Multiple caller numbers assigned to multiple called devices

ABSTRACT

One example method of operation may include identifying a number of profiles including respective recipient telephone numbers identified to be called within a period of time, forwarding a list of caller telephone numbers assigned to a caller entity to each of a number of mobile devices associated with the profiles, and placing calls to the respective mobile devices within the period of time, and the calls originate from a group of the caller telephone numbers included in the list.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is related to co-pending U.S. non-provisional patent application Docket No. FO012018_1-CIP-4 entitled, “MULTIPLE CALLER NUMBERS ASSIGNED TO A CALLED DEVICE,” which was filed on the same day and is also a continuation-in-part of U.S. patent application Ser. No. 16/298,640, Docket No. FO012018_1 entitled, “CALL CONTENT MANAGEMENT FOR MOBILE DEVICES,” filed on Mar. 11, 2019, which is a non-provisional of U.S. patent application No. 62/715,677, Docket No. FO012018-PROV entitled, “ENGAGE,” filed on Aug. 7, 2018, the entire contents of which are hereby incorporated by reference in their entirety.

BACKGROUND

Conventionally, mobile device users receive calls from undesired sources every day and sometimes several times an hour depending on the particular day. The source numbers which are used to dial the users may be local numbers, long-distance numbers, anonymous numbers, spoofed numbers, etc. The calls may be spam calls, scam calls, robocalls, etc. With recent updates to smartphones and the call screen user interfaces used during a call, the sources of the calls are generally displayed in some capacity to permit the user to identify whether to answer the phone call or not, such as caller ID or other data services. However, in the event that the number is not known to the caller or is matched to his or her previously stored contacts, the caller may require additional content to be shared to demonstrate credibility as a reputable service or advertisement and not just some arbitrary caller without a reputation or legitimate product/service to share with the caller. There are generally limited tools available to demonstrate that the call is likely to be a scam or spam caller, especially in real-time so a caller can quickly decide whether to answer the call, drop the call, block the call, etc. With approximately 90 percent of business calls going unanswered, both ends users and callers require more advanced strategies for identifying callers and making informed decisions regarding whether to answer a call.

SUMMARY

Example embodiments of the present application provide at least a method that includes at least one of identifying a call from an enterprise device destined for a mobile device, responsive to identifying the call, accessing a call content application programming interface (API) operated by a content delivery device responsible for delivering call content to the mobile device, assigning an IP address and user identifier to a mobile device telephone number, forwarding call content data stored in an enterprise account profile of the enterprise device to the mobile device, responsive to forwarding the call content data, establishing a communication channel between the enterprise device and the mobile device, receiving a confirmation from the mobile device at the content delivery device confirming that the call content data was received and loaded on the mobile device and the communication channel was established, and responsive to receiving the confirmation, routing the call to the mobile device via the communication channel.

Another example embodiment may include a system that provides an enterprise device configured to setup calls to one or more mobile devices, and a content delivery device configured to deliver call content to the one or more mobile devices prior to calls being sent to the one or more mobile devices. The content delivery device is further configured to identify a call from the enterprise device destined for a mobile device among the one or more mobile devices, responsive to the call identification, access a call content application programming interface (API) operated by the content delivery device responsible for delivery of the call content to the mobile device, assign an IP address and user identifier to a mobile device telephone number, forward call content data stored in an enterprise account profile of the enterprise device to the mobile device, responsive to the call content data being forwarded, establish a communication channel between the enterprise device and the mobile device, receive a confirmation from the mobile device at the content delivery device which confirms that the call content data was received and loaded on the mobile device and the communication channel was established; and responsive to the confirmation being received, forward the call to a call center entity which routes the call to the mobile device via the communication channel.

Another example embodiment may include a non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform identifying a call from an enterprise device destined for a mobile device, responsive to identifying the call, accessing a call content application programming interface (API) operated by a content delivery device responsible for delivering call content to the mobile device, assigning an IP address and user identifier to the mobile device telephone number, forwarding call content data stored in an enterprise account profile of the enterprise device to the mobile device, responsive to forwarding the call content data, establishing a communication channel between the enterprise device and the mobile device, receiving a confirmation from the mobile device at the content delivery device confirming that the call content data was received and loaded on the mobile device and the communication channel was established, and responsive to receiving the confirmation, routing the call to the mobile device via the communication channel.

Still another example embodiment may include a method that includes at least one of initiating a call via a calling device to a mobile device via a mobile device telephone number, responsive to initiating the call, retrieving call content data associated with a calling device profile, forwarding the call content data, via a content provider device, to the mobile device prior to establishing the call, hashing the mobile device telephone number to create a hashed value, storing the hashed value in the content provider device, authorizing the mobile device to receive the call content data, receiving a token representing the hashed value from the mobile device via the content delivery device, and connecting the call to the mobile device responsive to the token being authenticated.

Still yet another example embodiment may include a system that includes a calling device configured to call one or more mobile devices and a content provider device configured to forward the call content data to the one or more mobile devices, the calling device is configured to initiate a call to a mobile device among the one or more mobile devices via a mobile device telephone number, the content provider device, responsive to the call being identified, retrieves call content data associated with a calling device profile, forwards the call content data, via the content provider device, to the mobile device prior to the call being established, hashes the mobile device telephone number to create a hashed value, stores the hashed value in the content provider device, authorizes the mobile device to receive the call content data, and the calling device receives a token which represents the hashed value from the mobile device via the content delivery device, and connects the call to the mobile device responsive to the token being authenticated.

Still yet a further example embodiment may include a non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform initiating a call via a calling device to a mobile device via a mobile device telephone number, responsive to initiating the call, retrieving call content data associated with a calling device profile, forwarding the call content data, via a content provider device, to the mobile device prior to establishing the call, hashing the mobile device telephone number to create a hashed value, storing the hashed value in the content provider device, authorizing the mobile device to receive the call content data, receiving a token representing the hashed value from the mobile device via the content delivery device, and connecting the call to the mobile device responsive to the token being authenticated.

Another example embodiment may include at least one of identifying a call to a mobile device, determining whether the call comprises call content data intended for the mobile device, initiating an active session and a time to live (TTL) associated with the call content data, forwarding the call content data to the mobile device when the call comprises call content data associated with the caller, and receiving a content confirmation from the mobile device that the call content data was received.

Still yet another example embodiment may include a system that includes a content delivery device and a mobile device, the content delivery device is configured to identify a call to a mobile device, determine whether the call comprises call content data intended for the mobile device, initiate an active session and a time to live (TTL) associated with the call content data, forward the call content data to the mobile device when the call comprises call content data associated with the caller, and receive a content confirmation from the mobile device that the call content data was received.

Still yet a further example embodiment may include a non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform identifying a call to a mobile device, determining whether the call comprises call content data intended for the mobile device, initiating an active session and a time to live (TTL) associated with the call content data, forwarding the call content data to the mobile device when the call includes call content data associated with the caller, and receiving a content confirmation from the mobile device that the call content data was received.

Still another example embodiment may include a method that includes identifying a plurality of mobile device telephone numbers associated with a plurality of mobile devices, forwarding the plurality of mobile device telephone numbers to a content delivery device, hashing the plurality of mobile device telephone numbers, storing the hashed plurality of mobile device telephone numbers in the content delivery device, identifying a scheduled call campaign to the plurality of mobile devices, forwarding call content associated with schedule call campaign to the plurality of mobile devices prior to calling the plurality of mobile devices, and responsive to receiving confirmation that the content was successfully forwarded to the plurality of mobile devices, initiating a calling device to begin calling the plurality of mobile devices.

Another example embodiment may include a system that includes a content delivery device configured to forward content prior to conducting a call campaign, and a plurality of mobile devices, the content delivery device is configured to identify a plurality of mobile device telephone numbers associated with the plurality of mobile devices, hash the plurality of mobile device telephone numbers, store the hashed plurality of mobile device telephone numbers, identify a scheduled call campaign associated with the plurality of mobile devices, forward call content associated with schedule call campaign to the plurality of mobile devices prior to the plurality of mobile devices being called, and responsive to confirmation being received that the content was successfully forwarded to the plurality of mobile devices, initiate a calling device to call the plurality of mobile devices.

Still yet another example embodiment may include a non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform identifying a plurality of mobile device telephone numbers associated with a plurality of mobile devices, forwarding the plurality of mobile device telephone numbers to a content delivery device, hashing the plurality of mobile device telephone numbers, storing the hashed plurality of mobile device telephone numbers in the content delivery device, identifying a scheduled call campaign to the plurality of mobile devices, forwarding call content associated with schedule call campaign to the plurality of mobile devices prior to calling the plurality of mobile devices, and responsive to receiving confirmation that the content was successfully forwarded to the plurality of mobile devices, initiating a calling device to begin calling the plurality of mobile devices.

Still a further example embodiment may include a method that includes receiving from a remote source a list comprising a plurality of telephone numbers at a mobile device, receiving a call from a caller device at the mobile device, determining one of the telephone numbers in the list is paired with a telephone number of the call, and loading one or more enhanced content items assigned to the list on the mobile device.

Still another example embodiment may include an apparatus that includes a receiver configured to receive from a remote source a list comprising a plurality of telephone numbers at a mobile device, receive a call from a caller device at the mobile device, and a processor configured to determine one of the telephone numbers in the list is paired with a telephone number of the call, and load one or more enhanced content items assigned to the list on the mobile device.

Still yet another example embodiment may include a non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform receiving from a remote source a list comprising a plurality of telephone numbers at a mobile device, receiving a call from a caller device at the mobile device, determining one of the telephone numbers in the list is paired with a telephone number of the call, and loading one or more enhanced content items assigned to the list on the mobile device.

Still a further example embodiment may include a method that includes identifying a plurality of profiles comprising respective recipient telephone numbers identified to be called within a period of time, forwarding a list of caller telephone numbers assigned to a caller entity to each of a plurality of mobile devices associated with the profiles, and placing a plurality of calls to the respective plurality of mobile devices within the period of time, and the plurality of calls originate from a group of the caller telephone numbers included in the list.

Still another example embodiment may include an apparatus that includes a processor configured to identify a plurality of profiles comprising respective recipient telephone numbers identified to be called within a period of time, forward a list of caller telephone numbers assigned to a caller entity to each of a plurality of mobile devices associated with the profiles, and place a plurality of calls to the respective plurality of mobile devices within the period of time, and the plurality of calls originate from a group of the caller telephone numbers included in the list.

Another example embodiment may include a method that includes a non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform identifying a plurality of profiles comprising respective recipient telephone numbers identified to be called within a period of time, forwarding a list of caller telephone numbers assigned to a caller entity to each of a plurality of mobile devices associated with the profiles, and placing a plurality of calls to the respective plurality of mobile devices within the period of time, wherein the plurality of calls originate from a group of the caller telephone numbers included in the list.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A illustrates an example call content management network configuration according to example embodiments.

FIG. 1B illustrates another example call content management network configuration according to example embodiments.

FIG. 2 illustrates an example logic diagram of a content delivery provider network according to example embodiments.

FIG. 3 illustrates a batch call and content management configuration according to example embodiments.

FIG. 4 illustrates a user interface of a service provider forwarding call content to a mobile device according to a content delivery network configuration according to example embodiments.

FIG. 5 illustrates example user interfaces of potential call content delivery options according to example embodiments.

FIG. 6A illustrates an example of mobile device authentication by the content delivery network according to example embodiments.

FIG. 6B illustrates an example of mobile device call content delivery performed by a content delivery network according to example embodiments.

FIG. 7A illustrates a system network configuration that provides a call setup to a mobile device with call content delivery according to example embodiments.

FIG. 7B illustrates a system network configuration that provides a call authentication to a mobile device with call content delivery according to example embodiments.

FIG. 7C illustrates a system network configuration that provides a call setup to a mobile device with call content delivery via a service provider according to example embodiments.

FIG. 7D illustrates a system network configuration that provides a call campaign setup to various mobile devices with call content delivery according to example embodiments.

FIG. 8 illustrates a logic diagram with example data input and output parameters for performing call management according to example embodiments.

FIG. 9 illustrates an example network entity device configured to store instructions, software, and corresponding hardware for executing the same, according to example embodiments of the present application.

FIG. 10 illustrates an example batch call and content management configuration for multiple caller numbers being associated with a mobile device according to example embodiments.

FIG. 11 illustrates an example batch call and content management configuration for multiple caller numbers being associated with multiple mobile devices according to example embodiments.

FIG. 12 illustrates an example batch call and content management system configuration for multiple caller numbers being associated with a mobile device according to example embodiments.

FIG. 13 illustrates an example batch call and content management system configuration for multiple caller numbers being associated with multiple mobile devices according to example embodiments.

DETAILED DESCRIPTION OF THE APPLICATION

It will be readily understood that the components of the present application, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of a method, apparatus, and system, as represented in the attached figures, is not intended to limit the scope of the application as claimed, but is merely representative of selected embodiments of the application.

The features, structures, or characteristics of the application described throughout this specification may be combined in any suitable manner in one or more embodiments. For example, the usage of the phrases “example embodiments”, “some embodiments”, or other similar language, throughout this specification refers to the fact that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. Thus, appearances of the phrases “example embodiments”, “in some embodiments”, “in other embodiments”, or other similar language, throughout this specification do not necessarily all refer to the same group of embodiments, and the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

In addition, while the term “message” has been used in the description of embodiments of the present application, the application may be applied to many types of network data, such as, packet, frame, datagram, etc. For purposes of this application, the term “message” also includes packet, frame, datagram, and any equivalents thereof. Furthermore, while certain types of messages and signaling are depicted in exemplary embodiments of the application, the application is not limited to a certain type of message, and the application is not limited to a certain type of signaling.

Example embodiments provide call content management of content in associations with calls to and from mobile device users. Enterprise entities (e.g., government, corporate, etc.) may desire to have their services readily identified to mobile device users when providing appointments, services, advertising, etc. Mobile device users require secure communication channels to reduce fraud associated with scam callers and other falsified entities seeking to monetize from users using unexpected and undesirable approaches, such as solicitation calls and mobile device messages (SMS).

FIG. 1A illustrates an example call content management network configuration according to example embodiments. Referring to FIG. 1A, the network configuration 100 includes an end user device 102 as a mobile device which is configured to receive a call routed from a carrier network. The enterprise network, such as a provider of services, may attempt to communicate with a particular end device, such as mobile device 102 as part of a calling campaign to advertise services, perform customer services, etc. In such an example, many end users or ‘B’ devices may be dialed via automated and digitized call services. Those ‘B’ devices may be registered to receive pushed content that corresponds with the caller, which in this case is the enterprise 120.

During an initial call setup procedure, a SIP channel 128 and a RTP channel 126 may be setup to create an end-to-end IP security (IPsec) channel between the enterprise 120 calling device, which is based on a private branch exchange (PBX) 122 and/or a session border controller (SBC) 124. Once an incoming call is identified 132, the content API operating on the mobile device 102 is initialized via the content delivery network (CDN) 110. The user device is setup 134 with a particular SIP identifier including a user identifier UUID and IP address, which is linked to their mobile device telephone number and corresponding token which is stored on the mobile device and matched via the hash stored in the CDN 110. A call setup message may then be submitted to the mobile device 102 which provides a the UUID, the IPSEC IP channel information, and an authorized signed token 136 to the mobile device 102. The mobile terminal may then proceed to communicate with the content delivery network 110 to download content associated with the caller and setup the IPsec tunnel 138. The mobile terminal may then indicate that the content was downloaded in a confirmation message 142, which identifies certain content and a particular enterprise identifier associated with the caller. The CDN 110 may confirm the secure channel is setup via a SIP communication parameter, such as 200 OK and that the channel is accessible 144. The call is then routed 146 to the mobile device 102 via a SBC route via the enterprise 120. The call will appear to arrive contemporaneously with the content, so the content can be displayed without delay. The content arrives prior to the call (i.e., operation 138), however, the user will not recognize any lag in the content being loaded and the call being received. The content may include a banner logo image, links to websites, multimedia files, audio, video, animations, scrolling images, etc. A user can identify the content on the display of their mobile device 102 and confirm the content is desirable prior to answering the phone. The content may also have its own information response options (i.e., menus, message response options, link URLs) which provide alternatives for answering the call via the mobile device.

Prior to calls being sent to one or more ‘B’ number users (i.e., called devices/home devices/mobile devices), the content associated with the caller ‘A’ number dialer entity (i.e., enterprise 120, may be pre-loaded on the mobile devices via a subscription service that aims to load content of subscribed enterprise entities to subscribed end user devices. For example, a large entity enterprise group 120 may desire to launch a peek hour campaign to solicit certain ‘B’ users for a new credit card. The campaign may include content that demonstrates the logos, the links, multimedia, a short funny commercial, etc. The content is data intensive and cannot be uploaded on the fly during the few seconds preceding a caller pickup from a call dialing event. Therefore, the content must be identified, linked to a caller by an identifier, forwarded to a mobile device (or many devices) which subscribes to the content services prior to an expected call time, and confirmed and linked to the caller identifier so when a call does arrive, the content can be quickly referenced and displayed.

In operation, content providers can configured the content and/or related applications directly via the content management application through an API and/or portal. The content provider users an outbound API to prepare mobile devices for calls. The CDN 110 sends a push notification to a software development kit (SDK) with a link to content and the SDK downloads the content and sends back an indication the phone is ready. The content provider/call center/enterprise 120 may then initiate a call after content has been distributed to intended recipients. The SDK may send call information to the network.

FIG. 1B illustrates another example call content management network configuration according to example embodiments. Referring to FIG. 1B, the example 150 provides additional details regarding the calling of mobile devices during a call service. In operation, the enterprise entity 120 may push data 154 to a ‘B’ number entity, such as callee 102 through the push API using integration with campaign management software 122. The CDN configures the content and its accompanying rules and delivers the device ready bundle (DRB) to the device 102 in a call setup 156. The device 102 may respond back with a status along with certain telemetry information 158. The CDN 110 delivers telemetry information to the enterprise 120 as an API response 162 (i.e., content delivery status). The enterprise software campaign application 130 submits the ‘B’ number 164 through the VOIP API to the VOIP router 152 with a token. The router 152 converts the phone number to a VOIP handle and creates the VOIP XML, as a handle and transient access token 166. The enterprise campaign application will then hand the XML off to the call center SDK 140 installed in the call application software. The call center SDK opens a secure tunnel 168 using the XML passed by the VOIP router 152. The calls can then be made to the end user devices/′B′ devices and the content can be retrieved and displayed directly form the user device during the call.

FIG. 2 illustrates an example logic diagram of a content delivery provider network according to example embodiments. Referring to FIG. 2, the configuration 200 includes a detailed view of the content delivery network CDN 110 and the corresponding action modules which operate with the content provider 210 to manage call content and calling processes. The process may provide a content setup operation 232 which sets up content via content APIs and stores the content 232 in a management server. The application portal 212 and content API 214 are part of the content setup operations 232A/232B. The outbound API 216 provides a link to the CDN 110 to provide content management 222, and content delivery 224 to the devices prior to calls being sent. The devices are prepared for upcoming calls by forwarding a link to the content stored in the CDN 110 which when accessed causes a ready indication to be sent back 234 indicating a call may proceed. Then, a call may be sent 236 to the end user 102. The call may be tracked for call metrics and other telemetry data and the SDK may send the call information back to the network 238. Telemetry data 228 may be compiled to identify whether content is displayed on a user device, an indicator can be used to confirm such information is displayed during a call, the tally of those confirmations may be maintained at the CDN 110 for all placed calls over a period of time. As the metrics 226 are compiled (i.e., number of calls made, number of calls answered, number of calls connected over X seconds, number of calls paired with content information, number of links accessed in the content, etc.), throughout the call campaign to various end user devices, the results/metrics are sent back to the content provider 242 to provide feedback and strategies for subsequent campaigns. The application metrics 218 are stored in the content provider 210.

Further to the call example, the when the call is initiated, as the authorization of the caller is performed, the ‘B’ number dialed is sent to the CDN and stored as a hashed value so other parties cannot see the telephone numbers. A token composed of a confirmation that the hashed value matches the B number may be used to confirm the user device is valid and can accept the call. The token may be based on the hashed phone number and other non-sensitive information and would be returned from the mobile device to the content provider/call center. All the ‘B’ numbers uploaded form the content provider to the CDN 110 may be hashed prior to being stored, so no actual numbers are stored in the content provider. The content provider 210 may upload a raw text number for the ‘A’ number, however, all numbers are stored in a hashed format at the CDN 110. A tracking ID can be assigned to a particular call so the call metrics can be identified on a per call basis. The metrics also do not include raw telephone numbers which would be vulnerable to theft. During call authorization, the hash is compared to a particular ‘B’ number and a token stored on the mobile device can be generated and sent to confirm the comparing operation is accurate. The CDN 110 may store the hash for the ‘B’ number and the token received from the mobile device. In addition to the token identifying the hashed ‘B’ number, the token may also include non-sensitive information, such as content identifiers needed to identify the content for the call, hardware IDs of the device being called, etc.

FIG. 3 illustrates a batch call and content management configuration according to example embodiments. Referring to FIG. 3, the network configuration 300 includes a calling entity, such as an enterprise device 320 with call content 322 and ‘B’ numbers of mobile devices to call during a call campaign. The call content and ‘B’ numbers may be forwarded to the content delivery network 110 so the ‘B’ numbers can be hashed 314 and the call content 316 can be stored for uploading to the ‘B’ device 330 prior to the calls being dispatched to those devices (i.e., 302, 304 . . . N). This approach ensures the devices 330 can quickly display the call content during the call for an optimal calling experience.

In operation, a set of ‘B’ numbers may be identified from the enterprise entity 320 and sent as a batch of raw numbers 302 (i.e., xxx-xxx-xxxx) to the content delivery network 110. The numbers are hashed for security purposes and stored 314. The call content can be linked to the calls by identifiers to images, video, text, etc. The content is uploaded 303 to the CDN 110 and is then uploaded 304 to the devices 330 prior to any calls being placed. The devices 330 may confirm the content is received 306 and those devices which send confirmations may be identified in a database of the CDN 110. Those confirming devices are ready for subsequent call processing. The call content confirmations 306 are sent responsive to the content being sent 304 to the devices. Once the content is sent and stored on the devices, the devices may begin to be called 308 via a call processing module of the enterprise 320, such as the VOIP router 152.

A call campaign may define the ‘B’ numbers to dial, the content to display during the call, a time-to-live (TTL) of the content being displayed, and a date and time to begin the call content upload and/or dialing the calls. Most call campaigns specify a specific time period when the calls should be placed to increase the likelihood that the calls are answered and do not offed the called device users. For example, calls are generally not placed at night or during lunch and dinner to avoid pestering the device users. The call campaign may be a data file that is sent to the content delivery network so the call content can be uploaded prior to the calls being placed. For example, the CDN 110 may upload content 4, 6, 8, 12, 24 hours before a call campaign. The call content may be displayed during the first 30 seconds of a call and may be deleted on the devices thereafter to free up memory/disk space.

FIG. 4 illustrates a user interface of a service provider forwarding call content to a mobile device according to a content delivery network configuration according to example embodiments. Referring to FIG. 4, the configuration 400 includes a service provider, such as a utility company, subscription service, vehicle taxi service, food delivery service, etc. The service provider device 410 may be a service operator's mobile device which offers an option to contact the user of the service via a display option 412 on the mobile device 410. The content delivery network 110 may receive the contact selection option from the service provider device 410 and initiate a time-to-live (TTL) 402 for ‘X’ seconds. During this time, any call content associated with the service provider, such as a logo, status update (i.e., “heading your way”, “food is being delivered”, etc.), location information associated with a current location of the user device, etc., is forwarded to the user device 420. The user device display 414 may display information, such as a current map 416 of the service provider device location and other service provider call content. As the TTL expires, the content may be discarded and any further information sharing between the service provider device 410 and the user device 420 may be discontinued, however, an ongoing call may still be maintained along with additional SMS messages and calls which are sent/placed after the TTL has expired.

In order for the call content to be retrieved and displayed on the end user device, there are certain parameters which need to be identified, such as the content identifier (ID), which identifies the content to be delivered, a tracking identifier (ID), which identifies the customer's ID for reporting purposes, a phone number of the service provider, a company code (i.e., a registered API key), a calling window (TTL window).

FIG. 5 illustrates example user interfaces of potential call content delivery options according to example embodiments. In this example, each ‘B’ user device is different and whether it be a campaign for advertising or a service provider attempting to communicate with an end user, the user device may have certain preferences and/or parameters engaged for receiving content. For example, in FIG. 5, the examples 500 include the user device 520 receiving a full call content menu with caller identification information 514 along with company logo and other identifiers and marketing information 516. This option represents the call content with the call itself. The next option is to have just the caller identified, such as caller ID 518. In this configuration, the end user device 520 may be configured to block call content or may not have received any call content prior to the call. Yet another option is to have a multimedia message service (MMS) that sends a text message and certain multimedia information in the text message interface 522. Still another option is to have the messaging sent as a SMS message 524 without any images or other call content type data.

FIG. 6A illustrates an example of mobile device authentication by the content delivery network according to example embodiments. Referring to FIG. 6, the system 600 includes various system network components 610-619 which contribute to a call authorization, content creation and calling process. This example 600 is an authorization procedure. During a call setup process or preliminary setup process, the end user mobile device 619 may be authorized by the content delivery network 610 by receiving a device authorization request 622 from the mobile device 619. The device 619 may install an application with a SDK 624. The authentication process then includes various operations, such as forwarding a challenge key 626 to the mobile device. The CDN 610 then sends a request 628 to a carrier 618, which forwards the request 632 to the mobile device 619. The authorization is then sent 634 and an API key is returned 636. A token is then forwarded to the CDN 638 for comparison purposes to the known hashed b-number of mobile device 619. The content database 612 stores call content data which can then be forwarded during the call. Call metrics are forwarded to the telemetry report database 614 for subsequent call management operations when the token matches 642. The notify service 616 provides notification forwarding services when notifications need to be sent to the mobile device 619.

FIG. 6B illustrates an example of mobile device call content delivery performed by a content delivery network according to example embodiments. Referring to FIG. 6B, the system configuration 650 includes a procedure for calling a mobile device 619. In this example, the notify service 616 sends call content related parameters 652 to the mobile device 619 prior to any call being made to the mobile device 619. The parameters may include a URL, tracking ID, TTL, expiration date, service provider ID, content provider ID and custom data identifier. A HTTPS get content message 654 is sent from the mobile device 619 to the CDN 610. The content 656 is then sent to the mobile device 619, where it is stored locally 658 and may be recalled for display corresponding to a call that is received. A response code is sent 662 to confirm the content was completely downloaded on the mobile device. Then, as a call is received which invokes the call content the content is displayed 664. The results of the call are sent as telemetry metric data 668 to the CDN 610, which in turn forwards 672 the information to the report database 614.

FIG. 7A illustrates a system network configuration that provides a call setup to a mobile device with call content delivery according to example embodiments. Referring to FIG. 7A, the system 700 includes one or more callers 712, such as calling entities, enterprise members, etc. The callers may initiate calls through the CDN 714 to various called devices or ‘B’ devices which are known. One call may be placed 722 to the CDN 714, which then identifies the caller/callee(s) and accessed call content linked to the caller 724 in a caller profile stored in the CDN 714. The call content may be pre-registered as images, URLs, video, audio, etc. The called device may be assigned call parameters 726, such as in a SIP calling scenario (i.e., IP address, UUID, and other calling information). The call content is retrieved and associated with the callee 728 and then sent 732 to the mobile device 716. A confirmation 733 of the call content having been received and loaded may be sent to the caller entity 712 from the mobile device 716. A ‘B’ number may be pushed 734 to the VOIP API of a VOIP router device which converts the ‘B’ number to create XML data used to route a call 735. A XML-based call command and token may be returned 736 to the caller entity. A secure channel is established 737 between the calling entity and the called entity and a call content confirmation is sent indicating the call content was received. The call can then be setup to dial or message the user (i.e., SMS). The call content will be loaded once the call is sent. The call content may be loaded prior to the call being answered. The call connection is established 738 to route the call accordingly.

The process may include identifying a call from an enterprise device destined for a mobile device, responsive to identifying the call, accessing a call content application programming interface (API) operated by a content delivery device responsible for delivering call content to the mobile device, assigning an IP address and user identifier to the mobile device telephone number, forwarding call content data stored in an enterprise account profile of the enterprise device to the mobile device, responsive to forwarding the call content data, establishing a communication channel between the enterprise device and the mobile device, receiving a confirmation from the mobile device at the content delivery device confirming that the call content data was received and loaded on the mobile device and the communication channel was established, and responsive to receiving the confirmation, routing the call to the mobile device via the communication channel.

The method may also include transmitting a secure channel confirmation from the content delivery device to the enterprise device confirming the communication channel was established. In one example, the secure channel confirmation is a 200 OK session initiation protocol (SIP) message. The call content data includes one or more of an image file, an audio file, a video file, a location map, and a web link. The communication channel is a IPsec channel and is established between the mobile device and a session border control (SBC) entity and a public branch exchange (PBX) operated within an enterprise network hosting the enterprise device. Responsive to the call being sent, an enterprise account profile linked to the content may be accessed and provided to the mobile device to retrieve the call content data. The call may be a session initiation protocol (SIP) call type. The IP address and user identifier are linked to the mobile device telephone number via the session border control (SBC) entity. Prior to establishing the communication channel, an authorization of the mobile device may be performed, wherein the authorization includes one or more of a biometric data input, a passphrase input, and a mobile device location determination.

FIG. 7B illustrates a system network configuration that provides a call authentication to a mobile device with call content delivery according to example embodiments. Referring to FIG. 7B, the system 740 includes a call 742 to a mobile device, accessing call content 744 to forward to the mobile device, retrieving the content 745, providing the call content 746 to the mobile device, hashing and storing the mobile device telephone number information 748, receiving a token from the mobile device 752 which identifies the mobile device, comparing the token 754 to the hashed value stored in the CDN 714, and when the token matches the hash information, establishing a call connection 756.

Another example method may include initiating a call via a calling device to a mobile device via a mobile device telephone number, responsive to identifying the call, retrieving call content data associated with a calling device profile, forwarding the call content data, via a content provider device, to the mobile device prior to establishing the call, hashing the mobile device telephone number to create a hashed value, storing the hashed value in the content delivery device, authorizing the mobile device to receive the call content data, receiving a token representing the hashed value from the mobile device via the content delivery device, and connecting the call to the mobile device responsive to the token being authenticated.

The method may also include comparing the token to the hash value stored in the content delivery device. The token includes the hashed telephone number and one or more hardware identifiers of the mobile device. The method may also include transmitting a notification to an application interface, the notification comprising a link to the call content, and responsive to receiving a confirmation of the notification being received, uploading the content from the content provider device to the mobile device. The method may also include responsive to connecting the call to the mobile device, loading the loading the call content on a display of the mobile device, and prior to completing the call, performing an authorization of the mobile device, wherein the authorization comprises one or more of a biometric data input, a passphrase input, and a mobile device location determination.

FIG. 7C illustrates a system network configuration that provides a call setup to a mobile device with call content delivery via a service provider according to example embodiments. Referring to FIG. 7C, the method 760 may include placing a call 762 to a mobile device. In this example, the call may be sent by another mobile device user as a service provider entity that is assisting the user of the mobile device 716. The caller may be identified and any call content is also identified 764, and an active session may be initiated 766 which establishes a TTL duration when the caller can call the mobile device 716, share call content, etc., and the expiration of the TTL. Once the TTL is set, the call content can be forwarded to the mobile device 768 and a confirmation is sent 772 to confirm it was received. In this caller to callee scenario, the content does not have to be sent prior to the call being answered, however, the window of time for performing the content transfer may be set by the TTL. The expiration of the TTL causes the content sharing session to close 774.

One example method of operation may include identifying a call to a mobile device, determining whether the call comprises call content data intended for the mobile device, receiving a content confirmation from the mobile device, initiating an active session and a time to live (TTL) associated with the call content data, and forwarding the call content data to the mobile device when the call includes call content data associated with the caller.

The method also provides that when the call is determined to not have call content data, the call is connected without retrieving call content data. The method also includes identifying an active status associated with the active session, and forwarding updated content to the mobile device during the active session and prior to expiration of the TTL, and responsive to the active session terminating, blocking additional content from being sent to the mobile device. When the TTL expires, the call content data forwarded to the mobile device is revoked. The call content data includes a caller identifier and call content data, which includes location information, caller identification information, caller image data, and caller audio data. The TTL includes a fixed number of seconds between 10 and 60 seconds.

FIG. 7D illustrates a system network configuration that provides a call campaign setup to various mobile devices with call content delivery according to example embodiments. Referring to FIG. 7D, the method 780 includes identifying a plurality of mobile device telephone numbers associated with a plurality of mobile devices 782, forwarding the plurality of mobile device telephone numbers to a content delivery device, hashing the plurality of mobile device telephone numbers 784, storing the hashed plurality of mobile device telephone numbers in the content delivery device 786, identifying a scheduled call campaign to the plurality of mobile devices 788 and forwarding call content 792 associated with schedule call campaign to the plurality of mobile devices prior to calling the plurality of mobile devices. Responsive to receiving confirmations 794 that the content was successfully forwarded to the plurality of mobile devices, initiating a calling device to begin calling the plurality of mobile devices as part of the campaign 796. The calls may then be dialed 798 by a calling device as part of the caller facility, such as an enterprise calling facility.

The scheduled campaign may include a date to call the plurality of mobile devices, the plurality of mobile device telephone numbers and content identifiers which identify the content to load during calls placed to the plurality of mobile devices. the CDN 714 performs hashing of called and calling device numbers for the called device telephone numbers associated with the calling device(s), and storing the hashed calling device telephone numbers in the content delivery device. The method may also include determining call preferences to apply to each of the plurality of mobile devices, and retrieving the call content based on the call preferences. The retrieving of the call content includes retrieving one or more of short message service (SMS) image data, call image data, caller identification data. The method may also include transmitting a request for authorization information to one or more of the mobile devices prior to calling one or more of the mobile devices, receiving authorization information from the one or more mobile devices, and calling the one or more mobile devices responsive to receiving the authorization information.

FIG. 8 illustrates a logic diagram with example data input and output parameters for performing call management according to example embodiments. Referring to FIG. 8, the system configuration 800 may include a control logic module 840, such as a processor that processes input data, such as call telemetry 810, call content 820 and caller data 830 (i.e., caller profiles 832 and caller/callee numbers 834). The output of the logic module 840 may include identifying caller ‘A’ numbers 812, device details of recipient devices 814 assigned to callers/callees, certain program rules 816, content confirmations 818 that the content was sent and received and program data 822 for accessing and calling mobile devices according to campaign specifications.

The operations of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a computer program executed by a processor, or in a combination of the two. A computer program may be embodied on a computer readable medium, such as a storage medium. For example, a computer program may reside in random access memory (“RAM”), flash memory, read-only memory (“ROM”), erasable programmable read-only memory (“EPROM”), electrically erasable programmable read-only memory (“EEPROM”), registers, hard disk, a removable disk, a compact disk read-only memory (“CD-ROM”), or any other form of storage medium known in the art.

FIG. 9 is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the application described herein. Regardless, the computing node 900 is capable of being implemented and/or performing any of the functionality set forth hereinabove.

In computing node 900 there is a computer system/server 902, which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server 902 include, but are not limited to, personal computer systems, server computer systems, thin clients, rich clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.

Computer system/server 902 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types. Computer system/server 902 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices.

As shown in FIG. 9, computer system/server 902 in cloud computing node 900 is shown in the form of a general-purpose computing device. The components of computer system/server 902 may include, but are not limited to, one or more processors or processing units 904, a system memory 906, and a bus that couples various system components including system memory 906 to processor 904.

The bus represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.

Computer system/server 902 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 902, and it includes both volatile and non-volatile media, removable and non-removable media. System memory 906, in one embodiment, implements the flow diagrams of the other figures. The system memory 906 can include computer system readable media in the form of volatile memory, such as random-access memory (RAM) 910 and/or cache memory 912. Computer system/server 902 may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only, storage system 914 can be provided for reading from and writing to a non-removable, non-volatile magnetic media (not shown and typically called a “hard drive”). Although not shown, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided. In such instances, each can be connected to the bus by one or more data media interfaces. As will be further depicted and described below, memory 906 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of various embodiments of the application.

Program/utility 916, having a set (at least one) of program modules 918, may be stored in memory 906 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment. Program modules 918 generally carry out the functions and/or methodologies of various embodiments of the application as described herein.

FIG. 10 illustrates an example batch call and content management configuration for multiple caller numbers being associated with a mobile device according to example embodiments. Referring to FIG. 10, the example network configuration 1100 provides an example where the enterprise 220 may supply call content 1022, such as enhanced call content that is supplied with the calls placed from the enterprise to the customers or other end user devices 220. In this example, multiple ‘A’ numbers may be potentially used with the call content data that is shared as enhanced call data. For example, if a call campaign or other call purpose is invoked the potential ‘A’ numbers assigned to the enterprise may be sent along with the potential known device numbers (‘B’ numbers) to the clients, customers, targeted entities, etc., as a batch 1002. The numbers may be received and stored in the content delivery network 110 to include hashed ‘A’ number data 1012, ‘B’ number data 1014, received call content 1016 and a list of the ‘A’ numbers 1040 which may or may not be hashed and which must be sent to any of the intended recipient devices.

In this example of FIG. 10, the ‘A’ number list is sent to one or more devices with the intention of calling one ‘B’ number device at a time from one of many ‘A’ number devices. In the example of FIG. 11, the objective is to call many ‘B’ number devices from one or more ‘A’ number devices. In addition to the numbers being sent 1002 to the CDN 110, the call content is forwarded 1004 in lieu of the call(s) to be placed and may be stored in the CDN via a call content storage 1016.

The call data forwarding may be both real-time to a single device and a batch forward process. This may include a many ‘A’ number to a single ‘B’ number approach so the call recipient device can easily identify the ‘A’ number actually calling when many ‘A’ numbers are available to use and were previously/contemporaneously forwarded to the ‘B’ number device. This may also include a many ‘A’ number to many ‘B’ number approach that is utilized with a call campaign or batch call process. Once the content for the calls is uploaded 1006, such as enhanced call content (e.g., videos, images, links, words, strings, etc.), the confirmation 1008 may be sent prior the calls being placed 1010.

The enterprise 220 may send a list of ‘A’ numbers it might use to place a call to a single handset device 220. In this instance, there may be a one or more elements of enhanced call content on the phone, such as a name, logo, telephone number, however, those enhanced call elements will be shown on the device provided any of the numbers on the ‘A’ list were used to call the device 202. If any ‘A’ number dials to the device 202 and is identified from the list 1040 stored on the device 202, then the number, and other enhanced call content displayed on the device 202 may be a static number along with known enhanced content that is displayed regardless of the number received by the called device 202. For example, if the profile of the enterprise is a name, logo and telephone number, then those same elements will appear on the called device even though the ‘A’ number used to dial the device 202 was different, provided that the ‘A’ number is on the list 1040. The enterprise does not know which number will be available to place calls. The enterprise can push enhanced call content to the devices 220 that will be shown when any phone number on the list is used to place the call.

One example use case of a real-time push with enhanced call content using a many possible ‘A’ number to a single device may provide a client device calling a ‘1-800’ support sine. The automated call service of the enterprise may receive the incoming call and offer an option for a call-back. The user may accept the call-back option and hang-up the call. The software application that manages the call-back scheduling for the enterprise then accesses the real-time API and sends a call content push to the consumer's phone device. The push includes all ‘X’ number of possible phone numbers for the operators currently working in the call center on behalf of the enterprise. Eventually, one of the call-center operators becomes free and calls the consumer back on an open phone line. Since all ‘X’ phone numbers used by the call-center were sent to the device 202 with the push prior to the call, the content shown on the consumer's handset device 202 when the call back occurs will be the same regardless of the line used and its respective call number.

In another example use case, a batch push to multiple ‘B’ numbers is described with reference to FIG. 11. Referring to FIG. 11, the ‘A’ numbers are sent 1102 to multiple ‘B’ numbers so a large-scale call campaign can take place. The list being received by multiple devices may be confirmed 1104, the devices 220 which responded may be part of a list which is then used to enable calls to those devices while omitting those that did not respond. The calls 1106 may then commence from the ‘A’ numbers to the ‘B’ numbers and all the devices 220 may display the same caller telephone number and enhanced content regardless of which ‘A’ number dialed the call. This example may further provide an enterprise that has a list of 70,000 clients they need to call over a two-week period. They will be placing the calls from a call-center with 300 operators. They do not know ahead of time which operator will call each client. The enterprise application would access the batch push feature to push content to all 70,000 users at one time with a time to live (TTL) of 2 weeks and would include all 300 operator numbers in the push. After the TTL is over, the content may be removed and deleted. Eventually, one of the call-center operators will be queued to call each person on the list, or an automated call operator will dial the call to a particular end user device. Since all 300 phone numbers used by the call-center were sent to all 70,000 client devices with the push, the content shows on the consumer's handset when the call is received.

FIG. 12 illustrates an example batch call and content management system configuration for multiple caller numbers being associated with a mobile device according to example embodiments. Referring to FIG. 12, the system 1200 may include a caller 1202, such as an enterprise entity that is attempting to call one or more mobile devices with the assistance of a call content application and a content delivery network 1204. The numbers (′A′ numbers associated with the caller) may be forwarded 1212 to update a particular caller number list of potential telephone numbers which may be used for subsequent calls. The list is forwarded to the potential callee devices 1206. The mobile devices may receive from a remote source the list with the plurality of telephone numbers. A call 1218/1222 may be placed to one or more mobile devices, as the call is received, one of the telephone numbers in the list is paired 1224 with a telephone number of the call as a security measure and to determine whether an enhanced content should be provided with the call. The enhanced content can be identified by one master telephone number that is aliased with multiple telephone numbers included in the list so when one number in the list is identified, then the master number is identified and so is the content. The process may also include loading one or more enhanced content items assigned to the list on the mobile device. The content may be pre-loaded on the mobile device(s) 1206 or forwarded 1226/1228 along from the CDN 1204. The call is then connected 1232 and the content is displayed 1234.

Additional operations may include assigning the list to a caller profile associated with the caller device, and storing the list and the caller profile in a memory of the mobile device. The remote source is the caller device, and the list is received from the caller device prior to the call being received. All the telephone numbers in the list are assigned to the caller device. The process may also include selecting a portion of the one or more enhanced content items to load on the mobile device based on the telephone number of the call, and subsequently loading another portion of the one or more enhanced content items, different from the one or more enhanced content items, on the mobile device when another call is received from a different number included in the list. In this example, a certain sub-group of numbers in the list although assigned to one master caller entity may yield different enhanced content selections and loading, for example, a fraud protection division of a bank company vs. a marketing division may call from a same enterprise calling entity. In this example, when a number from one sub-group of numbers in the list is received, a different name but same logo may be selected so a logo of the company may be displayed with a name of “FRAUD PROTECTION”, and when a different number is used to call which is identified in the list as part of another sub-group the same logo is displayed as in the previous number but the name of “NEW PRODUCTS” is displayed.

Alternatively, a portion of the one or more enhanced content items to load on the mobile device based on the telephone number of the call is loaded, and subsequently the same enhanced content items are loaded on the mobile device when another call is received from a different number included in the list. The loading may include selecting from one or more content items and determining whether to include more, different or fewer items. In general, the same content is displayed every time from any number selected or identified from the list during a call, however, the content items may be included/excluded depending on the specific assignment to each of the numbers in the list. In one example, a callback option selection is performed by a mobile device via an automated call management platform, and responsive to performing the callback option, the list is forwarded to the mobile device. In this example, the mobile device initiated the call and the callback occurs with the list being forwarded to provide a basis for identifying the enterprise when the callback is performed.

FIG. 13 illustrates an example batch call and content management system configuration 1300 for multiple caller numbers being associated with multiple mobile devices according to example embodiments. Referring to FIG. 13, the process includes forwarding the list of potential caller numbers 1212 and the content delivery network will update caller number lists and profiles 1244 based on the updated information. The list is forwarded 1246 to various potential mobile devices 1206. The content delivery network 1204 will pair 1254 the calling numbers of calls received with data in the list. The content identified by the applications operating on the mobile devices 1206 will be selected 1256 and posted on the devices with calls as they are received. The calls are then forwarded 1258/1262 and paired with content 1264 prior to connecting a call 1266 with any of the mobile devices and displaying the content 1268.

The process may also include identifying a plurality of profiles including respective recipient telephone numbers identified to be called within a period of time, forwarding a list of caller telephone numbers assigned to a caller entity to each of a plurality of mobile devices associated with the profiles, and placing a plurality of calls to the respective plurality of mobile devices within the period of time, and the plurality of calls may originate from a group of the caller telephone numbers included in the list. The group may be a sub-group that is further identified by their numbers and those particular numbers may represent a division with specific enterprise content to share via the enhanced call content data sharing.

The group may include at least a majority of the caller telephone numbers, and the group of the caller telephone numbers are identified as being linked to first enhanced call content data, and another group of the caller telephone numbers different from the first group are linked to second enhanced call content data different from the first enhanced call content data. One example is both groups may have the same logo but different titles, or a same title with different logos. The list may include a time-to-live (TTL) defined as a period of time the caller telephone numbers in the list will remain on the plurality of mobile devices. At the end of the TTL, the list may be delete. Each of the calls include an enhanced content identifier which identifies one or more enhanced call content data files to retrieve on the respective called mobiles during each corresponding call of the plurality of calls. Each of the caller telephone numbers is assigned to one or more of the first group and the second group which identify the enhanced call content data files to retrieve during each corresponding call of the plurality of calls. In one example, at least a portion of the enhanced call content associated with the first group and the other group includes the same enhanced content.

As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method, or computer program product. Accordingly, aspects of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present application may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.

Computer system/server 902 may also communicate with one or more external devices 920 such as a keyboard, a pointing device, a display 922, etc.; one or more devices that enable a user to interact with computer system/server 902; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 902 to communicate with one or more other computing devices. Such communication can occur via I/O interfaces 924. Still yet, computer system/server 902 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 926. As depicted, network adapter 926 communicates with the other components of computer system/server 902 via a bus. It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 902. Examples include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc.

Although an exemplary embodiment of at least one of a system, method, and non-transitory computer readable medium has been illustrated in the accompanied drawings and described in the foregoing detailed description, it will be understood that the application is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications, and substitutions as set forth and defined by the following claims. For example, the capabilities of the system of the various figures can be performed by one or more of the modules or components described herein or in a distributed architecture and may include a transmitter, receiver or pair of both. For example, all or part of the functionality performed by the individual modules, may be performed by one or more of these modules. Further, the functionality described herein may be performed at various times and in relation to various events, internal or external to the modules or components. Also, the information sent between various modules can be sent between the modules via at least one of: a data network, the Internet, a voice network, an Internet Protocol network, a wireless device, a wired device and/or via plurality of protocols. Also, the messages sent or received by any of the modules may be sent or received directly and/or via one or more of the other modules.

One skilled in the art will appreciate that a “system” could be embodied as a personal computer, a server, a console, a personal digital assistant (PDA), a cell phone, a tablet computing device, a smartphone or any other suitable computing device, or combination of devices. Presenting the above-described functions as being performed by a “system” is not intended to limit the scope of the present application in any way but is intended to provide one example of many embodiments. Indeed, methods, systems and apparatuses disclosed herein may be implemented in localized and distributed forms consistent with computing technology.

It should be noted that some of the system features described in this specification have been presented as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom very large-scale integration (VLSI) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, graphics processing units, or the like.

A module may also be at least partially implemented in software for execution by various types of processors. An identified unit of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions that may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module. Further, modules may be stored on a computer-readable medium, which may be, for instance, a hard disk drive, flash device, random access memory (RAM), tape, or any other such medium used to store data.

Indeed, a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network.

It will be readily understood that the components of the application, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the detailed description of the embodiments is not intended to limit the scope of the application as claimed but is merely representative of selected embodiments of the application.

One having ordinary skill in the art will readily understand that the above may be practiced with steps in a different order, and/or with hardware elements in configurations that are different than those which are disclosed. Therefore, although the application has been described based upon these preferred embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent.

While preferred embodiments of the present application have been described, it is to be understood that the embodiments described are illustrative only and the scope of the application is to be defined solely by the appended claims when considered with a full range of equivalents and modifications (e.g., protocols, hardware devices, software platforms etc.) thereto. 

What is claimed is:
 1. A method comprising identifying a plurality of profiles comprising respective recipient telephone numbers identified to be called within a period of time; forwarding a list of caller telephone numbers assigned to a caller entity to each of a plurality of mobile devices associated with the profiles; and placing a plurality of calls to the respective plurality of mobile devices within the period of time, wherein the plurality of calls originate from a group of the caller telephone numbers included in the list.
 2. The method of claim 1, wherein the group comprises at least a majority of the caller telephone numbers.
 3. The method of claim 1, wherein the group of the caller telephone numbers are identified as being linked to first enhanced call content data, and another group of the caller telephone numbers different from the first group are linked to second enhanced call content data different from the first enhanced call content data.
 4. The method of claim 1, wherein the list comprises a time-to-live (TTL) defined as a period of time the caller telephone numbers in the list will remain on the plurality of mobile devices.
 5. The method of claim 1, wherein each of the calls comprises an enhanced content identifier which identifies one or more enhanced call content data files to retrieve on the respective called mobiles during each corresponding call of the plurality of calls.
 6. The method of claim 5, wherein each of the caller telephone numbers is assigned to one or more of the group and the another group which identify the enhanced call content data files to retrieve during each corresponding call of the plurality of calls.
 7. The method of claim 6, wherein at least a portion of the enhanced call content associated with the group and the another group comprises the same enhanced content.
 8. An apparatus comprising a processor configured to identify a plurality of profiles comprising respective recipient telephone numbers identified to be called within a period of time; forward a list of caller telephone numbers assigned to a caller entity to each of a plurality of mobile devices associated with the profiles; and place a plurality of calls to the respective plurality of mobile devices within the period of time, wherein the plurality of calls originate from a group of the caller telephone numbers included in the list.
 9. The apparatus of claim 8, wherein the group comprises at least a majority of the caller telephone numbers.
 10. The apparatus of claim 8, wherein the group of the caller telephone numbers are identified as being linked to first enhanced call content data, and another group of the caller telephone numbers different from the first group are linked to second enhanced call content data different from the first enhanced call content data.
 11. The apparatus of claim 8, wherein the list comprises a time-to-live (TTL) defined as a period of time the caller telephone numbers in the list will remain on the plurality of mobile devices.
 12. The apparatus of claim 8, wherein each of the calls comprises an enhanced content identifier which identifies one or more enhanced call content data files to retrieve on the respective called mobiles during each corresponding call of the plurality of calls.
 13. The apparatus of claim 12, wherein each of the caller telephone numbers is assigned to one or more of the group and the another group which identify the enhanced call content data files to retrieve during each corresponding call of the plurality of calls.
 14. The apparatus of claim 13, wherein at least a portion of the enhanced call content associated with the group and the another group comprises the same enhanced content.
 15. A non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform identifying a plurality of profiles comprising respective recipient telephone numbers identified to be called within a period of time; forwarding a list of caller telephone numbers assigned to a caller entity to each of a plurality of mobile devices associated with the profiles; and placing a plurality of calls to the respective plurality of mobile devices within the period of time, wherein the plurality of calls originate from a group of the caller telephone numbers included in the list.
 16. The non-transitory computer readable storage medium of claim 15, wherein the group comprises at least a majority of the caller telephone numbers.
 17. The non-transitory computer readable storage medium of claim 15, wherein the group of the caller telephone numbers are identified as being linked to first enhanced call content data, and another group of the caller telephone numbers different from the first group are linked to second enhanced call content data different from the first enhanced call content data.
 18. The non-transitory computer readable storage medium of claim 15, wherein the list comprises a time-to-live (TTL) defined as a period of time the caller telephone numbers in the list will remain on the plurality of mobile devices.
 19. The non-transitory computer readable storage medium of claim 15, wherein each of the calls comprises an enhanced content identifier which identifies one or more enhanced call content data files to retrieve on the respective called mobiles during each corresponding call of the plurality of calls.
 20. The non-transitory computer readable storage medium of claim 19, wherein each of the caller telephone numbers is assigned to one or more of the group and the another group which identify the enhanced call content data files to retrieve during each corresponding call of the plurality of calls. 