Method And System For Identifying Telemarketer Communications

ABSTRACT

A method and system for identifying telemarketer communications directed to a subscriber of a call screening service is provided. A link monitoring system monitors all inbound and outbound calls of a carrier network collecting data such as calling and called telephone directory numbers, and a termination status for at least each inbound call to a calling number. The data is analyzed at a telemarketer detection module to determine calling patterns of calling numbers. If a calling pattern of a calling telephone number matches a profile of telemarketer communications, the calling number is stored in a database of telephone directory numbers associated with telemarketer communications. A call is received from a calling party directed to a subscriber of the call screening service. Then a determination is made as to whether a telephone directory number of the calling party is known. If the telephone number of the calling party is known, a determination is made as to whether the telephone number of the calling party matches a telephone number stored in the database of telephone numbers associated with telemarketer communications. If a match exists, the call is intercepted from reaching the subscriber of the call screening service.

FIELD OF THE INVENTION

The present invention generally relates to call processing in atelephone network providing a call screening service to subscribers and,more particularly, relates to methods and systems for identifyingtelemarketer communications.

BACKGROUND OF THE INVENTION

Since the advent of modern telephony users of telephones have beenburdened by unwanted and unsolicited telephone calls. In recent timestelephone based commercial solicitations have exasperated this problembecause telephone solicitors, also known as telemarketers, place callsto unsuspecting users at all hours of the day.

Systems have been developed for blocking or intercepting calls fromtelephone solicitors where the solicitor does not provide a telephonedirectory number or where the solicitor blocks caller identification forsolicitor communication attempts. For example the caller identificationfor such telephone solicitors is often rendered as ‘Private’, ‘Out ofArea’, ‘Unavailable’ or ‘Blocked’ etc. However such systems areineffective at intercepting calls from undesired calling parties whenthe calling party does allow caller identification because the undesiredcall is allowed to come through to the called party. The called partythen has no means of notifying the calling party not to call againunless the called party answers the phone and hears an initial marketingpitch. If a machine is utilized to make the call, the called party mayexperience another ringing telephone interruption only to answer tosilence on the calling end with no opportunity to tell the caller not tocall again. Although caller identification technology reveals who thecaller is and undesired calls may be ignored, the caller is likely tocall again unless told not to call again. Thus, the interruption of aringing telephone from the same undesired telemarketers is notpermanently resolved.

Accordingly there is an unaddressed need in the industry to address theaforementioned deficiencies and inadequacies.

SUMMARY OF THE INVENTION

Embodiments of the present invention provide methods and systems foridentifying solicitor or telemarketer communications. A monitoringsystem monitors incoming and outgoing telephone calls to and from anetwork. An analysis is performed on data accumulated by the monitoringsystem to determine whether certain calling partics are calling fromtelephone directory numbers that match a predetermined profile of atelemarketer. For instance, a telephone directory number that has alarge number of outgoing calls with little to no incoming callsterminated or answered could possibly match the profile of atelemarketer telephone directory number. If a telephone number matchesthe telemarketer profile it is stored in a database of telephone numbersassociated with telemarketer or solicitor communication.

As calls come in directed to a subscriber of a privacy or call screeningservice a determination is made as to whether the telephone directorynumber of the calling party is known. If the telephone number is known,the number is then compared to the telephone numbers in the database oftelephone numbers associated with telemarketer communication. If thecalling number matches a telephone number stored in the database, thenthe call is intercepted from reaching the subscriber and processedaccordingly.

Furthermore, as the database of telephone numbers associated withtelemarketer communication continues to store the calling numbers thatmatch the profile of a telemarketer, verifications that the telephonenumbers continue to meet the profile are made. For instance, a callingnumber that is stored in the database but later becomes disconnected maybe verified and removed from the database. Secondly, telephone numbersthat once matched the profile but since then have started receiving andterminating more calls than a profile threshold may be removed from thedatabase. Also, calling telephone numbers initially matching the profilecriteria but not having a telemarketing purpose may be discovered andremoved from the database.

Other systems, methods, features, and advantages of the presentinvention will be or become apparent to one with skill in the art uponexamination of the following drawings and detailed description. It isintended that all such additional systems, methods, features, andadvantages be included within this description, be within the scope ofthe present invention, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram illustrating components of a publicswitched telephone network, an advanced intelligent telecommunicationsnetwork (AIN), and telemarketer detection components that provide anoperating environment for the present invention.

FIG. 2 is a schematic diagram illustrating a link monitoring systemprovided in an embodiment of the present invention.

FIG. 3 is a schematic diagram illustrating the connectivity of a passivemonitoring connection provided by the link monitoring system of FIGS.1-2.

FIG. 4 illustrates an operational flow for identifying telemarketingcommunications according to an embodiment of the invention.

FIG. 5 illustrates an operational flow for populating and maintaining adatabase of telephone numbers associated with telemarketingcommunications according to an embodiment of the invention.

DETAILED DESCRIPTION

As described briefly above, embodiments of the present invention aredirected to methods and systems for identifying telemarketingcommunications. In the following detailed description, references aremade to the accompanying drawings that form a part hereof, and in whichare shown by way of illustrations, specific embodiments or examples.These embodiments may be combined, other embodiments may be utilized,and structural changes may be made without departing from the spirit orscope of the present invention. The following detailed description is,therefore, not to be taken in a limiting sense and a scope of thepresent invention is defined by the appended claims and theirequivalents.

It is advantageous to describe an exemplary operating environment inwhich the present invention may operate. FIG. 1 is a schematic diagramillustrating components of a public switched telephone network, anadvanced intelligent telecommunications network (AIN), and telemarketerdetection components that provide an operating environment for thepresent invention and include a general description of a modern publicswitched telephone network through which the present invention operates.The modern public switched telephone network (PSTN) has separatesignaling paths for voice signals (or other customer-utilizedcommunication circuits) and for control signals, which includeinformation transmitted throughout the network to control the connectionand disconnection of the voice circuits. Voice signals are typicallycarried through trunk connections, while control signals are carriedacross the signaling system 7 (SS7) network.

The PSTN also incorporates the AIN. Some of the AIN components areillustrated in FIG. 1. The AIN also uses the SS7 network for signal orsystem control message transport. The components thereof are well knownin the art. However, it should be appreciated that other protocols, suchas the Session Initiation Protocol (SIP), a TCP/IP-based protocol may beused for signal or system control message transport.

Referring still to FIG. 1, a plurality of central offices is provided intypical public switched telephone network. Each central office mayinclude an electronic switch known to those skilled in the art as aservice switching point (SSP). These are indicated in FIG. 1 as SSPswitches 114 and 136. The number of SSP switches depends on the numberof subscribers to be served by the public switched telephone network. AnSSP is the AIN component of a typical electronic central office switchused by a local exchange carrier. The terms “SSP” and “switch” are usedinterchangeably hereinafter and are understood to refer to atelecommunications switch having AIN capability and which may beutilized for connecting voice channel circuits, including voice channellines, such as trunk circuits 113 and 117. The switching componentswithin a local exchange network are denoted by the carrier switching126.

SSP 114 has a subscriber line 119 connected thereto. Each subscriberline is connected to a terminating piece or pieces of customer premisesequipment that are represented by the telephone 116. SSP switches 114and 136 are connected by a plurality of trunk circuits indicated as 113and 117 in FIG. 1. These are the voice path trunks that interconnect theswitches and over which calls are completed.

Each piece of terminating equipment in the PSTN is assigned a directorynumber. The terms “telephone directory number”, “telephone number”, and“directory number” are used herein in a manner consistent with itsgenerally understood meaning of a number that is dialed or input by anoriginating or calling party at an originating station to reach aterminating station associated with the directory number. A directorynumber, typically a ten digit number, is commonly referred to as a“telephone number” and may be assigned to a specific telephone line,such as the telephone line 116 shown in FIG. 1.

Much of the intelligence, and the basis for many of the enhancedfeatures of the network, resides in the local service control point(SCP) 122 that has a database 122 a containing subscriber information,and is connected to the gateway signal transfer point 120 a via the SS7data link 118 d. As is known to those skilled in the art, servicecontrol points such as SCP 122, are physically implemented by relativelypowerful fault tolerant computers. Among the functions performed by theservice control points is maintenance of the network databases used inproviding enhanced services and the execution of service packageapplications (SPA). The SCP 122 executes the call screening or privacyscreening SPA 124 in response to a query initiated from the terminatingattempt trigger 115 of the subscriber SSP 114.

The SCP 122 is also connected to the shared database 128, wheretelephone numbers associated with telemarketers or solicitors arestored. The telemarketer database 128 may be used to provide a look-updatabase for use in conjunction with the call screening service. As willbe described in greater detail below, when executed, the call screeningSPA 124 queries the database 128 for a match between a calling numberand a number stored in the database 128. The database of telephonedirectory numbers associated with telemarketer communications 128 isshared among all subscribers of the privacy screening service and theservice control points executing the service package application for theprivacy screening service. While FIG. 1 shows the database 128 separatedfrom the SCP 122, it should be appreciated that the database 128 mayalso be implemented as a component of the SCP 122.

In operation, the intelligent network elements of the AIN 100, asdescribed above, communicate with each other via digital data messagestransmitted over the network of digital data links 118. An SSP may beconfigured to interface with these network elements through the use of aterminating attempt trigger 115 (TAT). When the caller 110 places a callto the subscriber 116, because the subscriber has subscribed to theprivacy screening service, the call (like all calls to that subscriber'snumber) triggers the TAT 115. A trigger in the network is an eventassociated with a particular subscriber line or call that causes the SSP114 to generate a data packet message to be sent to a SCP. It should beappreciated that the call reaching the TAT 115 may originate from thetelephone of a calling party, from a computer, from the Internet, orfrom other communications signal sending equipment.

The message created by the SSP 114 in response to the TAT 115 is knownas a “query” message. A query message opens a “transaction” and the SSPgenerally holds the communication until it receives a reply from anappropriate network element via the network of digital links instructingthe SSP 114 to take action. If the SSP 114 receives no instructions witha certain amount of time, the SSP “times out” and executes a defaulttask for the communication. The reply to the query message may be a“conversation” message or a “response” message. Conversation messagesallow for bi-directional exchanges between network elements while thetransaction remains open. A “response” message closes the transactionopened by the query message, an usually instructs the SSP 114 to routethe held communication for connection with a terminating station. Querymessages, conversation messages, and response messages are standardtypes of messages defined by the AIN protocol. The details of the AINprotocol are known to those skilled in the art and will not be furtherdescribed herein.

The modern AIN 100 also includes service nodes (SN) such as service node140 shown in FIG. 1. Those skilled in the art are familiar with servicenodes, which are physically implemented by the same types of computersthat embody the SCP 122. In addition to the computing capability anddatabase maintenance features, service nodes 140 use integrated servicesdigital network ISDN lines 138 and may include Dual Tone Multi-Frequency(DTMF) signal recognition circuits, text to speech (TTS) voicesynthesizers, voice recognition and digit collection capabilities, andother voice or data resources. As shown in FIG. 1, the connection isthrough an SSP. For example SN 140 is connected to the SCP 122 via theISDN links 138 to the SSP 136, the ISDN/SS7 protocol conversion in SSP136, and the SS7 links 118 c and 118 d. SNs are used principally whensome custom feature or service is needed that requires an audioconnection to the call or to transfer of a significant amount of data toa subscriber over a switched connection during or following a call.

The link monitoring system (LMS) 130 interfaces with the AIN 100 via thesignal transfer point (STP) 120. In certain networks, gateway STPs areused. Gateway STPs are components by which calls from outside thecarrier network enter the carrier network and through which queriesreach an SCP. The LMS 130 monitors all inbound and outbound calls to,from, and within the carrier network collecting data from protocolmessages. The link monitoring system 130 also provides the telemarketerdetection software module 132. The telemarketer detection module 132analyzes the collected data for call patterns and determines whether thecall pattern of any calling telephone directory numbers match atelemarketer profile. The calling numbers that match the telemarketerprofile are stored within or used to populate the telemarketer database128. As an alternative or in conjunction with the telemarketer detectionmodule 132, the database 128 may be populated by calling party telephonedirectory numbers identified by the called parties as a telemarketernumber, self-identified by one or more telemarketers, or received from aregulatory database of telemarketers required to identify theirrespective telephone directory numbers under government regulations.

A content management module 134 is also provided to manage the contentof the telemarketer database 128 such that the calling numbers storedare periodically verified or evaluated for continuously matching thetelemarketer profile. For example, calling numbers that the LMS 130 nolonger records at a threshold frequency, calling numbers that match thetelemarketer profile but do not have a telemarketing purpose, andcalling numbers that have been disconnected or stored for more than Xdays, months, or years may be removed from the database 128 by thecontent management module 134. Additional details regarding the LMS 130will be described below with regard to FIGS. 2, 3, and 5.

FIG. 2 is a schematic diagram illustrating a link monitoring systemprovided in an embodiment of the present invention. As described brieflyabove, the LMS 130 monitors calls originating from or attempting toterminate in the local exchange carrier network. The LMS 130 monitorscalls via the STPs 120 a-120 g that route packets of data to and fromthe carrier switching 126 via the data links 118. Calls may enter thecarrier network and the carrier switching 126 via the gateway STPs 120a-120 f from multiple outside networks such as the wireless network 222,the competitive local exchange carrier (CLEC) 226, the long distancecarrier 230, the independent central office (ICO) 214, and an Internetprotocol-based telephony network 218. Calls originating and attemptingtermination within the carrier switching 126 may also be monitored bythe LMS 130 via the local STPs such as the STP 120 g. Data collected bythe LMS 130 includes the calling and called telephone directory numbersof each monitored call, the termination status of each monitored call,and a time of each monitored call.

The LMS 130 is equipped with software packages that analyze the datacollected and stored in the disc drives 212. The LMS may offer a frauddetection module 202 for detecting fraudulent activity on the network, abusiness intelligent module 204 for calculating local exchange carrierstatistics for use in business decisions, and the telemarketer detectionmodule 132 for analyzing the collected data for calling numbers matchinga telemarketer profile. Additional details regarding the telemarketerdetection module 132 will be described below with respect to FIG. 5.

FIG. 3 is a schematic diagram illustrating the connectivity of a passivemonitoring connection 302 within the link monitoring system of FIGS.1-2. Each STP 120 has external ports 306 and internal ports 308. The LMS130 is equipped with the passive monitoring connection 302 formonitoring the data links 118 emerging from and entering the externalports 306 and the internal ports 308 of the STPs 120. The passivemonitoring connection 302 enables the LMS 130 to monitor all the SS7protocol messages for every call transaction to, from, or within thecarrier switching 126.

Referring now to FIGS. 1 and 4 an operational flow for identifyingtelemarketing communications according to an embodiment of the inventionwill be described. The routine 400 begins with start operation 401. Nextthe routine 400 continues to operation 402 where a calling party 110calls a subscriber 116 via the PSTN 112. The routine 400 then continuesto operation 404 where the call is routed to the switch 114 of thesubscriber. The routine 400 then continues to operation 406 where thecall activates the TAT 115 and in response to the TAT 115 beingactivated, the routine 400 continues to operation 408.

At operation 408, a query is transmitted to the SCP 122 via the STP 120over the data links 118. The query includes the calling party'stelephone number, the subscriber's number and a presentation indicatorof the calling party. The routine 400 then continues to operation 410where the SCP 122 executes the call screening SPA 124 to determine whatto do with the call. The SPA 124 examines the telephone number of thecalling party to determine whether the calling number is known orunknown. If the calling party number is known, the routine 400 continuesfrom operation 410 to operation 411 where the telemarketer database 128is queried to determine whether the calling party number matches any ofthe numbers associated with telemarketer or solicitor communicationsstored in the database 128.

The routine 400 then continues from operation 411 to operation 412 wherea determination is made as to whether a match was found between thecalling number and a number stored in the database 128. If a match isnot found, the routine 400 continues to operation 413 where adetermination is made as to whether the calling number is private. Ifthe calling number is not private, the routine 400 continues tooperation 420 where the call is authorized and routed to the subscriber116 where the subscriber may be notified of the call and the name of thecalling party. Upon being notified of the caller's name, the subscribermay be given options to handle the call such as answering, ignoring thecall and sending a message of unavailability, or sending a no callmessage.

If a match is found, the routine 400 continues from operation 412 tooperation 414 where the call is intercepted and transferred to the SN140 via the switch 136. At operation 414, the SN 140 may ask the callingparty to record his/her name and purpose for the call. The operation 400then continues from operation 414 to operation 418 where a determinationis made as to whether the calling party agreed and recorded her/his nameand purpose. If the calling party did not agree, the call isdisconnected or terminated at operation 422 thereby not ringing thesubscriber's 116 telephone. If the calling party agrees and recordshis/her name and purpose, the routine 400 continues from operation 418to 420 described above.

If at operation 413 it is determined that the calling party number isprivate, the routine 400 continues to operation 416. At operation 416the SN 140 may ask the calling party to unblock the private status ofthe call. The routine 400 then continues from operation 416 to operation418 described above.

If at operation 410 it is determined that the calling party number isunknown, the routine 400 continues from operation 410 to operation 414then operation 418 described above.

It should be appreciated that although the present embodiment describesusing the identification of a calling number to route the call through aprivacy screening service, other uses of the calling number may be made.For instance, the calling number identification may be used tocompletely block the call or automatically send the call to the voicemail system of a subscriber.

Turning now to FIGS. 1 and 5 an operational flow for populating andmaintaining a database of telephone numbers associated withtelemarketing communications according to an embodiment of the inventionwill be described. The routine 500 begins at start operation 501. Nextthe routine continues to operation 502 where the LMS 130 monitors allinbound and outbound calls of the carrier network. The routine 500 thencontinues to operation 504 where SS7 protocol data including a callingand a called telephone directory number, and a termination status foreach monitored call is received and collected via the passive monitoringconnection 302 into the disc drives 212. The termination status refersto an indicator as to whether a monitored call is terminated oranswered.

Next the routine 500 continues to operation 508 where the calling andcalled telephone directory numbers and the termination status of eachmonitored call are analyzed to determine calling patterns. It should beappreciated that in the alternative, the termination status of at leasteach inbound call to the calling telephone directory numbers may beanalyzed to determine calling patterns.

The routine 500 then continues to operation 510 where the telemarketerdetection module determines whether any calling patterns of thecollected calling numbers match a profile of telemarketercommunications. The telemarketer profile may outline parameters for thecalling numbers such as: greater than or equal to a predeterminedminimum quantity of outbound calls from the calling number over a datacollection cycle because telemarketers likely make a significant amountof outbound calls, less than or equal to a predetermined maximumquantity of inbound calls that terminate at the calling number over thesame data collection cycle because very few inbound calls to atelemarketer, if made, are answered, and the majority of the callsoriginating between specified times which are likely to be a prime ortypical time for telemarketers initiate calls to and reach potentialcustomers with respect to the time zone. If no matches occur atoperation 510, the routine 500 continues from operation 510 to operation514 described below.

If any calling patterns of one or more calling telephone numbers matchthe profile of telemarketer communications, the routine 500 continuesfrom operation 510 to operation 512 where one or more calling telephonedirectory numbers matching the profile associated with telemarketercommunications are added to the database 128. The routine 500 thencontinues to operation 514 where the calling numbers stored in thedatabase 128 are verified by the content management module 134 forcontinued matching with the telemarketer profile. For example, if acalling number is disconnected or is no longer recorded as exceeding apredetermined minimum for originating calls during a specified time, thecalling number may be removed from the database 128. Furthermore, ifadministrators of the database are made aware that a calling numbermatching the profile really does not have a telemarketing purpose or hasa non-telemarketing purpose, the administrators may also remove thatnumber from the database 128.

The routine 500 then continues from operation 514 to operation 516 wherea determination is made whether any numbers currently stored in thedatabase no longer match the telemarketer profile. If there are callingnumbers that no longer match the telemarketer profile, the routine 500continues to operation 518 where the calling numbers no longer matchingthe telemarketer profile are removed from the database 128. The routine500 then continues to operation 520 described below.

If at operation 516 all the calling numbers in the database 128 continueto match the telemarketer profile, the routine 500 continues tooperation 520 where a determination is made as to whether more calls areavailable to monitor. If no calls are being sent into, out of, or withinthe carrier network, the routine terminates at end operation 522. Ifmore calls are available for monitoring the routine 500 returns tooperation 502 described above.

The above specification, examples and data provide a completedescription of the manufacture and use of the composition of theinvention. Since many embodiments of the invention can be made withoutdeparting from the spirit and scope of the invention, the inventionresides in the claims hereinafter appended.

1. A method for identifying telemarketer communications directed to asubscriber of a call screening service comprising: receiving a call froma calling party directed to a subscriber of the call screening service;determining whether a telephone directory number of the calling party isknown; if the telephone directory number of the calling party is known,determining whether the telephone directory number of the calling partymatches one or more telephone directory numbers stored in a database oftelephone directory numbers associated with telemarketer communications;and if the telephone directory number of the calling party matches oneor more of the telephone directory numbers stored in the database oftelephone directory numbers associated with telemarketer communications,intercepting the call from reaching the subscriber of the call screeningservice. 2-24. (canceled)