Methods and apparatus for providing call screening and other communication services

ABSTRACT

Call screening is provided by a call processing method, involving detecting a first call directed to the premises of a service subscriber requesting call processing instructions from a service control point in response to the first call, operating the service control point to instruct the signal switching point to temporarily park the first call at the signal switching point, and controlling the disposition of the first call as a function of a determination as to whether a second call to the service subscriber was answered by a machine or a human being.

FIELD OF THE INVENTION

The present invention is directed to communications systems and, moreparticularly, to methods and apparatus for providing call screening andother communication services.

BACKGROUND OF THE INVENTION

In modern times, telephones have become almost a necessity. Telephonesare found in most homes and offices. Marketers have found that thetelephone can be used as a powerful sales tool. Telephones provide a wayof reaching a potential customer who frequently would not be willing tospeak with the marketer if they knew it was a salesperson calling.

Various attempts have been made to shield telephone subscriber's fromunwanted calls, e.g., telemarketer calls. Having an unlisted telephonenumber provides some protection from unsolicited calls from the publicat large. Computer controlled sequential dialing of multiple numbers iscommonly performed by telemarketers with the express intention ofreaching both listed and unlisted telephone service subscribers.Accordingly, unlisted numbers provide little protection fromtelemarketers.

Most telephone systems today use SS7 (Signaling System 7) standards forcommunication of telephone calls. SS7 is a digital communicationsprotocol which supports various messaging and call information featureswhich facilitate a variety of telephone services. SS7 facilitatesadvanced intelligent network (AIN) call processing. Such processingnormally includes call handling instructions being obtained by a switchfrom a service control point (SCP). The SCP normally includes logic,e.g., call processing records, used to provide a switch with specificcall processing instructions as a function of information obtained froma database and/or call information provided by the switch or anothersource. The logic in a switch used to initiate a request to an SCP forcall processing instructions is normally referred to as a trigger or anAIN trigger.

The SS7 messaging associated with a telephone call, includes a caller IDfield which incorporates the caller's telephone number as well as acaller ID display field. By setting a caller ID blocking bit in thecaller ID display field, the display of caller ID information to thecalled party is prohibited. Accordingly, SS7 provides information whichcan be useful in identifying a caller but may be blocked from beingdisplayed to a called party.

Unfortunately, in some places in this country and around the world,older analog telephone circuitry remains in use. When a telephone callis routed between telephone switches using this old analog technology,the caller ID information provided by the digital SS7 messaging standardis normally lost.

In order to avoid having to answer calls from unwanted parties, e.g.,telemarketers, telephone customer's often subscribe to a caller IDservice or an enhanced caller ID service. With basic caller ID service,assuming the call is not passed between switches over analog lines andthe caller does not activate caller ID blocking, the calling party'stelephone number will be displayed to the called party.

In the case of enhanced caller ID service, the calling party's telephonenumber is used to perform a database look-up operation which associatesthe calling party's telephone number with a name in a database, e.g., aline information database (LIDB). Both the name and the calling party'stelephone number are then displayed to the called party allowing thecalled party to make an educated decision as to whether or not to answerthe phone call. Unfortunately, not all telephone companies share nameand phone number information. In addition, even when the phone companiesdo exchange such information, names associated with unlisted telephonenumbers may be omitted from the database used for providing nameinformation to caller-ID service subscribers.

Telemarketers generally take steps to make sure that caller-ID nameinformation is not available to local telephone companies in regionsthey are calling. Thus, in the case of most telemarketer calls,subscribers to caller ID services are, at best, provided a telephonenumber but no identifying name when being called by a telemarketer.Common caller-ID conditions which are encountered in the case oftelemarketers are 1) name not available and 2) out of area. Caller IDblocked may be yet another condition which may be encountered.

In order to avoid disturbing telephone subscribes with calls for whichcaller-ID information is blocked or unavailable, a variety of callscreening systems have been designed. U.S. Pat. Nos. 5,497,414 and5,533,106 describe known call screening systems.

Known call screening services allow a subscriber to the service toprogram, prior to receipt of a call, how telephone calls for whichcaller-ID information is blocked or unavailable should be handled. Thisis done by having the service subscriber provide a list of desired callhandling instructions used to create a call processing record (CPR). Thecall handling instructions may include, e.g., rejecting calls for whichcaller-ID information is unavailable or blocked, sending such calls tovoice mail, or allowing calls for which a preselected call screeningoverride code has been entered to be connected to the called party.

Such call screening services provide a useful tool against telemarketersand other unwanted callers. However, the known systems have severaldrawbacks. For example they fail to provide the call screening servicesubscriber the opportunity to receive calls from individuals who do nothave a valid override code and whose caller-ID information is notavailable for legitimate reasons. For example, a calling party's callerId information may be unavailable because the caller is traveling andcalling from a pay phone or other phone for which caller-ID informationis unavailable.

Another disadvantage of the known systems, is that calls may be blockedeven when the called party is not home. From the calling party'sperspective, such a situation may be undesirable since the calling partymay be denied the opportunity to leave a message for the called party onan answering machine located on the called premises. From the telephonecompany's perspective, such a situation is undesirable since thetelephone company may be denied revenue that could be collected bycompleting the call to an answering machine located at the calledparty's premises.

In view of the above discussion, it is apparent that there is a need fornew and improved call screening methods. It is desirable that at leastsome of the methods provide a manner for informing a called party of acall for which caller ID information is blocked or unavailable and forallowing the called party to make a knowledgeable decision on how todispose of the call while the calling party is still on the line. It isalso desirable that at least some of the methods allow for a call to becompleted to an answering machine located at the called premises or to avoicemail system.

SUMMARY OF THE INVENTION

The present invention is directed to methods and apparatus which can beused to provide call screening and other communication services.

In one exemplary embodiment, calls to call screening service (CSS)subscribers are detected at the central office switch to which thecalled party's premises are connected using a terminating attempttrigger. Upon detecting a call directed to a CSS subscriber, a check ismade to see if caller ID information is blocked or unavailable. If thecaller ID information is blocked or unavailable, and the calling partydoes not enter a call screening override code, the call is connected toan intelligent peripheral (IP) which is used to play messages to thecalling and/or called party, to collect information and/or menuselection entries from the calling and/or called party, and to controlultimate disposition of the call.

As part of the call screening processing performed by the IP, in oneexemplary embodiment, the IP records spoken caller identificationinformation. The IP then calls the CSS subscriber to whom the call wasdirected. The terminating attempt trigger at the caller's switch detectsthe call from the IP to the CSS subscriber. However, since this secondcall to the caller is from the IP, the service control point responsiblefor providing call processing instructions to the switch result in theswitch connecting the call from the IP to the subscriber's premises.

The IP is programmed to detect whether a human or machine answers the IPinitiated call to the subscriber premises and to control subsequent callprocessing based on whether the call is answered by a human or machine.The manner in which a human or machine response is detected can varydepending on the embodiment.

In one exemplary embodiment, connection to an answering machine isdetermined by detecting a tone, e.g., recording prompt, or other audioor electrical signal indicative of a response from an answering machine.

In another exemplary embodiment, upon detecting that the call to thesubscriber has been answered, the IP plays a message prompting for inputfrom the subscriber. If the requested input, e.g., specific numbersentered using the phone key pad or spoken words, are not entered, it isassumed that a machine has answered the call and the IP connects thecaller to the subscriber premises so a message may be left on theanswering machine located there. Alternatively, under suchcircumstances, the caller may be connected to a subscriber's voicemailsystem.

If the requested input is received from the subscriber premises, itindicates that a human has answered the IP's call. Upon receiving therequested input, the subscriber is played a recording of the caller'sname which was supplied by the caller and recorded by the IP. The calledparty is then provided a menu of call disposition options including,e.g., refuse the call, play a no salesperson message to the caller,transfer the call to voice mail (if the CSS subscriber is also a VMSsubscriber) and accept the call. In response to detection of a calldisposition selection made by the subscriber, the IP implements therequested disposition option.

In the exemplary embodiment, when the forward to voice mail option isselected by the CSS subscriber, the IP's call to the CSS subscriber isfirst terminated. A new call to the CSS subscriber is then initiated bythe IP. This results in the terminating attempt trigger on the CSSsubscriber's line to be triggered for a third time. In response to arequest for call processing instructions initiated by the third triggerevent, a service control point (SCP) instructs the subscriber's switchto transfer the call from the IP to the subscriber's VMS system. Thecalling party is then connected by the IP to the called party's VMSsystem where the caller can leave a message.

The above described call screening service makes significant use of anIP's capability to play messages, collect information, and control calldisposition in response to received input. In addition, it allows a CSSsubscriber to interact with the IP while a caller is on the line therebyallowing individual customized disposition of individual calls based onorally supplied caller identification information. Notably, the CSSprocess of the present invention is able to determine whether a call isanswered by a human or an answering machine. This allows users tocontinue to use answering machines while still benefiting from callscreening service features which allow for real time call dispositioninput from a called party when available.

Various additional features and advantages of the present invention willbe apparent from the detailed description which follows.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a communication system implemented in accordance withan exemplary embodiment of the present invention.

FIG. 2 illustrates an intelligent peripheral (IP) used in the system ofFIG. 1.

FIG. 3, which comprises the combination of FIGS. 3A and 3B, illustratesthe steps of the present invention associated with processing a calldirected to a call screening service subscriber.

FIG. 4 illustrates a voice mail service (VMS) subscriber called partyselection detection routine which can be executed by the IP of FIG. 2.

FIG. 5 illustrates a non-VMS subscriber called party selection detectionroutine which can be executed by the IP of FIG. 2.

FIG. 6 illustrates steps associated with implementing a caller IDsubscriber's call disposition selection in accordance with the presentinvention.

FIG. 7 illustrates the steps of an error handling routine.

DETAILED DESCRIPTION

As discussed above, the present invention is directed to methods andapparatus for providing call screening and other communication services.FIG. 1 illustrates a communication system 100 implemented in accordancewith the present invention. As illustrated, the system comprises a firstsignal switching point (SSP) 102 which may be, e.g., a central officeswitch, a signal transfer point (STP) 110, voice mail system 114, and asecond SSP 116 which are coupled to one another via a public switchedtelephone network (PSTN) 112. The PSTN 112 may use, e.g., SS7 signaling.

The first SSP 102 includes control logic 107 in addition to switchingand input/output (I/O) interface circuitry 109. First through thirdsubscriber premises 117, 117′, 117″ are coupled to the PSTN via thefirst SSP's circuitry 109. Each of the first through third subscriberpremises 117, 117′, 117″ includes a telephone 120, 122, 124,respectively. In addition, the first subscriber premise includes ananswering machine 119 for recording messages from callers who call thefirst subscriber premises 117 when the subscriber is unavailable. Thecontrol logic 107 is programmed to detect calls directed to callscreening service (CSS) premises which are connected to the first SSP102. A termination attempt trigger (TAT) is used for this purpose. Theswitch's control logic 107 is also programmed to seek call processinginstructions, e.g., from an SCP, and thereafter follow received callprocessing instructions, for calls which result in a TAT beingactivated.

For purposes of explanation, assume that the telephone customer locatedat the first subscriber premises 117 is a call screening servicesubscriber. In such a case, a TAT would be set at the SSP 102 to beactivated each time a call directed to the telephone numbercorresponding to the first subscriber premises 117 was detected at theswitch 102.

In order to provide AIN functionality and services such as the callscreening service of the present invention, the communication system 100includes a service control point (SCP) 106 and intelligent peripheral(IP) 104. The SCP 106 is coupled to the SSPs 102, 116 via the STP 10 andPSTN 112. The STP AND PSN are used to convey the control, data and/orvoice signals as is known in the art. The IP 104 is coupled to the SCPvia a TCP-IP connection 105. This connection may be used fortransferring data, e.g., call and/or input information, between the IP104 and SCP 106. The IP 104 is also coupled to the first switch 102. AnSS7 communications channel 103 is used for the connection between the IP104 and switch 102.

The SCP 106 may be implemented using conventional hardware which iscombined with instructions used to perform the novel call screeningprocessing of the present invention. The SCP 106 includes callprocessing records, designed in accordance with the present invention,which include call handling instructions to be provided to a switch 102in response to execution of a TAT trigger at the switch 102. The callprocessing instructions associated with a particular called number varydepending on the services to which the customer, corresponding to thecalled number, subscribes. The instructions provided to a switch inresponse to a particular call can depend on: input received from thecalling and/or called party, control information provided by SS7signaling such as ANI information, as well as other communication systemstatus information such as the on or off-hook condition of a line at aparticular point in time. The SCP 106 can access a line informationdatabase (LIDB) 108, via STP 110. In this manner, the SCP can obtaincaller ID information, e.g., calling party name information, using acalling party's telephone number, when the information is available fromthe LIDB. Based on the caller ID information and status of a caller IDblocking indicator included in a call, and/or any information returnedfrom the LIDB look-up operation, the SCP can determine whether caller IDinformation is unavailable, or caller ID blocked condition exists. Aswill be discussed below, any one of these conditions results in the SCP106 initiating call screening procedures in accordance with the presentinvention.

The second SSP 116, like the first SSP 102, may be implemented using acentral office switch, e.g., an SS7 capable switch. The second SSP 116is coupled to fourth through sixth subscriber premises 118, 118′ and118″. While fifth and sixth subscriber premises 118′, 118″ are privateresidences which merely include telephones 126, 128, respectively, thefirst subscriber premises 118 is a telemarketing facility. Thetelemarketing facility 118 includes a private branch exchange 130 and aplurality of telephones 132, 134, 136. Using the PBX 130, a telemarketerusing one of the phones 132, 134, 136, can sequentially call a series oftelephone numbers, e.g., the telephone numbers corresponding totelephone subscriber premises 117, 117′, 117″. Assuming that thetelephone subscriber located at the first subscriber premises 117subscribes to the call screening service of the present invention, atelemarketing call directed to the premises 117 would result in a TATbeing executed at the first switch 102.

The intelligent peripheral (IP) 104 is illustrated in greater detail inFIG. 2. As illustrated the IP 104 includes a DTMF detector/generatorcircuit 202, a text to speech (TTS) circuit 204, a speech recognizer206, audio recording and playback circuitry 208, a central processingunit CPU 212, memory 213 and switching and I/O circuitry 224 which arecoupled together by a bus 210. The switching and I/O interface circuitry224 is coupled to the SSP 102 via communications line 103 and to the SCP106 via TCP/IP connection 105. The circuitry 224 is responsible forperforming switching operations and for converting between protocolsused on the communication lines 103, 105 and various components coupledto the internal bus 210 thereby allowing the exchange of instructions,data and other signals between the SSP 102, SCP 106 and the variouscomponents of the IP 104.

The DTMF detector/generator 202 is used for detecting DTMF input from acaller and for generating DTMF signals used to place a call through theswitch 102. TTS circuit 204 is capable of generating audible speech fromelectronic text prompts. The TTS circuit 204 is useful for prompting acaller for input and/or for playing messages to a party to therebyprovide the party with call or service related information. The speechrecognizer 206 is capable of recognizing speech. In various embodiments,it is used to detect spoken digits received in response to a request fora numerical input, e.g., a numbered menu selection. The audiorecording/playback circuit 208 provides speech recording and playbackcapability. In various embodiments, it is used to store verbalidentification information, e.g., a spoken name, obtained from a callingparty and to later playback the recorded information to a called party.

The CPU 212 is responsible for controlling IP operation under directionof instructions included in the various routines stored in the memory213. As illustrated, the memory 213 includes call screening servicesubscriber information 214, a set of text prompts 216, CSS controlroutines 218 and audio recordings 222. In another embodiment, CSSinformation 214 is stored in the SCP 106 as opposed to the IP 104.

The CSS subscriber information 214 is stored in the IP and/or SCP,includes lists of CSS subscribers, identified by their correspondingtelephone numbers, information on whether they are also voice mailservice (VMS) subscriber's, one or more call screening override codesand related service billing information. As will be discussed below, theCSS subscriber information 214 is accessed and used by the CSS controlroutines 218 in controlling operation of the IP 104 to service a calldirected to a call screening service subscriber. Individual promptsincluded in the set of prompts 216, are supplied to the speech generator204 as required when performing a call screening operation. Audiorecordings 222 include recordings of spoken identification information,e.g., caller's names, generated by recording circuit 208. As will bediscussed below, the recording of a calling party's speech, e.g., spokenname, is played to a called party at specific times while performingcall screening in accordance with the present invention.

The CSS control routines 218 are executed by the IP 104 when a callscreening service is to be performed. The steps performed by the IPunder direction of the CSS control routines 218 will be discussed indetail below with regard to FIG. 3.

FIG. 3, which comprises the combination of FIGS. 3A and 3B, illustratesthe call processing method 300 of the present invention. The methodbegins in start step 302 wherein the components of the system 100 areinitialized. For example, in step 302 an AIN terminating attempt trigger(TAT) is set at the switch 102 on each of the lines corresponding to acall screening service subscriber. For purposes of explanation, it willbe assumed that the telephone customer located at customer premises 117is a call screening service subscriber. In such a case, in step 302, aTAT trigger is set to detect calls received at the switch 102 that aredirected to the telephone number corresponding to subscriber premises117.

Once the triggers are set in step 302 operation proceeds to step 304. Instep 304 the switch 102 is operated to use the triggers to detect callsdirected to call screening service subscribers.

Upon detecting a call to a call screening service subscriber, e.g., acall directed to customer premises 117, the TAT set at switch 102 isactivated and operation proceeds to step 306. In step 306, in responseto a call to customer premises 117, the switch 102 initiates a callprocessing instruction request to the SCP 106. As part of the request,the switch 102 passes called party identification information, e.g., thetelephone number called, calling party identification information, e.g.,ANI information, and caller-ID blocking status bit information to theSCP 106.

In response to the first request for call processing instructions, instep 308, the SCP 106 determines if the caller ID information is blockedor unavailable. This is done by examining the contents of the CallingParty ID parameter in the call processing query message sent to the SCP.If the calling party number is blank or the caller-Id blocking bit,which may be set by the caller, is set to prohibit display of caller IDinformation, the SCP 106 concludes that the caller ID is unavailable orblocked.

In step 308, if it is determined that the caller ID information is notblocked and is available, the SCP returns the caller ID information tothe switch 102 and instructs the switch to allow the call to becompleted to the called CSS subscriber 117. In step 310 the switch 102is operated to complete the call to the called CSS party, e.g.,subscriber premises 117, and the call is then allowed to terminate in anormal manner, e.g., with one of the parties hanging up.

However, if in step 308, it is determined that the calling party has thecaller ID blocked or that caller ID information is unavailable, the SCP106 instructs the switch 102 to use the IP 104 to obtain additionalinformation, e.g., identification information from the calling party,and operation proceeds to step 312. The switch 102 does this, in oneembodiment, by performing a send to outside resource operation inresponse to the instructions from the SCP 106 where the outside resourceis an IP 104.

In step 312, a retry counter, RC, which may be maintained by the IP 104,is initialized to 0. Next, in step 314, the IP 104 is used to play amessage, e.g., one of the prompts 216, to the calling party using speechgenerator 204. The message states: “THE CALLED PARTY HAS CALL SCREENINGAND DOES NOT ACCEPT CALLS FROM UNIDENTIFIED NUMBERS”. Then, in step 316the IP 104 is used to play another message to the calling party. Thistime the message states: “TO RECORD YOUR NAME, PLEASE PRESS THE # KEY ORSIMPLY STAY ON THE LINE”.

In response to this message the caller can, optionally, enter a callscreening override code. In this manner, a family member or otherindividual to whom the called party has provided override codeinformation can override the call screening process and be connected tothe called party even when caller ID information is blocked orunavailable.

From step 316, operation proceeds to step 318 wherein the SCP 106detects entry of an override code, entry of the pound symbol (#), or theoccurrence of a timeout condition. In step 320, a determination is madeas to whether or not an override code was entered. If an override code,e.g., one or more DTMF signals other than the # symbol, was enteredoperation proceeds to step 322.

In step 322 a check is made to determine if the override code was valid.This may involve a comparison of a received override coded to one ormore valid override codes stored in the CSS subscriber information 106for the CSS subscriber to whom the call was directed. If the receivedoverride code is valid for the called party, operation proceeds to step310 wherein the switch 102 connects the calling party to the calledparty.

However, if the override code is determined in step 322 to be invalid,operation proceeds to step 324 wherein the retry counter RC isincremented by one. Then in step 325 the value RC is compared to 4. IfRC is less than 4, operation proceeds to step 327 in order to providethe calling party another opportunity to enter an override code orprovide name information. In step 327, the IP plays the calling party amessage stating: “I'M SORRY I DID NOT UNDERSTAND WHAT YOU PRESSED.PLEASE TRY AGAIN”. With the playing of the message, operation proceedsfrom step 327 to step 316.

RC equaling or exceeding 4 indicates that the calling party has alreadyhad three unsuccessful attempts at entering an override code. If in step325 it is determined that RC is not less than 4, operation proceeds fromstep 325 to step 326. In step 326, the caller is played a messagestating: “THERE IS AN INPUT ERROR. GOOD BYE.” Then, in step 328, thecall is terminated by the switch 102.

In step 320, if it is determined that an override code has not beenentered, operation proceeds to step 330. In step 330, the switch 102 isinstructed to disconnect from the IP 104 . Then, in step 332, the switch102 is controlled to forward the call being processed to the IP 104. Atthis point, the transaction between the switch 102 and the SCP 106 whichwas initiated in response to the first call to the CSS subscriber 117 isclosed and the IP 104, under control of the CSS control routines 218,takes over call processing. Then in step 333 the retry counter RC isreset to 0. From step 333 operation proceeds to step 334.

In step 334, the IP 104 plays a recording prompt to the caller stating:“AT THE TONE, PLEASE SAY YOUR NAME OR THE COMPANY YOU REPRESENT, THENPRESS THE POUND KEY”. Then, in step 336, the IP records the audio fromthe caller until a time out condition occurs or entry of a # signal isdetected, e.g., by the DTMF detector 202.

In step 338 a determination is made as to whether or not speech, e.g., aname, has been recorded. This step may be made by distinguishing from arecording of silence as opposed to speech. If any speech was recorded,it is assumed to be a name since a name was requested. Any one of aplurality of known techniques may be used to implement step 338.

If in step 338 if it is determined that speech has not been recorded,operation proceeds to step 340 wherein the retry counter RC isincremented operation then proceeds to step 342.

In step 342, RC is compared to 4. If RC<4, then operation proceeds tostep 344 to provide the caller another opportunity to record a name. Instep 344 the IP 104 plays a message to the caller stating: “THE NUMBERYOU ARE CALLING HAS CALL INTERCEPT AND DOES NOT ACCEPT CALLS FROMUNIDENTIFIED NUMBERS”. Operation then proceeds once again to step 334,wherein the caller is prompted to provide a name.

If in step 342 it is determined that RC is not less than 4, i.e., thecaller has already been provided three chances to leave a name,operation proceeds to step 346. In step 346, the caller is played amessage stating: “YOU HAVE NOT RECORDED YOUR NAME. THE PERSON YOU ARECALLING DOES NOT ACCEPT CALLS FROM UNKNOWN OR BLOCKED NUMBERS. GOODBYE”. Then, in step 348, the call is terminated with the calling partybeing disconnected.

In step 338, if it is determined that a name provided by the callingparty was recorded, operation proceeds to step 350 wherein the IP 104places a call to CSS subscriber 117 via switch 102. This causes the TATtrigger on the CSS subscriber's line to be activated a second timelaunching a second request to the SCP 106 for call processinginstructions. Recognizing the IP 104 as the calling party, the SCPinstructs the switch 102 to complete the call from the IP to the CSSsubscriber 117.

Via connection nodes 352 and 354 which serve to link FIGS. 3A and 3Btogether, operation proceeds from step 350 to step 356. In step 356, theIP 104 plays music to the waiting caller. Then in step 358 the IP 104 isoperated to monitor for an answer from the subscriber located at thecalled premises 117 or for the occurrence of a time out condition. Ananswer may be detected by examining the hook-status of the calledparty's line. The occurrence of an off-hook condition, in response tothe IP's call to the CSS subscriber, indicates an answer.

If no answer is detected in step 360, operation proceeds to step 362wherein the IP 104 plays a message to the calling party stating: “THECALLED PARTY IS UNAVAILABLE”. Then in step 364 the call is terminatedwith the calling party being disconnected. Alternatively, if the calledparty is a VMS subscriber, the call may be completed to the subscriber'sVMS system.

If an answer is detected in step 360, operation proceeds to step 368after the retry counter RC is reset to 0 in step 366. In step 368 the IP104 plays a message to the called party stating: “SOMEONE IS WAITING TOSPEAK WITH YOU. FOR MORE INFORMATION, PRESS ONE.” Then in step 370 DTMFinput or the occurrence of a time out condition is detected. In step372, a determination is made as to whether or not DTMF input wasdetected in step 370.

If it is determined in step 372 that DTMF input was not received, it isassumed that an answering machine has answered the call to the CSSsubscriber's premises 117, and operation proceeds to step 376. Block 374which states the assumption being made is not an actual processing stepbut is included for purposes of explanation. In step 376, the callingparty is connected to the called CSS subscriber premises 117 therebyallowing the calling party to leave a message on the answering machine119. In step 377, the call is allowed to terminate in a normal manner,e.g., with either the calling party or the answering machine 119terminating the call by hanging up.

In step 372, if it is determined that a DTMF input was received,operation proceeds to step 378 wherein a determination is made as towhether or not the requested number “one” was received in DTMF format.If it is determined that a one was not received, operation proceeds toinput error handling subroutine 700 wherein the IP seeks additionalinput or terminates the call after a preselected number of tries. Theinput error handling routine 700 will be described below in detail withregard to FIG. 7. Upon returning from the error handling sub-routine 700operation proceeds to step 370 wherein input from the called party orthe occurrence of a time out condition is once again detected.

If in step 378, it is determined that a one was received, indicatingthat a human operator provided a response to the message about a waitingcaller, operation proceeds to step 382. In step 382, the IP plays thesubscriber a message stating: “CALL FROM:”. Then in step 384, the IP 104plays to the called party, the recorded audio of the calling party'sspeech which was obtained in response to a request for a name. Next instep 386, the retry counter RC is reset to 0. Then in step 388 adetermination is made as to whether or not the called CSS subscriber isalso a voice mail service (VMS) subscriber. The menus of calldisposition options provided to the called party vary depending onwhether or not the called party is a VMS subscriber.

If the called party is a VMS subscriber operation proceeds to the calledparty selection detection routine 400 via step 390. However, if in step388 it is determined that the called party is not a VMS subscriber,operation proceeds to the non-VMS subscriber called party selectiondetection routine 500.

The VMS subscriber called party selection detection routine 400 beginsin start step 402 of FIG. 4 wherein it begins being performed by the IP104 under control of CPU 212. Operation proceeds from start step 402 tomenu step 404, wherein the IP plays a menu to the called party. In oneexemplary embodiment, it does this by playing the message: “TO ACCEPTTHIS CALL, PRESS 1; TO DENY THIS CALL, PRESS 2; TO PLAY THE SALES CALLREFUSAL TO THE CALLER, PRESS 3; TO SEND THIS CALL TO VOICE MAIL, PRESS4; TO REPLAY THE CALLERS NAME, PRESS 5”.

Next, in step 405 user input or the occurrence of a time out conditionis detected by the IP 104. Then in step 406 a determination is made asto whether or not a valid DTMF input was received from the called party.That is, a determination is made as to whether a number on the menuplayed in step 404 was received. If a valid input was received by the IP104 from the called party, operation proceeds to the selectionimplementation subroutine 600 via step 410. However, if a valid inputwas not received from the called party, operation proceeds to step 408wherein the input error handling sub-routine 700 is called. Uponreturning from the input error handling sub-routine, operation proceedsfrom step 408 to step 404 wherein the menu of available call dispositionoptions is again played to the called party.

The NON-VMS subscriber called party selection detection routine 500begins in start step 502 of FIG. 5 wherein it begins being performed bythe IP 104 under control of CPU 212. Operation proceeds from start step502 to menu step 504, wherein the IP plays a menu to the called party.In one exemplary embodiment, it does this by playing the message: “TOACCEPT THIS CALL, PRESS 1; TO DENY THIS CALL, PRESS 2; TO PLAY THE SALESCALL REFUSAL TO THE CALLER, PRESS 3; TO REPLAY THE CALLERS NAME, PRESS5”. Note that this menu is the same as that provided in step 404 to theVMS subscriber with the exception that the voice mail option is notpresented to the called party since the party does not subscribe to theVMS service.

Next, in step 505 user input or the occurrence of a time out conditionis detected. Then in step 506 a determination is made as to whether ornot a valid DTMF input was received from the called party. That is, adetermination is made as to whether a number on the menu played in step504 was received. If a valid input was received by the IP 104 from thecalled party, operation proceeds to the selection implementationsub-routine 600 via step 510. However, if a valid input was not receivedfrom the called party, operation proceeds to step 508 wherein the inputerror handling sub-routine 700 is called. Upon returning from the inputerror handling sub-routine 700, operation proceeds from step 508 to step504 wherein the menu of available call disposition options is againplayed to the called party.

FIG. 6 illustrates the selection implementation sub-routine 600. Theroutine 600 begins in step 602 and proceeds to step 604 wherein theprocessing path to be followed is determined as a function of the DTMFinput, e.g., value, received from the called party. Step 604 may beimplemented using a case statement as is known in the programming art.

If a 1 is received as the menu selection from the called party, path 1is followed from step 604 to step 606. In step 606 the IP 104 plays amessage to the called party stating: “NOW CONNECTING”. Then in step 610,a determination is made as to whether or not the calling party is stillconnected to the switch, i.e., the calling party has not hung up whilewaiting for the called party.

If in step 610 it is determined that the calling party is stillconnected operation proceeds to step 612 wherein the calling and calledparties are connected together. After the calling and called parties areconnected by the IP 104, the call is allowed to terminated in step 614in a normal fashion, e.g., with one of the parties hanging up.

If, however, in step 610 it is determined that the calling party is nolonger connected, e.g., because they hung up, the IP 104, in step 616,plays the calling party a message stating “WE'RE SORRY. THE PERSONWAITING TO SPEAK WITH YOU HAS HUNG UP”. The call is then terminated instep 618.

If a 2 is received as the menu selection from the called party, path 2is followed from step 604 to step 620. In step 620 the IP 104 plays amessage to the called party stating: “CALL DENIED”. This announcement isfollowed in step 622 with the termination of the connection between theIP and the called party. In step 624 the calling party is played amessage “THE PERSON YOU ARE CALLING IS NOT AVAILABLE. THANK YOU. GOODBYE.” The call is then terminated in step 618 with the calling partybeing disconnected from the IP 104 and switch 102.

If a 3 is received as the menu selection from the called party, path 3is followed from step 604 to step 630. In step 630 the IP 104 plays amessage to the called party stating: “THE SALES CALL REFUSAL MESSAGEWILL BE PLAYED TO THE CALLER.” This announcement is followed in step 632with a message being played to the calling party. The message played tothe calling party states: “THE PERSON YOU ARE CALLING DOES NOT ACCEPTPHONE SOLICITATIONS. PLEASE ADD THEIR NAME TO YOUR DO NOT CALL LIST.THANK YOU. GOOD BYE.” The call is then terminated in step 618.

If a 4 is received as the menu selection from the called party, path 4is followed from step 604 to step 640. In step 640 the IP 104 plays themessage “THE CALLER HAS BEEN SENT TO VOICE MAIL” to the called party.This announcement is followed in step 642 with the termination of theconnection between the IP and the called party. In step 644 the callingparty is played a message “NOW CONNECTING TO AN ANSWERING SYSTEM.” Instep 646, the IP initiates a new call to the CSS subscriber's premises117. This call causes the TAT on the subscriber's line to be activatedfor the third time. In response to activation of the TAT the switch 102initiates a new inquiry to the SCP 106 for call processing instructions.At this point in time, the calling party is still connected to the IP104 and the SCP 106. The SCP 106 detects from the call informationprovided to it that this is the second call from the IP to the CSSsubscriber in regard to the call from the calling party. In response tothis second call from the IP, the SCP instructs the switch 102 toconnect the call to the CSS subscriber's VMS 114. The IP 104, in step648, connects the calling party to the called party's VMS. Then in step650 the calling party is provided an opportunity to leave a message forthe called party prior to the call being terminated in step 618.

If a 5 is received as the menu selection from the called party, path 5is followed from step 604 to step 650. Step 650 is a GO TO STEP. In step650, operation proceeds to step 384 and then to step 404 if the calledparty is a VMS subscriber and to step 504 if the called party does notsubscribe to voice mail. Thus, via the path provided by step 650, thecalled party is provided an opportunity to hear the menu of availablecall disposition options again.

An exemplary input error handling sub-routine 700 which may be used byvarious other IP control routines and steps, is illustrated in FIG. 7.The routine 700 is used to determine if the party providing input shouldbe provided another opportunity to input the request information or menuselection or the call should be terminated. In the FIG. 7 embodiment, aparty is given a total of 3 chances to input expected data with theretry counter RC being used to determine when the three chances havebeen provided.

Operation proceeds from start step 702 to step 704 wherein the retrycounter RC is incremented by one. Then, in step 706 a determination ismade as to whether RC is less than 4. If RC is not less than 4, e.g., 4or greater, three chances have already been provided to supply theexpected input and operation proceeds to step 708. In step 708, the IPplays a message to the called party stating: “I'M UNABLE TO UNDERSTANDYOUR RESPONSE. GOOD BYE.” Then in step 710 the call is terminated.

However, if in step 706 it is determined that RC is less than 4,operation proceeds to step 712 wherein the IP plays the message: “I'MSORRY I DID NOT UNDERSTAND WHAT YOU PRESSED. PLEASE TRY AGAIN.”Operation then returns in step 714 to the routine or sub-routine whichcalled the input error handling routine 700 to allow another chance toenter the expected input.

Through the above discussed process, a subscriber can be shielded fromcalls with blocked or unavailable caller ID information while allowingthe CSS subscriber to specify call disposition options in real time. Inaddition, because the process provides for handling responses from acaller's answering machine, the processes of the present invention iscompatible with the use of home answering machines.

In the embodiment described above responses to prompts other than a nameprompt are normally entered by depressing telephone keys. However, thesystem of the present invention can, and in one embodiment does, usespeech recognition techniques to allow a CSS subscriber to enterresponses using speech. In such an embodiment, a CSS subscriber maystate “one” to select call disposition option one from the menu of calldisposition options or enter “1” using a telephone keypad. A spoken “1”is detected by the IP's speech recognizer 206 while a “1” entered usingthe telephone keypad is detected by DTMF detector/generator circuit 202.

While the detection of calls directed to a CSS subscriber has beendescribed as being performed at the switch 102 to which the lines to thesubscriber premises are connected, it is to be understood that the samefunctionality may be implemented elsewhere in the system 100, e.g., atanother switch through which calls are routed, using a similar triggerto detect calls to CSS subscriber's.

Numerous additional embodiments, within the scope of the presentinvention, will be apparent to those of ordinary skill in the art inview of the description included herein and the claims which follow.

What is claimed is:
 1. A call processing method, comprising the stepsof: detecting, using a trigger set at a signal switching point, a firstcall directed to the premises of a service subscriber; requesting callprocessing instructions from a service control point in response to thefirst call activating said trigger; operating the service control pointto instruct the signal switching point to: i) temporarily park the firstcall at the signal switching point; and ii) utilize an intelligentperipheral device coupled to the switch as an outside resource to playmessages and obtain additional input to be used by the service controlpoint in determining how the signal switching point should dispose ofthe first call; initiating a second call to the premises of the servicesubscriber; determining if the second call is answered by a machine or ahuman being; and controlling the disposition of the first call as afunction of the determination as to whether the second call was answeredby a machine or a human being.
 2. The method of claim 1, wherein thestep of controlling the disposition of the first call includes the stepof: completing the first call to the premises of the first subscriberwhen it is determined that the second call is answered by a machine. 3.The method of claim 2, wherein the step of completing the first callincludes the step of bridging the first and second calls.
 4. The methodof claim 2, further comprising the step of: playing a message to acalling party associated with the first call indicating that the firstcall is being connected to an answering machine.
 5. The method of claim2, wherein the step of controlling the disposition of the first callincludes the step of: requesting call disposition input from the humanbeing when it is determined that the second call is answered by a humanbeing.
 6. The method of claim 1, wherein the step of controlling thedisposition of the first call includes the step of: requesting calldisposition input from the human being when it is determined that thesecond call is answered by a human being.
 7. The method of claim 1,wherein the step of: determining if the second call is answered by amachine or a human being includes the steps of: playing a messagerequesting input; monitoring for the requested input; and determiningthat the second call was answered by a human being when the requestedinput is received.
 8. The method of claim 7, wherein the step of playinga message requesting input includes the step of: playing an audiomessage requesting input which can be entered by pressing at least onekey of a telephone keypad.
 9. The method of claim 8, wherein the step ofmonitoring for the requested input includes the step of: monitoring fora DTMF tone corresponding to at least part of the requested input. 10.The method of claim 1, wherein the step of determining if the secondcall is answered by a machine includes the step of: monitoring for asignal indicative of a machine answering the second call.
 11. The methodof claim 10, wherein the signal indicative of a machine answering thesecond call is an audible tone used as a recording prompt.