ring suppressionprofile between or among the receiving party's communications device160, the timed ring suppression device 100, the switches 610 thetelecommunications network 620 including AIN componentry, the datanetwork 860 including the gateway 865, and the calling party'scommunications device 605 include a variety of means, including opticaltransmission of data (e.g., any medium capable of optically transmittingthe data), wireless transmission of data (e.g., wireless communicationsof the data using any portion of the electromagnetic spectrum), and/orfixed-wire transmission of data (e.g., any medium capable oftransmitting electrons along a conductor). Fiber optic technologies,spectrum multiplexing (such as Dense Wave Division Multiplexing),Ethernet and Gigabit Ethernet services, Infrared, the family of IEEE 802standards, and Digital Subscriber Lines (DSL) are just some examples ofthe transmission means. The signaling between the receiving party'scommunications device 160, the timed ring suppression device 100, theswitches 610, the telecommunications network 620 including AINcomponentry, the data network 860 including the gateway 865, and thecalling party's communications device 605, however, are well understoodin by those of ordinary skill the art and will not be further described.Further, those of ordinary skill in the art will be able to apply theprinciples of this invention to their own network configurations whichmay differ substantially from the communications system(s) shown in thefigures.

Once a call is placed from the calling party's communications device 605to the receiving party's communications address (e.g., telephonenumber), the call is routed via switch 610 to telecommunications network620 as described above. The incoming call and other communicationssignals (e.g., ICLID signal) associated with an address of callingparty's communications device 605 arrive at SSP 820. The SSP suspendsprocessing of the call and queries the SCP 830 to determine whether ringsuppression is required. The SCP 830 queries the TRS DataServer 840 forfurther timed ring suppression profile processing and routinginformation. The TRS DataServer 840 accesses the database 845 of timedring suppression profiles to determine if the receiving party'scommunications device subscribes to timed ring suppression and/or toobtain other preferences, instructions, files, and/or associated timedring suppression data. Thereafter, the telecommunications network 620may enable timed ring suppression via switch 610 to the receivingparty's communications device 160. For example, the telecommunicationsnetwork 620 may route the ICLID signal and activate an initial audiblealert to the communications device 160 (according to the matched timedring suppression profile or default timed ring suppression parameters).Thereafter, the telecommunications network silences subsequent rings (oranother subsequent audible alert) according to the matched timed ringsuppression profile (or defaults). Alternatively, the telecommunicationsnetwork 620 may enable timed ring suppression via ISP 750 (or otherconnection) to the data network 860. The data network 860 then enablestimed ring suppression via the gateway 865 to the receiving party's IPcommunications device (e.g., PC 800 and modem 810) via switch 610.Still, another alternative, is for the telecommunications network 620 totransmit controls that enable timed ring suppression directly to thegateway 865 (such as when the timed ring suppression profile associatesa static IP address of the receiving party's IP communications device)to enable timed ring suppression of the receiving party's communicationsdevice via switch 610. In addition to enabling timed ring suppressionprofile, the telecommunications network 620 may also connect the callingparty's communications device with the receiving party's communicationsdevice to establish an available connection. That is, when the receivingparty is alerted (via the initial audible alert, the visual alert,and/or a subsequent alert after timed ring suppression) of the incomingcommunication, the receiving party can answer the incoming communicationfrom the calling party. For example, the receiving party may review theCaller ID after the initial audible alert and see the lit display panelto know that the call is still on-hook (even though there isn't acontinuous audible alert to indicate availability), and then decide toanswer the call to have a conversation with the calling party.

FIG. 9 is a schematic of a timed ring suppression communications systemsimilar to the communications system disclosed in FIG. 8; however, thetimed ring suppression communications system of FIG. 9 illustratesalternate receiving party communications devices 910 that include aPersonal Digital Assistant (PDA) 911, an IP phone 912, a modem 913, aninteractive pager 914, a global positioning system (GPS) 915, an MP3/4player 916, a digital signal processor (DSP) 917, an interactivetelevision 918, and a satellite phone 919. Regardless of the receivingparty's communications device (reference numerals 160, 530, 800, 810 and911-919), the telecommunications network 620 enables timed ringsuppression and enables communications with the receiving party'scommunications device (including audio, text (e.g., ASCII), video, otherdigital formats, and combination thereof). Accordingly, thetelecommunications network may include and/or be coupled with amulti-protocol communications interface that acts as a gateway to enabletimed ring suppression. For example, if the receiving party'scommunications device uses the Wireless Application Protocol (WAP)technique, then timed ring suppression is enable and communications usethe Wireless Mark-up Language (WML) as known in the art. The WirelessMark-up Language (WML) and the WAP technique are known and will not befurther described. This is a description of a solution for a specificwireless protocol, such as WAP. This solution may be clearly extended toother wireless protocol, such as i-mode, VoiceXML (Voice eXtensibleMarkup Language), Dual Tone Multi-Frequency (DTMF), and other signalingmeans.

This invention further provides for caller control systems and methodsto override timed ring suppression. For example, the calling party mayplace an incoming call to a telephone number of the receiving party'scommunications device that has activated timed ring suppression(activated either by way of the customer's hardware and equipment—thetimed ring suppression device 100—or by way of the communicationsnetwork—the TRS services of PSTN 620). The calling party enters aninterrupt code that authorizes interruption or disabling of timed ringsuppression and connects the incoming call while maintaining acontinuous alert/indicator of the incoming call, and, thus overridessuppression of the ringer 150 (or other indicator) according to thetiming parameter. The interrupt code entered by the calling party isreceived in a communications network, such as, for example the PublicSwitched Telephone Network (PSTN) 620. Alternatively, the interrupt codemay be received by another communications network, such as a mobileswitching network, a satellite network, a data communications network(e.g., internet, intranet, and/or extranet), and other networksproviding communications. The communications network detects, decodes,and processes the incoming communications signal and the interrupt codewith a timed ring suppression profile associated with the receivingparty's communications device. If the communications network verifiesauthorization to interrupt or disable timed ring suppression, then theincoming communications signal and/or an interrupt timed ringsuppression signal are transmitted to the receiving party'scommunications device so that the incoming call is connected and thereceiving party's communications device provides a continuous alert(e.g., ringing) despite the receiving party's communications devicehaving activated timed ring suppression services (e.g., to silencesubsequent alerts of an incoming communication according to a timedparameter). Further, the communications network may send a notificationmessage to the receiving party's communications device to notify a userthat timed ring suppression is interrupted and/or disabled. For example,the notification message may be sent instead of a caller identificationmessage so that a caller identification device or the timed ringsuppressor 100 (via screen 300) displays “TRS OVERRIDE” to alert thereceiving party that the caller has disabled timed ring suppression.

According to an embodiment, a caller controlled timed ring suppressionsystem includes a communications dataserver (such as TRS DataServershown as reference numeral 840 in FIGS. 8-9) communicating with acommunications network (such as Public Switched Telephone Network (PSTN)shown are reference numeral 620 in FIGS. 6, 8-9) for detecting,decoding, and communicating an incoming communications signal on acommunications link from a calling party's communications device to areceiving party's communications device and includes a timed ringsuppression application communicating with at least one of thecommunications network, the communications dataserver, and the receivingparty's communications device. The communications dataserver stores atimed ring suppression profile that includes a telephone number, adirectory name, a date/time identifier, a geographical identifier, acaller control interrupt code, and a timing parameter for suppressing acommunications indicator of the receiving party's communications deviceafter the receiving party's communications device activates thecommunications indicator to produce an initial alert of the incomingcommunications signal. The timed ring suppression application generatesa timed ring suppression signal that is communicated to the receivingparty's communications device (and/or to a switch) to suppresssubsequent alerts by the communications indicator of the incomingcommunications signal according to the timed ring suppression profile.Further, the timed ring suppression application further generates aninterrupt timed ring suppression signal in response to receiving thecaller control interrupt code from a calling party. The interrupt timedring suppression signal is communicated to the receiving party'scommunications device to temporarily disable the timed ring suppressionsignal such that the communications indicator maintains a continuous,uninterrupted alert of the uninterrupted, on-hook incomingcommunications signal. According to another embodiment, a callercontrolled timed ring suppression system includes a calling party'scommunications device that transmits an incoming communications signalto a communications network, and the communications network communicatesthe incoming communications signal and/or an interrupt timed ringsuppression signal to a receiving party's communications device. Thecommunications network may process an incoming line identification(ICLID) signal of the incoming communications signal to generate aninterrupt timed ring suppression signal and transmit the incomingcommunications signal and/or the interrupt timed ring suppression signalto the receiving party's communications device. Further, the interrupttimed ring suppression signal is communicated to the receiving party'scommunications device having a timed ring suppressor (externally coupledand/or integrated) and operates to override a timed ring suppressor of atimed ring suppression device such that when the incoming communicationssignal is communicated to the receiving party's communications device,the receiving party's communications device presents a continuousindicator of the incoming communications signal while the communicationssignal is in an uninterrupted, on-hook state.

FIG. 10 is a block diagram showing another embodiment of the timed ringsuppression device similar to the timed ring suppression device of FIG.1; however the timed ring suppression device of FIG. 10 includes asystem controller 1002, processor 1004, memory system 1006 includingdatabase 1008 and timed ring suppression management module 1010 (alsoreferred to as the timed ring suppression program), graphics system1020, keyboard system 1022, audio system 1024, an interface with aringer of a communications device 1030, a timed ring suppressor 1040, aclock 1045, a wireless communications device transceiver 1050, a wiredcommunications device port/connection 1055, and a power source 1060. Thesystem controller 1002 provides a bridging function between theprocessor, the graphics subsystem 1020, the keyboard subsystem 1022, theaudio subsystem 1024, the memory subsystem 1006, the timed ringsuppressor 1014, and the interface 1030. The interface 1030 may includea peripheral bus controller that is an integrated circuit serving as aninput/output hub for various peripheral ports. These peripheral portsenable the timed ring suppressor to control and to communicate with avariety of communications devices through Wireless Comm DeviceTransceiver 1030 (such as Wireless 802.11 and Infrared) and Wired CommDevice Port 1055 (such as modem V90+ and compact flash slots). Inaddition, the stored one or more timed ring suppression profiles may bestored by local memory system 1006 or by a peripheral storage device(such as TRS DataServer 840 shown in FIG. 8). According to anembodiment, the Comm Port 1055 may communicate with a communicationsnetwork (such as reference numeral 520 of FIG. 5) and transmit the timedring suppression profile. In an alternate embodiment, the Comm Port 1055may format the timed ring suppression profile for a connected orintegrated communications device (via the Wireless Comm DeviceTransceiver 1050 and/or Wired Comm Device Port/Connection 1055), and,the connected or integrated communications device would then initiatecommunications with the communications network and transmit the timedring suppression profile (via the connected or integrated communicationsdevice). Still, in another alternated embodiment, the interface 1030 mayinclude intelligent componentry that detects or otherwise identifies thereceiving party's communications device and formats or otherwiseconfigures the timed ring suppression profile or enables timed ringsuppression for the receiving party's communications device.

FIG. 11 is another block diagram of a manually-activated timed ringsuppression device that includes the timed ring suppressor 140 andcircuit 145 coupled with ringer 150 of telephone 160. The timed ringsuppressor 140 is enabled to open circuit 145 to prevent current/voltagefrom flowing to the ringer 150, and, thus, silence subsequent ringing ofan uninterrupted on-hook call after the call has initially activated theringer. For example, the timed ring suppressor 140 could be a punchbutton that the customer presses after an incoming call produces anaudible alert (e.g., a ring). Thereafter, subsequent ringing issuppressed for a selected timing parameter. For example, if the timingparameter is set at 12 seconds (approximately two ring cycles), then thecustomer could press the timed ring suppressor 140 to silence the ringerfor 12 seconds, and, if the ringing resumed, then press the timed ringsuppressor 140 again to silence the ringer for another 12 seconds.

FIGS. 12 and 13 are flowcharts showing processes of providing timed ringsuppression according to embodiments of this invention. While theprocesses in FIGS. 12 and 13 are shown in series, these processes mayoccur in different orders and/or at simultaneous times as one ofordinary skill in the art will understand.

A customer uses a timed ring suppression device 100 (such as referencenumeral 100 of FIG. 3) to access, create, modify, and/or otherwisemanage a timed ring suppression profile to enable timed ring suppression[block 1210]. Alternatively, the customer could used a communicationsdevice and a communications network (such as reference numerals 160 and620 of FIG. 6) to access, create, modify, and/or otherwise manage atimed ring suppression profile to enable timed ring suppression. Once anincoming call is detected, the ICLID signal (and/or other reference dataof the incoming call) is decoded [block 1220] and compared with one ormore timed ring suppression profiles [block 1230]. If a timed ringsuppression profile matches the ICLID signal, the timed ring suppressionprofile is used to determine if there is a timing parameter for timedring suppression [block 1240]. If there is a timing parameter, then thenext step is to determine if the calling party inputs a timed ringsuppression interrupt code to disable timed ring suppression [block1320]. If the calling party does not enter a timed ring suppressioninterrupt code, then the timing parameter specifies the time period(s)for silencing and/or re-activating the ringer (or other audible alert)of the communications device and the ringer is suppressed according tothe timing parameter [block 1330] and the call is processed according toother call handling options [block 1340]. If the ICLID signal is notmatched with a timed suppression profile or if the timed suppressionprofile does not specify a timing parameter, then the process determinesif there are defaults for timed ring suppression [block 1310]. If thereare defaults for timed ring suppression, then the process stilldetermines if the calling party inputs the timed ring suppressioninterrupt code [block 1320]. If the calling party does not input thetimed ring suppression interrupt code, then the default timing parameterspecifies the time period(s) for silencing and/or re-activating theringer (or other audible alert) of the communications device and theringer is suppressed according to the timing parameter [block 1320].Thereafter, the call is processed according to other call handlingoptions associated with the ICLID signal (or other reference data) ofthe incoming call (e.g., voice mail) [block 1340]. If there are notdefaults for timed ring suppression, then the ringer remains activated(continuous ringing) and the call is connected to the communicationsdevice [block 1350]. Finally, if the calling party inputs the timed ringsuppression interrupt code [block 1320], then the interrupt code isverified (by the communications network and/or timed ring suppressiondevice) to override timed ring suppression [block 1360] and thereafter,the ringer remains activated (continuous ringing) and the call isconnected to the communications device [block 1350].

While several exemplary implementations of embodiments of this inventionare described herein, various modifications and alternate embodimentswill occur to those of ordinary skill in the art. For example, the nextgeneration “softswitch” simply replaces the SCP with an “applicationserver.” This application server is a conventional computer server thatalso includes triggers for telecommunications services so that “newentrants” into telecommunications services (e.g., new telecommunicationsservice providers) don't have to purchase an expensive SSP and/or SCP toprocess telephone calls. This next-generation packet network representsan alternative operating environment for the network enabled timed ringsuppression systems, methods, programs, and apparatuses. Here thetelecommunications switch includes a packet-based “softswitch.” This“softswitch” uses software control to provide voice, data, and videoservices by dynamically changing its connection data rates and protocolstypes. An application server interfaces with the “softswitch” via apacket protocol, such as Session Initiation Protocol (SIP). Thisapplication server includes voice service protocols, triggers, andoperations that allow the PSTN and the data network (e.g., the worldwide electronic communications network) to interoperate. Still, anotherexample is using the timed ring suppression systems and methods toselectively activate and deactivate subsequent incoming call indicators(e.g., a vibrator, a lighted panel, a heat sensor, and/or otherindicators to alert the customer of an incoming call) according to thetiming parameter. Accordingly, this invention is intended to includethose other variations, modifications, and alternate embodiments thatadhere to the spirit and scope of this invention.

1. A timed ring suppression system, comprising: a telecommunicationsserver in communication with a communications network, thetelecommunications server processing an incoming communication, theincoming communication from a calling telephone number to a calledtelephone number associated with a receiving party's communicationsdevice, the incoming communication comprising an incoming lineidentification (ICLID) signal, the telecommunications server alsoprocessing a timed ring suppression signal for the called telephonenumber, the timed ring suppression signal for suppressing a ringer ofthe receiving party's communications device after the receiving party'scommunications device activates the ringer to produce an initial audiblealert of the telephone call such that subsequent audible alerts aresilenced according to a timing parameter wherein the timed ringsuppression signal is communicated by the communications network to thecalled telephone number associated with the receiving party'scommunications device such that the ringer of the receiving party'scommunications device produces the initial audible alert and such thatsubsequent audible alerts are silenced according to the timingparameter.
 2. The system of claim 1, wherein the timing parameter rangesfrom approximately one second to approximately two minutes.
 3. Thesystem of claim 1, wherein the timing parameter is greater than twominutes.
 4. A method for timed ring suppression, comprising the stepsof: processing a communications signal, the communications signal from acalling party communications device to a receiving party communicationsdevice via a communications network; associating an incoming lineidentification (ICLID) signal with the communications signal;associating a timed ring suppression profile with the ICLID signal, thetimed ring suppression profile comprising (i) an identifier of a callingparty, (ii) a communications address, (iii) an identifier of a callingparty's communications device, (iv) a timing parameter for suppressing aringer of a communications device after the communications devicereceives the incoming communications signal and after the communicationsdevice activates the ringer to produce an initial audible alert; andgenerating a timed ring suppression signal, the timed ring suppressionsignal silencing subsequent audible alerts of the incoming communicationaccording to the timing parameter, the timed ring suppression signalreactivates the ringer to produce subsequent unsuppressed audible alertsaccording to the timing parameter wherein the timed ring suppressionsignal is communicated via the communications network to the receivingparty communications device such that the timed ring suppression signalsilences subsequent audible alerts of the incoming communicationaccording to the timing parameter, and such that the timed ringsuppression signal reactivates the ringer to produce subsequentunsuppressed audible alerts according to the timing parameter.
 5. Themethod of claim 4, further comprising the steps of: communicating atleast one of the communications signal and the timed ring suppressionsignal to the receiving party communications device; allowing the ringerof the communications device to produce an initial audible alert; andsuppressing subsequent audible alerts of the ringer according to thetiming parameter.
 6. The method of claim 4, further comprising the stepof: presenting data associated with at least one of the communicationssignal and the timed ring suppression signal to the communicationsdevice.
 7. The method of claim 4, wherein the step of generating thetimed ring suppression signal comprises generating the timed ringsuppression signal according to the timing parameter, the timingparameter ranging from approximately one second to approximately twominutes.
 8. The method of claim 4, wherein the step of generating thetimed ring suppression signal comprises generating the timed ringsuppression signal according to the timing parameter, the timingparameter greater than two minutes.
 9. The method of claim 4, furthercomprising the step of: reactivating the ringer to produce subsequentunsuppressed audible alerts of the ringer according to the timingparameter.
 10. A communications method, comprising the steps of:receiving an incoming communications signal from a calling party'scommunications device to a communications network, the communicationsnetwork comprising a database of one or more timed ring suppressionprofiles; and using the incoming communications signal and a timed ringsuppression profile to generate a timed ring suppression signal, thetimed ring suppression signal comprising (i) an identifier of timed ringsuppression reference data and (ii) a timing parameter for suppressingan incoming communications indicator of the receiving partycommunications device after the receiving party communications deviceactivates the incoming communications indicator to produce an alert ofthe incoming communications signal, wherein the identifier of timed ringsuppression reference data comprises (i) a telephone number, (ii) adirectory name, (iii) a date/time identifier, (iv) a geographicalidentifier, and (v) a caller control signal and wherein the incomingcommunications indicator comprises at least one of (i) an audibleindicator, (ii) a vibrator, (iii) a visual indicator, and (iv) a sensoryindicator.
 11. The method of claim 10, further comprising the step of:communicating at least one of the incoming communications signal and thetimed ring suppression signal to a receiving party's communicationsdevice.
 12. The method of claim 10, further comprising the step of:using the timed ring suppression signal to silence subsequent alerts ofthe incoming communications signal according to the timing parameter,the timing parameter ranging from approximately one second to greaterthan one second.
 13. The method of claim 10, further comprising the stepof: using the timed ring suppression signal to reactivate the incomingcommunications indicator to produce subsequent unsuppressed alertsaccording to the timing parameter.