Managing multiple cli identities

ABSTRACT

A caller identity provision system comprises a receiver component that receives a call request, the call request originates from a mobile handset that is associated with multiple numbers. An analysis component analyzes the call request and selects a caller line identification (CLI) from amongst a plurality of CLIs to provide to a called party that is a subject of the call request. For instance, the mobile handset and/or a network server can comprise the receiver component and/or the analysis component.

RELATED APPLICATIONS

This application is a Continuation of U.S. patent application Ser. No.11/380,870, filed Apr. 28, 2006 and entitled “MANAGING MULTIPLE CLIIDENTITIES”, the entirety of which is incorporated herein by reference.

BACKGROUND

The mobile telephone industry has been associated with tremendous growthover the last several years. For instance, in the recent past, mobiletelephones were only available to those of highest economic status dueto service costs and costs associated with mobile phones. Moreover,network coverage was not extensive enough to enable robust service. Inparticular, only areas associated with dense population were providedwith extensive wireless network coverage. Still further, the mobilephones that could utilize the networks to communicate were quite bulky,causing portation of the phone over any significant distance to bedifficult at best. In more detail, antennas associated with these phonescould be over a foot in length, thus making it difficult to utilize thephones in automobiles or other congested areas.

In contrast, today's portable phones (and other portable devices) can beutilized as full-service computing machines. For example, many of themost recent and advanced mobile phones can be associated with wordprocessing software, accounting software, and various other types ofsoftware. Furthermore, network coverage has expanded to cover millions,if not billions, of users. Additionally, mobile phones have decreased inboth size and cost. Specifically, modern mobile phones are often smallenough to slip into an individual's pocket without discomforting theindividual. Furthermore, many mobile network service providers offerphones at extremely low cost to customers who contract for service withsuch providers.

Advances in technology relating to mobile devices in general, and mobilephones in particular, continue to occur. For example, recently mobiletelephones have been designed to communicate over disparate networksand/or between licensed and unlicensed spectra. In more detail, a dualmode handset can connect to a cellular network to effectuatecommunications between a user of the mobile phone and another phonedevice, and can further connect via WiFi, Bluetooth, and the like to awireless local access network (LAN) and thereafter utilize the Voiceover Internet Protocol (VoIP) (or other suitable protocol) to effectuatecommunication between users. Use of VoIP is often desirable to users asit is associated with less cost than employing a cellular network. Infact, some users may consider phone calls made over VoIP (or otherIP-based network) completely free, despite the fact that they pay forInternet service.

Implementation of this dual mode service is due at least in part to theThird Generation Partnership Project (3GPP), which have createdspecifications that define a mechanism that provides signal integrityfor session initial protocol (SIP) signals between an IP multimediasubsystem (IMS) (P-SCCF) and user equipment (UE) (e.g., a mobile phone,a personal digital assistant, . . . ). This integrity prevents identityspoofing, man-in-the-middle attacks, and the like. The IMS represents a3GPP and 3GPP2 effort to define an all-IP-based wireless network as areplacement for the various voice, data, signaling, and control networkelements currently in existence. Furthermore, the IMS enables supportfor IP multimedia applications within the Universal MobileTelecommunications System (UMTS). The UMTS is a 3G broadbandpacket-based transmission of text, digitized voice, video, andmultimedia that offers a consistent set of services to mobile computerand phone users regardless of their physical location.

The telecom industry is currently shifting towards all IP-systems,thereby rendering dual mode service handsets an important tool (as theyare compatible with existing cellular systems and emerging IP-systems).This shift is driven by desires to reduce costs and create new streamsof revenue while protecting an operator business model. IMS is a newservice domain that facilitates this shift by enabling convergence ofdata, speech, and network technology over an IP-based infrastructure.For users, IMS-based services enable transmittal and receipt of variousdata at significantly reduced cost, including voice, text, pictures,video, and/or any combination thereof in a highly personalized andsecure manner. In summary, IMS is designed to bridge the gap betweenexisting, traditional telecommunications technology and Internettechnology that increased bandwidth does not provide.

As stated above, these emerging IP-based technologies have createddemand for dual mode services, and thus for dual mode handsets. Usingthis technology, users can employ WiFi to effectuate voice calls,transmission of data, and the like. In more detail, a user can connectto a LAN by way of WiFi. Upon such connection, users can employ servicesoffered by their service provider.

SUMMARY

The following presents a simplified summary in order to provide a basicunderstanding of some aspects of the claimed subject matter. Thissummary is not an extensive overview, and it is not intended to identifykey/critical elements of the claimed subject matter or to delineate thescope thereof. Its sole purpose is to present some concepts in asimplified form as a prelude to the more detailed description that ispresented later.

The claimed subject matter relates to selectively providing calleridentification information to a called party when a calling party isassociated with multiple identities (phone numbers). For instance,dual-mode handsets may be associated with multiple numbers, such aspersonal numbers, business numbers, family numbers, etc., and thus it isdesirable to associate correct caller identification data with outgoingcalls. To that end, a subscriber can dial a number, use voice commands,select a contact, or the like in connection with requesting that acertain individual be contacted. The call request can be analyzed todetermine if caller identification information has previously beenassociated with the number to be called. For instance, a user cancategorize contacts as personal contacts, business contacts, and/or anyother suitable contacts. Such categorization can be retained upon amobile handset, upon a network server, or in any other suitablelocation. If the contact has been categorized, then calleridentification information related to the assigned category can beprovided to a called party.

If the desirably called party has not been previously categorized, then,for instance, default caller identification information can be providedto the called party. In another example, a user interface can beprovided to a user prior to connecting the call, requesting that suchuser select caller identification information to provide with the call.Additionally or alternatively, call history can be analyzed and calleridentification information can be selectively provided with the call.For instance, if a user has dialed several numbers in an area code thatare business contacts, and later places another call in such area code,it is probable that the dialed number is a business contact (and calleridentification information can be provided accordingly). Similarly,temporal analysis can be undertaken. For instance, if a user typicallycalls business contacts between 3:00 p.m. and 4:00 p.m., and such userdials a new number within such time, it is probable that the dialednumber is a business contact (and caller identification information canbe provided accordingly).

Dynamic billing can additionally be undertaken in connection withdetermining caller identification information. Pursuant to an example,an enterprise may provide an individual with a phone, and may pay forcalls made to business contacts and received from business contacts. Itmay be desirable, however, to obligate the user to pay for personalcalls (which may or may not be billed at a different rate). Stillfurther, billing can vary as a user enters and leaves ranges of accesspoints or other distinctive conditions detected by the network.

To the accomplishment of the foregoing and related ends, certainillustrative aspects are described herein in connection with thefollowing description and the annexed drawings. These aspects areindicative, however, of but a few of the various ways in which theprinciples disclosed herein can be employed and is intended to includeall such aspects and their equivalents. Other advantages and novelfeatures will become apparent from the following detailed descriptionwhen considered in conjunction with the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a high-level block diagram of a system that selectivelyprovides a caller line identification (CLI) from amongst a plurality ofpossible CLIs to a called party.

FIG. 2 illustrates a dual-mode handset that can utilize multiple phonenumbers to place phone calls.

FIG. 3 is block diagram of a system that facilitates selective provisionof a CLI by a mobile device.

FIG. 4 is a block diagram of a system that selectively provides a CLI toa called party.

FIG. 5 is a block diagram of a system that facilitates performingbilling based upon a CLI associated with a called party.

FIG. 6 illustrates an example graphical user interface that enables auser to associate a called party with a CLI.

FIG. 7 is a block diagram of a system that enables a user to utilize theInternet to associate contacts with CLIs.

FIG. 8 is a block diagram of a system that automatically associatesnumbers with CLIs.

FIG. 9 is a block diagram of a system that performs authentication of adual-mode handset.

FIG. 10 is a representative flow diagram of a methodology thatfacilitates selectively providing a CLI from amongst multiple CLIs to acalled party.

FIG. 11 is a representative flow diagram of a methodology for providinga default CLI to a called party.

FIG. 12 is a representative flow diagram of a methodology for analyzingcall history and intelligently providing a CLI to a called party basedat least in part upon the analysis.

FIG. 13 is a representative flow diagram of a methodology for receivinga phone call and automatically assigning a CLI to the number associatedwith the received phone call.

FIG. 14 is an example computing environment that can be employed inconnection with various aspects described herein.

FIG. 15 is an example networking environment.

DETAILED DESCRIPTION

The claimed subject matter is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the claimed subject matter. It may beevident, however, that such matter can be practiced without thesespecific details. In other instances, well-known structures and devicesare shown in block diagram form in order to facilitate describing theclaimed subject matter.

As used in this application, the terms “component” and “system” areintended to refer to a computer-related entity, either hardware, acombination of hardware and software, software, or software inexecution. For example, a component can be, but is not limited to being,a process running on a processor, a processor, a hard disk drive,multiple storage drives (of optical and/or magnetic storage medium), anobject, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components canreside within a process and/or thread of execution, and a component canbe localized on one computer and/or distributed between two or morecomputers.

Turning now to the drawings, FIG. 1 illustrates a system 100 that can beutilized to determine which of several calling line identifications(CLIs) to provide to a called party. While the acronym CLI is usedherein, it is understood that the claimed subject matter is intended toencompass any suitable caller identification information, which can alsobe referred to as Caller Display, Caller Line IdentificationPresentation (CLIP), Call Capture, Calling Line Identity (CLID), CallDisplay (CID), Automatic Number Identification (ANI), etc. Thus, CLI isjust one example of caller identification information that is utilizedfor sake of brevity and clarity, but any suitable caller identificationinformation is contemplated and intended to fall under the scope of thehereto-appended claims. The system 100 includes a receiver component 102that receives a request to place a call. For instance, a push button ona dual-mode mobile telephone can be depressed after a contact to bedialed has been selected or a series of numerical values (a phonenumber) have been provided. In still another example, the call requestcan be a request based on voice commands, where the voice commands caninclude a series of numbers or name of a contact that is retained withina phone or upon a network (e.g., a circuit-switched network). A mobiledevice, such as a mobile telephone, a personal digital assistant (PDA),a Smartphone, or the like can comprise the receiver component 102. Inanother example, a network can include the receiver component 102, suchthat a call request from a mobile device is received, for example, at anetwork server.

The receiver component 102 can be communicatively coupled to an analysiscomponent 104, which can analyze the call request to determine anappropriate CLI to apply to the requested call. In more detail,multi-mode services provided by wireless service providers may includeand support multiple telephone numbers with each individualsubscription. Thus, a single dual-mode handset of a subscriber may beassociated with multiple numbers, for instance, such that one numbercorresponds to a business number, one number corresponds to a personalnumber, one number corresponds to a number utilized for calling familymembers, etc. The analysis component 104 can cause a proper identity tobe displayed on a caller ID of a called party 106.

In one example, the analysis undertaken by the analysis component 104can be static and based upon designations provided to contacts withinthe dual mode-handset. For instance, a user can designate CLIs withrespect to individuals within a contacts list, and such designations canbe retained locally upon the dual-mode handset and/or upon a networkserver within a data repository 108. Thereafter, when the user calls acontact, a CLI that has been previously associated with the contact canbe provided to a recipient of the call. Pursuant to a specific example,a user can bring up a contacts list, and can select a contact to call.Previously, the user has characterized the selected contact as abusiness contact—thus, the CLI provided to the user will be a businessidentity or number (rather than a personal identity or number). Again,such characterization can be stored locally upon the dual-mode handsetand then provided to a wireless (e.g., GSM) network at a time the callis placed, such that the recipient of a call will receive a desired CLI(from amongst a plurality of numbers or identities).

If the analysis component 104 determines that the call request isassociated with a number that has not been associated with a CLI, thenthe analysis component 104, for example, can assign a default number oridentity to the called party 106. Such number can then be assigned andstored within the data repository 108 and associated with the defaultnumber until altered by a user or a network. Again, such assignment of adefault number can occur within a multi-mode device or within a networkassociated with the multi-mode device. In another example, the analysiscomponent 104 can make a dynamic and intelligent decision regardingwhich CLI to provide to the called party 106. For example, the analysiscomponent 104 can analyze a call history that is retained within thedata repository 108, and can assign a CLI with respect to the calledparty based at least in part upon such analysis. For instance, if a usermakes business calls to a particular area code, and dials a new numberwith such area code but is not assigned a CLI, the analysis componentcan automatically assign a business identity to such number. Theanalysis component 104 can undertake a probabilistic analysis withrespect to associating a CLI with a call request, such that a CLIassociated with a highest probability is assigned to a call. Thecorrelation between the called number and the appropriate CLI can beretained within the data repository 108.

In summary, dual-mode devices may be associated with multiple phonenumbers, such that incoming calls can have different numbers, yet bedelivered to the same device, and outgoing calls can have multiplepossible CLI associated therewith. The analysis component 104 aids inassociating an appropriate CLI to outgoing calls, such that if abusiness contact is called, appropriate caller identification isprovided to the called party. Similarly, if a personal contact iscalled, a number or identity that is associated with the dual-modedevice's personal number will be displayed upon an end device.Additionally, it is to be understood that management of multiple CLIs isindependent of network and/or radio technologies, as the claimed subjectmatter may apply to any suitable technology that provides a two or moreparty voice session.

Now turning to FIG. 2, an example arrangement 200 of multiple mobiledevices is illustrated. A first device 202 can be a dual-mode device,which may be associated with multiple phone numbers. Dual-mode devicescan connect by way of WiFi, Bluetooth, or other suitable protocol to abroadband network, and can then utilize such network to send and receivevoice calls as well as data. Dual-mode devices are also equipped toutilize conventional cellular networks in areas not covered by an accesspoint associated with a particular dual-mode device. In an example oftypical usage of a dual mode device, an enterprise may have their ownnetwork infrastructure, and my wish that their employees utilize theinternal network for phone calls and data transmittal to reducetelephone bills. Outside areas covered by such network, however,employees can still communicate through use of a cellular network (e.g.,GSM).

Second and third communication devices 204 and 206, respectively, canreceive a call from the first device 202, which is associated withmultiple telephone numbers. For instance, the second communicationdevice 204 can be associated with a personal contact of the operator ofthe first communications device 202; accordingly, a number or identityassociated with a personal number of the first communication device 202should be displayed to the owner of the second communication device 204.Similarly, the third communication device 206 can be associated with abusiness contact of the operator of the first communications device 202.Therefore, a number or identity provided to the third communicationdevice 206 when called by the first communication device 202 should be abusiness number or identity of the first communications device 202.While shown as portable devices, it is understood that the second andthird communications devices 204 and 206 can be landline phones, mobilephones, or any other suitable communication devices. Additionally,caller identity displayed in connection with the devices 204 and/or 206can be visual in nature, such as a phone number or identity, and/or canbe output audibly.

Referring now to FIG. 3, a system 300 that facilitates selection andoutput of a CLI from amongst a plurality of CLIs is illustrated. Thesystem 300 includes a mobile device 302, which can be a dual-modehandset (telephone). The mobile device 302 can be associated withmultiple telephone numbers, such that different parties can utilizedifferent numbers and reach a same operator. Similarly, outgoing callsmay be associated with different caller identification data, whereincalls made to different parties may desirably have different CLIsassociated therewith. To that end, the mobile device 302 includes thereceiver component 102 that receives a call request (e.g., a request tocall a particular individual, phone line, company, . . . ). The callrequest can be a user selecting a contact from a contact list throughselection of one or more push-buttons, use of speed dial (e.g.,maintaining pressure on a single key for a short period of time), use ofvoice commands, or any other suitable manner for initiating a call tothe called party 106.

The receiver component 102 is communicatively coupled to the analysiscomponent 104, which analyzes the call request received by the receivercomponent 102. More particularly, the analysis component 104 analyzesthe number or identity that is the subject of the call request, andsearches the data repository 108 for the number or identity. The datarepository 108 includes called party/CLI associations 304, such that theanalysis component 104 can quickly determine an appropriate CLI toassociate with the number or identity within the call request. If thecalled party/CLI associations 304 do not include a number or identityrelating to the call request, the analysis component 104 can associatean outgoing call with a default CLI. Additionally or alternatively, theanalysis component 104 can make a real-time inference relating to aparticular CLI to provide to the receiving party 106 given the callrequest. As used herein, the terms “inference” or “to infer” refergenerally to the process of reasoning about or inferring states of thesystem, environment, and/or user from a set of observations as capturedvia events and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources. Various classification schemes and/or systems(e.g., support vector machines, neural networks, expert systems,Bayesian belief networks, fuzzy logic, data fusion engines . . . ) canbe employed in connection with performing automatic and/or inferredaction in connection with the subject invention.

In one example, an operator of the mobile device 302 may frequently makebusiness calls to various enterprise numbers, which each have a samearea code (and may have other similar digits as well). If the calledparty 106 is within the area code associated with the enterprisenumbers, the analysis component 104 can infer that a business CLI shouldbe provided to the called party 106. Thereafter, the inferred CLI andthe number can be retained, for instance, within the called party/CLIassociations 304 within the data repository 108. For instance, the datarepository 108 can be a SIM card, a hard drive within the mobile device302, a flash card, or any other suitable removable and/or non-removablemedia.

Turning now to FIG. 4, a system 400 for appending an appropriate CLI toa mobile originated call is illustrated. The system 400 includes adual-mode handset 402 that can be associated with multiple phone numbers(e.g., a business number, a personal number, a family number, . . . ).The dual mode handset 402 can employ a wireless network 404 toeffectuate deliverance and receipt of voice calls and data, such asimage data, text messages, audio data (e.g., music files), and the like.The network 404 can be a GSM network, a Code-Division Multiple Access(CDMA) based network, or any other suitable wireless network. Thenetwork 404 can, for instance, authenticate the dual mode handset 402when it requests dual-mode services, and can cause incoming and outgoingcalls to be routed over a broadband network, such as a cable network, aDSL network, a WiMAX network, and the like.

In this example system 400, the network includes the receiver component102, the analysis component 104, and the data repository 108. Forinstance, a subscriber can select a number, contact, dial a number, usespeed dial, or the like to generate a call request that is received atthe network 404 by the receiver component 102. The analysis component104 can then analyze the request and provide an appropriate CLI to thecalled party 106. In an example, the call request received at thereceiver component 102 can include metadata associated with the calledparty 106, indicating a CLI to be provided to the called party 106.Additionally or alternatively, the analysis component 104 can access thedata repository 108 and utilize contents thereof to determine anappropriate CLI to provide to the called party. Thus, when the calledparty receives indication of an incoming call (phone ringing, phonevibrating, phone flashing, etc.), the called party 106 will also receivedata identifying the calling party 402. The analysis component 104 can,as described above, access call history 406 within the data repository108 and dynamically infer which of several CLIs to provide to the calledparty 106. Also, the analysis component 104 can provide a default CLI tothe called party 106, and the default CLI can be associated with thecalled party 106 in the future until changed by the user. In moredetail, a particular CLI can be designated as a default CLI, such thatif a call is made and a CLI is not statically or dynamically assigned,the default CLI can be assigned. Moreover, an assigned CLI can beoverridden through use of the default CLI on an ad hoc basis.

Now referring to FIG. 5, a system 500 that facilitates selectivelyproviding a CLI from amongst a plurality of available CLIs to the calledparty 106 is illustrated. As described above, dual-mode handsets can beassociated with several numbers, thus rendering it important to providea correct CLI to parties called through utilization of dual modehandsets. The system 500 includes the receiver component 102, whereinsuch component 102 receives call requests made by a dual mode handset502. The call request can then be passed to the analysis component 104,which can be utilized in connection with selecting a CLI to provide tothe called party 106. For instance, the analysis component 104 canreceive the call request and then access the data repository 108 todetermine if the called party 106 has previously been assigned anappropriate CLI. If yes, the analysis component 104 can provide such CLIto the called party 106.

If the called party 106 has not been assigned a CLI, an interfacegenerator component 504 can be utilized to provide a user with anopportunity to assign a CLI to the called party 106. While shown asbeing separate and outside of the dual mode handset 502, it isunderstood that one or more of the receiver component 102, the analysiscomponent 104, the data repository 108, and the interface generatorcomponent 504 can be included within the dual mode handset 502.Additionally or alternatively, one or more of such components can belocated on network devices, such as network servers. An interfaceprovided by the interface generator component 504 can enable a user toselect a CLI to associate with the called party 106, and such CLI (and anumber or contact associated with the called party 106) can be retainedwithin the data repository 108. Moreover, the interface generatorcomponent 504 can provide an interface that can receive and interpretvoice commands from a user, and a CLI can be associated with the calledparty 106 based upon such voice commands. Additionally, the interfacegenerator component 504 can create an interface that can be used inconnection with a pressure-sensitive screen, such that use of, forinstance, a stylus can enable a user to select a CLI to associate withthe called party 106.

The analysis component 104 can additionally be associated with a billingcomponent 506 that can bill a subscriber associated with the dual modehandset 502 based upon determinations made by the analysis component104. Pursuant to one example, the dual mode handset 502 can be utilizedin connection with a particular enterprise, such that business callsmade by the subscriber can be billed to the enterprise. Similarly, callsmade to friends or family members may be desirably billed to thesubscriber (rather than the enterprise). The billing component 506 cantrack calls made to different parties that are associated with differentCLIs and automatically bill based upon such tracking. In anotherexample, the billing component 506 can bill at different levels when thedual mode handset 502 is handed off from an access point to a wirelessbase station, for instance. More particularly, the dual-mode handset 502may travel outside of a range of an access point, and thus may need toutilize conventional wireless apparatuses to continue with a phone callor receive/transmit data. The billing component 506 can bill atdifferent rates depending on whether the dual-mode handset 502 isutilizing a broadband network or conventional wireless apparatuses toundertake communications/data exchange. Thus, the billing component 506can bill different subscribers/entities (an individual and anenterprise, for example) at different rates depending on a CLIassociated with calls made by the dual mode handset 502 and servicesbeing utilized by the dual mode handset.

Now turning to FIG. 6, an example interface 600 that can be provided toa dual-mode handset is illustrated. As stated supra, dual-mode handsetsmay be associated with multiple numbers, and it may be desirable toassign specific CLIs to contacts or called parties. If a user calls anumber that is not associated with a particular CLI, the interface 600can be provided to such user. The interface 600 can include text orgraphics that directs a user with respect to how to assign a CLI to thecalled party. Additionally or alternatively, directions can be audiblyprovided to a subscriber. In the example interface 600, a subscriber isasked to select between two different numbers 602 and 604 associatedwith the dual mode handset. The selection can be made, for instance, bydepressing one or more keys that relate to the two numbers 602 and 604.In another example, a stylus or other suitable instrument can be used todepress a graphical icon (button) on a pressure-sensitive screen. In yetanother example, a subscriber can proffer voice commands to enable a CLIto be associated with an outgoing call.

Referring now to FIG. 7, a system 700 that facilitates assigning a CLIor CLIs to one or more contacts is illustrated. The system 700 includesa graphical user interface 702 that enables a user to associate one ormore called numbers or contacts with a CLI or CLIs. For instance, a usercan enter a first contact or number in a field and then provide orselect an appropriate CLI in a corresponding field (through text entry,selection by way of pull-down menus, radio buttons, etc.). The userselections can then be provided to a web server 704, which can beemployed to transfer such selections to a network server 706 (a servermaintained by a wireless service provider). Thereafter, when a userutilizes the dual-mode handset, an appropriate CLI will be assigned tocalled parties. The system 700 enables a user, through use of acomputing device, such as a PC, to update or assign CLIs to specificnumbers in bulk.

Now turning to FIG. 8, a system for assigning a CLI to a number orcontact is illustrated. The system 800 includes the receiver component102, which receives an incoming call. The incoming call is directedtowards one of several numbers associated with a dual-mode handset. Theanalysis component 104 receives the incoming call and determines anumber (e.g., personal, business, family, . . . ) that the incoming callutilized to contact the individual associated with the dual-modehandset. The analysis component 104 includes a tagging component 802that tags the number of the incoming call (CLI) with metadata thatindicates how to categorize such caller. Pursuant to a particularexample, a caller with a number 111-222-3333 can attempt to contact thedual-mode handset by way of a personal number associated therewith(e.g., 222-333-4444). The analysis component can determine that thecaller is contacting the personal number, and can associate such caller(e.g., the number 111-222-3333) with metadata such that when thedual-mode handset is utilized to call the caller, a CLI relating to thepersonal number (e.g., 222-333-4444) will be provided. The relationshipscan be stored in the data repository 106 to enable subsequentassociation of a CLI and the number of the calling party.

With reference to FIG. 9, a system 900 that is related to authenticatinga dual-mode handset and enabling the dual-mode handset to provide CLIsthat vary with respect to certain called parties is illustrated. Thesystem 900 includes a dual-mode handset 902 that accesses anauthorization component 904 associated with a wireless network serviceprovider (e.g., a GSM network). The authorization component 904 cananalyze identifying indicia associated with the dual-mode handset 902and access a data repository 906 to determine whether the dual-modehandset 902 is authorized with respect to the network and/or withrespect to requested services. If the dual-mode handset is authorized902, a provisioning component 908 can provide the dual-mode handset 902with access to CLI information 910 within the data repository 906.Thereafter, when making a call, appropriate CLI information can beprovided to the called party.

Referring to FIGS. 10-13, methodologies in accordance with variousaspects of the claimed subject matter are illustrated. While, forpurposes of simplicity of explanation, the methodologies are shown anddescribed as a series of acts, it is to be understood and appreciatedthat the claimed subject matter is not limited by the order of acts, assome acts may occur in different orders and/or concurrently with otheracts from that shown and described herein. For example, those skilled inthe art will understand and appreciate that a methodology couldalternatively be represented as a series of interrelated states orevents, such as in a state diagram. Moreover, not all illustrated actsmay be required to implement a methodology in accordance with theclaimed subject matter. Additionally, it should be further appreciatedthat the methodologies disclosed hereinafter and throughout thisspecification are capable of being stored on an article of manufactureto facilitate transporting and transferring such methodologies tocomputers. The term article of manufacture, as used herein, is intendedto encompass a computer program accessible from any computer-readabledevice, carrier, or media.

Turning specifically to FIG. 10, a methodology 1000 for associating oneof many CLIs with an outgoing call is illustrated. The methodology 1000starts at 1002, and at 1004 a dual-mode handset requests to make a callto a specific party, and such request is received. As stated above, therequest can be a selection of a contact within a contact list, dialing aparticular number, providing voice commands that relate to a certainnumber, or any other suitable manner for requesting that a call be made.Additionally, the dual-mode handset is associated with multiple phonenumbers. At 1006, one of a plurality of CLIs is selected with respect tothe specific party. For example, a CLI relating to a personal number canbe selected if the specific party is a close friend of an owner of thedual-mode handset. Similarly, a CLI relating to a business number can beselected if the specific party is a business contact of the owner of thedual-mode handset. In yet another example, a default CLI can be selectedif the specific party has not previously associated with a CLI. At 1008,the selected CLI is provided to the specific party, such that anoperator of a phone can quickly discern an identity of the caller. Themethodology 1000 then completes at 1010.

With reference to FIG. 11, a methodology 1100 for providing anappropriate CLI from amongst a plurality of CLIs to a called party isillustrated. The methodology 1100 begins at 1102, and at 1104 a requestfrom a dual-mode handset is received, wherein the request relates tocalling a specific party. At 1106, a determination is made regardingwhether the desirably called party is associated with a CLI. In moredetail, the dual-mode handset can utilize multiple numbers to make andreceive phone calls; thus, calls to different people may desirably beassociated with different CLIs. Such associations can be made by a user,such as through creating contacts and placing them in particularcategories (personal, business, family, etc.). Similarly, associationscan be automatically created when individuals call the dual-mode handset(e.g., outgoing CLIs to such individual will be numbers previouslydialed by the individual to contact the dual-mode handset).

If it is determined that there currently is no association between thespecific party and a CLI, then at 1108 a default CLI can be provided tothe specific party. Such default CLI can be set by a user or by anetwork provider associated with the dual-mode handset. If it isdetermined that there is an association between the specific party and aCLI, then such CLI can be provided to the specific party at 1110. Themethodology 1100 then completes at 1112.

Referring now to FIG. 12, a methodology 1200 for selectively providingan appropriate CLI to a called party is illustrated. The methodology1200 initiates at 1202, and at 1204 a request from a dual-mode handsetto call a specific party is received. At 1206, a determination is maderegarding whether the specific party is associated with a CLI. If thespecific party is associated with a CLI (e.g., from previous calls madeto the specific party or categorization of the specific party), thensuch CLI can be provided to the specific party at 1208. If the specificparty is not associated with a CLI, then at 1210 call history of thedual-mode handset can be analyzed. For example, the call history can bereviewed to locate patterns regarding time of calling (e.g., betweencertain times of day it is highly probable that a business call is beingmade). Similarly, the call history can be analyzed to locate patternsregarding location of calls, such as area codes. More particularly, itmay be more probable that numbers in a certain area code are personalcontacts rather than business contacts. At 1212, a CLI is selected withrespect to the specific party based at least in part upon the analysisof the call history, and at 1214 the selected CLI is provided to thespecific party. The methodology 1200 can take place upon a dual-modehandset, upon a network server, a series of network servers, or anyother suitable location. The methodology 1200 then completes at 1216.

Now turning to FIG. 13, a methodology 1300 for assigning a mobileterminated call with a CLI for later utilization in connection withmobile originating calls is illustrated. The methodology 1300 begins at1302, and at 1304 an incoming phone call is received. The incoming phonecall can be from a land line, a cellular phone, a call over a broadbandnetwork, or any other suitable call. Additionally, the incoming call canbe directed towards a dual-mode handset that is associated with multiplenumbers, such that dialing any of the multiple numbers results in thedual-mode handset receiving a call. At 1306, a CLI is analyzed withrespect to the incoming call. For example, the CLI can indicate acertain number that is attempting to reach the dual-mode handset. At1308, a determination is made regarding whether the party making thecall (the calling party) has previously been assigned a CLI with respectto the dual-mode handset. In other words, if the dual-mode handset wereto call the calling party, would a CLI be associated with the callingparty.

If the calling party has not been assigned a CLI with respect to thedual-mode handset, then the calling number is associated with a CLIrelating to the number called at 1310. For instance, the dual-modehandset may be associated with a personal number and a business number,and the calling party may have called the personal number. Thereafter,if the dual-mode handset is utilized to contact the calling party, a CLIrelating to the personal number will be provided to such calling party.If the calling party has previously been assigned a CLI with respect tothe dual-mode handset, then at 1312 a determination is made regardingwhether such CLI matches the CLI previously assigned. If the CLIs do notmatch, at 1314 a CLI relating to the calling party is updated withrespect to the number called. Pursuant to an example, the calling partymay have previously called the dual-mode handset using the personalnumber. Over time, however, the calling party may become a businesscontact and begin contacting the subscriber associated with thedual-mode handset through use of the business number. Accordingly, ifthe dual-mode handset is utilized to contact the calling party, a CLIassociated therewith may desirably be the business-related CLI.Additionally or alternatively, CLIs associated with parties may varywith time. For instance, during working hours a number may desirably beassociated with a business CLI while during evening hours the samenumber may desirably be associated with a personal CLI. If it isdetermined at 1312 that the CLIs match, then there is no need to performany updating and the methodology 1300 completes at 1316.

Referring now to FIG. 14, there is illustrated a block diagram of acomputer operable to analyze incoming and outgoing calls from adual-mode handset and associate appropriate CLIs therewith. While shownthrough use of a computer or computing components, it is understood thatthe claimed subject matter may be implemented as a method, apparatus, orarticle of manufacture using standard programming and/or engineeringtechniques to produce software, firmware, hardware, or any combinationthereof to control a computing device, such as a mobile handset, toimplement the disclosed subject matter. The term “article ofmanufacture” as used herein is intended to encompass a computer programaccessible from any computer-readable device, carrier, or media. Forexample, computer readable media can include but is not limited tomagnetic storage devices (e.g., hard disk, floppy disk, magnetic strips. . . ), optical disks (e.g., compact disk (CD), digital versatile disk(DVD) . . . ), smart cards, SIM cards, and flash memory devices (e.g.,card, stick, key drive . . . ). Additionally it should be appreciatedthat a carrier wave can be employed to carry computer-readableelectronic data such as those used in transmitting and receivingelectronic mail or in accessing a network such as the Internet or alocal area network (LAN). Of course, those skilled in the art willrecognize many modifications may be made to this configuration withoutdeparting from the scope or spirit of the claimed subject matter.

In order to provide additional context for various aspects of theclaimed subject matter, FIG. 14 and the following discussion areintended to provide a brief, general description of a suitable computingenvironment 1400 in which the various aspects described herein can beimplemented. While the description above is in the general context ofcomputer-executable instructions that may run on one or more computers,those skilled in the art will recognize that the claimed subject matteralso can be implemented in combination with other program modules and/oras a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the claimed subject matter may also bepracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and non-volatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes both volatileand non-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalvideo disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 14, the exemplary environment 1400 forimplementing various aspects includes a computer 1402, the computer 1402including a processing unit 1404, a system memory 1406 and a system bus1408. The system bus 1408 couples system components including, but notlimited to, the system memory 1406 to the processing unit 1404. Theprocessing unit 1404 can be any of various commercially availableprocessors, such a single core processor, a multi-core processor, or anyother suitable arrangement of processors.

The system bus 1408 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1406 caninclude read-only memory (ROM), random access memory (RAM), high-speedRAM (such as static RAM), EPROM, EEPROM, and/or the like. Additionallyor alternatively, the computer 1402 can include a hard disk drive, uponwhich program instructions, data, and the like can be retained.Moreover, removable data storage can be associated with the computer1402. Hard disk drives, removable media, etc. can be communicativelycoupled to the processing unit 1404 by way of the system bus 1408.

The system memory 1406 can retain a number of program modules, such asan operating system, one or more application programs, other programmodules, and program data. All or portions of an operating system,applications, modules, and/or data can be, for instance, cached in RAM,retained upon a hard disk drive, or any other suitable location. A usercan enter commands and information into the computer 1402 through one ormore wired/wireless input devices, such as a keyboard, pointing andclicking mechanism, pressure sensitive screen, microphone, joystick,stylus pen, etc. A monitor or other type of interface can also beconnected to the system bus 1408.

The computer 1402 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, phones, or other computing devices, such asworkstations, server computers, routers, personal computers, portablecomputers, microprocessor-based entertainment appliances, peer devicesor other common network nodes, etc. The computer 1402 can connect toother devices/networks by way of antenna, port, network interfaceadaptor, wireless access point, modem, and/or the like.

The computer 1402 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least WiFi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

WiFi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. WiFi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. WiFi networks use radio technologies called IEEE 802.11(a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. A WiFinetwork can be used to connect computers to each other, to the Internet,and to wired networks (which use IEEE 802.3 or Ethernet). WiFi networksoperate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps(802.11a) or 54 Mbps (802.11b) data rate, for example, or with productsthat contain both bands (dual band), so the networks can providereal-world performance similar to the basic 10BaseT wired Ethernetnetworks used in many offices.

Now turning to FIG. 15, such figure depicts a GSM/GPRS/IP multimedianetwork architecture 1500 that includes a GSM core network 1501, a GPRSnetwork 1530 and an IP multimedia network 1538. The GSM core network1501 includes a Mobile Station (MS) 1502, at least one Base TransceiverStation (BTS) 1504 and a Base Station Controller (BSC) 1506. The MS 1502is physical equipment or Mobile Equipment (ME), such as a mobile phoneor a laptop computer that is used by mobile subscribers, with aSubscriber identity Module (SIM). The SIM includes an InternationalMobile Subscriber Identity (IMSI), which is a unique identifier of asubscriber. The MS 1502 includes an embedded client 1502 a that receivesand processes messages received by the MS 1502. The embedded client 1502a may be implemented in JAVA and is discuss more fully below.

The embedded client 1502 a communicates with an application 1502 b thatprovides services and/or information to an end user. One example of theapplication may be navigation software that provides near real-timetraffic information that is received via the embedded client 1502 a tothe end user. The navigation software may provide road conditions,suggest alternate routes, etc. based on the location of the MS 1502.Those of ordinary skill in the art understand that there are manydifferent methods and systems of locating an MS 1502.

Alternatively, the MS 1502 and a device 1502 c may be enabled tocommunicate via a short-range wireless communication link, such asBLUETOOTH. For example, a BLUETOOTH SIM Access Profile may be providedin an automobile (e.g., device 1502 c) that communicates with the SIM inthe MS 1502 to enable the automobile's communications system to pullinformation from the MS 1502. The BLUETOOTH communication system in thevehicle becomes an “embedded phone” that employs an antenna associatedwith the automobile. The result is improved reception of calls made inthe vehicle. As one of ordinary skill in the art would recognize, anautomobile is one example of the device 1502 c. There may be an endlessnumber of devices 1502 c that use the SIM within the MS 1502 to provideservices, information, data, audio, video, etc. to end users.

The BTS 1504 is physical equipment, such as a radio tower, that enablesa radio interface to communicate with the MS. Each BTS may serve morethan one MS. The BSC 1506 manages radio resources, including the BTS.The BSC may be connected to several BTSs. The BSC and BTS components, incombination, are generally referred to as a base station (BSS) or radioaccess network (RAN) 1503.

The GSM core network 1501 also includes a Mobile Switching Center (MSC)1508, a Gateway Mobile Switching Center (GMSC) 1510, a Home LocationRegister (HLR) 1512, Visitor Location Register (VLR) 1514, anAuthentication Center (AuC) 1518, and an Equipment Identity Register(EIR) 1516. The MSC 1508 performs a switching function for the network.The MSC also performs other functions, such as registration,authentication, location updating, handovers, and call routing. The GMSC1510 provides a gateway between the GSM network and other networks, suchas an Integrated Services Digital Network (ISDN) or Public SwitchedTelephone Networks (PSTNs) 1520. In other words, the GMSC 1510 providesinterworking functionality with external networks.

The HLR 1512 is a database or component(s) that comprises administrativeinformation regarding each subscriber registered in a corresponding GSMnetwork. The HLR 1512 also includes the current location of each MS. TheVLR 1514 is a database or component(s) that contains selectedadministrative information from the HLR 1512. The VLR containsinformation necessary for call control and provision of subscribedservices for each MS currently located in a geographical area controlledby the VLR. The HLR 1512 and the VLR 1514, together with the MSC 1508,provide the call routing and roaming capabilities of GSM. The AuC 1516provides the parameters needed for authentication and encryptionfunctions. Such parameters allow verification of a subscriber'sidentity. The EIR 1518 stores security-sensitive information about themobile equipment.

A Short Message Service Center (SMSC) 1509 allows one-to-one ShortMessage Service (SMS) messages to be sent to/from the MS 1502. A PushProxy Gateway (PPG) 1511 is used to “push” (e.g., send without asynchronous request) content to the MS 1502. The PPG 1511 acts as aproxy between wired and wireless networks to facilitate pushing of datato the MS 1502. A Short Message Peer to Peer (SMPP) protocol router 1513is provided to convert SMS-based SMPP messages to cell broadcastmessages. SMPP is a protocol for exchanging SMS messages between SMSpeer entities such as short message service centers. It is often used toallow third parties, e.g., content suppliers such as news organizations,to submit bulk messages.

To gain access to GSM services, such as speech, data, and short messageservice (SMS), the MS first registers with the network to indicate itscurrent location by performing a location update and IMSI attachprocedure. The MS 1502 sends a location update including its currentlocation information to the MSC/VLR, via the BTS 1504 and the BSC 1506.The location information is then sent to the MS's HLR. The HLR isupdated with the location information received from the MSC/VLR. Thelocation update also is performed when the MS moves to a new locationarea. Typically, the location update is periodically performed to updatethe database as location updating events occur.

The GPRS network 1530 is logically implemented on the GSM core networkarchitecture by introducing two packet-switching network nodes, aserving GPRS support node (SGSN) 1532, a cell broadcast and a GatewayGPRS support node (GGSN) 1534. The SGSN 1532 is at the same hierarchicallevel as the MSC 1508 in the GSM network. The SGSN controls theconnection between the GPRS network and the MS 1502. The SGSN also keepstrack of individual MS's locations and security functions and accesscontrols.

A Cell Broadcast Center (CBC) 1533 communicates cell broadcast messagesthat are typically delivered to multiple users in a specified area. CellBroadcast is one-to-many geographically focused service. It enablesmessages to be communicated to multiple mobile phone customers who arelocated within a given part of its network coverage area at the time themessage is broadcast.

The GGSN 1534 provides a gateway between the GPRS network and a publicpacket network (PDN) or other IP networks 1536. That is, the GGSNprovides interworking functionality with external networks, and sets upa logical link to the MS through the SGSN. When packet-switched dataleaves the GPRS network, it is transferred to an external TCP-IP network1536, such as an X.25 network or the Internet. In order to access GPRSservices, the MS first attaches itself to the GPRS network by performingan attach procedure. The MS then activates a packet data protocol (PDP)context, thus activating a packet communication session between the MS.the SGSN, arc the GGSN.

In a GSM/GPRS network, GPRS services and GSM services can be used inparallel. The MS can operate in one three classes: class A, class B, andclass C. A class A MS can attach to the network for both GPRS servicesand GSM services simultaneously. A class A MS also supports simultaneousoperation of GPRS services and GSM services. For example, class Amobiles can receive GSM voice/data/SMS calls and GPRS data calls at thesame time. A class B MS can attach to the network for both GPRS servicesand GSM services simultaneously. However, a class B MS does not supportsimultaneous operation of the GPRS services and GSM services. That is, aclass B MS can only use one of the two services at a given time. A classC MS can attach for only one of the GPRS services and GSM services at atime. Simultaneous attachment and operation of GPRS services and GSMservices is not possible with a class C MS.

A GPRS network 1530 can be designed to operate in three networkoperation modes (NOM1, NOM2 and NOM3). A network operation mode of aGPRS network is indicated by a parameter in system information messagestransmitted within a cell. The system information messages dictates a MSwhere to listen for paging messages and how signal towards the network.The network operation mode represents the capabilities of the GPRSnetwork. In a NOM1 network, a MS can receive pages from a circuitswitched domain (voice call) when engaged in a data call. The MS cansuspend the data call or take both simultaneously, depending on theability of the MS. In a NOM2 network, a MS may not received pages from acircuit switched domain when engaged in a data call, since the MS isreceiving data and is not listening to a paging channel In a NOM3network, a MS can monitor pages for a circuit switched network whilereceived data and vise versa.

The IP multimedia network 1538 was introduced with 3GPP Release 5, andincludes an IP multimedia subsystem (IMS) 1540 to provide richmultimedia services to end users. A representative set of the networkentities within the IMS 1540 are a call/session control function (CSCF),a media gateway control function (MGCF) 1546, a media gateway (MGW)1548, and a master subscriber database, called a home subscriber server(HSS) 1550. The HSS 1550 may be common to the GSM network 1501, the GPRSnetwork 1530 as well as the IP multimedia network 1538.

The IP multimedia system 1540 is built around the call/session controlfunction, of which there are three types: an interrogating CSCF (I-CSCF)1543, a proxy CSCF (P-CSCF) 1542, and a serving CSCF (S-CSCF) 1544. TheP-CSCF 1542 is the MS's first point of contact with the IMS 1540. TheP-CSCF 1542 forwards session initiation protocol (SIP) messages receivedfrom the MS to an SIP server in a home network (and vice versa) of theMS. The P-CSCF 1542 may also modify an outgoing request according to aset of rules defined by the network operator (for example, addressanalysis and potential modification).

The I-CSCF 1543 forms an entrance to a home network and hides the innertopology of the home network from other networks and providesflexibility for selecting an S-CSCF. The I-CSCF 1543 may contact asubscriber location function (SLF) 1545 to determine which HSS 1550 touse for the particular subscriber, if multiple HSS's 1550 are present.The S-CSCF 1544 performs the session control services for the MS 1502.This includes routing originating sessions to external networks androuting terminating sessions to visited networks. The S-CSCF 1544 alsodecides whether an application server (AS) 1552 is required to receiveinformation on an incoming SIP session request to ensure appropriateservice handling. This decision is based on information received fromthe HSS 1550 (or other sources, such as an application server 1552). TheAS 1552 also communicates to a location server 1556 (e.g., a GatewayMobile Location Center (GMLC)) that provides a position (e.g.,latitude/longitude coordinates) of the MS 1502.

The HSS 1550 contains a subscriber profile and keeps track of which corenetwork node is currently handling the subscriber. It also supportssubscriber authentication and authorization functions (AAA). In networkswith more than one HSS 1550, a subscriber location function providesinformation on the HSS 1550 that contains the profile of a givensubscriber.

The MGCF 1546 provides interworking functionality between SIP sessioncontrol signaling from the IMS 1540 and ISUP/BICC call control signalingfrom the external GSTN networks (not shown). It also controls the mediagateway (MGW) 1548 that provides user-plane interworking functionality(e.g., converting between AMR- and PCM-coded voice). The MGW 1548 alsocommunicates with other IP multimedia networks 1554.

What has been described above includes examples of the claimed subjectmatter. It is, of course, not possible to describe every conceivablecombination of components or methodologies for purposes of describingthe claimed subject matter, but one of ordinary skill in the art mayrecognize that many further combinations and permutations of such matterare possible. Accordingly, the claimed subject matter is intended toembrace all such alterations, modifications and variations that fallwithin the spirit and scope of the appended claims. Furthermore, to theextent that the term “includes” is used in either the detaileddescription or the claims, such term is intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

1. A system comprising: an analysis component configured to: identify adestination telephone number in a telephone call request; and associatecalling line identification information with the telephone call requestbased on the destination telephone number.
 2. The system of claim 1,wherein the telephone call request originates from a device configuredwith a plurality of origination telephone numbers available to originatecalls from the device.
 3. The system of claim 2, wherein the callingline identification information comprises an origination telephonenumber selected from the plurality of origination telephone numbers. 4.The system of claim 1, wherein the analysis component is furtheredconfigured to replace an origination telephone number employed ingeneration of the telephone call request with a replacement telephonenumber and include the replacement telephone number in the calling lineidentification information.
 5. The system of claim 4, wherein theanalysis component is configured to replace the origination telephonenumber with the replacement telephone number based on an activityassociated with a destination of the destination telephone number of thetelephone call request.
 6. The system of claim 4, wherein the analysiscomponent is configured to replace the origination telephone number withthe replacement telephone number based on an identity associated with adestination of the destination telephone number of the telephone callrequest.
 7. The system of claim 1, wherein the calling lineidentification information comprises a name associated with theorigination telephone number.
 8. The system of claim 1, wherein thecalling line identification information comprises a plurality of callingline identifications associated with the destination telephone number.9. The system of claim 1, wherein the calling line identificationinformation comprises a calling party identifier selected from aplurality of calling party identifiers.
 10. The system of claim 1,further comprising: a receiver component configured to receive thetelephone call request.
 11. A method comprising: identifying adestination telephone number of a telephone call request; andassociating a calling line identification with the telephone callrequest based on the identifying of the destination telephone number.12. The method of claim 11, further comprising selecting, from aplurality of available origination telephone numbers associated with thetelephone call request, an origination telephone number for inclusion inthe calling line identification.
 13. The method of claim 12, wherein theselecting of the origination telephone number includes selecting theorigination telephone number as a function of an activity associatedwith the destination telephone number.
 14. The method of claim 12,further comprising supplementing the calling line identification withpersonal information of an entity associated with the originationtelephone number.
 15. The method of claim 11, further comprisingdetermining a previous calling line identification previously associatedwith the destination telephone number including referring to a callhistory for the destination telephone number.
 16. The method of claim15, further comprising generating the calling line identification basedon the call history.
 17. A computer readable storage medium comprisingcomputer executable instructions that, in response to execution by acomputing system, cause the computing system to perform operations,comprising: identifying a destination telephone number of a telephonecall request; associating a calling line identification with thetelephone call request based on the identifying of the destinationtelephone number; and forwarding the calling line identification to thedestination telephone number.
 18. The computer readable storage mediumof claim 17, wherein the instructions further comprise selecting anorigination telephone number from a plurality of origination numbersassociated with the telephone call request.
 19. The computer readablestorage medium of claim 18, wherein the instructions further compriseincluding the origination telephone number in the calling lineidentification.
 20. The computer readable storage medium of claim 17,wherein the instructions further comprise including, in the calling lineidentification, entity information associated with a source of thetelephone call request.