Unrecognized number identifier

ABSTRACT

Communication address identification information is obtained. A communication address number is collected from a customer at a telecommunications apparatus in response to a trigger being initiated at a switch and a connection being established between the switch and the telecommunications apparatus. Communication address identification information is obtained from a memory in response to collecting the communication address number from the customer. The communication address identification information is returned to the customer when communication address identification information corresponding to the communication address number is available at the memory.

This application is a continuation application of pending U.S. patentapplication Ser. No. 10/200,977, filed on Jul. 24, 2002, the disclosureof which is expressly incorporated herein by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an information service in atelecommunications environment. More particularly, the present inventionrelates to a telecommunications system and method for a calling party toobtain information when the calling party dials a service number andprovides an unrecognized number corresponding to the information soughtby the calling party.

2. Background Information

A need exists to ascertain information associated with an unrecognizednumber. For example, when a customer of a telecommunications serviceprovider receives a phone bill, the customer may see an unrecognizednumber. The customer may wish to ascertain information associated withthe unrecognized number, such as the name and address of the subscribercorresponding to the unrecognized number, without first calling thenumber directly.

Additionally, a customer of a telecommunications service provider mayreceive a phone call and need to ascertain information associated withan unrecognized number, such as when an emergency call center receives acall from a wireless subscriber number, the call is hung-up or dropped,and the emergency call center is not able to successfully call back thewireless subscriber to obtain additional information.

Currently, the customer of a telecommunications service provider mayobtain the information associated with a listed unrecognized number bycalling a telecommunications service provider's business office andmaking an inquiry through a business agent. However, manually answeringinquiries to determine the associated information is an inefficient useof telecommunications service provider manpower. In addition, customersrequesting information may waste time waiting for a customer servicerepresentative at the business office to answer the phone, determinewhether the information exists, and provide the information if itexists.

In some areas, an automated service may be provided for customers toobtain information associated with a listed unrecognized number. Forexample, a customer in Chicago, Ill. may dial 796-9600 in order toconnect with an interactive service that associates an unrecognizednumber with information of a corresponding subscriber. However, becausethe 796-9600 number corresponds to a terminating number, the process ofactivating any service logic, including performing a database inquiry,may only be possible after a connection is made to 796-9600. In otherwords, 796-9600 does not take advantage of features of an AdvancedIntelligent Network (AIN) that uses dispersed network resources tohandle the call. Accordingly, the 796-9600 service may be limited byequipment constraints or prohibitive equipment requirements.

Additionally, a person may use the World Wide Web by, for example,visiting whitepages.com or reversephonedirectory.com and entering anunrecognized number to determine if the unrecognized number is listedand obtain information corresponding to the number if the number islisted. Information for unlisted numbers may not be accessiblewhatsoever on the World Wide Web due to privacy concerns or legalrestrictions, even if the person making the inquiry is legallyauthorized to obtain such information.

Accordingly, customers may be willing to incur a monthly charge or acharge each time they call an unrecognized number identifier service todetermine information associated with a listed number. An automatedmethod and system for obtaining the associated information may turn anunprofitable service into a profitable service for a telecommunicationsservice provider. Moreover, using a shortened dialing pattern willlikely lead to increased usage as customers can more readily rememberthe number associated with the service.

A telecommunications system and method are needed for automaticallyobtaining information associated with a listed number so that theinformation associated with the listed number may be easily provided toa telecommunications service provider customer when a shortened dialingpattern is entered and the unrecognized number is provided. In addition,a telecommunications system and method are needed for automaticallyobtaining information associated with an unlisted number so that theinformation associated with the unlisted number may be provided to anauthorized party, such as a public safety official or an authorizedlegal authority.

To solve the above-described problems, a telecommunications system andmethod are provided for providing an unrecognized number identificationservice in a telecommunications environment.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is further described in the detailed descriptionthat follows, by reference to the noted drawings by way of non-limitingexamples of embodiments of the present invention, in which likereference numerals represent similar parts throughout several views ofthe drawing, and in which:

FIG. 1 shows an exemplary telecommunications network architecture forthe unrecognized number identifier service, according to an aspect ofthe present invention;

FIG. 1 a shows an improved exemplary telecommunications networkarchitecture for the unrecognized number identifier service of FIG. 1,according to an aspect of the present invention;

FIG. 2 shows another exemplary telecommunications network architecturefor the unrecognized number identifier service, according to an aspectof the present invention;

FIG. 3 shows an improved exemplary telecommunications networkarchitecture for the unrecognized number identifier service of FIG. 1,according to an aspect of the present invention;

FIG. 4 is a flow diagram showing a method for using the unrecognizednumber identifier service, according to an aspect of the presentinvention;

FIG. 5 is a flow diagram showing exemplary service logic, according toan aspect of the present invention.

FIG. 6 is an exemplary call flow diagram showing the various steps forcompleting a call using the unrecognized number identifier service.

DETAILED DESCRIPTION OF THE INVENTION

In view of the foregoing, the present invention, through one or more ofits various aspects, embodiments and/or specific features orsub-components, is thus intended to bring out one or more of theadvantages as specifically noted below.

In one aspect of the invention, a telecommunications method is providedthat obtains subscriber identification information in atelecommunications environment using a subscriber number input by acustomer calling a subscriber identification information service. Atrigger is initiated at a switch based upon receiving a shortenedtelephone number provided by the customer. In response to the trigger,the subscriber number is collected from the customer. A query using thesubscriber number is forwarded to the memory apparatus in response toreceiving the subscriber number from the customer. The subscriberidentification information is forwarded to the customer when thesubscriber identification information corresponding to the subscribernumber is available at the memory apparatus for the customer. A messageis forwarded to the customer indicating that the subscriber number isunlisted when subscriber identification information corresponding to thesubscriber number is unlisted.

In another aspect of the present invention, the subscriberidentification information is received from the memory apparatus as adata signal at an intelligent peripheral and translated into an audiblesignal.

In a further aspect of the present invention, an audible instruction toprovide the subscriber number information is forwarded from anintelligent peripheral to the customer.

In still another aspect of the present invention, a query is received ata service control point based on the trigger initiated at the switch. Inresponse to the query, the service control point may instruct theintelligent peripheral to forward the audible instruction to thecustomer to provide the subscriber number.

In still another aspect of the present invention, a determination ismade whether the customer is authorized to receive subscriberidentification information corresponding to an unlisted subscribernumber.

In yet another aspect of the present invention, the determinationincludes receiving a line indicator that indicates a type of line usedby the customer.

In another aspect of the present invention, connecting the customer toan intelligent peripheral includes initiating a call connection from theswitch to the intelligent peripheral.

In a further aspect of the present invention an option message isforwarded to the customer. The option message includes options toprovide a new subscriber number, to terminate the call, and to provideauthorization information.

In still another aspect of the present invention, the query to thememory apparatus is forwarded from an intelligent peripheral via aservice control point. The service control point receives a responsefrom the memory apparatus and determines whether subscriberidentification information is available.

In another aspect of the present invention, a telecommunications systemis provided that obtains subscriber identification information using asubscriber number input by a customer calling a subscriberidentification information service. The system includes a switch thatinitiates a trigger based upon receiving a shortened telephone numberprovided by the customer. The switch forwards a first query to a servicecontrol point to obtain routing instructions and the switch routes thecall based on the routing instructions received from the service controlpoint. The system also includes an intelligent peripheral that receivesthe call from the switch. The intelligent peripheral forwards a secondquery using the subscriber number to the memory apparatus in response toreceiving the subscriber number from the customer. The intelligentperipheral forwards subscriber identification information correspondingto the subscriber number to the customer when the subscriberidentification information is available at the memory apparatus for thecustomer. When the subscriber identification information is unlisted,the intelligent peripheral forwards a message to the customer indicatingthat the subscriber identification information is unlisted.

In still another aspect of the present invention, the intelligentperipheral includes a text-to-speech processor that receives thesubscriber identification information from the memory apparatus as adata signal and translates the subscriber identification informationinto an audible signal.

In yet another aspect of the present invention, the system includes asecurity apparatus that determines whether the customer is authorized toreceive subscriber identification information corresponding to anunlisted subscriber number.

In another aspect of the present invention a call connection isinitiated from the switch to the intelligent peripheral.

In a further aspect of the present invention, the second query to thememory apparatus is forwarded from the intelligent peripheral via theservice control point. The service control point receives a responsefrom the memory apparatus and determines whether subscriberidentification information is available.

In another aspect of the present invention, a telecommunications systemis provided that obtains subscriber identification information using asubscriber number input by a customer calling a subscriberidentification information service. The system includes a switch thatforwards a first query to obtain routing instructions for the call basedupon receiving a shortened telephone number provided by the customer.The system also includes a service control point that receives the queryfrom the switch, causing the service control point to obtain a routinginstruction for the call. The service control point forwards the routinginstruction for the call to the switch. The system further includes anintelligent peripheral that receives the call from the switch based uponthe routing instruction from the service control point. The intelligentperipheral forwards a second query using the subscriber number to thememory apparatus in response to receiving the subscriber number from thecustomer. The intelligent peripheral forwards subscriber identificationinformation corresponding to the subscriber number to the customer whenthe subscriber identification information is available at the memoryapparatus for the customer. When the subscriber identificationinformation is unlisted, the intelligent peripheral forwards a messageto the customer indicating that the subscriber identificationinformation is unlisted.

In yet another aspect of the present invention, the intelligentperipheral includes a text-to-speech processor that receives thesubscriber identification information from the memory apparatus as adata signal and translates the subscriber identification informationinto an audible signal.

In still another aspect of the present invention, the system includes asecurity apparatus that determines whether the customer is authorized toreceive subscriber identification information corresponding to anunlisted subscriber number.

In a further aspect of the present invention, the service control pointinstructs the intelligent peripheral to forward an audible instructionto the customer to provide the subscriber number.

In another aspect of the present invention, a computer readable mediumis provided for storing a computer program that obtains subscriberidentification using a subscriber number input by a customer calling asubscriber identification information service. The computer readablemedium includes a signal receiving source code segment that receives asignal from a switch that is sent in response to the switch receiving ashortened telephone number provided by the customer. The signalreceiving source code segment determines a routing instruction for thecall and forwards the routing instruction to the switch to connect thecustomer to an intelligent peripheral. The computer readable medium alsoincludes an information requesting source code segment that causes arequest for subscriber information to be forwarded to a memory apparatuswhen the intelligent peripheral receives the subscriber number from thecustomer. The computer readable medium further includes an informationtransmission source code segment that causes the intelligent peripheralto forward subscriber information to the customer when subscriberidentification information corresponding to the subscriber number isavailable at the memory apparatus. When the subscriber identificationinformation is unlisted, the information transmission source codesegment causes the intelligent peripheral to forward a messageindicating that the subscriber number is unlisted.

In another aspect of the present invention, the computer readable mediumincludes an authorization determination source code segment thatdetermines whether the customer is authorized to receive subscriberidentification information corresponding to an unlisted subscribernumber.

In still another aspect of the present invention, the computer readablemedium includes an instruction source code segment that instructs theintelligent peripheral to forward a message to the customer requestingthat the customer provide the subscriber number.

In another aspect of the present invention, a computer readable mediumis provided for storing a computer program that obtains subscriberidentification using a subscriber number input by a customer calling asubscriber identification information service. The computer readablemedium includes an element instructing source code segment that causes anetwork element to request that a customer provide the subscriber numberwhen the call is received from a switch in response to the switchreceiving a shortened telephone number provided by the customer. Thecomputer readable medium also includes an information requesting sourcecode segment that forwards a query to a memory apparatus when thenetwork element receives the subscriber number from the customer. Thecomputer readable medium further includes an information transmittingsource code segment that causes the subscriber identification to beforwarded to the customer when subscriber identification informationcorresponding to the subscriber number is available at the memoryapparatus for the customer. When the subscriber identificationinformation is unlisted, the information transmitting source codesegment causes a message to be forwarded indicating that the subscribernumber is unlisted.

In still another aspect of the present invention, the computer readablemedium includes an authorization source code segment that determineswhether the customer is authorized to receive subscriber identificationinformation corresponding to an unlisted subscriber number.

A telecommunications system is provided for routing telephone calls to asystem component of a telecommunications service provider's network inresponse to a customer's attempt to ascertain information related to anunrecognized number. The telecommunications system includes an advancedintelligent network (AIN) in which service logic is provided at servicecontrol points (SCPs) that receive queries from service switching points(SSPs).

A service switching point is connected to an individual communicationsdevice, such as a phone, fax or modem, and responds to particulardialing patterns or sequences. The service switching point triggers whenit detects a predetermined dialing pattern and sends a query to theservice control point. The query to a service control point results inan instruction to forward the call from the service switching point toan intelligent peripheral. The intelligent peripheral may includeinteractive voice response functionality that instructs the customer toinput data by punching a keypad of the customer's phone. The intelligentperipheral may also include a text-to-speech processor that convertstext data to audible signals that can be presented to the customer.

When the intelligent peripheral receives data from the customer, theintelligent peripheral performs a database lookup based on the receiveddata. In response to the query to the database, the intelligentperipheral is either notified that information corresponding to the datais unavailable, or the intelligent peripheral receives a signal with theinformation corresponding to the data. The intelligent peripheral thenplays an audible message to the customer. For example, when the datacorresponds to an unlisted number the intelligent peripheral returns apre-recorded message to the customer informing the customer that thenumber is unlisted. The message may also instruct the customer to hangup, or include a statement such as “Thank you for calling”.

If the data corresponds to a listed number, the intelligent peripheralwill convert the retrieved information associated with the listed numberinto a voice message, and forward the message to the customer via theservice switching point. The message may include informationcorresponding to the listed number, such as a name and address of asubscriber associated with the listed number.

Additionally, data may be stored among multiple databases andapportioned among the databases according to any criteria desired by atelecommunications service provider. For example, separate databases maybe provided for listed and unlisted numbers, land-based phone lines andwireless phones, different geographic areas, or differenttelecommunications service providers. Additional databases can be usedto increase storage space, decrease processing requirements, or enhanceprivacy.

Interactive voice response units typically interact with a customer byreceiving standard dual tone multi-frequency (DTMF) signals from thecustomer's communication device and providing audible instructions andother messages to the customer. In the alternative, an intelligentperipheral may be provided with speech recognition functionality, suchas Nuance speech recognition software, available from NuanceCommunications of Menlo Park, California, in addition to interactivevoice response functionality. The speech recognition software mayreceive and interpret voice input from the customer. Accordingly, anintelligent peripheral may receive and interpret voice input from thecustomer and/or touch tone DTMF signals, as long as the intelligentperipheral has an interactive voice response capability and speechrecognition software. Of course, any comparable speech recognitionsystem may likewise be incorporated into the system.

The speech recognition functionality captures analog voice signals ofthe customer and converts the voice signals to digital data which may bestored in relation to the customer's call. The data is segmented, orarranged into recognizable patterns, and compared to previously storedmodels of words to be recognized. Furthermore, speech recognitionfunctionality may include multiple languages, such as English, Spanishand Polish.

In an embodiment, Nuance Verifier 3.0 software may be incorporated intothe intelligent peripheral to further enable verification based on thecustomer's voice print, enabling efficient authentication, in additionto conventional speech interaction. Speech verification software is usedto verify a customer's identity before providing the customer access tosensitive information, such as information associated with an unlistednumber.

As is explained herein, an intelligent peripheral may communicate withcomponents of the public switched telephone network (PSTN). Theintelligent peripheral may internally translate data messages receivedfrom the service control point through the SR-3511 protocol, the use ofwhich enables simultaneous compatibility with interactive voice responsefunctionality. Details of the SR-3511 protocol are provided inTelcordia, Recommendations SR-3511 SCP Intelligent Peripheral (IP)Interface Specification for TCP/IP, Version 5.0(January, 1997), thedisclosure of which is expressly incorporated by reference herein in itsentirety. In an embodiment, the translation program is coded in eitherC, C++or JAVA.

FIG. 1 shows an exemplary service architecture of the telecommunicationssystem of the present invention. As shown, a customer using acommunication device 101, goes off hook and dials a shortened number,such as *99, to inquire for information associated with an unrecognizednumber. The telecommunications device is connected to a serviceswitching point 110 that responds to particular dialing patterns orsequences by generating a query. By way of example, the serviceswitching point may be a 1 AESS switch or 5ESS manufactured by LucentTechnologies, Inc.; DMS-100 switches manufactured by Nortel NetworksCorporation (Nortel); AXE-10 switches manufactured byTelefonaktiebolaget LM Ericsson, or EWSD switches available from SiemensInformation and Communication Networks, Inc. The switches may utilizeAIN protocol. However, embodiments of the present invention may includeswitches, such as ATM switches, that are incorporated into anyalternative telecommunications technology.

According to the present invention, each service switching point 110 isset with an originating trigger that responds to a shortened number,such as *99. Exemplary triggers include the Public Office Dialing Plan(PODP) feature code trigger, which is used with the Ericcson AXE-10, theNortel DMS-100, the Siemens EWSD, the Lucent Technologies 5ESS and theLucent Technologies 1AESS service switching point. In response to thetrigger, the service switching point suspends the call and launches aInfo Analyzed query to the service control point 130 through signalingtransfer points (not shown).

The service switching point 110 and the service control point 130communicate with each other using a standard interface protocol. In anembodiment, the interface protocol used by the service switching point110 and the service control point 130 to communicate is AIN protocol.

In response to receiving the query from the service switching point 110,the service control point 130 processes the query and transfers controlto common service logic, which determines a routing solution for thecall. Exemplary service control points 130 include the TelcordiaIntegrated Service Control Point Current Generation Platform (ISCP)(CGP); the ISCP Next Generation Platform (NGP); the Lucent AdvantageService Control Point (LSCP) and Service Package Application (SPA); orthe Telcordia Integrated Service Control Point (ISCP), loaded with ISCPsoftware, available from Telcordia, Murray Hill, N.J.

The call flow logic of the present invention may be upgraded toaccommodate future AIN releases and protocols and future trigger types.Specifications of AIN SSPs may be found in Telcordia GR-1299-CORE,Switch-Service Control Point Application Protocol Interface GenericRequirements, and Telcordia Technical Reference GR-1298-CORE, AINSwitching Systems Generic Requirements, the disclosures of which areexpressly incorporated by reference herein in their entireties.

In response to the query, the service control point 130 executes itsinternal Called Number Identifier service logic and signals back to theinquiring service switching point 110 a Forward Call response with thedestination routing number corresponding to the intelligent peripheral140. Exemplary intelligent peripherals include a servicenode/intelligent peripheral, such as an IBM Resource Manager, a LucentCompact Service Node or a Lucent Enhanced Media Resource Server (eMRS).

The service switching point forwards the call to the intelligentperipheral 140 through the switching network. The service control point130 also instructs the intelligent peripheral 140 to play anintroductory message to the customer. The introductory message mayinclude a request for the customer to input the digits of theunrecognized number.

The customer responds by providing the digits of the unrecognized numberby, for example, entering the digits using the keypad. When the digitsare entered into the keypad, DTMF tones are generated corresponding toeach digit of the unrecognized number.

The intelligent peripheral 140 receives the numbers and translates DTMFtones of the entered numerals of the unrecognized number into data. Adata message with the numbers is forwarded to the service control point130, which determines the appropriate database for the service using theNPA or NPA-NXX of the numerals. The service control point 130 forwardsthe data to the database 150 in order to determines whether theunrecognized number is listed and, if the unrecognized number is listed,to retrieve data corresponding to the unrecognized number.

The database 150 may be any database that associates a number withinformation such as a name and address of a subscriber. In anembodiment, the database 150 is a caller-ID with name (CNAM) database.In other embodiments, the database 150 may be a Public Safety databaseof the type used by emergency call centers, or a Line InformationDatabase (LIDB). The database 150 may store full textual representationsof a subscriber name and address or, in the alternative, abbreviationsso that data may be efficiently stored. As indicated herein, datacorresponding to subscribers of multiple telecommunications serviceproviders may be divided among many databases dispersed in the advancedintelligent network by any criteria, such as listed/unlisted, differenttelecommunications service providers, and geography.

The database 150 forwards a message to the service control point 130with the listed/unlisted status of the unrecognized number, as well asthe data corresponding to the unrecognized number if the unrecognizednumber is listed. The service control point 130 forwards the data to theintelligent peripheral 140. The service control point 130 may instructthe intelligent peripheral 140 to process the data by, for example,using the text-to-speech processor to generate an audible signal that isplayed to the customer. Accordingly, the customer receives an audiblemessage from the intelligent peripheral 140 with information associatedwith the previously unrecognized number. If the unrecognized number isnot listed, the intelligent peripheral 140 plays a pre-recorded messagethat the unrecognized number is not listed.

The intelligent peripheral 140 may then provide the customer withadditional prerecorded options, such as replaying the informationcorresponding to the unrecognized number, or entering anotherunrecognized number. Of course, if the customer hangs up or does notrespond to a request after the options are played for a predeterminedresponse period, the call is ended. In the embodiment of FIG. 1, afterobtaining information associated with an unrecognized number, theunrecognized number information service will not provide an option forforwarding the call to a subscriber associated with the unrecognizednumber. Thus, the intelligent peripheral 140 is the ultimate destinationof the call.

In another embodiment shown in FIG. 1 a, the network includes adestination communications device 199 connected to a switch 111.Accordingly, when the intelligent peripheral 140 provides options to thecustomer, the options may include attempting a connection with thedestination associated with the previously unrecognized number.

Of course, in the embodiments of FIGS. 1 and 1 a, call serviceinstructions are associated directly with the service control point 130.When call service instructions are stored at or otherwise directlyassociated with the service control point 130, the intelligentperipheral 140 of FIGS. 1 and 1 a may retrieve the service informationfrom the service control point 130 using the SR-3511 protocol. Inanother embodiment, the intelligent peripheral 140 may retrieve datafrom an external database, such as a Name and Address Database (notshown) through a generic data interface (GDI) server (not shown), forexample, invoked by a GetData command.

If the customer chooses to call the unrecognized number (which, by now,is of course recognized), the intelligent peripheral 140 receives thecustomer's decision to call the unrecognized number. The intelligentperipheral 140 places a call to the communications device 199 throughthe service switching point 110. The service switching point 110connects the original call with the newly initiated call using, forexample, the two B channel transfer (TBCT) methodology. Alternatively,Release-to-Pivot capability can be used to re-route the call from theservice switching point 110 to the communications device 199.

FIG. 2 shows another exemplary service architecture of thetelecommunications system of the present invention. As shown, a customerusing a communications device 101, goes off hook and dials the shorteneduniversal number to reach the unrecognized number identification serviceto inquire for information associated with an unrecognized number. Theservice switching point 110 suspends the call and forwards a query tothe service control point 130. The service control point 130 determinesthe call is for the unrecognized number identification service and sendsa Forward_Call response to the service switching point 10. The serviceswitching point 110 will establish a connection with the servicenode/intelligent peripheral (SN/IP) 240 to obtain information from thecustomer.

The service node/intelligent peripheral 240 may differ from theintelligent peripheral 140 in the embodiment shown in FIG. 1 by acapability to operate independently of the service control point 130 inmany aspects. The SN/IP 240 can be a computer or communications serverlinked to the service switching point 219 via, for example, an ISDN linkusing either ISDN-BRI (Basic Rate Interface) or an ISDN-PRI (PrimaryRate Interface) protocol, each of which is known in the art. The servicenode/intelligent peripheral 240 of FIG. 2 may include interactive voiceresponse functionality, similar to the intelligent peripheral 140 inFIG. 1.

The SN/IP 240 contains resources to offer service enhancements tocustomers of a telecommunications service provider. The SN/IP 240 maycombine computer telephony integration (CTI) and advanced speechtechnologies in a single platform used as a system resource. The SN/IP240 may provide speech recognition, text-to-speech/speech-to-textconversion and dual-tone multi-frequency (DTMF) recognition withexternal telephony resources. An example of text-to-speech processingusing a pre-processor in a service node/intelligent peripheral (SN/IP)is disclosed in U.S. Pat. No. 6,400,809, issued Jun. 4, 2002, toBOSSEMEYER, Jr., et al., the disclosure of which is expresslyincorporated herein by reference in its entirety.

The service node/intelligent peripheral 240 is connected to the serviceswitching point 219, similar to the manner in which intelligentperipheral 140 is connected to service switching point 110 in FIG. 1.However, as noted above, once the call is received at the servicenode/intelligent peripheral 240, the service node/intelligent peripheral240 is less dependent on the service control point 130 than was theintelligent peripheral 140 of FIG. 1. In particular, the servicenode/intelligent peripheral 240 performs processing functions anddetermines actions to take, such as playing a prerecorded message to acustomer, without direction from the service control point 130.

According to the embodiment of FIG. 2, a database 250 of unrecognizednumbers may be accessed directly by the service node/intelligentperipheral 240. Accordingly, the service node/intelligent peripheral 240may search the database 250 by, for example, forwarding a signal tosearch the database 250, rather than relaying data signals through theservice control point 130 as in FIG. 1.

In the embodiment of FIG. 2, the service switching point 110 may beinstructed to connect with the service node/intelligent peripheral 240temporarily to enable, for example, speech recognition functionality orother security protocols of the service node/intelligent peripheral 240.The connection between a service switching point 10 and the servicenode/intelligent peripheral 240 is established using, e.g., BRI or PRI.

After the service switching point 110 establishes the connection withthe service node/intelligent peripheral 240 and the customer providesthe unrecognized number, the service node/intelligent peripheral 240ascertains the information associated with the unrecognized number. Avoice connection may be established with the service node/intelligentperipheral 240, through a second service switching point 219 (ifnecessary) based on signaling instructions sent via a signaling system 7(SS7) or comparable out-of-band signaling system. As a result, theconnection between the service switching point 219 and the servicenode/intelligent peripheral 240 enables the service node/intelligentperipheral 240 to perform the speech prompting and DTMF signalcollection and translation as noted above, for example, to obtain theunrecognized number for which the customer wishes to obtain associatedinformation. When the unrecognized number is determined from thedatabase 250, and the customer chooses to be connected to thecommunications device 199, the SN/IP 240 will initiate a call tocommunications device 199. The new call and the original call may beconnected using, for example, the two B channel transfer methodology.

In the embodiment of FIG. 3, the service node/intelligent peripheral 240includes a security apparatus 251 in order to pre-qualify a customer fora particular aspect of the called number identifier service, such as anunlisted unrecognized number look-up. In the alternative, a shorteneddialing pattern may be dedicated to an unrecognized/unlisted numberinformation service for pre-qualified users to look-up unrecognizednumbers. When a shortened dialing pattern is dedicated to the unlistednumber information service, every call made using the shortened dialingpattern will be subject to the security protocols. Therefore, with ashortened dialing pattern dedicated to an unlisted number informationservice, a pre-authorized user can access unlisted numbers.

To process the security protocols, the service control point 130 isnotified that the customer will attempt to obtain information associatedwith an unlisted unrecognized number. The service switching point 219will establish a connection with the service node/intelligent peripheral240 to obtain, for example, a voice print comparison or special passcodethat is used to determine that the customer is authorized to access anunlisted unrecognized number database. The service node/intelligentperipheral 240 compares information obtained from the customer withinformation of the security apparatus 251, to ascertain whether thecustomer has entered valid information to obtain information associatedwith an unrecognized unlisted number.

As in the embodiment of FIG. 2, a voice connection may be establishedwith the service node/intelligent peripheral 240, through a secondservice switching point 219 (if necessary). As a result, the connectionbetween the service switching point 219 and the service node/intelligentperipheral 240 enables the service node/intelligent peripheral 240 toperform, for example, a speech prompting and recognition function. Thespeech recognition function is performed, for example, to obtain a voiceprint of the customer and compare the voice print to voice prints ofauthorized users stored in the security apparatus 251.

When the security protocols of the security apparatus 251 are satisfiedsuch that a customer is authorized to access information associated withan unrecognized number, the service node/intelligent peripheral 240 willinteract with the customer, similar to a call in FIGS. 1, 1 a and 2. Inany case, the call is processed by the service node/intelligentperipheral 240 to ascertain information associated with an unrecognizednumber.

In the embodiment of FIG. 3, where security/authorization protocols areused, when the initial call is forwarded to the service node/intelligentperipheral 240, the customer may interact with the servicenode/intelligent peripheral 240 until the service node/intelligentperipheral 240 receives the unrecognized number. The servicenode/intelligent peripheral 240 then determines the informationassociated with the unrecognized number from the database 250.

Furthermore, when the service node/intelligent peripheral 240 receivesthe information associated with the unlisted unrecognized number fromthe database, the service node/intelligent peripheral 240 performs textto speech conversion and provides the information to the customer. Theservice node/intelligent peripheral 240 may also play a pre-recordedmessage to the customer offering the customer the opportunity to inputanother unrecognized number. In the alternative, the servicenode/intelligent peripheral 240 may offer the customer the opportunityto attempt a connection with communications device 199 if informationassociated with the unrecognized number is determined.

In any of the embodiments shown above, additional features may beprovided that enhance the unrecognized number identifier. For example,in any of the embodiments associated with FIGS. 1, 1 a, 2 and 3, if theunrecognized number is not listed, the customer may be presented with anoption to enter a special passcode used by public safety officials orother officials authorized by law to access information corresponding tounlisted unrecognized numbers. In other words, the intelligentperipheral 140 or service node/intelligent peripheral 240 of any of theembodiments can be modified to allow an authorized official to obtaininformation associated with an unrecognized unlisted number after theintelligent peripheral 140 or service node/intelligent peripheral 240determines that the number is unlisted.

For example, if a special passcode is entered by the customer, theintelligent peripheral 140 will again be directed by the service controlpoint 130 to forward a message to the database 150. The new messagecontains an unlisted access authorization to obtain the informationassociated with the unlisted unrecognized number. Alternatively, the newmessage may be forwarded to another database (not shown) dedicated tounlisted numbers and the information will be returned in the same mannerdescribed above for a listed unrecognized number.

In another embodiment, information related to the inquiry may becompiled at the intelligent peripheral 140, such as the specialpasscode, the date and time of the inquiry, a voice print requested bythe intelligent peripheral 140 or service node/intelligent peripheral240, the unrecognized number, and/or the information associated with theunrecognized number. As a result, information for each query of theunrecognized number identifier service may be stored at a database (notshown) in order to later associate each call to the service with thecustomer making the call.

Additionally, the customer communications device 101 may be checked toensure that an indicator associated with the calling party's device isof a type that indicates the calling party's device is allowed toinquire about unrecognized numbers, whether the inquiry is for unlistedor listed numbers. For instance, the service may not be available forpay phones, centrex lines, or any other lines designated as not suitablefor use with the dissemination of information associated withunrecognized numbers.

FIG. 4 shows an exemplary flow diagram for using the servicearchitecture shown in FIG. 1. The call starts when a customer goesoff-hook and dials a shortened dialing pattern at S410. At S420, theshortened dialing pattern is received at the service switching point 110where a query is initiated to obtain processing instructions from theservice control point 130. At S430, the service control point 130receives the query and determines routing instructions for the callbased on the query. The routing instructions are forwarded to theservice switching point 110 and the service switching point 110 forwardsthe call to the intelligent peripheral 140.

At S440, when the call is connected to the intelligent peripheral 140,the intelligent peripheral 140 executes a routine that results in apre-recorded or digitally generated voice message being played to thecustomer asking the customer to enter the full unrecognized number. Thecustomer may be given the option to enter the digits using the keypad.The intelligent peripheral 140 then collects the digits and translatesthe collected digits into a message that is sent to a database 150 as aquery at S450.

The database 150 will conduct a query with the unrecognized number. Adetermination whether the unrecognized number is listed is made at S455.If the unrecognized number is listed at S455 (S455=Yes), the database150 will compile the information into a signal that is sent to theintelligent peripheral 140. If the database 150 finds informationassociated with the unrecognized number, the intelligent peripheral 140translates the signal into an audible signal and plays it to thecustomer at S460. However, if the unrecognized number is unlisted atS455 (S455=No), the intelligent peripheral 140 plays a pre-recorded ordigital message to the customer informing the customer that theunrecognized number is unlisted at S499.

The flow diagram in FIG. 4 would apply to the service architecture shownin FIGS. 2 and 3 in a similar manner to that described above for theservice architecture in FIG. 1. However, the service node/intelligentperipheral 240 of FIG. 2 replaces the intelligent peripheral 140 of FIG.1, and the information associated with the unrecognized number isobtained by the service node/intelligent peripheral 240 from thedatabase 250 in FIG. 2 (e.g., without relaying the subscriberinformation through service control point 130).

FIG. 5 shows an exemplary flow diagram for an authorized customer toaccess information associated with an unrecognized unlisted number in adatabase. The flow of FIG. 5 is invoked after the full unrecognizednumber is forwarded to the database from the intelligent peripheral 140and the unrecognized number is determined to be unlisted at S455. Asshown in FIG. 4, at S499, the interactive voice response functionalityof the intelligent peripheral 140 plays a pre-recorded or digitalmessage to the customer informing the customer that the unrecognizednumber is unlisted. In addition to the message informing the customerthat the unrecognized number is unlisted, a message is played to thecustomer requesting an authorization code at S551. In particular, theintelligent peripheral 140 prompts the customer to enter anauthorization code via a keypad or audibly. The customer's authorizationcode is verified at S552/S553. If the customer enters a validauthorization code, the intelligent peripheral 140 may cause a messageto be sent to the service control point 130 to determine informationrelated to the calling device 101 used by the customer at S555/S556.

For example, the service control point 130 may check the Calling_PartyID and compare the Calling_Party ID against a table associated with theservice control point 130 to determine whether the customer is using adevice that is authorized to obtain information related to unlistednumbers at S555. In the alternative, the service control point 130 maymerely inquire to ensure that a particular type of phone (e.g., payphone) is not being used to make the inquiry.

If the customer provides a proper authorization code at S552 and thephone is verified as a device authorized to receive informationassociated with unlisted numbers at S555, the intelligent peripheral 140forwards a permission indicator or override code and the fullunrecognized number is again sent to the database 150 at S558. Theintelligent peripheral 140 receives the information from the database150, converts the information to speech and forwards a voice responsewith the information to the customer at S560. However, if the callingdevice information is not verified at S556 or the authorization code isnot verified at S553, the call is terminated at S557 or S554,respectively. Additionally, the call may be terminated at S554 after aset period of time if an authorization code is not provided. A briefmessage may be played to the customer at S554 or S557 informing thecustomer that the call is ending.

Of course, the order of steps of the authorization procedure of FIG. 5may vary. For instance, the check to verify the calling deviceinformation at S555 may occur before, or simultaneous with, the requestfor the authorization code and the verification of the authorizationcode at S552. Additionally, other security procedures are known and maybe used in place of the procedures at S551 to S557. For instance, avoice print may be taken from the customer and matched against a memoryof authorized users.

FIG. 6 shows an exemplary call flow corresponding to thetelecommunications network architecture of FIG. 1. Initially, a customerconnected to a service switching point 110 dials the shortened dialingpattern in S601 by, for example, removing a phone handset from a cradleand entering the shortened dialing pattern on a keypad. The serviceswitching point 110 connected to the user's handset detects theshortened dialing pattern and launches a query to the service controlpoint 130 in S602. The service control point 130 executes the callednumber identifier service logic and instructs the service switchingpoint 110 to forward the call to the intelligent peripheral 140 at S603.The service switching point 110 forwards the call to the intelligentperipheral 140 at S604. The intelligent peripheral 140 receives the calland begins communicating with the customer at step S605. In particular,the communications between the intelligent peripheral 140 and thecustomer at step S605 includes an instruction to the customer to enterthe digits of the unrecognized number. Furthermore, S605 includes thecustomer actually providing the digits of the unrecognized number on akeypad.

The intelligent peripheral 140 gathers the digits of the unrecognizednumber and forwards a query to the service control point 130 at stepS606 including the gathered digits. The service control point 130forwards the gathered digits to the database 150 at S607. The database150 determines whether the unrecognized number is listed or unlistedand, if the unrecognized number is listed, determines the informationassociated with the unrecognized listed number. The status of theunrecognized number, and the information associated with theunrecognized number if listed, is forwarded in a message to the servicecontrol point 130 at S608. The service control point 130 forwards thedata in a message to the intelligent peripheral 140 at S609.

The intelligent peripheral 140 initiates another interactivecommunications session with the user at S610 where the user is informedwhether the number is listed or unlisted (available or unavailable). Ifthe number is listed (available), the information associated with thelisted number is translated into an audible message and presented to theuser/customer. The intelligent peripheral 140 may also ask the customerif the customer wishes to inquire for information associated with asecond unrecognized number, or terminate the call. When the call is tobe terminated, at S611 the intelligent peripheral 140 initiates aprocess to tear down the call.

Thus, according to the exemplary call-flow of FIG. 6, corresponding tothe embodiment of FIG. 1, a customer receives information correspondingto an unrecognized number by dialing the shortened dialing pattern whichis recognized by the service switching point 110, and inputting theunrecognized number in response to a prompt from the intelligentperipheral 140. As should be clear, many enhancements may be made to thearchitecture of FIG. 1 to, for example, set up the session with theintelligent peripheral as a second call, or invoke security protocols ifthe unrecognized number is unlisted.

Although the invention has been described with reference to severalexemplary embodiments, it is understood that the words that have beenused are words of description and illustration, rather than words oflimitation. Changes may be made within the purview of the appendedclaims, as presently stated and as amended, without departing from thescope and spirit of the invention in its aspects. Although the inventionhas been described with reference to particular means, materials andembodiments, the invention is not intended to be limited to theparticulars disclosed; rather the invention extends to all functionallyequivalent structures, methods, and uses such as are within the scope ofthe appended claims.

For example, the database shown in FIG. 1 could be accessed through theservice control point 130 to enable efficient signaling. Moreover,additional databases may be provided to separate informationcorresponding to listed numbers from information corresponding tounlisted numbers. Additionally, a separate database may be accessedthrough the intelligent peripheral 140 or elsewhere to store informationrelating to each inquiry, including, for example, the number of times aparticular customer calls the service, each unrecognized number input bythe customer, whether information associated with the unrecognizednumber was returned to the customer, etc. Moreover, a blocking tablecould be provided in FIG. 1 to determine whether a particular type ofcalling device (e.g., pay phone) is being used to make the inquiry.

In accordance with various embodiments of the present invention, themethods described herein are intended for operation as software programsrunning on a computer processor. Dedicated hardware implementationsincluding, but not limited to, application specific integrated circuits,programmable logic arrays and other hardware devices can likewise beconstructed to implement the methods described herein Furthermore,alternative software implementations including, but not limited to,distributed processing or component/object distributed processing,parallel processing, or virtual machine processing can also beconstructed to implement the methods described herein.

It should also be noted that the software implementations of the presentinvention as described herein are optionally stored on a tangiblestorage medium, such as: a magnetic medium such as a disk or tape; amagneto-optical or optical medium such as a disk; or a solid statemedium such as a memory card or other package that houses one or moreread-only (non-volatile) memories, random access memories, or otherre-writable (volatile) memories. A digital file attachment to email orother self-contained information archive or set of archives isconsidered a distribution medium equivalent to a tangible storagemedium. Accordingly, the invention is considered to include a tangiblestorage medium or distribution medium, as listed herein and includingart-recognized equivalents and successor media, in which the softwareimplementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the invention is not limited to such standards andprotocols. Each of the standards for internet and other packet switchednetwork transmissions (e.g., SR-3511 GR-1129, SS7, TCP/IP) representexamples of the state of the art. Such standards are periodicallysuperseded by faster or more efficient equivalents having essentiallythe same functions. Accordingly, replacement standards and protocolshaving the same functions are considered equivalents.

1. A method of obtaining communication address identificationinformation, the method comprising: collecting a communication addressnumber from a customer at a telecommunications apparatus in response toa trigger being initiated at a switch and a connection being establishedbetween the switch and the telecommunications apparatus; obtainingcommunication address identification information from a memory inresponse to collecting the communication address number from thecustomer; and returning the communication address identificationinformation to the customer when communication address identificationinformation corresponding to the communication address number isavailable at the memory.
 2. The method of obtaining communicationaddress identification information of claim 1, further comprising:returning a message from the telecommunications apparatus to thecustomer indicating that the communication address number is unavailablewhen communication address identification information corresponding tothe communication address number is unavailable.
 3. The method ofobtaining communication address identification information of claim 1,wherein the communication address identification information is receivedfrom the memory as a data signal at the telecommunications apparatus andtranslated into an audible signal for presentation to the customer. 4.The method of obtaining communication address identification informationof claim 1, further comprising: forwarding to the customer an audibleprompt to provide the communication address number.
 5. The method ofobtaining communication address identification information of claim 1,further comprising: determining whether the customer is authorized toreceive communication address identification information correspondingto an unlisted communication address number.
 6. The method of obtainingcommunication address identification information of claim 5, thedetermining further comprising: receiving a line indicator thatindicates a type of line used by the customer.
 7. The method ofobtaining communication address identification information of claim 5,the determining further comprising: receiving an authorization code fromthe customer, the authorization code indicating that the customer isauthorized to receive communication address identification informationthat is not available to other customers.
 8. The method of obtainingcommunication address identification information of claim 4, furthercomprising: receiving an instruction to forward the audible prompt tothe customer to provide the communication address number.
 9. The methodof obtaining communication address identification information of claim1, further comprising: forwarding an option message to the customer, theoption message including an option to provide a new communicationaddress number.
 10. The method of obtaining communication addressidentification information of claim 1, further comprising: forwarding anoption message to the customer, the option message including an optionto terminate the call.
 11. The method of obtaining communication addressidentification information of claim 1, further comprising: forwarding anoption message to the customer, the option message including an optionto provide authorization information.
 12. The method of obtainingcommunication address identification information of claim 1, wherein thecommunication address identification information is obtained from thememory in response to a query which is forwarded to a control point, andwherein the control point determines whether communication addressidentification information is available and provides a response to thequery.
 13. The method of obtaining communication address identificationof claim 1, wherein the communication address identification informationis obtained from the memory in response to a query which is forwarded tothe memory via a control point, and wherein the control point receives aresponse from the memory and determines whether communication addressidentification information is available.
 14. A telecommunicationsapparatus that obtains communication address identification information,the telecommunications apparatus comprising: a number collector thatcollects a communication address number from a customer in response to atrigger being initiated at a switch and a connection being establishedbetween the switch and the telecommunications apparatus; an informationobtainer that obtains communication address identification informationfrom a memory in response to collecting the communication address numberfrom the customer; and an information output that returns thecommunication address identification information to the customer whencommunication address identification information corresponding to thecommunication address number is available at the memory.
 15. Thetelecommunications apparatus of claim 14, further comprising: atext-to-speech processor that obtains the communication addressidentification information from the memory as a data signal andtranslates the communication address identification information into anaudible signal.
 16. A computer readable medium for storing a computerprogram that obtains communication address identification, the computerreadable medium comprising: a communication address number collectingcode segment that collects a communication address number from acustomer at a telecommunications apparatus in response to a triggerbeing initiated at a switch and a connection being established betweenthe switch and the telecommunications apparatus; a communication addressidentification information obtaining code segment that obtainscommunication address identification information from a memory inresponse to collecting the communication address number from thecustomer, and a communication address identification informationreturning code segment that returns the communication addressidentification information to the customer when communication addressidentification information corresponding to the communication addressnumber is available at the memory.
 17. The computer readable medium ofclaim 16, further comprising: an instruction receiving code segment thatreceives an instruction to forward a message to the customer requestingthat the customer provide the communication address number.
 18. Thecomputer readable medium of claim 16, the communication addressidentification information obtaining code segment further comprising: aninformation requesting code segment that forwards a query to the memoryin response to the telecommunications apparatus receiving thecommunication address number from the customer.
 19. The computerreadable medium of claim 16, further comprising: a tone-translating codesegment that translates dual tone multi-frequency tones into datacorresponding to the communication address number.
 20. The computerreadable medium of claim 16, further comprising: a customerauthenticating code segment that authenticates the customer by promptingthe customer to provide authentication information.
 21. The computerreadable medium of claim 20, wherein the authentication informationcomprises a voice print of the customer.
 22. The computer readablemedium of claim 20, wherein the authentication information comprises apredetermined passcode.