Ring-tone identification of urgent phone calls

ABSTRACT

A method for activating a distinctive ring-tone can include the steps of extracting caller identifying data from an incoming phone call; comparing the caller identifying data to data in a caller list; determining whether the caller is authorized to activate a distinctive ring-tone based upon the comparison; and, activating a distinctive ring-tone if the caller is authorized and if a request to activate a distinctive ring-tone can be detected in the incoming phone call. The extracting step can include the step of extracting a source phone number from the incoming phone call. The determining step can include the step of determining whether the caller has been included in the caller list as an authorized caller. Conversely, the determining step comprises the step of determining whether the caller has been included in the caller list as an unauthorized caller.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Divisional of U.S. application Ser. No.10/424,028, filed Apr. 25, 2003, entitled “RING-TONE IDENTIFICATION OFURGENT PHONE CALLS,” which is incorporated herein by reference in itsentirety.

BACKGROUND OF THE INVENTION

1. Statement of the Technical Field

The present invention relates to the field of telecommunications, andmore particularly to the selective activation of phone ring-tones.

2. Description of the Related Art

Caller identification techniques have become a necessary aspect ofpersonal telecommunications management in consequence of the explosionof personal communications devices in the marketplace. Persons rangingfrom pre-adolescents through convalescents carry cellular telephones asreadily as they carry wallets and purses. As a result of the massdistribution of personal communications devices, today anyone can bereached by telephone at any hour, regardless of the desirability of oneto be “reached”. In many ways, people have become overly accessible.

As a solution to having become overly accessible, it stands to reasonthat one simply can discard their cellular telephones, or at theminimum, choose not to answer incoming phone calls when it becomesinconvenient to do so. Still, most who carry cellular telephones remainacutely aware that enhanced reachability can prove important in the caseof an emergency, or at least when a call has been deemed “urgent” or“important”. To that end, it is known to provide distinctive ring-tonesfor selected individuals who originate phone calls from specified phonenumbers. By identifying the caller by phone number and matching theidentified phone number to a phone number pre-specified in a list ofphone numbers, a distinct ring-tone can be audibly produced whichdiffers from the ordinary ring-tone produced by the telephone handset.By recognizing the distinct ring-tone, the call recipient can know thatthe person who is calling is considered of higher priority than atypical caller.

Examples of distinctive ringing technology include that which has beendisclosed in U.S. Pat. No. 5,661,788 for “Method and System forSelectively Alerting User and Answering Preferred Telephone Calls” andin PCT Application Publication No. WO 02/087209 entitled “Device forSelecting Ring Tones in Real Time According to the Caller's Number andAssociated Methods and Systems.” In both publications, distinctive ringtones are produced responsive to the matching of a caller's number to aphone number in a pre-specified list. In this way, the call recipientcan infer a priority of the call based upon a pre-determination that anycall having the distinctive ring-tone is a higher priority call thancalls producing an ordinary ring-tone.

Notably, in an emergency circumstance, it is possible to alter thering-tone of an incoming phone call in order to denote a sense ofurgency. For example, in United States Patent Application Publication US2002/0054673 A1 and in U.S. Pat. No. 6,370,233 B1, both entitled“Security System with Call Management Functionality”, a home securitysystem can screen incoming phone calls at night to enforce eveningprivacy. Where a caller indicates that a call is an emergency, despite arequest by the home security system that the caller ought to leave amessage, the home security system can permit the house telephone to ringwith a distinctive ring tone to indicate that the phone call is anemergency. It will be recognized by the skilled artisan, however, thatas described in the foregoing publications, the home security cannotprevent any person who calls the home security system from feigning anemergency to cause the phone call to ring through to the household.

SUMMARY OF THE INVENTION

The present invention is a ring-tone identification system and method.The ring-tone identification system and method overcomes thedeficiencies of the prior art by affirmatively establishing at theselective discretion of the call recipient, those callers who canactivate a distinctive ring-tone, and those who cannot activate adistinctive ring-tone. Callers who are deemed trustworthy can bepermitted to activate a distinctive ring-tone on a discretionary basis.Conversely, callers who are deemed untrustworthy are not permitted toactivate the distinctive ring-tone, regardless of discretion. In thisway, the sense of urgency associated with a distinctive ring-tone willbe less likely to be feigned by an unknown or untrusted caller.

To that end, a ring-tone identification system which has been suitablyconfigured in accordance with the inventive arrangements can include alist of callers authorized to activate a distinctive ring-tone. Thesystem further can include a ring-tone identification processor coupledto the list. The ring-tone identification system can be configured toactivate a distinctive ring-tone responsive to detecting an incomingphone call from a caller in the list in which a distinctive ring-tonehas been requested. Notably, in a preferred aspect of the invention, thelist of callers can include a list of caller identifying data selectedfrom the group consisting of a phone number, a name, and a passphrase.Furthermore, the distinctive ring-tone can include audio producedthrough processing a digital multimedia file. Finally, at least one listof unauthorized callers can be provided in which listed callers areprohibited from activating a distinctive ring-tone.

Notably, the invention is not merely limited to the bifurcation of allpotential callers into authorized and unauthorized callers. Rather, inan alternative aspect of the invention, multiple tiers oftrustworthiness can be established corresponding to a different range ofavailable distinctive ring-tones. In this regard, at least oneadditional list of callers can be included in which individual callerscan be listed, each having a level of authorization which varies bothfrom an ordinary caller and a caller listed in the list of callersauthorized to activate a distinctive ring-tone. Consequently, thering-tone identification processor can be further configured to activateanother distinctive ring-tone for calls received from callers in theadditional list of callers responsive to detecting an incoming phonecall from a caller in the additional list in which a distinctivering-tone has been requested.

A method for activating a distinctive ring-tone can include the steps ofextracting caller identifying data from an incoming phone call;comparing the caller identifying data to data in a caller list;determining whether the caller is authorized to activate a distinctivering-tone based upon the comparison; and, activating a distinctivering-tone if the caller is authorized and if a request to activate adistinctive ring-tone can be detected in the incoming phone call. Theextracting step can include the step of extracting a source phone numberfrom the incoming phone call. The determining step can include the stepof determining whether the caller has been included in the caller listas an authorized caller. Conversely, the determining step comprises thestep of determining whether the caller has been included in the callerlist as an unauthorized caller.

BRIEF DESCRIPTION OF THE DRAWINGS

There are shown in the drawings embodiments which are presentlypreferred, it being understood, however, that the invention is notlimited to the precise arrangements and instrumentalities shown,wherein:

FIG. 1 is a schematic illustration of the ring-tone identificationsystem and method of the present invention;

FIG. 2 is a pictorial illustration of the ring-tone identificationsystem of FIG. 1;

FIG. 3 is a flow chart illustrating a process for selectively producingan audibly distinct ring-tone in the ring-tone identification system ofFIG. 1; and,

FIG. 4 is a flow chart illustrating an alternative process forselectively producing an audibly distinct ring-tone in the ring-toneidentification system of FIG. 1.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention is a ring-tone identification system and methodable to selectively permit callers to activate a distinct audio orvisual alert feature (collectively, “ring-tone”) for calls deemed urgentby the caller. More particularly, a call recipient can establish a listof callers authorized to invoke an urgent ring-tone when announcing aphone call to the call recipient. Subsequently, when an authorizedcaller determines that a phone call is urgent in nature, a code can beappended to the caller's identifying data. For a phone call receivedfrom an authorized caller in a call recipient node, the call recipientnode can detect the code and, once validating the authorized nature ofthe caller, the call recipient can produce an audibly or visuallydistinct ring-tone which can be recognized as an urgent call by the callrecipient.

FIG. 1 is a schematic illustration of the ring-tone identificationsystem and method of the present invention. The ring-tone identificationsystem can include a calling node 110 and a called node 120 which can becommunicatively coupled at the direction of the calling node 110 overthe public switched telephone network (PSTN) 130. The called node 120can include both a ring-tone identification processor 150, and a list ofauthorized callers 160. The calling node 120 further can be configuredto emit at least two distinct ring-tones 170, 180, for instance basicring-tones which can vary from one other in duration and pitch, or morecomplex ring-tones which take the form of digitized music.

The list of authorized callers 160 can include a list of those callersdeemed able to selectively activate an urgent ring-tone. To that end,the list of authorized callers 160 can include any identifying aspect ofthe caller, including a calling node phone number, a caller nameassociated with the calling node phone number, a passphrase, or othersuch identifying data. The ring-tone identification processor 150 can becoupled to the list of authorized callers 160 and can compareidentifying data 140 associated with an incoming phone call to data inthe list of authorized users 160. Based upon a match between theidentifying data 140 and data in the list of authorized users 160, thecalling node can be permitted to activate a distinct one of thering-tones 170, 180 based upon whether the calling node has so requestedsuch activation.

It will be recognized by the skilled artisan that the invention is notso limited in the manner as described herein and can include variationstherefrom which do not depart from the spirit of the present invention.In this regard, in a less restrictive configuration, the list ofauthorized callers 160 can act as a list of unauthorized callers inwhich enumerated callers are not permitted to activate a distinct one ofthe ring-tones 170, 180. Additionally, in a more robust configurationmultiple distinct ring-tones can be activated according to a set ofactivating codes which extend beyond a mere urgent/not urgent paradigm.Finally, the list of authorized callers 160 can include multiple tiersof authorized callers in which additional distinct ring-tones can beselected by callers listed at higher levels of a permissive hierarchy.

Importantly, in a preferred aspect of the invention, the ring-toneidentification processor 150 can be coupled not directly to the calledparty 120, but to infrastructure included in the PSTN 130. In thisregard, the ring-tone identification system of FIG. 1 can be distributedcommercially to end-users as a service to the end-user. Moreover, thering-tone identification system of FIG. 1 can be deployed to limitedfunction and “dumb” handsets which lack the processing capability tointernally process requests to produce an audibly or visually distinctring-tone. Finally, by deploying the ring-tone identification processor150 in the PSTN 130, the system can be scaled to include a vast numberof called parties 120.

FIG. 2 is a pictorial illustration of the ring-tone identificationsystem of FIG. 1. As it will be apparent to one skilled in the art, inthe present invention, the set of all possible callers can be dividedinto at least two sets of callers: authorized callers 240 whose identityhas been included in a list of authorized callers 250, and all othercallers 230 unspecified by the call recipient 280. As before, it shouldbe noted that the set of all possible callers can be divided equally aswell amongst those callers who explicitly are not authorized, and allother callers who are deemed implicitly authorized.

In any case, it will be recognized that the sub-division of the set ofall possible callers represents an affirmative decision on the part ofthe call recipient 280 as to who is trustworthy enough to exercise theactivation of a distinct ring-tone 260 in response to an urgentcondition 290, and who is not trustworthy enough to exercise suchdiscretion. Furthermore, it is contemplated that “levels” oftrustworthiness” can be established as to the range and selection ofdistinct ring-tones available for use by a caller. Thus, unlikeconventional ring-tone identification systems, in accordance with thepresent invention, a call recipient can limit the availability orunavailability of distinct ring-tone activation to a select group ofcallers.

Additionally, it will be recognized that in the present invention, adistinctive ring-tone is not limited to those audibly distinct alertswhich can be produced via transducive element. Rather, in the presentinvention, a distinctive ring-tone can include a visually or tactilelydistinct alert feature. By way of example, a visually distinctive alertfeature can include differing video imagery, flashing or pulsatinglights, and the like. As a further example, a tactilely distinct alertfeature can include differing vibration patterns commonly encountered incommercial paging and cell phone handsets.

FIG. 3 is a flow chart illustrating a process for selectively producingan audibly distinct ring-tone in the ring-tone identification system ofFIG. 1. Beginning in block 310, a call recipient node can receive a callfrom a calling node. In block 320, the caller can be identified throughdata provided by the calling node to the call recipient node. Indecision block 330, the data can be compared to a list of authorizedcallers to determine whether the caller is authorized to activate adistinct ring-tone at the discretion of the caller. If not, the callrecipient node can activate an ordinary ring-tone in block 360.

Otherwise, where the caller has been determined to be authorized toexercise discretion in activating a distinct ring-tone, in decisionblock 340 it can be determined whether the caller has in fact exercisedsuch discretion. If not, as before, in block 360 an ordinary ring-tonecan be audibly produced to alert the called party of an incoming phonecall. If, however, in decision block 340 it is determined that thecaller has in fact exercised such discretion to activate a distinctring-tone, in block 350 a distinct ring-tone can be audibly produced toalert the called party of an urgent incoming phone call.

FIG. 4 is a flow chart illustrating an alternative process forselectively producing an audibly distinct ring-tone in the ring-toneidentification system of FIG. 1. Beginning in block 410, a callrecipient node can receive a call from a calling node and an ordinaryring-tone can be produced. In block 420, the caller can be identifiedthrough data provided by the calling node to the call recipient node. Indecision block 430, the data can be compared to a list of authorizedcallers to determine whether the caller is authorized to activate adistinct ring-tone at the discretion of the caller. If not, the callrecipient node can route the yet unanswered phone call to voice mail inblock 460.

Otherwise, where the caller has been determined to be authorized toexercise discretion in activating a distinct ring-tone, in decisionblock 440 it can be determined whether the caller has in fact exercisedsuch discretion. If not, as before, in block 460 the yet unansweredphone call can be routed to voice mail. If, however, in decision block440 it is determined that the caller has in fact exercised suchdiscretion to activate a distinct ring-tone, in block 450 a distinctring-tone can be audibly produced to alert the called party of an urgentincoming phone call.

The present invention can be realized in hardware, software, or acombination of hardware and software. An implementation of the methodand system of the present invention can be realized in a centralizedfashion in one computer system, or in a distributed fashion wheredifferent elements are spread across several interconnected computersystems. Any kind of computer system, or other apparatus adapted forcarrying out the methods described herein, is suited to perform thefunctions described herein.

A typical combination of hardware and software could be a generalpurpose computer system with a computer program that, when being loadedand executed, controls the computer system such that it carries out themethods described herein. The present invention can also be embedded ina computer program product, which comprises all the features enablingthe implementation of the methods described herein, and which, whenloaded in a computer system is able to carry out these methods.

Computer program or application in the present context means anyexpression, in any language, code or notation, of a set of instructionsintended to cause a system having an information processing capabilityto perform a particular function either directly or after either or bothof the following a) conversion to another language, code or notation; b)reproduction in a different material form. Significantly, this inventioncan be embodied in other specific forms without departing from thespirit or essential attributes thereof, and accordingly, referenceshould be had to the following claims, rather than to the foregoingspecification, as indicating the scope of the invention.

1. A ring-tone identification system comprising: a list of callersauthorized by a call recipient to activate a distinctive ring-tone; aring-tone identification processor coupled to said list and configuredto activate a distinctive ring-tone responsive to detecting an incomingphone call to the call recipient from a caller in said list in which adistinctive ring-tone has been requested by the caller, and activate adifferent ring-tone responsive to determining the caller of the incomingphone call has not requested a distinctive ring-tone; and at least oneadditional list of callers comprising individual callers each having alevel of authorization which varies both from an ordinary caller and acaller listed in said list of callers authorized to activate adistinctive ring-tone; wherein said ring-tone identification processorfurther is configured to activate another distinctive ring-tone forcalls received from callers in said additional list of callersresponsive to detecting an incoming phone call from a caller in saidadditional list in which a distinctive ring-tone has been requested. 2.The system of claim 1, wherein said list of callers comprises a list ofcaller identifying data selected from the group consisting of a phonenumber, a name, and a passphrase.
 3. The system of claim 1, wherein saiddistinctive ring-tone comprises audio produced through processing adigital multimedia file.
 4. The system of claim 1, further comprising atleast one list of unauthorized callers in which listed callers areprohibited from activating a distinctive ring-tone.
 5. The system ofclaim 1, wherein said distinctive ring-tone comprises one of an audibly,visually and tactilely distinct alert.
 6. The system of claim 1, whereinsaid ring-tone identification processor is coupled to a provisioningsystem in a public switched telephone network.
 7. The system of claim 1,wherein said ring-tone identification processor is coupled to a handset.8. A machine readable storage having stored thereon a computer programfor activating a distinctive ring-tone, the computer program comprisinga routine set of instructions for causing the machine to perform thesteps of: extracting caller identifying data from an incoming phone callto a call recipient; comparing said caller identifying data to data in acaller list; determining whether said caller is authorized by the callrecipient to activate a distinctive ring-tone based upon saidcomparison; activating a distinctive ring-tone if said caller isauthorized and if a request to activate a distinctive ring-tone by thecaller can be detected in said incoming phone call; activating adifferent ring tone if said caller is not authorized or if said requestto activate a distinctive ring-tone by the caller cannot be detected insaid incoming phone call, and activating another distinctive ring-tonefor calls received from callers in an additional list of callersresponsive to detecting an incoming phone call from a caller in saidadditional list in which a distinctive ring-tone has been requested,wherein said additional list of callers comprising individual callerseach having a level of authorization which varies both from an ordinarycaller and a caller listed in said list of callers authorized toactivate a distinctive ring-tone.
 9. The machine readable storage ofclaim 8, wherein said extracting step comprises the step of extracting asource phone number from said incoming phone call.
 10. The machinereadable storage of claim 8, wherein said determining step comprises thestep of determining whether said caller has been included in said callerlist as an authorized caller.
 11. The machine readable storage of claim8, wherein said determining step comprises the step of determiningwhether said caller has been included in said caller list as anunauthorized caller.