System and method for ring suppression

ABSTRACT

A system for ring suppression facilitates notification and handling of unwanted calls as desired by a recipient, and in particular without disturbing the recipient. A new social dimension of call presentation logic is now available to callers. A telephony device is configured to receive an incoming call. The incoming call includes a calling line identity (CLI). On the telephony device, individual contacts in an address book are searched for a match to the CLI. If a match is found, a first phone action is activated (such as ringing the phone). If a match is not found in the address book for the incoming CLI, a second phone action is activated (such as not ringing the phone, and displaying the CLI). In other words, a call that is not in the address book of the recipient (B party) is silenced.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. provisional patentapplication (PPA) Ser. No. 61/716,771 Oct. 22, 2012 by the presentinventor, which is incorporated by reference.

FIELD OF THE INVENTION

The present invention generally relates to the field of communications,and in particular, it concerns notification of telephony calls.

BACKGROUND OF THE INVENTION

A continuing problem in the current modem world of telephonycommunications is receiving unwanted calls. Existing solutions, such asnational “do not call” registries, prevent unwanted calls from beingpresented to the recipient. That is, the call is blocked in the network,and the recipient is unaware of the attempted call. In addition, “do notcall” registries require users to “opt in” to the registry, and callingcontrol is at the source (origination) of the call.

Another existing solution is creating “contact groups”, where a receivedcall from any member of a contact group of callers is handled accordingto a configuration for that contact group. This technique requires thatevery desired contact is entered into the appropriate contact groups,and every new contact must also be added to all of the appropriatecontact groups to achieve a desired configuration and call behavior.

There is therefore a need for a more seamless system and method toprovide notification and handling of unwanted calls without disturbingthe recipient.

SUMMARY

According to the teachings of the present embodiment there is provided asystem including: a telephony device configured to: receive an incomingcall, the incoming call including a calling line identity (CLI); andsearch individual contacts in an address book associated with thetelephony device for a match to the CLI, and if the match is found,activate a first phone action; and if the search fails to find thematch, activate a second phone action.

According to the teachings of the present embodiment there is provided amethod including the steps of: receiving, at a telephony device, anincoming call, the incoming call including a calling line identity(CLI); and searching individual contacts in an address book associatedwith the telephony device for a match to the CLI, and if the match isfound, activate a first phone action; and if the search fails to findthe match, activate a second phone action.

In an optional embodiment, the first phone action is selected from thegroup consisting of: audible tone; activation of a visible indicator;and flash screen.

In an optional embodiment, the second phone action is selected from thegroup consisting of: silence; displaying the CLI; vibrate phone; andforward to voice mail.

In an optional embodiment, the first phone action is distinct from thesecond phone action.

In an optional embodiment, the telephony device is a cellular phone.

In an optional embodiment, the incoming call originates from a deviceselected from the group consisting of: a VoIP phone; and a telephonyapplication.

In an optional embodiment, the telephony device is associated with acalled party.

In an optional embodiment, the CLI is associated with a calling party.

According to the teachings of the present embodiment there is provided acomputer-readable storage medium having embedded thereoncomputer-readable code for handling a received call, thecomputer-readable code including program code for: receiving, at atelephony device, an incoming call, the incoming call including acalling line identity (CLI); and searching individual contacts in anaddress book associated with the telephony device for a match to theCLI, and it the match is found, activate a first phone action; and ifthe search fails to find the match, activate a second phone action.

According to the teachings of the present embodiment there is provided acomputer program that can be loaded onto a server connected through anetwork to a client computer, so that the server running the computerprogram constitutes a server in a system according to any one of theabove claims.

According to the teachings of the present embodiment there is provided acomputer program that can be loaded onto a computer connected through anetwork to a server, so that the computer running the computer programconstitutes a client computer in a system according to any one of theabove claims.

BRIEF DESCRIPTION OF FIGURES

The embodiment is herein described, by way of example only, withreference to the accompanying drawings, wherein:

FIG. 1 is a general, high-level diagram of telephony communicationssupporting the current embodiment.

FIG. 2 is a sketch of an exemplary address book.

FIG. 3 is a flowchart of an embodiment for notification and handling ofunwanted calls as desired by a recipient.

FIG. 4 is a high-level partial block diagram of an exemplary systemconfigured to implement telephony device of the present invention.

DETAILED DESCRIPTION—FIGS. 1 to 4

The principles and operation of the system and method according to apresent embodiment may be better understood with reference to thedrawings and the accompanying description. A present invention is asystem for ring suppression. The system facilitates notification andhandling of unwanted calls as desired by a recipient, and in particularwithout disturbing the recipient.

In general, an embodiment includes a telephony device configured toreceive an incoming call. The incoming call includes a calling lineidentity (CLI). On the telephony device, individual contacts in anaddress book ate searched for a match to the CLI. If a match is found, afirst phone action is activated (such as ringing the phone). If a matchis not found in the address book for the incoming CLI, a second phoneaction is activated (such as not ringing the phone, and displaying theCLI). In other words, a call that is not in the address book of therecipient (B party) is silenced.

Conventional solutions, such as “do not call” lists, prevent unwantedcalls from being presented to a user (recipient). In contrast, anembodiment of this invention can be used to prevent unwanted calls fromdisturbing a user. Another significant drawback of conventionalsolutions is that conventional solutions require a user to “opt in”, orindividually configure each contact, in particular each new contact inthe user's address book. In contrast, an embodiment of the currentinvention provides an innovative built-in feature for handling unwantedcalls and also provides a feature for handling new address book contactswithout the need for a user to configure individually the user's phoneto handle the new contact. In addition, whereas conventional solutionsplace calling control at the source (calling party and/or network), thecurrent embodiment gives the recipient call control at the destination.

The current embodiment provides an innovative “social dimension”including call presentation logic on the terminal. The social logicdisclosed herein applies to the “relationship that naturally existsbetween A and B” in order to impart “context to the ring”. Since Bgoverns the relationship with A (that is B determines which A isrecorded in B's address book) and since by default any “new caller” isnot recorded in the B address book, unwanted calls (such as robo-calls)are automatically silenced. Even if robo-callers change callingidentity, robo-callers cannot change the recorded AB relationship, andtherefore cannot alert through ringing B's phone. This solution can beimplemented via a software modification (or as hardware/firmwaremodifications) to existing call presentation managers on telephones.This modification can be enabled and distributed by mobile operatingsystem (O/S) providers and handset vendors since substantially alltelephony operating systems attempt to match an incoming CLI (caller) toa named contact in the callee address book. Significantly “silencing thering” is non-destructive, in that this solution can universally presentall callers, however only alerting (ringing) when the caller is “knownand recorded in the callee address book”. This feature results inlegitimate “unknown callers” being silenced rather than “denied access”,placing complete call control and ring presentation in the hands of therecipient (consumer). Unwanted calls can still be presented to therecipient, however unwanted calls do not disturb (DND) the recipient.

Referring now to the drawings, FIG. 1 is a general, high-level diagramof telephony communications supporting the current embodiment. Oneskilled in the art will realize the drawings and examples are simplifiedfor clarity and typical cases and terminology are used. However, theexamples used in the current description should not be consideredlimiting, and based on this description one skilled in the art will beable to implement an embodiment of the current invention to meet desiredspecific requirements and applications.

UserA having associated telephony device PhoneA calls UserB havingassociated telephony device PhoneB via network 100. In general, thecallpath is described from A to B, or A->B. UserA is the caller, callingparty, or sender, with PhoneA being the calling phone and having anassociated calling number (caller's number). UserB is the recipient,also referred to as the receiver, called party consumer, or user. As iscommon in the industry, a distinction may not be made between the userand phone when referring to “A” and “B”.

PhoneA can be one of a variety of devices, including include cellularphones, VoIP phones, telephony applications running on processors (suchas software applications running on a user's computer or Smartphone),and landline phones. Typically, PhoneB, the telephony device of UserB isa cellular phone. PhoneB is able to receive calling line identity (CLI),such as “caller-id”, and includes an address book function. The actualtelephony device used by a user is also referred to as a handset.

Calling line identity (CLI) is also known as caller ID (calleridentification, CID), calling line identification (CLID), calling numberdelivery (CND), calling number identification (CNID) and calling lineidentification presentation (CLIP). CLI is a telephone service,available in analog and digital phone systems and most voice overInternet Protocol (VoIP) applications, which transmit a caller's numberto the called party's telephone.

Referring again to the drawings, FIG. 2 is a sketch of an exemplaryaddress book 200. Address books are known by other names, depending onthe manufacturer, including “names” and “contacts”. For simplicity andconsistency in this document, the term “address book” is used to referto this data structure and/or feature. An address book may have(support) various entries. The address book 200 is shown with two typesof typical entries: individual contacts and contact groups. In thecontext of this document, the term “individual contact” generally refersto an entry for a single calling party (one person, one calling party).Individual contacts may have one or more associated telephone numbers(or simply “numbers”), and other information (such as name, streetaddress, photograph, etc.). Some address books also support contactgroups. In the context of this document, the term “contact group”generally refers to a reference to more than one calling party (morethan one person). Note that a contact group can have a single entry.

The address book 200 has exemplary entries contact-1, contact-2,group-1, and contact-4. Contact-1 is an example of an individual contacthaving name1 and three associated telephone numbers number11, number12,and number13. Contact-2 is an example of an individual contact havingname2 and one associated telephone number number21. Group-1 is anexample of a contact group having three associated contacts: contact-1,contact-2, and contact-3. Contact-4 is an example of an individualcontact having name4 and two associated telephone numbers number41,number42.

In the context of this document, the term “unwanted calls” generallyincludes calls received by a recipient that the recipient does not wantto pay attention to at the time the call is received. Unwanted calls caninclude unsolicited or unscheduled calls from strangers and“Robo-calling”. Robo-calling (robotic-calling) includes calls from anautomated system that plays a pre-recorded message. Robo-callers caneasily mask and modify the robo-caller's caller identity (such as CLI).Unwanted calls are characterized by the phone number of the unwantedcall not being in the recipient's address book. In other words, anunwanted call has an associated calling number (CLI) that fails toappear in an address book of a called party (recipient).

Referring to the drawings, FIG. 3 is a flowchart of an embodiment fornotification and handling of unwanted calls as desired by a recipient. Atelephony device (PhoneB) is configured to receive 300 an incoming callfrom a calling party (PhoneA). The incoming call includes an associatedcalling line identity (CLI), the CLI corresponding to the calling party(UserA). Individual contacts in an address book associated with thetelephony device are searched 302 for a match to the CLI. If a match isfound for the CLI in the address book, the method continues from block304 to block 306 and a first phone action is activated on the telephonydevice (PhoneB). If a match is not found (in other words, the searchfails to find a match) for the CLI in the address book, the methodcontinues from block 304 to block 308 and a second phone action isactivated on the telephony device. In other words, unwanted calls arenot found in the recipient's address book, and activate a second phoneaction, while wanted calls are found in the recipient's address book andactivate a first phone action. Ring suppression is automatically appliedto received calls whenever a received call is not in the user's addressbook, and whenever a user adds a new contact to the address book thenringing is automatically permitted.

A significant feature of the current method is that matching of areceived CLI is done with all of the contacts in an address book. Inother words, all of the individual contacts in an address book aresearched for a match with the received CLI. The search 302 is to matchany contact, as opposed to conventional ringing that can be set forcontacts and contact groups. This feature facilitates presentation andDND functions on a user's phone, without requiring the user to configureindividually each contact, in particular each new contact in therecipient's address book.

In a case where the calling number is private, the CLI of the callingparty is not sent to PhoneB, the telephony device of the recipient, sothe incoming CLI is not matched to the recipient's address book, and thesecond phone action is activated.

The first phone action can include a variety of implementations on therecipient's phone, including, but not limited to:

ringing;

audible tone;

activation of a visible indicator; and

flash screen.

The second phone action can include a variety of implementations on therecipient's phone, including, but not limited to:

silence;

vibrate;

tonal alerts;

forward to voice mail; and

displaying the CLI.

While ringing is well understood to describe a repetitive audibleemission to alert the caller, in alternative embodiments anon-repetitive, short duration sound, or a single short duration tonecan be emitted (collectively known as “tonal alerts”).

In general, the first phone action is distinct from the second phoneaction. Where the first phone action is intended to get the recipient'sattention, the second phone action is chosen as to not interrupt therecipient. The second phone action can also be thought of as a“non-action”. Normally, the incoming CLI is displayed as at least a partof the second phone action.

Conventional techniques for “silencing” an individual contact is toeither exclude the contact from a ringing group or apply a “blank”(silent) recorded ringing tone, that is a ringing tone that has noaudio. “Selecting an individual contact to silence” is distinct from“selecting an individual contact to ring” or excluding an individualcontact front a ringing group and thereby silently receiving of anindividual contact. This is an inverse operation as “silencingindividually” exceptions a contact from the presently disclosed “defaultring all contacts in address book”.

The second phone action corresponds to a DND function implementing“silencing the ring” and call screening functionality. Second phoneaction (such as call screening functionality) may be provided by arecipient's phone to deliver the disclosed DND functionality, includingwithout limitation an ability to flag a recorded contact as a “silentcaller”. In a preferred embodiment, “silencing the ring”, describespresenting an incoming call without audible alerting, that is withoutringing the telephony device (a preferred option in activating a secondphone action). Typically, this results in the telephony device visuallydisplaying the incoming call. Visually displaying the incoming callincludes visually displaying the calling phone number (CLI) and or nameassociated with the CLI or with a contact in the recipient's addressBook, when such information is available. Visually displaying theincoming call may further include “visual display effects” such asvariable lighting effects, including without limitation, “flashing” thecaller information on and off the telephony display and displayingvariable colors.

In further embodiments, silencing the ring may result in vibrating thedevice, which results in a humming or buzzing tone, and in furtherembodiments, combinations of tonal and visual effects. Tonal alerts suchas emitting a short duration sound or a single short duration tone.

Alternative visual and/or tonal alerts may be automatically applied whena method of the embodiment is invoked. Alternatively, visual and tonalalerts may be applied on callee selection. Further, visual and or tonalalerts may be determined from settings that are currently in effect onthe telephony device that describe “silent mode”, such as an existingprofile or configuration on the recipient's phone.

Refer now to the drawings, FIG. 4 is a high-level partial block diagramof an exemplary system 400 configured to implement telephony device(PhoneB) of the present embodiment. System (processing system) 400includes a processor 402 (one or more) and four exemplary memorydevices: a RAM 404, a boot ROM 406, a mass storage device (hard disk)408, and a flash memory 410, all communicating via a common bus 412. Asis known in the art, processing and memory can include any computerreadable medium storing software and/or firmware and/or any hardwareelement(s) including but not limited to field programmable logic array(FPLA) element(s), hard-wired logic element(s), field programmable gatearray (FPGA) element(s), and application-specific integrated circuit(ASIC) element(s). Any instruction set architecture may be used inprocessor 402 including but not limited to reduced instruction setcomputer (RISC) architecture and/or complex instruction set computer(CISC) architecture. A module (processing module) 414 is shown on massstorage 408, but as will be obvious to one skilled in the art, could belocated on any of the memory devices.

Mass storage device 408 is a non-limiting example of a computer-readablestorage medium bearing computer-readable code for implementing thetelephony device (PhoneB) methodology described herein. Other examplesof such computer-readable storage media include read-only memories suchas CDs bearing such code.

System 400 may have an operating system stored on the memory devices,the ROM may include hoot code for the system, and the processor may beconfigured for executing the boot code to load the operating system toRAM 404, executing the operating system to copy computer-readable codeto RAM 404 and execute the code.

Network connection 420 provides communications to and from system 400.Typically, a single network connection provides one or more links,including virtual connections, to other devices on local and/or remotenetworks. Alternatively, system 400 can include more than one networkconnection (not shown), each network connection providing one or morelinks to other devices and/or networks.

System 400 can be implemented as a server or client respectivelyconnected through a network to a client or server.

Conventional user phones (called phone B) permit users to control callpresentation individually or in groups. For example by allowing therecipient (callee) to selectively permit certain callers to ring andsilencing other callers by exclusion (that is not selecting certaincallers to ring). in conventional solutions, callers may further beassigned “distinct ringing tones” and phones may be automatically set toswitch profiles based on other factors such as “time of day”. Forexample, at a pre-designated time the phone may automatically switch to“silent mode” for a specified time interval.

Rather than selectively presenting the ring based on administered callerprofiles, a current embodiment facilitates users now unconditionallysilencing calls on a universal exception. This universal exception beingthe caller is not recorded as a contact in the callee address book.Beyond the “do not disturb” DND aspect related to unwanted callers, aDND function can be applied to any caller who is not currently in thecallee address book.

The choices used to assist in the description of this embodiment shouldnot detract from the validity and utility of the invention. It isforeseen that more general choices including, but not limited to typesof telephony devices, and types and implementations of address books canbe used.

Note that a variety of implementations for modules and processing arepossible, depending on the application. Modules are preferablyimplemented in software, but can also be implemented in hardware andfirmware, on a single processor or distributed processors, at one ormore locations. The above-described module functions can be combined andimplemented as fewer modules or separated into sub-functions andimplemented as a larger number of modules. Based on the abovedescription, one skilled in the art will be able to design animplementation for a specific application.

To the extent that the appended claims have been drafted withoutmultiple dependencies, this has been done only to accommodate formalrequirements in jurisdictions that do not allow such multipledependencies. It should be noted that all possible combinations offeatures that would be implied by rendering the claims multiplydependent are explicitly envisaged and should be considered part of theinvention.

Note that the above-described examples, numbers used, and exemplarycalculations are to assist in the description of this embodiment.Inadvertent typographical and mathematical errors do not detract fromthe utility and basic advantages of the invention.

It will be appreciated that the above descriptions are intended only toserve as examples, and that many other embodiments are possible withinthe scope of the present invention as defined in the appended claims.

1.-12. (canceled)
 13. A ring suppression telephony system comprising: atelephony device; a processor communicatively coupled to the telephonydevice; a non-transitory memory communicatively coupled to theprocessor; and machine readable instructions stored in thenon-transitory memory that cause the ring suppression telephony systemto perform at least the following when executed by the processor: uponreceiving a call from a calling telephony device, search one or morecontacts, calling telephony numbers, or combinations thereof stored inthe non-transitory memory for a match to the calling telephony device;and upon failure to find the match, initiate a ring suppression mode toprogrammatically override a ringing mode of the telephony device,wherein the telephony device is configured to permit answering the callin the ring suppression mode.
 14. The ring suppression telephony systemof claim 13, wherein the machine readable instructions further cause thering suppression telephony system to perform at least the following whenexecuted by the processor: present the call on a telephony display ofthe telephony device without ringing the telephony device in the ringsuppression mode; and control the call presented on the telephonydisplay to one of: answer the call; disconnect the call; or forward thecall to voice mail.
 15. The ring suppression telephony system of claim13, wherein the call from the calling telephony device includes acalling line identity (CLI) associated with the calling telephonydevice, and the match is between the one or more contacts, callingtelephony numbers, or combinations thereof in the non-transitory memoryand the CLI of the calling telephony device.
 16. The ring suppressiontelephony system of claim 15, wherein the machine readable instructionsfurther cause the ring suppression telephony system to perform at leastthe following when executed by the processor: present the call on atelephony display of the telephony device to view the CLI withoutringing the telephony device.
 17. The ring suppression telephony systemof claim 15, wherein the CLI is associated with a calling partyassociated with the calling telephony device.
 18. The ring suppressiontelephony system of claim 13, wherein the machine readable instructionsfurther cause the ring suppression telephony system to perform at leastthe following when executed by the processor: upon failure to find thematch, vibrating the telephony device, forwarding the call to voicemail, or both.
 19. The ring suppression telephony system of claim 13,wherein the telephony device is a mobile phone comprising a cellularphone, a satellite phone, or a Wi-Fi phone.
 20. The ring suppressiontelephony system of claim 13, wherein the call originates from a devicethat is one of a voice over Internet Protocol phone and a telephonyapplication.
 21. The ring suppression telephony system of claim 13,wherein the telephony device is associated with a called party, and thecall is received when the telephony device is not engaged in anothercall with another telephony device.
 22. A method, comprising steps of:receiving, by a telephony device, a call from a calling telephonydevice; searching one or more contacts, calling telephony numbers, orcombinations thereof in a non-transitory memory of the telephony device,for a match to the calling telephony device upon receiving the call; andupon failure to find the match, initiating a ring suppression mode toprogrammatically override a ringing mode of the telephony device,wherein the telephony device is configured to permit answering the callin the ring suppression mode.
 23. The method of claim 22, furthercomprising: presenting, by the telephony device, the call on a telephonydisplay of the telephony device without ringing; and controlling thecall presented to one of: answer the call; disconnect the call; orforward the call to voice mail.
 24. The method of claim 22, wherein thecall from the calling telephony device includes a calling line identity(CLI) associated with the calling telephony device, and the match isbetween the one or more contacts, calling telephony numbers, orcombinations thereof and the CLI of the calling telephony device. 25.The method of claim 24, further comprising: presenting the call on atelephony display of the telephony device to view the CLI withoutringing the telephony device.
 26. The method of claim 24, wherein theCLI is associated with a calling party associated with the callingtelephony device.
 27. The method of claim 22, further comprising: uponfailure to find the match, vibrating the telephony device, forwardingthe call to voice mail, or both.
 28. The method of claim 22, wherein thetelephony device is a mobile phone comprising a cellular phone, asatellite phone, or a Wi-Fi phone.
 29. The method of claim 22, whereinthe call originates from a device that is one of a voice over InternetProtocol phone and a telephony application.
 30. The method of claim 22,wherein the telephony device is associated with a called party, and thecall is received when the telephony device is not engaged in anothercall with another telephony device.
 31. A ring suppression telephonysystem comprising: a telephony device; a processor communicativelycoupled the telephony device; a non-transitory memory communicativelycoupled to the processor; and machine readable instructions stored inthe non-transitory memory that cause the ring suppression telephonysystem to perform at least the following when executed by the processor:receive a call from a calling line identity (CLI) associated with acalling telephony device; search one or more contacts, calling telephonynumbers, or combinations thereof stored in the non-transitory memory fora match to the CLI; and upon failure to find the match, initiate a ringsuppression mode to programmatically override a ringing mode of thetelephony device, wherein the telephony device is configured to permitanswering the call in the ring suppression mode; present the call on atelephony display of the telephony device to view the CLI withoutringing; and control the call presented on the telephony display. 32.The ring suppression telephony system of claim 31, wherein the machinereadable instructions further cause the ring suppression telephonysystem to perform at least the following when executed by the processor:control the call presented on the telephony display through a userselection of one of: answer the call; disconnect the call; or forwardthe call to voice mail.