Method for providing particularized audible alerts

ABSTRACT

A system and method of generating at least two distinctive auditory alerts upon receiving a transmission or telephone call at a device is described. Data indicative of a first plurality of sounds corresponding to a user of a device configured to receive the transmission or telephone call is accessed, such as from a memory. The first plurality of sounds is played at the device so as to identify a received transmission or telephone call being directed to the user. A telephone number, subscriber name or identifier associated with a transmitting or calling party of the transmission or telephone call is accessed. Data indicative of a second plurality of sounds designating the transmitting or calling party based on the subscriber name, telephone number or identifier is retrieved, such as from a data structure, and the second plurality of sounds is played at the device so as to identify the transmitting or calling party.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of co-pending application Ser. No.12/987,024, filed Jan. 7, 2011, which is a continuation of applicationSer. No. 11/119,229, filed Apr. 28, 2005, and issued as U.S. Pat. No.7,869,588, entitled “SYSTEM AND METHOD FOR PROVIDING PARTICULARIZEDAUDIBLE ALERTS”, which claims the benefit under 35 U.S.C. §119(e) ofU.S. Provisional Application No. 60/568,083 filed May 3, 2004, entitled“SYSTEM AND METHOD FOR PROVIDING PARTICULARIZED AUDIBLE ALERTS”, all ofwhich are hereby incorporated by reference.

BACKGROUND

1. Field of the Invention

The present invention relates to providing distinctive audible alerts,and more particularly, to generating particularized audible alerts inresponse to receiving a telephone call.

2. Description of the Related Art

During the past few years the usage of electronic means for humancommunications has expanded rapidly. Numerous end user electronicdevices used for such communication emit audible sounds to alert theirowners or users of an incoming communication. As electroniccommunication devices become more commonplace, and as people use thesedevices more often, two problems have arisen. First, many people findfrequent non-urgent communications disruptive because other activitiesare interrupted. Therefore there is a need to obtain informationpertaining to the incoming communication prior to deciding whether ornot to respond immediately. The second problem is confusion that oftenresults in situations where two or more people each carrying a portablecommunication device are in close proximity to each other, and at leastone person's device emits an audible alert. Often, at least one personwhose communication device has not emitted an alert hears a nearby alertand erroneously attempts to accept a communication that doesn't involvetheir device. This, again, is a distraction and inconvenience.

Digital displays showing caller ID, in principle, address both of theabove problems, but require the user to handle and/or look at thedevice. Again, this is distracting, disruptive, and/or inconvenient.Personalized ring tones, or audible alerts, help people distinguish analert from their device from those of other people's devices. However,many people find the available rings/alerts irritating or “sillysounding”. Also, some individuals are not inclined to activate thisfeature or simply never learn how to use their phone's advanced featuresincluding personalized ring tones, or audible alerts.

Lastly, many phones today are capable of distinctive ringing, a featurewhereby users can assign specific rings or alert sounds to each contactin their phone's contacts list. Many customers like this feature inprinciple, but don't actually use it because of practical shortcomings.Generally, today's distinctive rings/alerts require a cumbersome andtime consuming setup, and they can only be assigned to a person ornumber after a corresponding contact has been entered (usually manually)into the phone's contacts list. Many people find the availablerings/alerts irritating or “silly sounding”, and in crowded settings,often miss calls when they fail to recognize the less familiar alerts ofinfrequent callers. Finally, many customers simply never learn how touse their phone's advanced features including distinctive ringing.

SUMMARY

In contrast, an audible alert as described in conjunction with variousembodiments does not require setup or a contacts list. Caller ID (and/orother information) is conveyed through acoustic variations to thering/alert. A desirable feature of the audible alert is that it cansound generally like a conventional phone and yet be distinctlyrecognizable to its owner. The sound of the alert may be altered (tomusical instruments or bird calls for example) via user preferenceswithout adversely affecting its information content.

When a person first gets an electronic device enabled with embodimentsof an alert capability, he/she will notice that its ring/alert is alittle different from that of other electronic devices including othersof the same kind and similarly enabled. They will quickly come torecognize their own ring/alert including the subtle, yet distinct,differences for each caller or contact. Within a very short time, itwill be possible to recognize callers/contacts by the sound of theirrings/alerts. Importantly, with millions of different ways to create thesubtle yet distinct differences, people will not be able to recognizethe information imbedded in the rings/alerts of other people's devices.The resulting privacy for the owner of the phone, and anonymity for thecaller is another advantage of alerts using the technology associatedwith various embodiments.

In one embodiment, there is a method of generating at least twodistinctive auditory alerts upon receiving a telephone call at a device,the method comprising accessing data indicative of a first plurality ofsounds corresponding to a user of a device, the device configured toreceive a telephone call; playing the first plurality of sounds at thedevice so as to identify a received telephone call being directed to theuser; accessing a telephone number or a subscriber name associated witha calling party of the telephone call; retrieving data indicative of asecond plurality of sounds designating the calling party based on thetelephone number or subscriber name; and playing the second plurality ofsounds at the device so as to identify the calling party. Prior to theaccessing, the method may additionally comprise assigning dataindicative of the first plurality of sounds corresponding to the user ofthe device, wherein the data corresponds to a sequence of phonemesassociated with the user. Playing the first plurality of sounds maycomprise playing a portion of the first plurality of soundsconcurrently. Playing the second plurality of sounds may compriseplaying a portion of the second plurality of sounds concurrently.Playing the first plurality of sounds is repeated, after a timeinterval, for a first predetermined number of times. Playing the secondplurality of sounds is repeated, after a time interval, for a secondpredetermined number of times.

Playing the first plurality of sounds in the method may be followed by apredetermined period of silence and playing the second plurality ofsounds, and where the first plurality of sounds, the predeterminedperiod of silence and the second plurality of sounds is repeated, aftera time interval, for a predetermined number of times. Playing the secondplurality of sounds may be followed by a predetermined period of silenceand playing the first plurality of sounds, and where the first pluralityof sounds, the predetermined period of silence and the second pluralityof sounds is repeated, after a time interval, for a predetermined numberof times. The number of sounds in the first and second plurality ofsounds may be selected from a group of less than seven unique sounds,and where the sounds in the first and second plurality of sounds areplayed individually or in combinations, having up to 63 combinations orcomposite sounds. The number of sounds in the first and second pluralityof sounds may be selected from a group of less than ten unique sounds.The first or second plurality of sounds may be either six or ninesounds.

The sounds in the first plurality of sounds of the method may correspondto a first set of selected notes. The sounds in the second plurality ofsounds may correspond to a second set of selected notes. The sounds inthe first plurality of sounds and the second plurality of sounds maycorrespond to a predetermined set of notes or chords. The sounds in thefirst plurality of sounds and the second plurality of sounds maycorrespond to a set of outputs from a speech engine. Each sound may lackspectral and temporal complexity and variability of natural phonemes.

The device of the method may comprise a mobile telephone, a wirelesstelephone, a pager, or a two-way radio. The device may comprise acomputing device with a telephone call capability. Accessing thetelephone number may comprise automatically retrieving the telephonenumber associated with the calling party of the telephone call at thedevice. The telephone number may comprise a caller number identification(CNID), an automatic number identification (ANI), or a calling party'snumber (CPN). Retrieving may comprise indexing a data structure based onthe telephone number or subscriber name. The data structure may be alist, array or table, or may be a database. Retrieving may compriseapplying a transformation based on the telephone number or subscribername. The transformation may comprise rules for arranging and/or parsingthe telephone number, and may additionally comprise assigning phonicsymbols to the arranged and/or parsed telephone number. Thetransformation may comprise rules assigning phonic symbols based on thesubscriber name, and the assigned phonic symbols may correspond tophonemes of the subscriber name.

The method may additionally comprise assigning default sounds for thesecond plurality of sounds. The method may additionally compriseassigning default sounds for the first and second plurality of sounds.The method may additionally comprise automatically assigning aparticular second plurality of sounds to the telephone number of thecalling party. The method may additionally comprise additionallycomprising storing the assigned particular second plurality of soundsand the corresponding telephone number of the calling party in the datastructure. The method may additionally comprise automatically assigninga particular second plurality of sounds corresponding to the callingparty.

The method may additionally comprise assigning default sounds for thefirst plurality of sounds. The user may select the sounds of the firstplurality of sounds. The user may select a type of sound via a userinterface. The first plurality of sounds may correspond to oneinstrument and the second plurality of sounds may correspond to a secondinstrument. The first plurality of sounds and the second plurality ofsounds may correspond to the same instrument. The first plurality ofsounds may correspond to multiple instruments and the second pluralityof sounds may correspond to one instrument. The first plurality ofsounds may correspond to one instrument and the second plurality ofsounds may correspond to multiple instruments.

The method may additionally comprise selecting the first plurality ofsounds corresponding to a user prior to accessing the data indicative ofthe first plurality of sounds. The selecting may comprise randomlygenerating the first plurality of sounds, or may comprise receiving auser input. The selecting may further comprise applying transformationsbased on the user input. The selecting may comprise obtaining a useridentifier based on a dialed number identification service (DNIS)corresponding to the telephone call, and may further comprise applyingtransformations based on the user identifier. The method mayadditionally comprise storing the selected first plurality of sounds ina memory.

In another embodiment, there is a method of generating at least twodistinctive auditory alerts upon receiving a telephone call at a device,the method comprising playing a first plurality of sounds at a device soas to identify a received telephone call being directed to a user of thedevice, accessing a telephone number or subscriber name associated witha calling party of the telephone call, retrieving data indicative of asecond plurality of sounds corresponding to the calling party based onthe telephone number or subscriber name, and playing the secondplurality of sounds at the device so as to identify the calling party.Playing the first plurality of sounds may be followed by a predeterminedperiod of silence and playing the second plurality of sounds, and wherethe first plurality of sounds, the predetermined period of silence andthe second plurality of sounds may be repeated, after a time interval,for a predetermined number of times. Alternatively, playing the secondplurality of sounds may be followed by a predetermined period of silenceand playing the first plurality of sounds, and where the first pluralityof sounds, the predetermined period of silence and the second pluralityof sounds may be repeated, after a time interval, for a predeterminednumber of times.

Retrieving in the method may comprise indexing a data structure based onthe telephone number or subscriber name, where the data structure may bea list, array, table, or database. Retrieving may comprise applying atransformation based on the telephone number or subscriber name. Thetransformation may comprise rules for arranging and/or parsing thetelephone number, or rules assigning phonic symbols based on thesubscriber name. The method may additionally comprise assigning phonicsymbols to the arranged and/or parsed telephone number, where theassigned phonic symbols correspond to phonemes of the arranged and/orparsed telephone number or the subscriber name.

The first plurality of sounds may correspond to one instrument and thesecond plurality of sounds may correspond to a second instrument. Thefirst plurality of sounds may correspond to multiple instruments and thesecond plurality of sounds may correspond to one instrument, or thefirst plurality of sounds may corresponds to one instrument and thesecond plurality of sounds may correspond to multiple instruments, orboth the first and second plurality of sounds may correspond to multipleinstruments.

In another embodiment, there is a method of generating at least twodistinctive auditory alerts upon receiving a telephone call at a device,the method comprising accessing data indicative of a first plurality ofsounds corresponding to a user of a device, the device configured toreceive a telephone call, playing the first plurality of sounds at thedevice so as to identify a received telephone call being directed to theuser, accessing an identifier associated with a calling party of thetelephone call, retrieving data indicative of a second plurality ofsounds designating the calling party based on the identifier, andplaying the second plurality of sounds at the device so as to identifythe calling party. Accessing the identifier may comprise automaticallyretrieving the identifier associated with the calling party from asignaling portion of the telephone call.

Retrieving in the method may comprise indexing a data structure based onthe identifier. The method may additionally comprise automaticallyassigning a particular second plurality of sounds to the identifier ofthe calling party, where the particular second plurality of sounds maybe randomly generated. The method may additionally comprise storing theassigned particular second plurality of sounds and the correspondingidentifier of the calling party in the data structure. Retrieving maycomprise applying a transformation based on the identifier. Thetransformation may comprise rules for arranging and/or parsing theidentifier, or rules assigning phonic symbols based on the identifier.Alternatively, the transformation may comprise rules for randomlyarranging and/or parsing the identifier, or rules assigning randomphonic symbols based on the identifier.

The method may additionally comprise selecting the first plurality ofsounds corresponding to a user prior to accessing the data indicative ofthe first plurality of sounds. The selecting may comprise randomlygenerating the first plurality of sounds. The selecting may comprisereceiving a user input, and where the selecting may further compriseapplying transformations based on the user input. The method mayadditionally comprise storing the selected first plurality of sounds ina memory.

In another embodiment, there is a method of generating at least twodistinctive auditory alerts upon receiving a transmission at acommunication device, the method comprising accessing data indicative ofa first plurality of sounds corresponding to a user of a communicationdevice, the communication device configured to receive a transmission,playing the first plurality of sounds at the communication device so asto identify a received transmission being directed to the user,accessing an identifier associated with a transmitting party of thetransmission, retrieving data indicative of a second plurality of soundsdesignating the transmitting party based on the identifier, and playingthe second plurality of sounds at the device so as to identify thetransmitting party. The transmission may be an electronic mail, or maybe a telephone call. The transmission may be a short messaging serviceor a multi-media messaging service transmission. The transmission may bea paging transmission. The transmission may comprise text, or maycomprise a picture.

The transmission of the method may comprise a signaling portionincluding the identifier associated with the transmitting party of thetransmission. The identifier may comprise a name of the transmittingparty. The identifier may comprise a caller number identification,automatic number identification, or calling party's number of thetransmitting party. The identifier may comprise an Internet protocoladdress of the transmitting party, or may comprise an electronic-mailaddress of the transmitting party.

In another embodiment, there is a method of generating a distinctiveauditory alert upon receiving a telephone call at a device, the methodcomprising accessing a telephone number or subscriber name associatedwith a calling party of a telephone call, retrieving data indicative ofa plurality of sounds designating the calling party based on thetelephone number or subscriber name, and playing the plurality of soundsat the device so as to identify the calling party. A user of the devicemay not select the sounds of the plurality of sounds. Retrieving maycomprise indexing a data structure based on the telephone number orsubscriber name, where the data structure may be a list, array, table,or database. Retrieving may comprise applying a transformation based onthe telephone number or subscriber name. The transformation may compriserules for arranging and/or parsing the telephone number, or rulesassigning phonic symbols based on the subscriber name. The method mayadditionally comprise assigning phonic symbols to the arranged and/orparsed telephone number, where the assigned phonic symbols correspond tophonemes of the arranged and/or parsed telephone number or thesubscriber name. The method may additionally comprise automaticallyassigning a particular plurality of sounds to the telephone number ofthe calling party. The method may additionally comprise storing theassigned particular plurality of sounds and the corresponding telephonenumber of the calling party in the data structure.

The method may additionally comprise automatically assigning aparticular plurality of sounds corresponding to the calling party. Theplurality of sounds for each calling party may be played in a sequence.Two or more sounds may overlap at one or more predetermined times in thesequence. The sequence of the plurality of sounds may be unique for eachcalling party. The plurality of sounds may correspond to one instrument,or alternatively, the plurality of sounds may correspond to multipleinstruments, and where the sounds of the multiple instruments mayoverlap at times.

In another embodiment, there is a method of generating a distinctiveauditory alert upon receiving a telephone call at a device, the methodcomprising accessing a telephone number or subscriber name associatedwith a calling party of a telephone call, automatically assigning aparticular plurality of sounds to correspond to the telephone number orsubscriber name of the calling party, and playing the plurality ofsounds at the device so as to identify the calling party. A user of thedevice may not select the sounds of the plurality of sounds.Automatically assigning may comprise applying transformations based onthe telephone number or subscriber name. The transformations maycomprise arranging and/or parsing the telephone number. The method mayadditionally comprise assigning phonic symbols to the arranged and/orparsed telephone number. The transformations may comprise assigningphonic symbols based on the subscriber name. The assigned phonic symbolsmay correspond to phonemes of the subscriber name.

The method may additionally comprise assigning each calling party aunique plurality of sounds to be played in a sequence. Two or moresounds may overlap at one or more predetermined times in the sequence.The method may additionally comprise storing the assigned particularplurality of sounds and the corresponding telephone number or subscribername of the calling party in a data structure associated with thedevice. The data structure may be a list, array, table, or database. Ina subsequent telephone call to the device from a calling party that haspreviously called the device, the method may additionally compriseindexing the data structure based on the telephone number or subscribername of the calling party to retrieve the assigned plurality of soundsdesignating the calling party, and playing the plurality of sounds in asequence at the device so as to identify the calling party.

In another embodiment, there is a method of generating a distinctiveauditory alert upon receiving a transmission at a communication device,the method comprising accessing an identifier associated with atransmitting party of a transmission, automatically assigning aparticular plurality of sounds to correspond to the identifier of thetransmitting party, and playing the plurality of sounds at the device soas to identify the transmitting party. The transmission may comprise asignaling portion including the identifier associated with thetransmitting party of the transmission. The identifier may comprise aname of the transmitting party. The identifier may comprise a callernumber identification, automatic number identification, or callingparty's number of the transmitting party. The identifier may comprise anInternet protocol address of the transmitting party, or may comprise anelectronic-mail address of the transmitting party.

In another embodiment, there is a system for generating at least twodistinctive auditory alerts upon receiving a telephone call, the systemcomprising: data indicative of a first plurality of sounds designating auser of a device, the device configured to receive a telephone call; asound generator at the device configured to play the first plurality ofsounds in a sequence so as to identify a received telephone call beingdirected to the user; a telephone number module configured to access atelephone number or subscriber name associated with a calling party ofthe telephone call; and means for providing data indicative of a secondplurality of sounds designating the calling party based on the accessedtelephone number or subscriber name, where the sound generator isfurther configured to play the second plurality of sounds in a sequenceso as to identify the calling party. The means for providing maycomprise a data structure indexed by the accessed telephone number orsubscriber name. The telephone number module may access a caller numberidentification (CNID), an automatic number identification (ANI), or acalling party's number (CPN). The data structure may be a list, array,table, or database. The means for providing may comprise means forapplying transformations based on the accessed telephone number orsubscriber name. The transformations may comprise rules for arrangingand/or parsing the telephone number, or rules assigning phonic symbolsbased on the subscriber name. The first plurality of sounds maycorrespond to one instrument and the second plurality of sounds maycorrespond to a second instrument. The first plurality of sounds maycorrespond to multiple instruments and the second plurality of soundsmay correspond to one instrument, or the first plurality of sounds maycorrespond to one instrument and the second plurality of sounds maycorrespond to multiple instruments. Two or more sounds of the secondplurality of sounds may overlap at one or more predetermined times inthe sequence.

In another embodiment, there is a system for generating at least twodistinctive auditory alerts upon receiving a telephone call, the systemcomprising a first plurality of sounds indicative of a user of a device,the device configured to receive a telephone call; and a secondplurality of sounds indicative of a calling party of the receivedtelephone call, wherein the device is configured to play the firstplurality of sounds in a sequence so as to identify the receivedtelephone call being directed to the user, access a telephone number orsubscriber name associated with the calling party of the receivedtelephone call, and play the second plurality of sounds in a sequence soas to identify the calling party. The device may comprise a datastructure indexed by the accessed telephone number or subscriber name.The device may comprise a module configured to apply transformationsbased on the accessed telephone number or subscriber name. The devicemay comprise a memory configured to store the first plurality of soundsindicative of the user of the device.

In another embodiment, there is a telephonic device comprising means forproducing an acoustic representation of a message, the acousticrepresentation comprising acoustic symbols, the acoustic symbolsrepresenting phonemes of a language, where the acoustic symbols comprisecombinations of sounds, single sounds, and/or silence, and where theacoustic symbols are produced in a temporal order consistent with thelanguage. The device may additionally comprise an audible alert/ringer,where the alert/ringer may be configured to generate an acousticrepresentation of a message. The message may comprise informationregarding an incoming call. The information may comprise a caller ID ofthe incoming call. The message may comprise the name of an owner of thetelephonic device. The message may comprise the name of the telephonicdevice.

The telephonic device may additionally comprise means for assigning thecombinations of sounds or the single sounds to the acoustic symbols. Themeans for assigning the combinations of sounds or the single sounds tothe acoustic symbols may comprise means for randomly assigning thecombinations of sounds or the single sounds to the acoustic symbols. Themeans for assigning the combinations of sounds or the single sounds tothe acoustic symbols may further comprise means for a user to assign thecombinations of sounds or the single sounds to the acoustic symbols. Thetelephonic device may additionally comprise a transmitter of theacoustic representation of a message and a receiver of the acousticrepresentation of a message. The telephonic device may comprise a mobiletelephone, a wireless telephone, a pager, or a two-way radio.

In another embodiment, there is a method of generating a distinctiveauditory alert upon receiving a telephone call at a device, the methodcomprising accessing data indicative of a plurality of sounds in asequence corresponding to a user of a device, the device configured toreceive a telephone call, and playing the plurality of sounds in thesequence at the device so as to identify a received telephone call beingdirected to the user. The plurality of sounds may comprise combinationsof notes. The combinations of notes may at least partially overlap intime. The method, prior to the accessing, may additionally compriseassigning data indicative of a plurality of sounds in the sequencecorresponding to the user of the device, where the plurality of soundsin the sequence correspond to a phone number of the device. The method,prior to the accessing, may additionally comprise assigning dataindicative of a plurality of sounds in the sequence corresponding to theuser of the device, where the plurality of sounds in the sequencecorrespond to a name of the user.

The method, prior to the accessing, may additionally comprise assigningdata indicative of a plurality of sounds in the sequence correspondingto the user of the device, where the plurality of sounds in the sequencecorrespond to one or more words selected by the user. The method, priorto the accessing, may additionally comprise assigning data indicative ofa plurality of sounds in the sequence corresponding to the user of thedevice, where the data corresponds to a sequence of phonemes associatedwith the user. The plurality of sounds in the sequence corresponding tothe user may be unique to the user.

In yet another embodiment, there is a method of generating a distinctiveauditory alert upon receiving a transmission at a communication device,the method comprising accessing data indicative of a plurality of soundsin a sequence corresponding to a user of a communication device, thecommunication device configured to receive a transmission, where theplurality of sounds comprises combinations of notes, and where thecombinations of notes at least partially overlap in time; and playingthe plurality of sounds in the sequence at the device so as to identifya received transmission being directed to the user. The transmission maybe an electronic mail, a telephone call, a short messaging service or amulti-media messaging service transmission, or a paging transmission.The transmission may comprise text, or may comprise a picture. Thetransmission may comprise a signaling portion including anidentification of an originator of the transmission. The identificationmay comprise a name of the originator of the transmission. Theidentification may comprise a caller number identification, automaticnumber identification, or calling party's number of the originator ofthe transmission. The identification may comprise an Internet protocoladdress of the originator of the transmission, or may comprise anelectronic-mail address of the originator of the transmission. Thecommunication device may comprise a mobile telephone, a wirelesstelephone, a pager, or a two-way radio. The communication device maycomprise a personal computer, a portable computer, a hand-held computingdevice, or a wearable computing device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a diagram illustrative of problems with conventional audiblealerts.

FIG. 1B is a diagram illustrative of benefits achieved by certainembodiments of the present invention.

FIG. 2A is flow diagram of an overview of exemplary processes used in anembodiment of the system and method.

FIG. 2B is block diagram of an exemplary configuration of components inone embodiment of the system.

FIG. 2C is block diagram of an exemplary configuration of components inanother embodiment of the system.

FIG. 3 is a diagram of an exemplary screen used for selecting potentialpreference options in an embodiment of process 210 shown in FIG. 2A.

FIGS. 4A, 4B, 4C and 4D are diagrams illustrating exemplary audiblealerts such as produced at the completion of process 230 shown in FIG.2A.

FIG. 5 is a flow diagram of an exemplary process for assigning specificalerts to a device such as performed by process 220 shown in FIG. 2A.

FIG. 6A is a diagram of an exemplary assignment of acoustic symbols to acharacter set such as used by the processes shown in FIG. 5.

FIG. 6B is a diagram of an alternative representation of the exemplaryassignment of acoustic symbols to a character set shown in FIG. 6A.

FIG. 7 is a flow diagram of an exemplary process for deriving anacoustic symbol set from a name or word such performed by process 520 orprocess 540 shown in FIG. 5.

FIG. 8 is a diagram of English language phonemes as can be used byprocess 730 shown in FIG. 7.

FIG. 9 is a diagram of an exemplary assignment of acoustic symbols tophonemes as used by certain embodiments of the system and method.

FIG. 10 is a flow diagram of an exemplary process for assigning acousticsymbols to phonemes, the result of which can be used by process 750shown in FIG. 7.

FIG. 11 is a flow diagram of an exemplary process for assigning acousticsymbols to members of a symbol set, the result of which can be used byprocess 510 or process 530 shown in FIG. 5, or process 740 or process750 shown in FIG. 7.

FIGS. 12A-12H are diagrams that illustrate ways that acoustic symbolsassigned to digits in a counting system, such as by process 510 orprocess 530 shown in FIG. 5, can be arranged into an audible alert.

FIGS. 13A-13D are exemplary graphs of an acoustic symbol representationfor an exemplary word corresponding to the completion of process 750shown in FIG. 7.

DETAILED DESCRIPTION OF CERTAIN EMBODIMENTS

The following detailed description of certain embodiments presentsvarious descriptions of specific embodiments of the present invention.However, the present invention can be embodied in a multitude ofdifferent ways as defined and covered by the claims. In thisdescription, reference is made to the drawings wherein like parts aredesignated with like numerals throughout.

The terminology used in the description presented herein is not intendedto be interpreted in any limited or restrictive manner, simply becauseit is being utilized in conjunction with a detailed description ofcertain specific embodiments of the invention. Furthermore, embodimentsof the invention may include several novel features, no single one ofwhich is solely responsible for its desirable attributes or which isessential to practicing the inventions herein described.

The system is comprised of various modules, tools, and applications asdiscussed in detail below. As can be appreciated by one of ordinaryskill in the art, each of the modules may comprise various sub-routines,procedures, definitional statements and macros. Each of the modules aretypically separately compiled and linked into a single executableprogram. Therefore, the following description of each of the modules isused for convenience to describe the functionality of the preferredsystem. Thus, the processes that are undergone by each of the modulesmay be arbitrarily redistributed to one of the other modules, combinedtogether in a single module, or made available in, for example, ashareable dynamic link library.

The system modules, tools, and applications may be written in anyprogramming language such as, for example, C, C++, BASIC, Visual Basic,Pascal, Ada, Java, HTML, XML, or FORTRAN, and executed on an operatingsystem, such as variants of Windows, Macintosh, UNIX, Linux, VxWorks, orother operating system. C, C++, BASIC, Visual Basic, Pascal, Ada, Java,HTML, XML and FORTRAN are industry standard programming languages forwhich many commercial compilers can be used to create executable code.

FIG. 1A illustrates certain problems 100 a addressed by certain but notall embodiments of the present invention. First, audible alerts emittedby different electronic devices can be difficult to discern from oneanother. This in turn can result in distraction and confusion asillustrated by a dark haired woman 106 a failing to meet up with Joyce112 a as she 106 a attempts to answer her phone 103 a, erroneouslythinking that a conventional audible alert 115 a had been emitted by herphone 103 a. Second, as personal electronic communication becomesincreasingly ubiquitous in its various forms, a need is developing forpeople to discriminate between communications that are important to themand those which are merely a nuisance or simply not urgent. This isillustrated by the dark haired man, Jim 109 a, hearing his phone'sconventional audible alert 115 a, but failing to answer his daughter 118a Brenda's call believing it was unimportant and not wanting to bebothered with his hands full.

Various embodiments include an audible alert. The audible alert includeselements distinctive to the intended recipient and/or initiator (likelydevice(s) or account(s)) of a communication or transmission. Thiseliminates confusion and distraction associated with audible alertsintended for other people as illustrated in FIG. 1B. In this scene 100b, the dark haired woman 106 b, not distracted by someone else's audiblealert 121 b, meets up with Joyce 112 b. The two head happily off to thetrain terminal. FIG. 1B also illustrates how the caller's identityembedded in the audible alert 121 b of Jim's phone 124 b lets Jim 109 bknow that the call is from his daughter Brenda 118 b. With thisinformation he decides that the call should be answered then and there.

The audible alerts can be automatically generated, eliminating the needfor programming or assigning by the user. They can be automaticallyindividualized so that only the owner of an electronic device will beable to easily recognize the information content of its audible alert.Also, the information containing portion of the alert can be createdusing different kinds of sounds including musical notes and conventionalphone ring sounds, for example.

Although it is possible for people to select different kinds of soundsto be used for their audible alert, bird songs or human voice forexample, it is also possible for millions of people to use the same kindof sound, such as conventional phone ring sounds, without duplicatingany individual's alert code.

Therefore, in a setting where several people each possess the same modelof phone, and one person's phone rings, that person will know that istheir phone as well as who is trying to reach them. The others will knowonly that is not their phone that is ringing. This scenario is basicallyunaffected by whether or not the individuals in the setting havepersonalized or otherwise altered the factory settings on their phone.

FIG. 2A provides an overview of the basic components of an embodiment200. Depending on the embodiment, additional states and/or processes maybe added, others removed, and the ordering of the states and processesrearranged. Specifically, a transmission, communication, or call 202being sent to a communication device is assigned a set of alert soundsor acoustic symbols indicative of the intended recipient or initiator orboth by a process 220. The sounds or acoustic symbols can be derivedfrom and assigned to phonemes or letters comprising names or labels.They can also be derived from and assigned to numbers or digits.Arbitrary assignments are also contemplated. Sounds indicative of othertypes of information may also be assigned by the process 220. The alertsounds are then temporally arranged, and produced in a process 230. Anoptional assignment of preferences process 210 is included mainly to addclarity. The processes 210, 220 and 230 acting on the incomingtransmission, communication or call 202 can be performed by manydevices, such as hand-held computing devices, laptop computers, portablecomputers, personal digital assistants (PDAs), wearable computingdevices, mobile telephones, pagers, and so forth. A client/serverconfiguration can be utilized where preferences and options from process210 can be made and stored via one or more servers. Alternatively, thepreferences can be made via a user interface on the user (client) deviceand stored at the device or additionally at one or more servers. Forexample, a custom alert sound can be generated via the user interface onthe user device and stored at the user device, the server, or both.

FIG. 2B illustrates an exemplary configuration of components in oneembodiment of the system. The system can be configured to generate atleast two distinctive auditory alerts or sounds 246 indicative of theintended recipient and initiator, one auditory alert indicative of theintended recipient, or one auditory alert indicative of the initiatorupon receiving a transmission or telephone call 242. A usercommunication device 240, such as described above, receives an incomingtransmission 242, such as a telephone call, and optional user input 244,such as described in conjunction with FIG. 3 below. The user device 240includes a user module 250 and a transmitting/calling party module 270,one of which can be optional if the device is configured to only providean auditory alert indicative of the intended recipient or the initiator.The incoming transmission 242 is provided to the user module 250 and toa transmission identifier or telephone number module 262 for processing,as will be described below. The transmission identifier or telephonenumber module 262 processes its input and provides output signals to thetransmitting/calling party module 270. For example, the transmissionidentifier or telephone number module 262 can access a telephone numberor subscriber name associated with a calling party of a telephone call.The user input 244 is provided to an optional user interface 258 thatsends output signals to the user module 250 and/or thetransmitting/calling party module 270 to indicate preferences of theuser. The user module 250 and/or the transmitting/calling party module270 provide data indicative of a first plurality of sounds and a secondplurality of sounds, respectively, to a sound generator 260, whichgenerates the sound 246 output from the user device 240.

Further referring to FIG. 2B, the user module 250 includes an optionaltransformation process 252 that can process the incoming transmission242, as will be described below. The user module 250 further includessoftware code that accesses a memory 254 that contains data indicativeof a first plurality of sounds designating a user 256 of the device 240.The transmitting/calling party module 270 includes an optionaltransformation process 272 that can process the incoming transmissionidentifier or telephone number from module 262, as will be describedbelow. The transmitting/calling party module 270 further includessoftware code that accesses a data structure 274, such as a list, array,table or database, which contains data indicative of a second pluralityof sounds designating the calling party 276 based on the accessedtelephone number, subscriber name, or transmission identifier. The soundgenerator 260 plays the first plurality of sounds in a sequence so as toidentify a received transmission or telephone call as being directed tothe user, and/or plays the second plurality of sounds in a sequence soas to identify the transmitting or calling party.

FIG. 2C illustrates an exemplary configuration of components in anotherembodiment of the system. The system can be configured to generate atleast two distinctive auditory alerts or sounds 247 indicative of theintended recipient and initiator, one auditory alert indicative of theintended recipient, or one auditory alert indicative of the initiatorupon receiving a transmission or telephone call 243. A usercommunication device 241, such as described above, receives the incomingtransmission 243, such as a telephone call, and optional user input 245.The user device 241 includes a software module 280 that receives theincoming transmission 243 for processing. The user input 245 is providedto an optional user interface 259 that sends signals to the softwaremodule 280 to indicate preferences of the user. The software module 280generates the sound 247 output from the user device 241.

The software module 280 executed by the device 241 can play a firstplurality of sounds in a sequence so as to identify a receivedtransmission or telephone call being directed to the user. This can bedone by accessing a memory 282 having data indicative of the firstplurality of sounds designating the user 284. The software module 280can obtain or derive a telephone number, subscriber name or transmissionidentifier associated with a transmitting or calling party of atelephone call from the incoming transmission 243. A data structure 286,such as a list, array, table or database, can provide data indicative ofa second plurality of sounds designating the transmitting or callingparty. The software module 280 can include a transformation process ormodule to optionally transform the incoming transmission 243. Thesoftware module 280 can further play the second plurality of sounds in asequence so as to identify the transmitting or calling party.

FIG. 3 illustrates example embodiments of a user selection screen orscreens for selecting potential preference options, previously shown asprocess 210 (FIG. 2A), that could be presented to a user of acommunication device equipped with an alert capability. In oneembodiment, a display for presenting the screen or screens of the userinterface is part of the user device, such as device 124 b (FIG. 1B). Itis to be appreciated that depending on the embodiment, particular fieldsor parts thereof on the screen may be added, removed, and the orderingof the fields rearranged. The screens may be in the form of one or moremenus, dialog boxes and so forth. In a first section 303, the user candecide if their alert should convey information pertaining to thereceiver, the initiator, a type of communication, a type of contact, orany combination thereof. Examples of information pertaining to thereceiver include phone numbers, device identification numbers,electronic addresses, user accounts, routing information, the DialedNumber Identification Service (DNIS), and the like as well as associatedinformation, such as assigned labels and names. Examples of informationpertaining to the initiator include phone numbers, device identificationnumbers, electronic addresses, user accounts, routing information, theAutomatic Number Identification (ANI), and the like as well asassociated information, such as assigned labels and names. Examples ofinformation categories pertaining to the type of communication includevoice, text, Short Text Message (STM), reminder, email, picture,priority, and the like. Examples of information categories pertaining tothe type of contact include friend, family, business, unassigned, firsttime caller, caller ID blocked, urgent, not urgent, and the like.

In a next section 306, the user can select an aspect of the availableinformation from which the alert will be derived. Examples include, butare not limited to: “NAME (PHONIC)”, alerts will be derived from thephonetic structure of names or words; “NAME (SPELLING)”, alerts will bederived from the written or printed structure of names or words; “PHONENUMBER”, alerts will be derived from the digits comprising a phonenumber; “EMAIL ADDRESS”, alerts will be derived from the characterscomprising an email address; “CUSTOM”, alerts will constructed manuallyby the user; “CONTACT CATEGORY”, alerts will be derived a contactcategory. Other examples include date of first communication, arbitraryassignment, time zone of initiator, and so forth. In this example ofprocess 210, a selection from section 306 determines which aspect ofavailable information to derive the alert from and applies to both theinitiator and the receiver. However, it is possible to provide thefeature where such variables would be independently selectable. Forexample, in a situation involving two telephonic devices, receiverindicative information can be derived from (or convey) the phone numberassociated with the device used to receive the communication and theinitiator specific information can be derived from (or convey) thephonetic structure of the name or contact associated with a phone numberderived from the ANI of the incoming call. Alternatively, the phonenumber can be derived from a caller number identification (CNID) or acalling party's number (CPN) associate with the call.

As with section 306, sections 309, 312, 315, and 318 are examples ofpreferences that may be applied independently to various aspects of analert according to certain embodiments. However, the illustration ofFIG. 3 shows these preferences applying to all aspects of the alert.Section 309 relates to the treatment of names, while sections 312 and315 relate to the treatment of numbers.

In section 309, the user can select which parts of a contact's name willbe conveyed in an audible alert. The examples given here are first name,middle initial and last name, and combinations thereof. Other examplesinclude title, suffix, nickname and so on. It may be specified that oneor more parts of a name are only to be used if required to prevent twocontacts from having the same alert, or to assure a minimum of maximumlength to an alert. The order that these parts are presented may also bespecified

Section 312 is much like section 309 except that it pertains to portionsof a phone number rather than a name. The examples given here are areacode, prefix, suffix, but could also include country code, city code,every third digit, last five digits, hexadecimal representation,combinations thereof, and so forth and so on. Other choices could alsobe included such as the order of presentation, use only to preventredundancy, and so forth and so on.

Section 315 allows a user to retain or alter the order in which thedigits of a number are presented via an audible alert of certainembodiments. Example choices include, but are not limited to, originalorder, arbitrary and custom. The later two, may be applied uniformly toall communications in order to provide a form of encryption, privacy forthe receiver and anonymity for the initiator of a communication.Examples of other choices include reverse order, and so on.

The examples given in FIG. 3 and associated text are for illustrationpurposes only. They are neither comprehensive, nor are any required. Theconcepts illustrated in section 315 could be applied to names, emailaddresses, or street address for example. An option designating an alertas a call waiting alert could be added to the user selection screen orscreens, for example. Also, any section or sections could be omitted andreplaced with some default setting.

In some embodiments, information can be conveyed through the basiccharacter of the sound of the alert, while in other embodiments,information can be conveyed irrespective of the basic character of thesound of the alert. Section 318 pertains to the later. All sounds arecomprised of one or more vibrations. These vibrations, their frequenciesand amplitudes, both absolute and relative to each other, as well aschanges in frequencies and their amplitude over time confer to eachdifferent sound its unique and recognizable (to the human ear)characteristics or basic character. Terminology commonly used todescribe such sound characteristics includes, but is not limited to,timbre, which may comprise overtones (harmonics and partials), attack,decay, sustain, and release; tremolo; and vibrato. Different soundcharacteristics are imparted to the alert through the selection of theabove parameters. Note that the only sounds that comprise only onefrequency and exhibit none of the other qualities mentioned are simplesine waves of constant frequency and amplitude (although this could initself be considered a unique timbre).

Embodiments that convey information irrespective of the basic characterof the sound of the alert comprise sets of sounds that differ in theirfundamental frequencies, or differ in the amplitudes of theirfundamental frequencies. Other qualities remain largely unchangedrelative to the fundamental frequencies.

Section 318 illustrates a few of the various sound qualities or basiccharacteristics that may be applied to the alerts. Depending onparameters or qualities such as those mentioned above, alerts may soundlike conventional phone rings, musical instruments, birds, human voices,and so forth and so on. Techniques for producing or creating varioussound qualities or basic characteristics include physical modeling,spectral modeling, sampling synthesis, and the like. These and othertechniques are generally known with tools and reference materials toimplement the techniques being readily available. The examples shown inthe figure are phone ring sounds, sine waves, piano, viola, bird sounds,synthetic voice, arbitrary sounds, optimized sound set, custom, sillysounds, synthetic speech, and pig-Latin speech. The potential list ofchoices is vast. Additional options may include traffic sounds, drums,square waves, and so forth and so on.

Not all options need be involve predetermined sound qualities. Forexample, new sound files can be incorporated after a given electronicdevice is acquired by its user. Techniques such as spectral modeling,physical modeling, and sampling synthesis can be used to apply soundqualities or characteristics not available at the time a givenelectronic device is acquired by its user. For example, soundsfrequencies, their amplitudes, both absolute and relative to each other,as well as changes in frequencies and their amplitude over time can bemodeled after these same qualities in voices. Voices from which thesound qualities are derived could include the individual user of thedevice, those who initiate communications to the device, other people'svoices, synthetic voices, voices or sounds of animals, and the like.

As just one example evolving deriving sound qualities from a voice of aperson initiating a communication to a device, the alert would have aninitial quality of a traditional phone ring. The first time the devicewas used in a conversation involving a new phone number or address, thevoice of the person associated with that number would be analyzed. Thenext time an incoming communication was determined to be originatingfrom that number or address, the device would adjust the timbre andcadence of the alert to resemble that of the voice analyzed during theprevious communication. More specifically to this one example, thecadence of an alert can be derived from the average frequency in whichglottal stops occur during the speech the person whose voice is beinganalyzed. This would impart a quickness to alerts for people who speakquickly, and a slowness to alerts for people who speak slowly. The vowelsound, long “e”, and the nasal sound, “n”, can be used to construe theactual ring sound. This can be accomplished using techniques such asphysical modeling, spectral modeling, sampling synthesis, and the like.The identification and sampling of the above-mentioned speech componentscan be accomplished using software subroutines or functions used inspeech-to-text, speech recognition programs, and other applicationsknown to those skilled in such arts. The resulting alert from thisexample might have a cadence resembling that of the caller's speech, abasic sound quality similar to, and derived from the formant of thecaller's pronunciation of the vowel sound, long “e” at the start of eachsound pulse and the overtones exhibited in the caller's pronunciation ofthe nasal, “n”, at the end of each sound pulse.

As stated above, embodiments that convey information irrespective of thebasic character of the sound of the alert comprise sets of sounds thatdiffer in their fundamental frequencies, or differ in the amplitudes oftheir fundamental frequencies. There are a vast number of ways thatfundamental frequencies, or their amplitudes, can be varied in order toconvey information. Each variant can be thought of as a different code.Section 321 illustrates some of the choices that a user can haveregarding the assignment of such codes. The examples given in the figureare OPTIMIZED CODE, empirically determined to facilitate rapid learningfor most people; SCRAMBLE, a unique code assigned to each user selectingthis option; and CUSTOM, user assigned code. Other examples couldinclude six fundamentals, ten fundamentals, symbol groupings, and soforth and so on.

The last section of FIG. 3, section 324, deals with cadence. The upperleft choice in section 324 would result in audible alert sounds followedby a short pause, more audible alert sounds, a longer pause, audiblealert sounds, a short pause, more audible alert sounds, a longer pause,and so forth and so on. The upper middle choice would result in audiblealert sounds, a long pause, more audible alert sounds, a long pause, andso forth and so on. The upper middle choice would result in audiblealert sounds, a short pause, more audible alert sounds, a short pause,and so forth and so on. The middle row provides for the same threechoices as the upper row, except that the audible alert sounds areproduced for a longer time and the pauses are also longer. In the lowerleft choice, the short pause is eliminated. In the middle bottom choice,both pauses are eliminated, and the lower right choice is the sameexcept that the audible alert sounds are produced for a longer time. Aswith the other examples, this list is not intended to be comprehensive.

Although not shown, it is possible to provide the feature where theorder that information is audibly presented is user selectable. Forexample, one user may prefer to have the alert identify the initiatorthen the receiver then the initiator then the receiver and so forth. Adifferent user may prefer to have the alert identify the receiver thenthe initiator then the initiator then the initiator and so forth.

As stated in the description of FIG. 2A, the audible alert comprisessets of sounds or acoustic symbols which may be derived from andassigned to phonemes, letters, numbers, or other types of charactersused to represent information pertaining to the receiver, initiator,contact, or communication type. It is possible to shuffle or randomizethe correspondence of acoustic symbols to phonemes, letters, numbers, orother types of characters, and to assign to a device such as atelephone, PDA, computer, etc. a unique correspondence of the acousticsymbols to the characters. The result is a form of weak encryption. Theowner or user of a device, with a given correspondence of the acousticsymbols to the characters, will become accustomed to the sounds of theirdevice and therefore be able to perceive the information carried in itsaudible alerts. However, someone else whose device uses a differentcorrespondence of the acoustic symbols to the characters will beunaccustomed to the sounds of another's device and therefore unable toperceive the information carried in its audible alerts. The resulting(optional) privacy for the receiver and anonymity for the initiator willbe appealing to some users. In the example of FIG. 3, selecting SCRAMBLEfrom the choices given in section 321 would activate the encryptionfeature described above. Unique correspondences could be installed intodevices at the time of manufacture, distributed electronically, derivedfrom phone numbers, serial numbers, and so forth.

An example of a different form of weak encryption is to shuffle thedigits of a phone number. Again, different devices would use differentcorrespondences, this time from original digit order to final digitorder. In the example of FIG. 3, selecting ARBITRARY DIGIT ORDER fromthe choices shown in section 315 would activate the encryption featuredescribed above. Other encryption schemes are contemplated.

Certain embodiments may have factory default settings that enablesubstantial utility without requiring user input or programming. Theoptions shown as checked in FIG. 3 illustrate one possible set of suchdefault settings that may be used if the device is a telephone. Thesettings selected in the example would result in an alert soundingsubstantially like a conventional phone ring, as selected in section318, while still being unique to the device, as selected in sections303, 321. Also, the alerts would be unique to each caller's phonenumber, as selected in sections 306, 302, and therefore access to anup-to-date contacts list or electronic address book would not berequired. This is advantageous, as often newly purchased phones have notbeen programmed with contact lists or electronic address books. Theinformation would be conveyed to the owner or user of the device whilebeing generally unintelligible to others, as selected in section 321.

FIG. 3 is for illustration purposes, and is not intended to represent anactual user interface preference menu. Information conveyed via certainembodiments is not limited to the receiver, the initiator, the type ofcommunication, and type of contact. Other types of information arecontemplated including, but not limited to, priority, urgency,importance, subject, weather alerts, stock movements, reminders,proximity alerts, and so forth.

FIGS. 4A, 4B, 4C, and 4D illustrate a few examples of an audible alertas might result at the end state 232 (FIG. 2A). These figures alsoillustrate how various sound qualities including, but not limited to,timbre, which may comprise overtones (harmonics and partials), attack,decay, sustain, release; tremolo; and vibrato can be used according tosome embodiments. Various other patterns, sounds, combinations and soforth are contemplated.

Along the top of each figure, 4A, 4B, 4C, and 4D, the words within thestarburst outlines indicate the sound characteristics of the alert asmay have been assigned in a preference selection in section 318 (FIG.3). Grouping and spacing portray cadence as may have been assigned in apreference selection in section 321 (FIG. 3) for example. The boxesportray a type of information presented within each portion of the alertas may have been assigned in a preference selection in section 303,while the words in quotes below each box portray the actual informationcontent according to a preference selection as indicated in sections306, 309, and 312.

Variations in sound qualities including, but not limited to, timbre(including overtones, attack, decay, sustain, release), tremolo, andvibrato result in alerts having sounds which are distinctlyrecognizable, resembling such things as ringing, chirping, buzzing,various musical instruments, and so forth. The characteristic qualitiesof these distinctly recognizable sounds are substantially independent ofthe fundamental sound frequencies comprising the alert. These factors incombination with temporal variables such as the sequential arrangementof the components of the alert, and cadence (comprising the duration ofeach component and time gaps, if any, between them), give rise to theoverall general sound of the alert. Examples include, “ringing ringingpause ringing ringing pause, and so forth” as in FIG. 4A, and “buzzingpause buzzing pause, and so forth”, as in FIG. 4B.

The informative aspect of the alert which is applied by the process 220(FIG. 2A) in accordance with preferences 210 exemplified in (FIG. 3) mayconsist of variations in the fundamental sound frequencies of the alert.At any given time, the alert may comprise one or more fundamental soundfrequencies. Each of the rectangular boxes shown in FIGS. 4A, 4B, 4C,and 4D represent a series of acoustic symbols, the acoustic symbols eachcomprising one or more fundamental sound frequencies. The words inquotes below the boxes represent the actual information corresponding tothe unique sequence of acoustic symbols.

In FIG. 4A, the alert has the timbre and tremolo of a conventional phonering and a temporal arrangement such that the resulting alert soundslike “ringing ringing pause ringing ringing pause, and so forth”. Theinformative component of the alert, “for Jim from Brenda” is conveyedvia modulating the sound frequency of the ringing. The first ringing ofeach “ringing ringing pause” conveys the word “Jim”. The second ringingof each “ringing ringing pause” conveys the word “Brenda”. In FIG. 4B,the alert has the timbre and vibrato of a buzzing sound and a temporalarrangement such that the resulting alert sounds like “buzzing buzzingpause buzzing buzzing pause, and so forth”, and the information conveyedvia frequency modulation is “for Jim from Brenda”. In FIG. 4C, the alertsounds like “chirping chirping pause chirping chirping pause, and soforth”, and the information conveyed via frequency modulation is “forJim”. In FIG. 4D, the alert sounds like “ringing pause ringing pauseringing pause, and so forth”, and the information conveyed is “fromBrenda”.

FIGS. 4A, 4B, 4C, and 4D illustrate that different preference settingscan independently control how the alert sounds and what information willbe conveyed. These figures also illustrate how using frequencymodulation to confer information to the user need not drastically alterthe basic sound of the alert.

In FIGS. 4A and 4B, neither the nature of sounds, ringing vs. buzzing,nor the cadence variations affect the information content of the alert.However, the information embedded in the alert will result in aperceivable modulation of at least some characteristics of the basicalert sound. It is this last aspect that causes each alert to be uniqueand recognizable.

FIGS. 4A and 4C are different in that frequency modulation conveys onlythe identity of the recipient or initiator, respectively. Here the otherqualities such as cadence, timbre, tremolo, and/or vibrato, and soforth, for example, might be used to convey the identity of theinitiator or the recipient, respectively.

Some embodiments may convey information not limited to the identity ofthe receiver, and/or the initiator. Some embodiments may conveyinformation not comprising the identity of the receiver, and/or theinitiator.

FIG. 5 illustrates a possible telephonic application embodiment andexpands upon the process 220 (FIG. 2A). Depending on the embodiment,additional states and/or processes may be added, others removed, and theordering of the states and processes rearranged. Here, depending on userpreference settings 210 (FIGS. 2 and 3), a distinctive alert is derivedfrom and assigned to the name associated with the device, and the nameof the contact associated with a phone number derived from the ANI (orother type of identifier) of the incoming call at a process 520, and aprocess 540, respectively. However, if it is determined at a decisionstate 504 that the “name code” feature has not been selected (or it hasbeen deselected), or if at a decision state 506 a name associated withthe device is unavailable, the receiver indicative alert will be derivedfrom and assigned to the phone number associated with the device at aprocess 510. If it is determined at a decision state 524 that the “namecode” feature has not been selected (or it has been deselected), or ifit is determined at a decision state 528 that no contact name isassociated with a phone number derived from the ANI (or other type ofidentifier) of the incoming call, the initiator indicative alert will bederived from and assigned to the phone number derived from the ANI (orother type of identifier) at a process 530. If it is determined atdecision state 522 that no ANI (or other type of identifier) isavailable or accessible, a default alert is assigned as the initiatorindicative alert at a state 544.

The processes 510, 520, 530, and 540 (FIG. 5) may assign sets ofacoustic symbols to names, words, or numbers by different methods. Oneexemplary method involves assigning a different acoustic symbol to eachmember of the character set used to represent the names, words, ornumbers. In one embodiment, an option is provided at section 306 (FIG.3) for the acoustic symbol assignment to be based upon the spelling ofthe word or name or its constituent phonemes. The acoustic symbols arethan substituted for the characters comprising the names, words, ornumbers.

FIG. 6A relates to the processes 510, 520, 530, and 540 and provides oneexample of how acoustic symbols may be assigned to a character set of atype often used to represent names, numbers, and other receiver andinitiator specific information. This graphical representation 600A showshow unique combinations of sounds (and in special cases, single sounds)can be assigned to each character in the set. The range of sounds usedin this example span approximately one log in frequency, the actualupper and lower limits being arbitrary (hence no unit label forfrequency). Fundamental frequencies ranging from 100 Hz to 6 kHz may beparticularly useful in telephonic applications. The range of frequenciesused is also arbitrary but needs to be sufficient to allow distinctfrequency intervals and/or combinations of intervals. In this example,each character is assigned a frequency and one or more frequencyintervals at which additional sounds are produced (and in special cases,a frequency only). The intervals (and in special cases, their absence)can be distinguishing characteristics of each of the acoustic symbols.In the special cases were the interval is lacking (or unity) within anacoustic symbol, as in “6” and “q”, and in cases were two symbols havethe same interval as in “9” and “Y”, the frequency intervals between thesymbols is an additional distinguishing characteristic.

For any given sound frequency, the qualities of the sounds used mayinclude and differ in timbre, including overtones, attack, decay,sustain, release; tremolo; vibrato; and other parameters. In mostinstances, the frequency of a sound is considered to be its fundamentalor lowest frequency component.

The use of intervals may have advantages as most people, includingtrained musicians, lack the ability to recognize individual soundfrequency but are able to recognize intervals. Another potentialadvantage can be a softening of the sound of the resulting audiblealert. This, however, does not preclude the assignment of single soundfrequencies in certain embodiments, particularly when such sounds arethemselves separated by frequency intervals.

FIG. 6B illustrates that in some embodiments the relationship betweensound frequencies rather that the sound frequencies themselves areimportant. The figure is a tabular representation 600 b of the sameexample illustrated by the chart 600 a (FIG. 6A). The INTERVALS section605 b lists the intervals that are graphically represented in the chart600 a as a ratio of the sounds comprising a given acoustic symbol to thelowest frequency sound comprising the same acoustic symbol. TheFUNDAMENTALS section 615 b lists sound frequencies consistent with boththe INTERVALS section 605 b as well as the chart 600 a (FIG. 6A). TheALTERNATIVE FUNDAMENTALS section 625 b also lists sound frequenciesconsistent with both the INTERVALS section 605 b as well as the chart600 a (FIG. 6A). Although the FUNDAMENTALS section 615 b and theALTERNATIVE FUNDAMENTALS section 625 b share no frequencies in common,they represent the same set of acoustic symbols, and are notsubstantially different, further illustrating the significance of therelationship between sound frequencies (both within and between acousticsymbols) rather that the sound frequencies themselves.

Although the example shown in FIGS. 6A and 6B deals with assigningsounds to letters and numbers, the underlying principles can be appliedto different kinds of sounds and characters and symbols.

FIG. 7 illustrates a process 700 that expands on the processes 520 and540 (FIG. 5) showing two different ways that a set of acoustic symbols(sounds) can be derived from and assigned to a name or a word byassigning individual acoustic symbols to the constituent parts of thename or word. Depending on the embodiment, additional states and/orprocesses may be added, others removed, and the ordering of the statesand processes rearranged. At a start state 710, “Joyce” is an example ofa name to which a set of acoustic symbols will be assigned. At adecision state 720 a determination is made whether the preferences, asdetermined at section 306 (FIG. 3) of process 210, call for acousticsymbol assignment to be based upon the spelling of the word oralternatively its constituent phonemes. If the acoustic symbols are tobe assigned based upon spelling, an acoustic symbol is assigned to eachletter comprising the word by a process 740. This will result, at an endstate 760, in a set of five acoustic symbols 780 each representing oneof the letters in the word “Joyce”. If the acoustic symbols are to beassigned based upon phonic structure, a set of phonemes are assigned tothe word by a process 730, and an acoustic symbol is assigned to eachphoneme by a process 750. This will result, at an end state 770, in aset of three acoustic symbols 790, each representing one of the phonemesin the word “Joyce”. These examples are not intended to limit thisdescription as other approaches are readily contemplated.

An advantage in deriving sets of acoustic symbols from phonemes is thatthe resulting alerts tend to be shorter for many languages. Anotheradvantage in deriving sets of acoustic symbols from phonemes is that theuser will begin to associate the sounds of the alerts with the sounds ofwords or people's names.

FIG. 8 is a list of English phonemes as may be employed by the process730 (FIG. 7). This list cross-references three equivalent phonicalphabets. Other languages can be represented by similar tables.Phonemes can be assigned to words, including names, by softwaresubroutines or functions used in text-to-speech programs and otherapplications known to those skilled in such arts.

Moments of relative silence that occur in natural speech, although notgenerally classified as phonemes, can be considered to be like phonemesin certain embodiments of the invention. Examples include glottal stops,pauses between words and syllables, or between the suffix and prefix ofa phone number.

The number of different transformations giving rise to a set of acousticsymbols is infinite (hence numerous encryption possibilities).Transformations giving rise to a correspondence between an acousticsymbol set and some other symbol set can take many forms. It may bedesirable that one or more of the acoustic symbols have a bimodal orpolymodal distribution of energy as a function of frequency, so thatmembers of such a set will be more easily recognizable by the human ear.Moreover, the number of acoustic symbols, distinct to the human ear thatcan be created within any given range of sound frequencies, is greaterif one or more of the symbols has a bimodal or polymodal distribution ofenergy as a function of frequency.

Acoustic symbols can be created such that their distinguishingcharacteristics are substantially independent of frequency, timbre,tremolo and other sound qualities. For example, each of the acousticsymbols within a set could produce as a high pitched ring or cat's meow,or as a low pitched buzz or cow's moo without changing their meanings orbecoming unrecognizable to the listener. (This is not to say timbre andother qualities couldn't also be used to convey meaning.) In oneembodiment, to preserve the meaning and recognizable qualities of theacoustic symbols of the current example, two characteristics of the setand its symbols should remain substantially unchanged. First, theintervals between the most dominant (loudest) frequencies within eachacoustic symbol should be substantially preserved. Second, the intervalsbetween the most dominant (loudest) frequencies between each acousticsymbol should be substantially preserved. For the purposes of thisdiscussion, an interval is the difference of the log values of twofrequencies.

Transforming a set of symbols into a set of acoustic symbols, such as bythe transformation process 252 or 272 (FIG. 2B), can be accomplished ina variety of ways. For example, one might employ a table 600 a, 600 b(FIGS. 6A and 6B) to map a correspondence from the domain set of symbolssuch as a digital character set to a range set of acoustic symbols.Alternatively, a set of rules or a transforming equation can be used.Combinations of these and other tools can also be employed. One exampleof an approach combining the use of a transforming equation and a tablefollows.

First, an equation, f(n), is used to transform the set of integers, N={. . . −2, −1, 0, 1, 2, . . . } into a set of frequencies, F={ . . . ,f(−1), f(0), f(2), . . . }, such that within any finite frequencyinterval, H (e.g., the range of human hearing), there exists a finiteset of discrete frequencies S=F∩H. Next, an acoustic symbol set iscreated by correlating the members of a symbol set (e.g., numbers,letters, or phonemes) to individual frequencies within the set ofavailable frequencies, S.

Because human hearing is receptive to sound frequency changes in alogarithmic fashion, it may be desirable to construct the equation,f(n), such that f(i)/f(i+1)=f(j)/f(j+1) for all integers, i and j. Anexample of such an equation is f(n)=x*v̂(n/p), where x, v, and p are realnumbers greater than one. For illustration purposes, if x=2, v=10, andp=2, and H=[20 Hz, 20 kHz], the range of human hearing, the availablefrequencies, S=F∩H would be the set {20 Hz, 63 Hz, 200 Hz, 632 Hz, 2kHz, 6.3 kHz, 20 kHz}, corresponding to n values of {2, 3, 4, 5, 6, 7,8}.

It may be noted that values for v that are powers of 2 such as 2, 4, 8,etc. and values for p such as 3, 4, 6, 12, and 24 will tend to give riseto frequencies separated by intervals approximating naturally occurringovertones. Such sets of frequencies may give rise to sets of acousticsymbols that are more pleasing and perhaps more discernable to the ear.

Table 900 (FIG. 9) illustrates how this technique can be used to assigncombinations of sounds (and in special cases, single sounds) to eachcharacter of a set representing English phonemes. The values used in theequation f(n) are x=500, v=2, and p=12, and the frequency interval isH=[150 Hz, 1500 Hz]. In this example, most characters are assigned oneor more frequencies portrayed by their corresponding n value. In threecases, “AE”, “UW” and “UH”, where single fundamental frequencies havebeen assigned, the lack of an interval is unique and discerning. Anotheraspect of this example is that three sets of three sounds: {−17, −13,−10}, {−3, 0, 4}, and {8, 13, 18} (nine sounds in all) are established(for clarity only, in this example each set comprises three frequencieswithin one factor of 2, and the sets do not overlap). In this example,each phoneme is represented by up to three sounds, no more than one fromeach set. The advantage here being that the resulting acoustic symbolsare simple, distinctive, and easy to recognize. A potential advantage inhaving a small set of sounds (nine in this example) to derive theacoustic symbols from is that the individual sounds will be moredistinctive sounding to the human ear than if they are elements oflarger sets. Also, in certain embodiments where the different soundsdiffer in their fundamental frequency, but have other characteristics incommon, smaller sets of sounds can be placed into smaller frequencyintervals, H. Note, that in this example, if the value of x is increasedor decreased, the frequencies associated with each acoustic symbol willincrease or decrease respectively. Changing all of the acoustic symbolsuniformly in this way may alter how they sound, but it need notsubstantially alter the information content or recognizable aspects ofthe alert.

As further shown in the example table 900, each phoneme is assigned aduration in milliseconds. In one embodiment, the sounds are produced forlonger periods of time if they correspond to phonemes that arerelatively long in duration in natural speech.

FIG. 10 shows an example of portions of an algorithm or process 1000 forassigning acoustic symbols to phonemes. Depending on the embodiment,additional states and/or processes may be added, others removed, and theordering of the states and processes rearranged. After such anassignment has been performed once, the resulting correspondence can beused and reused by the process 750 (FIG. 7) in its assignment of sets ofacoustic symbols to words and names. Beginning at a start state 1007,the phonemes of a given language are placed into groups of like phonemes(e.g., plosive, fricative, diphthong, monophthong, etc.) by a process1014. Such a placement of phonemes into groups of like phonemes is knownto linguists and others skilled in such arts. In one embodiment, allphonemes are then assigned a sound frequency (the root) by a process1021, all phonemes being given the same root. Processes 1028, 1035,1042, 1049, and 1056 then assign additional sound frequencies to eachphoneme creating unique intervals and sets of intervals for each. Notethat after all phonemes have been assigned a second sound frequency bythe process 1028, the most frequently used phonemes of each group arenot assigned additional sound frequencies. Therefore these phonemes arerepresented by simple single intervals.

The large number of different attainable outcomes at an end state 1063allows for a high degree of device to device variability in theresulting assignment of acoustic symbols to phonemes. The result is thatit will be difficult or impossible for people to perceive theinformation content of audible alerts from devices or accounts not usedfrequently by them (e.g., other people's devices or accounts, inparticular). The resulting (optional) privacy for the receiver andanonymity for the initiator will be appealing to some users. Also, inthis example, the most commonly occurring phonemes are assigned some ofthe simpler sounding and recognizable symbols. This results in a lesscomplex and more distinctive alert. This aspect also enhances the user'sability to learn to recognize the acoustic symbols associated with thephonemes of a given language.

FIG. 11 illustrates an example of an algorithm or process 1100 forassigning acoustic symbols to the members of a symbol set, such as theletters of an alphabet and the digits of a counting system, or thephonemes of a language. Depending on the embodiment, additional statesand/or processes may be added, others removed, and the ordering of thestates and processes rearranged. After such an assignment has beenperformed once, the resulting correspondence can be used and reused bythe process 510 (FIG. 5), the process 530, the process 740 (FIG. 7), orthe process 750 in its assignment of sets of acoustic symbols to words,names, or numbers. Here, the members of a character set 1106 arerandomly arranged into an ordered set by a state 1109, and then assignedsequential binary numbers by a state 1112. Seven sound frequencies arethen selected by states 1115 and 1118. One or more of these are thenassigned to each member of the character set by states 1121, 1124, 1127,1129, 1132, and 1135. If it is determined at a decision state 1138 thatpreferences forbid the assignment of acoustic symbols comprising just asingle fundamental frequency, a state 1141 then assigns the root to allmembers of the character set that have not already been assigned morethan one note.

The example shown in FIG. 11 is for character sets of less than 64members, but it would be straightforward to create algorithms to treatlarger sets. The extremely large number of different attainable outcomesat an end state 1144 allows for an extremely high degree of device todevice variability in the resulting assignment of acoustic symbols tocharacters. High device to device variability will result in it beingdifficult or impossible for people to perceive the information contentof audible alerts from devices or accounts not used frequently by them(e.g., other people's devices or accounts). The resulting (optional)privacy for the receiver, and anonymity for the initiator, will beappealing to some users.

For example, in a setting where several people each possess the samemodel of mobile phone, and one person's phone rings, that person willknow that is their phone as well as who is trying to reach them. Theothers will know only that is not their phone that is ringing.

In a different, somewhat extreme example where the selection of soundsis limited to six sound frequencies and the character set is limited tothe 26 letters in the English alphabet, there would still be over1.44×10̂44 (one point four four times ten to the forty-fourth power)unique outcomes or personal codes. A potential advantage in having asmall set of sounds (six in this example) to derive the acoustic symbolsfrom is that the individual sounds will be more distinctive sounding tothe human ear than if they are elements of larger sets. Also, in certainembodiments where the different sounds differ in their fundamentalfrequency, but have other characteristics in common, smaller sets ofsounds can be placed into smaller frequency intervals.

FIGS. 12A-12H relate to the processes 510 and 530 (FIG. 5) andillustrates some of the ways that acoustic symbols assigned to digits ofa counting system can be arranged into an audible alert as in certainembodiments. All eight of the given examples illustrate an audible alertderived from an exemplary telephone number 987-654-3210. The firstexample, shown in FIG. 12A, is a direct translation of the ten-digitnumber into ten sequential unique polyphonic (polymodal with respect toenergy as a function of frequency) sounds, each sound representing aunique digit. In the next two examples, shown in FIGS. 12B and 12C,single monophonic (one fundamental sound frequency) sounds can beassigned to digits, as the final arrangement results in the creation ofdistinctive intervals. Note that in FIG. 12C, but not in FIG. 12B, aunique alert is assured for all possible 10-digit numbers. The exampleshown in FIG. 12D differs from 12A, 12B, and 12C in that the order ofthe digits is shuffled. In the fifth example, shown in FIG. 12E, thedigits have been grouped into ordered pairs. The first member of eachdigit pair is assigned a sound, and second member is assigned a durationfor that sound. In one embodiment, the duration corresponds to the valueof the digit, except when the digit is zero, when a predeterminedminimum duration is assigned. In the sixth example, shown in FIG. 12F,only four digits of the ten-digit number are assigned sounds. In oneembodiment, these are the last four digits. This results in a shorter,simpler alert with the potential drawback that not all phone numbers canbe assigned unique alerts. FIG. 12G, illustrates a completely random andarbitrary assignment and arrangement of sounds that are permanentlyassigned to each new phone number or contact name as it becomesavailable to the device. Of course, an alert first assigned to a phonenumber derived from the ANI (or other type of identifier) of an incomingcall could be transferred to a contact name associated with that phonenumber at a later time. For the last example, shown in FIG. 1211, thephone number itself is assigned an acoustic symbol. As is apparent fromearlier examples, the number of potential acoustic symbols is verylarge. It is therefore possible to assign a different single acousticsymbol to each new phone number or contact name as it becomes availableto the device.

FIGS. 12A-12H and the examples they illustrates relate to the treatmentof acoustic symbols assigned to digits as may be employed by theprocesses 510 and 530 (FIG. 5). However, the basic principlesillustrated apply to letters, phonemes, and other symbols. Therefore theconcepts illustrated here can also be applied to the processes 520 and540, and the process 740 and 750 (FIG. 7).

FIGS. 13A-13D illustrate a few examples of how the acoustic symbolrepresentation 790 (FIG. 7) for the word Joyce might appear at the endstate 770 (FIG. 7) if the correspondence called for by table 900 (FIG.9) were used in the process 750 (FIG. 7). Of course, other names orwords and other values in table 900 will yield different results. Inthese examples, FIG. 7 relates to the process 520, or 540 (FIG. 5).Also, the NAME (PHONIC) option is selected in section 306 (FIG. 3).

FIGS. 13A-13D each represent examples of a 320 millisecond segment ofsound during an audible alert of certain embodiments. These figures aresimplified spectrograms with time in milliseconds along the bottomhorizontal axis and sound frequency along right vertical axis. Thefrequency scale is logarithmic. On the left vertical axis are n valuesfrom the example equation used to create table 900 (FIG. 9), and on theupper horizontal axis are the phonemes being represented. The darkshapes represent sound frequency (vertical position) and energy (heightor thickness) as a function of time.

FIGS. 13A-13C each show energy at four discreet frequencies, 794 Hz, 500Hz, 281 Hz, and 187 Hz. Therefore these figures can correspond to theselection of SINE WAVE in the section 318 (FIG. 3). Other sounds wouldgenerally exhibit overtones and transients. FIG. 13A is a simple examplein that each acoustic symbol remains unchanged from beginning to end.

In FIGS. 13B and 13C, the phoneme “oi” exhibits a shift in emphasis fromlow to high frequency during its 150 milliseconds of play. In FIG. 13B,this is accomplished by delaying the start of its 794 Hz component by 30milliseconds and ending its 187 Hz component 30 milliseconds early. InFIG. 13C, the 794 Hz component increases in intensity over time, whilethe 187 Hz component decreases over time.

FIG. 13D illustrates an alert that has a low-pitched sound somewhat likea combination between a ringer and a buzzer. This quality results fromabruptly increasing and quickly decreasing the energy (intensity) of allfrequencies in unison about every 20 milliseconds. Overtones are alsopresent, represented as less intense higher frequency images of thefundamentals. To aid in visualizing this example, the overtones havebeen placed closer to the fundamentals than they would actually occur.

Frequency intervals have been used to describe how embodiments ofacoustic symbols and audible alerts are created. Those knowledgeable inmatters relating to human hearing will realize that some intervals andsets of intervals are easier to recognize than others. Also someintervals and sets of intervals have a more pleasing sound than others.The same applies for other sound qualities including but not limited totimbre, comprising overtones (harmonics and partials), attack, decay,sustain, release; tremolo; and vibrato. These and other factors would betaken into account by those practicing embodiments of this invention.Undue experimentation would not be required as this information isgenerally known, and readily available.

Example embodiments deal largely with the assignment of frequencyintervals. However, relative energy levels at different frequencies andchanges of energy levels and/or frequencies over time can also be usedto impart meaning to audible alerts. The same applies for other soundqualities including but not limited to timbre, comprising overtones(harmonics and partials), attack, decay, sustain, release; tremolo; andvibrato. These and other factors would be taken into account by thosepracticing embodiments of this invention. Again, undue experimentationwould not be required as this information is generally known, andreadily available. Lastly, the acoustic symbols comprising a set ofacoustic symbols, and the sounds comprising an acoustic symbol need notall share the same basic sound characteristics. For example, some soundsmight be sine waves while other sounds may be similar to conventionalphone rings.

A skilled technologist will realize that there are many ways toconstruct, store, and manipulate audible alerts of certain embodiments.An example in which preference settings 210 (FIG. 2A) call for theconversion of words into strings of symbols representing phonemesfollows. On first receiving a communication from a new initiator, thereceiver's device accesses the signaling portion of the communicationand determines an identifier, such as the ANI of a telephone call, orthe header of an email. In some embodiments, the initiator's(subscriber) name is also part of the signaling portion of thecommunication. In an Internet embodiment, the name may not benecessarily available from the communication, but could be accessed viaa data structure (e.g., database, array, look-up table, etc.). From thatinformation, the phonemes of the name or other type of identifier areaccessed from another data structure. Then, the acoustic symbols thatcorrespond to the phonemes are assigned and are stored in a final datastructure. Alternatively, the sound preference (including timbre,tremolo, vibrato, for example) selected from section 318 (FIG. 3) isapplied to the acoustic symbols and that data is stored in analternative final data structure. Example data structures for storingthe final data in a memory are arrays, linked lists, tables, files,databases and so forth. Likewise, data corresponding to the receiverwould be stored in a similar final data structure for the receiver, orcould be combined with the data for the initiators. The data structuresfor storing the conversion of ANI, IP address, e-mail address or otheridentifier to name (or other identifier), name or number to phonemes,and so forth can be of various types also. If the name is not part ofthe signaling portion of the communication, it may be derived from anelectronic address book or contacts database. For subsequentcommunications from the same initiator, the final data structure isindexed based on the identifier from the signaling portion of thecommunication to access the acoustic symbols or alert sound or soundscorresponding to the initiator or to access the sound preference appliedto the acoustic symbols corresponding to the initiator. Similarly, datacorresponding to the receiver is accessed from the appropriate datastructure if the receiver information is selected in section 303 (FIG.3). The appropriate data stored in the data structures is modified uponchanges to preference settings. Alternatively, some or all aspects ofthe transformation from an identifier to an audible alert could beperformed each time a communication is received.

CONCLUSION

Specific blocks, sections, devices, functions, processes and modules mayhave been set forth. However, a skilled technologist will realize thatthere are many ways to partition the system, and that there are manyparts, components, processes, modules or functions that may besubstituted for those listed above.

While the above detailed description has shown, described and pointedout the fundamental novel features of the invention as applied tovarious embodiments, it will be understood that various omissions andsubstitutions and changes in the form and details of the systemillustrated may be made by those skilled in the art, without departingfrom the intent of the invention. The foregoing description detailscertain embodiments of the invention. It will be appreciated, however,that no matter how detailed the foregoing appears, the invention may beembodied in other specific forms without departing from its essentialcharacteristics. The described embodiment is to be considered in allrespects only as illustrative and not restrictive.

What is claimed is:
 1. A method of generating a distinctive auditoryalert upon receiving a telephone call at a device, the methodcomprising: accessing an identifier associated with a calling party of atelephone call; retrieving data indicative of a plurality of soundsdesignating the calling party based on the identifier; and playing theplurality of sounds at the device so as to identify the calling party,wherein the plurality of sounds are based on phonemes associated withthe calling party, and wherein the sounds do not constitute words of aspoken language.
 2. A method of generating a distinctive auditory alertupon receiving a telephone call at a device, the method comprising:accessing an identifier associated with a calling party of a telephonecall; retrieving data indicative of a plurality of sounds designatingthe calling party based on the identifier; and playing the plurality ofsounds at the device so as to identify the calling party for a user,wherein the plurality of sounds are based on processing a sequence ofphonemes associated with the calling party.
 3. The method of claim 2,wherein retrieving comprises indexing a data structure based on theidentifier, wherein the identifier comprises a caller numberidentification, an automatic number identification, a calling party'stelephone number or subscriber name.
 4. The method of claim 2, whereinretrieving comprises applying a transformation based on the identifier.5. The method of claim 3, additionally comprising automaticallyassigning a particular plurality of sounds corresponding to the callingparty.
 6. The method of claim 5, additionally comprising storing theassigned particular plurality of sounds and the corresponding identifierof the calling party in the data structure.
 7. The method of claim 2,wherein a sequence of the plurality of sounds is unique for each callingparty.
 8. The method of claim 2, wherein the plurality of soundscorresponds to one instrument.
 9. The method of claim 2, wherein theplurality of sounds corresponds to multiple instruments, and wherein thesounds of the multiple instruments overlap at times.
 10. The method ofclaim 6, in a subsequent telephone call to the device from a callingparty that has previously called the device, additionally comprising:indexing the data structure based on the identifier of the calling partyto retrieve the assigned particular plurality of sounds designating thecalling party; and playing the plurality of sounds in a sequence at thedevice so as to identify the calling party.