Systems and Methods for Transmitting Subject Line Messages

ABSTRACT

A system and method of sending subject line messages is provided. A particular method includes receiving a call setup signaling message. The call setup signaling message includes a message identifier. The method further includes determining a subject line message associated with the message identifier of the call setup signaling message. The message identifier is replaced with the subject line message. The method further includes transmitting the call setup signaling message to a called party.

FIELD OF THE DISCLOSURE

The present disclosure is generally related to systems and methods fortransmitting subject line messages.

BACKGROUND

Currently, when a person receives a call, the called party may receivecaller identification information (caller ID information, such as callername or telephone number) of the call originator. For people who arebusy or receive many calls, this may not be enough information to decidewhether to answer the call or not.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flow chart of a first particular embodiment of a method oftransmitting a subject line message to a called party;

FIG. 2 is a flow chart of a second particular embodiment of a method oftransmitting a subject line message to a called party;

FIG. 3 is a flow chart of a third particular embodiment of a method oftransmitting a subject line message to a called party;

FIG. 4 is a block diagram of a particular embodiment of a communicationsystem;

FIG. 5 is an illustration of a first particular embodiment of a webportal interface;

FIG. 6 is an illustration of a second particular embodiment of a webportal interface;

FIG. 7 is an illustration of a third particular embodiment of a webportal interface; and

FIG. 8 is an illustration of an illustrative embodiment of a generalcomputer system.

DETAILED DESCRIPTION OF THE DRAWINGS

A system and method of sending subject line messages is disclosed. In aparticular embodiment, a method includes receiving a call setupsignaling message. The call setup signaling message includes a messageidentifier. The method further includes determining a subject linemessage associated with the message identifier of the call setupsignaling message. The message identifier of the call setup signalingmessage is replaced with the subject line message. The method furtherincludes transmitting the call setup signaling message to a calledparty.

In another particular embodiment, a communication system includes aprocessor and a memory coupled to the processor. The communicationsystem further includes a call setup interface adapted to receive a callsetup signaling message from a caller device. The call setup signalingmessage includes a message identifier. The communication system furtherincludes logic to determine a subject line message associated with themessage identifier. The message identifier of the call setup signalingmessage is replaced with the subject line message. The communicationsystem further includes logic to transmit the call setup signalingmessage to a called party device via the call setup interface.

In another particular embodiment, a computer-readable medium includesoperational instructions that, when executed by a processor, cause theprocessor to receive a call setup signaling message from a callerdevice. The call setup signaling message includes a Session InitiationProtocol (SIP) INVITE message. The received SIP INVITE message includesa SIP subject header that includes a message identifier. Thecomputer-readable medium further includes operational instructions that,when executed by the processor, cause the processor to determine asubject line message associated with the message identifier based on apredetermined list. The predetermined list includes a plurality ofsubject line messages, where each subject line message is associatedwith a particular message identifier. The message identifier of the callsetup signaling message is replaced with the subject line message. Thecomputer-readable medium further includes operational instructions that,when executed by the processor, cause the processor to transmit the callsetup signaling message to a called party device. Transmitting the callsetup signaling message to the called party device includes transmittingthe SIP INVITE message to the called party device. The transmitted SIPINVITE message includes a modified SIP subject header that includes thesubject line message.

Referring to FIG. 1, a flow chart of a first particular embodiment of amethod of transmitting a subject line message to a called party isillustrated, at 100. The method includes, at 102, receiving a call setupsignaling message 104. The call setup signaling message 104 includes amessage identifier 106. In a particular embodiment, the messageidentifier 106 corresponds to a pre-stored subject matter identifierthat may be input or selected by a user of a customer premises equipment(CPE) device. In a particular embodiment, the CPE device may be a mobiletelephone, a cellular telephone, a conventional telephone, a personalcomputer, a Voice over Internet Protocol (VoIP) telephone, or anotherend-user telephony device. The method further includes determining asubject line message that is associated with the message identifier 106,as shown at 108. In a particular embodiment, the message identifier 106is a numerical or alpha-numerical identifier that may be linked to asubject line message 114. In one embodiment, the message identifier 106is linked to the subject line message 114 at a subject line messagerepository. The subject line message 114 may be retrieved from thesubject line message repository based on the message identifier 106. Themessage identifier 106 is replaced with the subject line message 114, at109. The method further includes, at 110, transmitting the call setupsignaling message 104 including the subject line message 114 to a calledparty. In a particular embodiment, the called party is a destinationparty that receives a telephone call or other data communication from anoriginating party (e.g., a caller). In a particular embodiment, thesubject line message 114 includes information provided by the caller tothe called party related to a reason for a telephone call.

Referring to FIG. 2, a flow chart of a second particular embodiment of amethod of transmitting a subject line message to a called party isillustrated, at 200. The method includes, at 202, receiving a call setupsignaling message 204. The call setup signaling message 204 includes amessage identifier 206. The method further includes determining asubject line message associated with the message identifier 206, at 208.The subject line message may be mapped or otherwise linked to themessage identifier 206, as shown at 212. In a particular embodiment, apredetermined list 210 includes mapping information that maps themessage identifier 206 to the subject line message.

In the particular embodiment illustrated in FIG. 2, the method furtherincludes determining whether the caller is authorized to send thesubject line message, at 214. For example, a list of subscribers 216(e.g., callers that have subscribed to a subject line message service)may be consulted to determine whether the caller is authorized to sendthe subject line message. As a further example, the method may includedetermining whether the caller is delinquent on an account (e.g.,whether the caller has paid one or more recent bills). When the calleris not authorized to send the subject line message, the method ends at232 since subject line message communications are not authorized for thecaller.

When the caller is authorized to send the subject line message, asdetermined at 214, the method continues at 218. At 218, a determinationis made whether the called party is authorized to receive the subjectline message. For example, a list of subscribers 220 (e.g., calledparties that have subscribed to the subject line message service) may beconsulted to determine whether the called party is authorized to receivethe subject line message. As a further example, the method may includedetermining whether the called party is delinquent on an account (e.g.,whether the called party has paid one or more recent bills). When thecalled party is not authorized to receive the subject line message, themethod ends at 232 since subject line message communications are notauthorized for the called party.

In the particular embodiment illustrated in FIG. 2, the method furtherincludes determining whether the caller is allowed to send subject linemessages to the called party, at 222. Determining whether the caller isallowed to send subject line messages to the called party may includedetermining whether a telephone number of the caller is included in alist of authorized caller telephone numbers 224. In a particularembodiment, the list of authorized caller telephone numbers 224 is aconfigurable list of callers that the called party can receive subjectline messages from. For example, the called party may want only teammembers or a supervisor to be able to send subject line messages (e.g.,a caller white list), while other callers are not allowed to sendsubject line messages (e.g., a caller black list). Thus, the callerwhite list may be stored to allow transmission of subject line messagesfrom authorized callers, and the caller black list may also be stored toblock transmission of subject line messages from unauthorized callers.In this manner, the receiving party (e.g., the called party) can providefor further security and filters with respect to subject line messagecommunications. When the caller is not allowed to send subject linemessages to the called party, the method ends at 232.

When the caller is allowed to send subject line messages to the calledparty, as determined at 222, the method continues at 226. At 226, themethod includes transmitting the call setup signaling message 204 to thecalled party. The call setup signaling message 204 includes the subjectline message.

In the particular embodiment shown in FIG. 2, the call setup signalingmessage 204 includes a subject line message that includes information230 provided by a caller related to a reason for a telephone call. In aparticular embodiment, the information 230 may be provided by a callerusing various input capabilities of an end-user communication device.For example, the end-user communication device may include a “smartphone”, a cellular phone, a set-top box, or another electronic deviceaccessible to an IP communication network. Thus, a caller may use avariety of different devices accessible to the IP communication networkto provide the information 230 related to the reason for a particulartelephone call. The reason provided by the caller may be apre-determined message or may be a user defined custom message. Once theinformation 230 is provided by the caller via the end-user communicationdevice, the information 230 may be communicated via the IP communicationnetwork to the called party, thereby facilitating enhanced informationfor the called party to improve end-to-end communications.

Referring to FIG. 3, a flow chart of a third particular embodiment of amethod of transmitting a subject line message to a called party isillustrated, at 300. At 302, a call setup signaling message 304 isreceived from a caller device 340 via an IP Access network 312. In aparticular embodiment, the call setup signaling message 304 includes aSession Initiation Protocol (SIP) INVITE message 306. The received SIPINVITE message 306 includes a SIP subject header 308 which includes amessage identifier 310.

In a particular embodiment, the SIP INVITE message 306 is received at anoriginating IP Multimedia Subsystem (IMS) session call session controlfunctions (S-CSCF) server. The originating IMS S-CSCF server sends thetelephone call to a particular subject line messaging applicationserver. The particular subject line messaging application server isselected based on originating initial filter criteria (iFC) retrievedfor the caller device from a home subscriber server (HSS) atregistration. In a particular embodiment, the originating IMS S-CSCFsends the telephone call to an application server assigned to thecaller. The application server assigned to the caller performsoriginating feature treatment, such as determining if the callersubscribes to the subject line message service. If the caller does notsubscribe to the subject line message service, the subject linemessaging application server removes the SIP subject header 308. If thecaller subscribes to the subject line message service, the SIP subjectheader 308 is not removed. In a particular embodiment, the originatingIMS S-CSCF server queries the HSS to determine a terminating IMS S-CSCFassociated with the called party. The originating IMS S-CSCF serversends the telephone call to the terminating IMS S-CSCF associated withthe called party. Based on terminating iFC, the terminating IMS S-CSCFdetermines if the called party subscribes to the subject line messageservice. If the called party does not subscribe to the subject linemessage service, the telephone call is routed to another applicationserver, based on the terminating iFC. If the called party subscribes tothe subject line message service, the telephone call is routed to thesubject line messaging application server.

In a particular embodiment, the subject line messaging applicationserver determines if the called party has enabled the subject linemessage service. If the called party has not enabled the subject linemessage service or has disabled the subject message service, the subjectline messaging application server removes the SIP subject header 308. Inanother particular embodiment, the subject line messaging applicationserver determines whether the caller is allowed to send subject linemessages to the called party. For example, determining whether thecaller is allowed to send subject line messages to the called party mayinclude determining whether a telephone number of the caller is includedin a list of authorized caller telephone numbers. If the caller is noton the list of authorized caller telephone numbers, the subject linemessaging application server removes the first SIP subject header 308.If the caller is on the list of authorized caller telephone numbers, themethod proceeds to 314.

At 314, a subject line message 334 associated with the messageidentifier 310 is determined, and the message identifier 310 is replacedwith the subject line message 334. In a particular embodiment, thesubject line message 334 is determined by accessing information from asubject line message repository 316. The subject line message repository316 may be stored within a database accessible to a network serviceprovider via an IP communication network. In one embodiment, the methodincludes retrieving the subject line message 334 from the subject linemessage repository 316 based on the message identifier 310 of thereceived SIP INVITE message 306. The subject line message repository 316may include a plurality of subject line messages, where each subjectline message is associated with a particular message identifier. Forexample, in FIG. 3, a first message identifier 318 is associated with afirst subject line message 320, and a second message identifier 322 isassociated with a second subject line message 324. It should beunderstood that the subject line message repository 316 may include anynumber of message identifers, and each message identifier may beassociated with a particular subject line message stored in aretrievable format.

At 326, the call setup signaling message 304 is transmitted via the IPAccess network 312 to a called party device 342. The call setupsignaling message 304 includes the SIP INVITE message 306, including amodified SIP subject header 332. The modified SIP subject header 332includes the subject line message 334 to be delivered to the calledparty device 342.

In a particular embodiment, the functions illustrated in boxes 302, 314,316 and 326 are elements of a Session and Application Layer of a ThirdGeneration Partnership Program (3GPP) IMS architecture. The 3GPP IMSarchitecture may include a plurality of different interconnectedcommunication elements that may be used for data and call trafficcommunications. The 3GPP IMS architecture is an example of a nextgeneration network (NGN). For example, the NGN may be based on anAlliance for Telecommunications Industry Solutions (ATIS) NGN framework,a European Telecommunications Standards Institute (ETSI) NGN framework,or a Telecoms & Internet converged Services & Protocols for AdvancedNetworks (TISPAN) NGN framework. Next generation networks use SessionInitiation Protocol (SIP) for call setup signaling. An NGN architectureseparates network accesses, session control, and application services toallow rapid deployment of new application services. An NGN architectureis capable of providing a large variety of real-time multimediacommunication services consistently on various network accesses. Requestfor Comment (RFC) 3261 (SIP) supports a header subject to enable asubject text to be sent from the caller to the called party.

Thus, call setup signaling messages may be used within an IMS context tofacilitate communication of message identifiers linked to specificsubject line messages as shown. Use of NGN technologies can enhancenetwork operator performance and reduce cost as well as provideincreased functionality. In addition, the subject line messagecapabilities disclosed provide a new feature for an NGN operator todifferentiate from more basic services such as caller ID information(e.g. caller name or telephone number). Having the capability for thecalled party to determine who is calling and the reason for the call mayenable the called party to make better decisions when determiningwhether to answer an incoming call and may allow the called party todifferentiate calls having a higher priority or urgent nature ascompared to other calls which may be suitable for a later call back.

The disclosed subject line messaging systems and methods provideenhanced communication and additional information with respect to calledparties receiving communications, such as telephone calls fromoriginating calling parties. In a particular embodiment, the disclosedsubject line messaging systems and methods may be implemented using asubject line messaging service that is enabled using an IMS networkbased platform and configured using an originating iFC and a terminatingiFC based on subscriber service profiles stored within an HSS system. Asanother benefit, use of the SIP messages and signaling mechanisms of thedisclosed subject matter provides for more ubiquitous implementationswith respect to service providers having a need to balance useracceptance against service manageability and network performance.

Referring to FIG. 4, a block diagram of a particular embodiment of acommunication system is illustrated, at 400. The communication system400 includes a subject line messaging application server 401, a webserver 435, a device management server 441, a SIP proxy server 414, ahome subscriber server (HSS) 424, and an IP Access Network 428. Thesubject line messaging application server 401 is coupled to the SIPproxy server 414, which is coupled to the HSS 424. In addition, thesubject line messaging application server 401 is coupled to the webserver 435, which is coupled to the device management server 441.

In the embodiment shown in FIG. 4, the IP Access Network 428 is incommunication with a plurality of different end-user communicationdevices (e.g., caller devices and called party devices). For example,the end-user communication devices may include a wireless device 426(e.g., a wireless telephone or cellular telephone), a hand-heldcomputing device 451 (e.g., a personal digital assistant (PDA) or atablet computer), a laptop computer 452, a desktop computer 453, or aVoIP telephone 454, among other alternatives. The IP Access network 428may receive communications from any device that is connected to an IPnetwork.

The subject line messaging application server 401 includes a processor402, a memory 404 coupled to the processor 402, subject line messagingapplication server logic 406, and a call setup interface 412. In aparticular embodiment, the subject line messaging application serverlogic 406 is implemented by software stored within the memory 404. Inanother embodiment, the subject line messaging application server logic406 may be implemented by hardware or programmable logic circuitry.

The web server 435 includes a subject line message repository 436, a webportal interface 432, and web server logic 434. In a particularembodiment, the web server logic 434 may be implemented in hardware,software, firmware or any combination thereof.

The device management server 441 includes a caller device interface 440and device management server logic 442. In a particular embodiment, thedevice management server logic 442 may be implemented in hardware,software, firmware or any combination thereof.

During operation, a user may communicate with and receive access to theweb server 435 via messages utilizing the IP Access Network 428. In aparticular embodiment, a message received at the IP Access Network 428is then communicated to the web server 435. For example, the user mayaccess the web server 435 via the web portal interface 432 to provide auser selected subject line message 430. The user selected subject linemessage 430 is provided by the user of a caller device to request aparticular subject line message to be stored at the caller device forsubsequent use during communication. In one embodiment, the userselected subject line message 430 includes a default subject linemessage selected from a list of default subject line messages displayedvia the web portal interface 432. In another embodiment, the userselected subject line message 430 includes a user defined subject linemessage (e.g., a custom message) supplied by the user via the web portalinterface 432. The user selected subject line message 430 is received atthe web portal interface 432 and is processed by the web server logic434. Further, the web portal interface 432 is adapted to receive a userselection of at least one caller device to receive the user selectedsubject line message 430. For example, the caller device may include thewireless device 426, the hand-held computing device 451, the laptopcomputer 452, the desktop computer 453, or the VoIP telephone 454, amongother alternatives. The web server logic 434 determines a messageidentifier 418 of the user selected subject line message 430 anddetermines at least one unique identifier (UID) 438 associated with theat least one caller device selected by the user to receive the userselected subject line message 430. For example, the user may select morethan one caller device to receive the user selected subject line message430, resulting in more than one UID 438 being associated with aparticular user selected subject line message 430 and message identifier418. The web server logic 434 stores the user selected subject linemessage 430, the message identifier 418, and the at least one UID 438 atthe subject line message repository 436.

In a particular embodiment, the subject line message repository 436 isfurther adapted to store a plurality of default subject line messages.In one embodiment, the default subject line messages include informationrelated to a reason for a telephone call (e.g., health issue, question,weekend plans, advice). Further, the reason for the telephone call mayinclude the nature of the telephone call (e.g., an urgency of thetelephone call). Providing the reason for the telephone call via thesubject line message may enable called parties to decide whether toanswer an incoming telephone call or to reject the incoming telephonecall. Caller ID information may not be available at times (e.g., a PBXnumber), and even if Caller ID information is available it provides noinformation about the reason for the telephone call or the urgency ofthe telephone call. The web portal interface 432 is further adapted todisplay one or more of the plurality of default subject line messagesfor user selection. Alternatively, the web portal interface 432 mayreceive a user defined subject line message. For example, the userdefined subject line message allows a user to provide a non-genericmessage not displayed in the list of default subject line messages.Thus, the user of an end-user communication device (e.g., the wirelessdevice 426) may select a default subject line message or may provide acustom subject line message.

In a particular embodiment, the user defined subject line message may bescreened to determine whether the message includes allowable subjectmatter. In one embodiment, the web server logic 434 includes logic todetermine whether the user defined subject line message includesallowable subject matter, which may include logic to identify offensivesubject matter contained in the user defined subject line message. Forexample, user defined subject line messages may be screened forallowable subject matter based on parental control settings or otherinformation associated with a particular subscriber account. In thismanner, the web server logic 434 may remove or otherwise restrictsubject matter deemed offensive to a particular user or owner of aparticular end-user communication device. In one embodiment, the webserver logic 434 includes logic to store the user defined subject linemessage when the user defined subject line message includes allowablesubject matter. Subject matter that is deemed allowable based on the webserver filtering process is stored within the subject line messagerepository 436. In one embodiment, the web server logic 434 includeslogic to reject the user defined subject line message when the userdefined subject line message does not include allowable subject matter.Subject matter that is not deemed allowable based on the web serverfiltering process is rejected and not stored within the subject linemessage repository 436.

In a particular embodiment, the web portal interface 432 is adapted toallow the user to enable or disable subject line message services. Inanother particular embodiment, the web portal interface 432 is adaptedto receive a user selection of one or more telephone numbers of callersthat are authorized to send subject line messages, and the web serverlogic 434 includes logic to store the one or more authorized telephonenumbers at the subject line message repository 436 as a list of enabledtelephone numbers. In another particular embodiment, the web portalinterface 432 is adapted to receive a user selection of one or moretelephone numbers of callers that are not authorized to send subjectline messages, and the web server logic 434 includes logic to store theone or more unauthorized telephone numbers at the subject line messagerepository 436 as a list of disabled telephone numbers. For example, thecalled party may want only team members or a supervisor to be able tosend subject line messages (e.g., a caller white list), while othercallers are not allowed to send subject line messages (e.g., a callerblack list). Thus, the caller white list may be stored to allowtransmission of subject line messages from authorized callers, and thecaller black list may also be stored to block transmission of subjectline messages from unauthorized callers. In this manner, the receivingparty (e.g., the called party) can provide for further security andfilters with respect to subject line message communications.

After storage at the subject line message repository 436, information444 including the user selected subject line message 430, the messageidentifier 418 and the at least one UID 438 is sent from the subjectline message repository 436 to the device management server logic 442 ofthe device management server 441. The caller device interface 440 of thedevice management server 441 receives the information 444 from thedevice management server logic 442 and transmits the information 444through the IP Access Network 428 for storage at one or more of theend-user communication devices. For example, the one or more end-usercommunication devices may include the wireless device 426, the hand-heldcomputing device 451, the laptop computer 452, the desktop computer 453,or the VoIP telephone 454, among other alternatives. The information 444includes a particular UID 438 associated with a particular end-usercommunication device. As noted above, in the event that the user selectsmore than one end-user communication device to receive the user selectedsubject line message 430, each selected end-user communication devicereceives a different UID 438 (e.g. a first UID associated with wirelessdevice 426, and a second UID associated with VoIP telephone 454).

After receipt of the information 444 from the device management server441, the end-user communication device (e.g., a caller device such asthe wireless device 426) may store the information 444 including theuser selected subject line message 430, the message identifier 418, andthe UID 438 associated with the particular device in memory. Aspreviously described, the message identifier 418 is used to retrieve theuser selected subject line message 430 from the subject line messagerepository 436. Thus, storing the message identifier 418 at the end-usercommunication device prevents a user from editing or modifying the userselected subject line message 430 in order to send a subject linemessage containing offensive subject matter. Further, the UID 438 may beused to ensure that subject line messages are sent from authorizedend-user communication devices, as described below.

A caller may select the user selected subject line message 430 at acaller device for transmission to a called party device, allowing thecaller to provide information to a called party related to a reason fora telephone call. In one embodiment, the caller selects the userselected subject line message 430 via a keypad, touchscreen, or otherinput at the caller device. For example, a caller at the wireless device426 may want to provide a reason for the telephone call to the calledparty at the VoIP telephone 454. A call setup signaling message 416including the message identifier 418 is communicated from the wirelessdevice 426 to the SIP proxy server 414. The message identifier 418 isthen communicated via the call setup interface 412 of the subject linemessaging application server 401. The subject line messaging applicationserver logic 406 retrieves a subject line message 422 associated withthe message identifier 418 from the subject line message repository 436of the web server 435. The subject line messaging application serverlogic 406 communicates the subject line message 422 via the call setupinterface 412 to the SIP proxy server 414. The call setup signalingmessage 416 including the subject line message 422 is communicated fromthe SIP proxy server 414 via the IP Access Network 428 to the calledparty device (e.g., the VoIP telephone 454). Thus, in a particularembodiment, the message identifier 418 of the call setup signalingmessage 416 received from the caller device (e.g., the wireless device426) is translated into the subject line message 422 for delivery viathe IP Access Network 428 to the called party device (e.g., the VoIPtelephone 454).

The home subscriber server (HSS) 424 is adapted to provide IP basedauthorization, accounting and authentication (AAA) functions and isadapted to store one or more subscriber profiles, registration data,network policy rules, or any combination thereof. The SIP proxy server414 also includes logic to retrieve data from the HSS 424. In oneembodiment, the SIP proxy server 414 retrieves data from the HSS 424based on a particular subscriber phone number associated with aparticular end-user communication device.

In addition, the SIP proxy server 414 includes IP Multimedia Subsystem(IMS) session call session control functions (S-CSCF). In oneembodiment, the SIP proxy server 414 includes originating S-CSCF andterminating S-CSCF. In a particular embodiment, the originating S-CSCFretrieves an originating initial filter criteria (iFC) from the HSS 424,and the terminating S-CSCF retrieves a terminating iFC from the HSS 424.In one embodiment, the originating iFC and the terminating iFC are usedby the SIP proxy server 414 to route the telephone call to the subjectline messaging application server 401, which manages the subject linemessage services of caller devices and called party devices.

The subject line messaging application server 401 may be used to preventsubject line messages being sent from a particular caller device. Forexample, the particular caller device may be associated with asubscriber that has disabled the subject line message service. As afurther example, the caller may be delinquent on an account (e.g., thecaller has not paid one or more recent bills). In the event that thesubscriber associated with the particular caller device (e.g., thecaller device 340 of FIG. 3) has disabled the service, a SIP subjectheader (e.g., the SIP subject header 308 of FIG. 3) including themessage identifier (e.g., the message identifier 310 of FIG. 3) isremoved from a SIP INVITE message (e.g., the SIP INVITE message 306 ofFIG. 3). Otherwise, the subject line message (e.g., the subject linemessage 334 of FIG. 3) is retrieved from the subject line messagerepository (e.g., the subject line message repository 316 of FIG. 3)based on the message identifier.

The subject line messaging application server 401 may also be used toprevent subject line messages being sent to a particular called partydevice. For example, the particular called party device may beassociated with a subscriber that has disabled the subject line messageservice. As a further example, the called party may be delinquent on anaccount (e.g., the called party has not paid one or more recent bills).In the event that the subscriber associated with the particular calledparty device (e.g., the called party device 342 of FIG. 3) has disabledthe service, a modified SIP subject header (e.g., the modified SIPsubject header 332 of FIG. 3) including the subject line message (e.g.,the subject line message 334 of FIG. 3) is removed from the SIP INVITEmessage (e.g., the SIP INVITE message 306 of FIG. 3). As a furtherexample, the subscriber associated with a particular called party devicemay have created a white list or a black list. If a particular callerdevice (e.g., the caller device 340 of FIG. 3) is included in the whitelist, the modified SIP subject header including the subject line messageis transmitted to the particular called party device. If the particularcaller device is included in the black list, the modified SIP subjectheader including the subject line message is removed from the SIP INVITEmessage. In one embodiment, the SIP proxy server 414 retrievesinformation related to the white list and the black list from the HSS424 based on the UID of the particular caller device.

Referring to FIG. 5, a first particular embodiment of a web portalinterface is illustrated, at 500. In a particular embodiment, the webportal interface 432 as shown in FIG. 4 may be implemented as the webportal interface 500 as shown in FIG. 5. Referring to FIG. 5, in aparticular embodiment, the web portal interface 500 includes an area 503for a user to select a default subject line message from a list ofpredetermined subject line messages. For example, a default subject linemessage may include the text “Urgent—Health Issue” 504,“Urgent—Question” 506, “Not Urgent—Weekend Plans” 508, “NotUrgent—Advice” 510, among other alternatives. A user may select one ormore of the default subject line messages using a checkbox 511 or otherselection means. In the embodiment shown in FIG. 5, the web portalinterface 500 includes an area 513 for the user to enter a user definedsubject line message. For example, the user may enter user definedsubject line message text into a text box 514. Upon entering the userdefined subject line message text at the text box 514, the user mayclick a submit button 516 to submit the user defined subject linemessage. In one embodiment, after clicking the submit button 516 tosubmit the user defined subject line message, the system determineswhether the user defined subject line message includes allowable subjectmatter. In the embodiment shown in FIG. 5, the web portal interface 500includes an area 515 for the user to select one or more caller devicesto receive one or more subject line messages. For example, the one ormore caller devices may include the VoIP telephone 518, the desktopcomputer 520, the laptop computer 522, or the wireless telephone 524,among other alternatives. The user may request that the one or more userselected subject line messages be transmitted to the selected callerdevices by clicking a download button 526. For example, the one or moresubject line messages may be transmitted to the one or more callerdevices via the caller device interface 440 of the device managementserver 411, as shown in FIG. 4.

Referring to FIG. 6, a second particular embodiment of a web portalinterface is illustrated, at 600. When a user enters a user definedsubject line message 604 at the text box 514, the system determineswhether the user defined subject line message 604 contains allowablesubject matter. For example, in the particular embodiment shown in FIG.6, the user defined subject line message 604 includes the message“ANSWER YOUR PHONE #$%@#.” Because the user defined subject line message604 contains offensive subject matter, a message 606 may be displayed.For example, the message 606 may include the message, “The Message YouEntered Contains Offensive Subject Matter. Please Enter a New Message”.A user may then enter a new user defined subject line message 604 at thetext box 514. In the event that the user defined subject line message604 includes allowable subject matter, the user defined subject linemessage 604 is stored at a subject line message repository, such as thesubject line message repository 436 of FIG. 4. Thus, the system includesa filtering process that automatically filters user defined subject linemessages for suspicious or abusive language. In one embodiment,suspicious or abusive language may be flagged for administrator reviewor approval.

Referring to FIG. 7, a third particular embodiment of a web portalinterface is illustrated, at 700. The web portal interface 700 includesan area 702 to enable or disable a subject line message service. Forexample, a user may click an enable button 704 to enable the subjectline message service. Alternatively, the user may click a disable button706 to disable the subject line message service.

In one embodiment, the web portal interface 700 includes an area 708 toreceive a user selection of one or more telephone numbers from whichsubject line messages may be received. For example, the user may enterone or more authorized telephone numbers into a text box 710. Uponentering the one or more authorized telephone numbers at the text box710, the user may click a submit button 712 to submit the authorizedtelephone numbers. In one embodiment, the one or more authorizedtelephone numbers are stored as a list of enabled telephone numbers at asubject line message repository, such as the subject line messagerepository 436 of FIG. 4.

In another embodiment, the web portal interface 700 includes an area 714to receive a user selection of one or more telephone numbers from whichsubject line messages may not be received. For example, the user mayenter one or more unauthorized telephone numbers into a text box 716.Upon entering the one or more unauthorized telephone numbers at the textbox 716, the user may click a submit button 718 to submit theunauthorized telephone numbers. In one embodiment, the one or moreunauthorized telephone numbers are stored as a list of disabledtelephone numbers at the subject line message repository, such as thesubject line message repository 436 of FIG. 4.

Referring to FIG. 8, an illustrative embodiment of a general computersystem is shown and is designated 800. The computer system 800 caninclude a set of instructions that can be executed to cause the computersystem 800 to perform any one or more of the methods or computer basedfunctions disclosed herein. The computer system 800 may operate as astandalone device or may be connected, e.g., using a network, to othercomputer systems or peripheral devices. For example, the generalcomputer system 800 may include or be included within any one or more ofthe end-user communication devices (e.g. caller devices and called partydevices), servers, repositories, and network equipment illustrated inFIG. 3 and FIG. 4.

In a networked deployment, the computer system may operate in thecapacity of a server or as a client user computer in a server-clientuser network environment, or as a peer computer system in a peer-to-peer(or distributed) network environment. The computer system 800 can alsobe implemented as or incorporated into various devices, such as apersonal computer (PC), a tablet PC, a set-top box (STB), a personaldigital assistant (PDA), a mobile device, a palmtop computer, a laptopcomputer, a desktop computer, a communications device, a wirelesstelephone, a land-line telephone, a control system, a camera, a scanner,a facsimile machine, a printer, a pager, a personal trusted device, aweb appliance, a network router, switch or bridge, or any other machinecapable of executing a set of instructions (sequential or otherwise)that specify actions to be taken by that machine. In a particularembodiment, the computer system 800 can be implemented using electronicdevices that provide voice, video or data communication. Further, whilea single computer system 800 is illustrated, the term “system” shallalso be taken to include any collection of systems or sub-systems thatindividually or jointly execute a set, or multiple sets, of instructionsto perform one or more computer functions.

As illustrated in FIG. 8, the computer system 800 may include aprocessor 802, e.g., a central processing unit (CPU), a graphicsprocessing unit (GPU), or both. Moreover, the computer system 800 caninclude a main memory 804 and a static memory 806, that can communicatewith each other via a bus 808. As shown, the computer system 800 mayfurther include a video display unit 810, such as a liquid crystaldisplay (LCD), an organic light emitting diode (OLED), a flat paneldisplay, a solid state display, or a cathode ray tube (CRT).Additionally, the computer system 800 may include an input device 812,such as a keyboard, and a cursor control device 814, such as a mouse.The computer system 800 can also include a disk drive unit 816, a signalgeneration device 818, such as a speaker or remote control, and anetwork interface device 820.

In a particular embodiment, as depicted in FIG. 8, the disk drive unit816 may include a computer-readable medium 822 in which one or more setsof instructions 824, e.g. software, can be embedded. Further, theinstructions 824 may embody one or more of the methods or logic asdescribed herein. In a particular embodiment, the instructions 824 mayreside completely, or at least partially, within the main memory 804,the static memory 806, and/or within the processor 802 during executionby the computer system 800. The main memory 804 and the processor 802also may include computer-readable media.

In an alternative embodiment, dedicated hardware implementations, suchas application specific integrated circuits, programmable logic arraysand other hardware devices, can be constructed to implement one or moreof the methods described herein. Applications that may include theapparatus and systems of various embodiments can broadly include avariety of electronic and computer systems. One or more embodimentsdescribed herein may implement functions using two or more specificinterconnected hardware modules or devices with related control and datasignals that can be communicated between and through the modules, or asportions of an application-specific integrated circuit. Accordingly, thepresent system encompasses software, firmware, and hardwareimplementations.

In accordance with various embodiments of the present disclosure, themethods described herein may be implemented by software programsexecutable by a computer system. Further, in an exemplary, non-limitedembodiment, implementations can include distributed processing,component/object distributed processing, and parallel processing.Alternatively, virtual computer system processing can be constructed toimplement one or more of the methods or functionality as describedherein.

The present disclosure contemplates a computer-readable medium thatincludes instructions 824 or receives and executes instructions 824responsive to a propagated signal, so that a device connected to anetwork 826 can communicate voice, video or data over the network 826.Further, the instructions 824 may be transmitted or received over thenetwork 826 via the network interface device 820.

While the computer-readable medium is shown to be a single medium, theterm “computer-readable medium” includes a single medium or multiplemedia, such as a centralized or distributed database, and/or associatedcaches and servers that store one or more sets of instructions. The term“computer-readable medium” shall also include any medium that is capableof storing, encoding or carrying a set of instructions for execution bya processor or that cause a computer system to perform any one or moreof the methods or operations disclosed herein.

In a particular non-limiting, exemplary embodiment, thecomputer-readable medium can include a solid-state memory such as amemory card or other package that houses one or more non-volatileread-only memories. Further, the computer-readable medium can be arandom access memory or other volatile re-writable memory. Additionally,the computer-readable medium can include a magneto-optical or opticalmedium, such as a disk or tapes or other storage device to capturecarrier wave signals such as a signal communicated over a transmissionmedium. A digital file attachment to an e-mail or other self-containedinformation archive or set of archives may be considered a distributionmedium that is equivalent to a tangible storage medium. Accordingly, thedisclosure is considered to include any one or more of acomputer-readable medium or a distribution medium and other equivalentsand successor media, in which data or instructions may be stored.

A next generation network (NGN) that includes 3GPP IMS standards hasbeen illustrated. The NGN system uses a SIP Protocol for call setupsignaling. The NGN architecture separates network accesses, such ascontrol and application services to allow rapid deployment of newapplication services and features. The NGN network is capable ofproviding a large variety of real time multimedia communication servicesconsistently over various network access interfaces. Accordingly, thedisclosed system provides a framework that enable callers to sendsubject line messages along with call setup signaling messages to informthe called party about the nature of the call before the call isanswered. The disclosed framework enhances user end-point devicecapabilities for sending and receiving and displaying by introducing anew application server to store messages and also to insert the subjectline messages in the call offered to the called party device. Thedisclosed system and method is based on SIP standards to provideinter-operability in a particular embodiment. The subject line messageservice provides an enhanced service provider web portal to allow usersto create and store messages to be sent at call setup time. The systemalso allows a user to enable or disable the service by callers andcalled parties and enables filtering of subject line messages forallowable subject matter. The system further includes a scan processthat automatically filters newly created messages for suspicious orabusive language and flags such language for administrator review andapproval. In addition, the system includes a method to propagateapproved messages including subject line information to a variety ofdifferent customer premises equipment (CPE) devices owned by the messagecreator. In addition, the system and method allows a user to set-up anauthorize a list of people that can send and receive the subject linemessages as defined.

Although the present specification describes components and functionsthat may be implemented in particular embodiments with reference toparticular standards and protocols, the disclosed embodiments are notlimited to such standards and protocols. For example, standards forInternet and other packet switched network transmission (e.g., TCP/IP,UDP/IP, HTML, HTTP) represent examples of the state of the art. Suchstandards are periodically superseded by faster or more efficientequivalents having essentially the same functions. Accordingly,replacement standards and protocols having the same or similar functionsas those disclosed herein are considered equivalents thereof.

The illustrations of the embodiments described herein are intended toprovide a general understanding of the structure of the variousembodiments. The illustrations are not intended to serve as a completedescription of all of the elements and features of apparatus and systemsthat utilize the structures or methods described herein. Many otherembodiments may be apparent to those of skill in the art upon reviewingthe disclosure. Other embodiments may be utilized and derived from thedisclosure, such that structural and logical substitutions and changesmay be made without departing from the scope of the disclosure.Additionally, the illustrations are merely representational and may notbe drawn to scale. Certain proportions within the illustrations may beexaggerated, while other proportions may be reduced. Accordingly, thedisclosure and the figures are to be regarded as illustrative ratherthan restrictive.

One or more embodiments of the disclosure may be referred to herein,individually and/or collectively, by the term “invention” merely forconvenience and without intending to voluntarily limit the scope of thisapplication to any particular invention or inventive concept. Moreover,although specific embodiments have been illustrated and describedherein, it should be appreciated that any subsequent arrangementdesigned to achieve the same or similar purpose may be substituted forthe specific embodiments shown. This disclosure is intended to cover anyand all subsequent adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, will be apparent to those of skill in theart upon reviewing the description.

The Abstract of the Disclosure is provided with the understanding thatit will not be used to interpret or limit the scope or meaning of theclaims. In addition, in the foregoing Detailed Description, variousfeatures may be grouped together or described in a single embodiment forthe purpose of streamlining the disclosure. This disclosure is not to beinterpreted as reflecting an intention that the claimed embodimentsrequire more features than are expressly recited in each claim. Rather,as the following claims reflect, inventive subject matter may bedirected to less than all of the features of any of the disclosedembodiments. Thus, the following claims are incorporated into theDetailed Description, with each claim standing on its own as definingseparately claimed subject matter.

The above-disclosed subject matter is to be considered illustrative, andnot restrictive, and the appended claims are intended to cover all suchmodifications, enhancements, and other embodiments, which fall withinthe true spirit and scope of the present invention. Thus, to the maximumextent allowed by law, the scope of the present invention is to bedetermined by the broadest permissible interpretation of the followingclaims and their equivalents, and shall not be restricted or limited bythe foregoing detailed description.

1. A method, comprising: receiving a call setup signaling message,wherein the call setup signaling message includes a message identifier;determining a subject line message associated with the messageidentifier of the call setup signaling message; replacing the messageidentifier of the call setup signaling message with the subject linemessage; and transmitting the call setup signaling message to a calledparty.
 2. The method of claim 1, wherein the subject line messageincludes information provided by a caller to the called party related toa reason for a telephone call.
 3. The method of claim 1, wherein thecall setup signaling message is received via an Internet Protocol (IP)Access network, and the call setup signaling message is transmitted viathe IP Access network.
 4. The method of claim 1, wherein receiving thecall setup signaling message includes receiving a Session InitiationProtocol (SIP) INVITE message, wherein the SIP INVITE message includes aSIP subject header, wherein the SIP subject header includes the messageidentifier.
 5. The method of claim 4, wherein determining the subjectline message associated with the message identifier includes retrievingthe subject line message from a subject line message repository based onthe message identifier of the received SIP INVITE message and replacingthe message identifier with the subject line message, wherein thesubject line message repository includes a plurality of subject linemessages, wherein each of the plurality of subject line messages isassociated with a particular message identifier.
 6. The method of claim5, wherein transmitting the call setup signaling message to the calledparty includes transmitting the SIP INVITE message to the called party,wherein the transmitted SIP INVITE message includes a modified SIPsubject header, wherein the modified SIP subject header includes thesubject line message.
 7. The method of claim 1, further comprising:transmitting the call setup signaling message to the called party when acaller is authorized to send the subject line message.
 8. The method ofclaim 7, further comprising determining whether the caller is authorizedto send the subject line message by determining whether the caller isincluded in a list of subscribers to a subject line message service. 9.The method of claim 7, further comprising determining whether the calleris authorized to send the subject line message to the called party bydetermining whether a telephone number of the caller is included in alist of authorized caller telephone numbers.
 10. The method of claim 1,further comprising: determining whether the called party is authorizedto receive the subject line message by determining whether the calledparty is included in a list of subscribers to a subject line messageservice; and transmitting the call setup signaling message to the calledparty when the called party is authorized to receive the subject linemessage.
 11. A communication system, comprising: a processor; a memorycoupled to the processor; a call setup interface adapted to receive acall setup signaling message from a caller device, wherein the callsetup signaling message includes a message identifier; logic todetermine a subject line message associated with the message identifier;logic to replace the message identifier of the call setup signalingmessage with the subject line message; and logic to transmit the callsetup signaling message to a called party device via the call setupinterface.
 12. The system of claim 11, further comprising: a subjectline message repository adapted to store at least one subject linemessage and at least one message identifier associated with the at leastone subject line message; wherein the logic to determine the subjectline message associated with the message identifier includes logic toretrieve the subject line message from the subject line messagerepository based on the message identifier of the received call setupsignaling message.
 13. The system of claim 12, further comprising: a webportal interface adapted to: receive a user selected subject linemessage; and receive a user selection of at least one caller device toreceive the user selected subject line message; logic to determine themessage identifier of the user selected subject line message; logic todetermine at least one unique identifier (UID) associated with the atleast one caller device; logic to store the user selected subject linemessage, the message identifier of the user selected subject linemessage, and the at least one UID associated with the at least onecaller device at the subject line message repository.
 14. The system ofclaim 13, wherein the subject line message repository is further adaptedto store a plurality of default subject line messages, and wherein theweb portal interface is further adapted to display one or more of theplurality of default subject line messages for user selection.
 15. Thesystem of claim 13, wherein the web portal interface is further adaptedto receive a user defined subject line message.
 16. The system of claim15, further comprising logic to determine whether the user definedsubject line message includes allowable subject matter.
 17. The systemof claim 16, wherein the logic to determine whether the user definedsubject line message includes allowable subject matter includes logic toidentify offensive subject matter.
 18. The system of claim 16, furthercomprising: logic to store the user defined subject line message at thesubject line message repository when the user defined subject linemessage includes allowable subject matter; and logic to reject the userdefined subject line message when the user defined subject line messagedoes not include allowable subject matter.
 19. The system of claim 13,wherein the web portal interface is further adapted to receive a userselection of one or more telephone numbers from which subject linemessages may be received, and further comprising logic to store the oneor more telephone numbers at the subject line message repository as alist of enabled telephone numbers.
 20. The system of claim 13, whereinthe web portal interface is further adapted to receive a user selectionof one or more telephone numbers from which subject line messages maynot be received, and further comprising logic to store the one or moretelephone numbers at the subject line message repository as a list ofdisabled telephone numbers.
 21. The system of claim 13, furthercomprising: a caller device interface; and logic to transmit the userselected subject line message, the message identifier of the userselected subject line message, and the UID of the at least one callerdevice to the at least one caller device via the caller deviceinterface.
 22. The system of claim 21, wherein the at least one callerdevice includes at least one of a Voice over Internet Protocol (VoIP)telephone, a desktop computer, a laptop computer, and a wirelesstelephone.
 23. The system of claim 21, further comprising: a HomeSubscriber Server (HSS) adapted to provide IP-based authorization,accounting and authentication (AAA) functions and adapted to store oneor more of subscriber profiles, registration data, and network policyrules; and a Session Initiation Protocol (SIP) proxy server, comprising:IP Multimedia Subsystem (IMS) Session Call Session Control Functions(S-CSCF); and logic to retrieve data from the HSS based on the at leastone UID associated with the at least one caller device.
 24. Acomputer-readable storage medium comprising operational instructionsthat, when executed by a processor, cause the processor to: receive acall setup signaling message from a caller device, wherein the callsetup signaling message includes a Session Initiation Protocol (SIP)INVITE message, wherein the received SIP INVITE message includes a SIPsubject header, wherein the SIP subject header includes a messageidentifier; determine a subject line message associated with the messageidentifier based on a predetermined list, wherein the predetermined listincludes a plurality of subject line messages, wherein each of theplurality of subject line messages is associated with a particularmessage identifier; replace the message identifier of the call setupsignaling message with the subject line message; and transmit the callsetup signaling message to a called party device, wherein transmittingthe call setup signaling message to the called party device includestransmitting the SIP INVITE message to the called party device, whereinthe transmitted SIP INVITE message includes a modified SIP subjectheader, wherein the modified SIP subject header includes the subjectline message.