Method and system for providing calling name identification requery

ABSTRACT

A method for determining the name of a calling party where the calling party&#39;s name and corresponding telephone number are found in a remote database. The method first identifies whether the calling party&#39;s telephone number is contained within the local database. When it is determined that the telephone number is not within the local database, the method attempts to locate the telephone number in a remote database. A query is formed according to a basic signal transmission protocol to ensure that a database which receives the query will be able to respond to it. The query requesting the name associated with the telephone number is sent across a network. The method receives a response to the inquiry and checks to ensure that a name was returned to the local database before delivering the name to the called party.

RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 11/253,293 (still pending), filed Oct. 18, 2005, which is acontinuation of U.S. patent application Ser. No. 10/389,227 (now U.S.Pat. No. 6,975,716), filed Mar. 13, 2003, which is a continuation ofU.S. patent application Ser. No. 09/864,081 (now U.S. Pat. No.6,560,324), filed May 23, 2001, which is a continuation of U.S. patentapplication Ser. No. 09/393,763 (now U.S. Pat. No. 6,275,576), filedSep. 10, 1999, which is a continuation of U.S. patent application Ser.No. 08/757,893 (now U.S. Pat. No. 5,974,128), filed Nov. 27, 1996, theentirety of each of which is hereby incorporated by reference.

FIELD OF THE INVENTION

This invention relates generally to telephone services and morespecifically to enhanced caller identification services.

BACKGROUND

Local telephone service providers offer a variety of optional servicesto their customers. The services can be broadly categorized asoriginating services and terminating services. Originating services arecontrolled by the originating or calling party's central office when thecalling party places a call. In comparison, terminating services arecontrolled by the terminating or called party's central office when anattempt to terminate a call occurs.

One example of a terminating service is “caller identification.” Calleridentification provides the called party with the name and telephonenumber of the calling party. Caller identification is typically providedto a subscriber by its local central office. In particular, each centraloffice ordinarily has access to a local database containing telephonenumbers and the corresponding names of people within its local area.Prior to terminating a call to the called party, the central officesearches its database for the telephone number of the calling party. Ifthe telephone number is found within the database, the namecorresponding to that number will be accessed and are delivered to thecalled party by the central office.

If the telephone number and name are not within the database, theservice cannot provide a name to the called party. When a service cannotidentify a name corresponding to the number, it typically delivers amessage indicating that the calling party's name is unavailable.Accordingly, a local database containing only a small quantity ofnumbers and corresponding names will generate a large number of“unavailable” messages.

An indication of unavailability provides the customer with noinformation about who is calling or where the call originated from. Thisis an undesirable result for a customer who is paying for a service thatis designed to provide them with information about the person who iscalling them.

The present embodiment of the invention addresses the problem ofproviding no information regarding a calling party when the calledparty's local database does not contain information about the callingparty. The present embodiment provides for access to remote databasescontaining telephone numbers and corresponding names which are notcontained in a local database. This results in a larger quantity oftelephone numbers and corresponding names to search in an attempt toidentify a calling party. In turn, there are fewer instances where theservice is forced to provide a customer with an “unavailable” callername message.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a telephone network system.

FIG. 2 is a flow chart of the method of the present invention utilizedin the telephone network of FIG. 1.

DETAILED DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a modern telephone network 10. Such a telephone network mayhave network elements including signal switching points (SSP) 28, 30,48, 50, signal transfer points (STP) 24, 44, tandem switches 26, 46 andservice control points (SCP) 22, 42. These elements typically transfernetwork signaling protocols 60 and voice and data traffic 70 between oneanother.

For example, SSPs 28, 30, 48, 50 and tandem switches 26, 46 typicallytransfer voice and data traffic 70. SSPs 28, 30, 48, 50 also communicatewith STPs 24, 44 to transfer network signaling protocols 60, such asthose defined by Signaling System 7, which is well known in the art, tocontrol the network switching of voice and data traffic 70.

Preferably, subscribers 34, 54 gain access to the network through theSSPs 28, 30, 48, 50. A SSP is similar to a local telephone centraloffice equipped with a voice switch such as an AT&T #5 ESS or a NortelDMS--100, well known to those skilled in the art. Central officesequipped with software implementing advanced intelligent network (AIN)features are designated as SSPs.

As shown in FIG. 1, the telephone network may be divided into regions,such as region A and region B. Each region may include several centraloffices or SSPS. For example, SSPs 28, 30 within region A send andreceive network signaling protocols 60 to and from STP 24 which servicesregion A. SSPs 28, 30 within region A send voice and data traffic 70 toand from tandem switch 26 located within region A, as well as other SSPs44 in region A.

Tandem switches 26, 46, STPs 24, 44 and SCPs 22, 42 typically providevoice and data traffic 70 and network signaling protocols 60 betweencustomers in different geographic areas. For example, tandem switches26, 46 transfer voice and data traffic 70 between regions. Tandemswitches such as AIT No. 4 ESS and Northern Telecom DMS 100 are wellknown in the art. In addition to the tandem connection, it should beunderstood that SSPs in different areas may also transfer voice and datatraffic directly between each other.

STPs 24, 44 communicate with SCPs 22, 42 to transfer network signalingprotocols 60. STPs 24, 44 also transfer network signaling protocols 60between regions. SCPs 22, 42 may also transfer network signalingprotocols between region A and region B via STPs 24, 44. A STP and a SCPpreferably include a microprocessor controlled computer system usingcomputer peripherals controlled by application software programmed toimplement the appropriate communication functions. STPs and SCPs areavailable from a number of telephone switch venders such as AT&T (LucentTechnologies), Nortel, and Siemens, for example.

Referring again to FIG. 1, the process of identifying the name of acalling party 32 in the preferred embodiment begins when the callingparty 32 lifts the telephone receiver and sends the number of the calledparty 52 to the SSP 28. The SSP 28 of calling party 32 sends a networksignaling protocol 60 to STP 24 which routes the network signalingprotocol signal 60 to the SSP 50 of the called party 52. The networksignaling protocol 60 alerts the called party's SSP 50 that the callingparty 32 is attempting to terminate a call to the called party 52.

In the AIN of the present embodiment, central databases 23, 43 at SCPs22, 42 store information identifying the types of terminating servicesavailable to a subscriber 34, 54. This information determines how SCPs23, 43 will handle queries sent from the called party's SSP 50.

When the called party's SSP 50 attempts to terminate the call, SSP 50triggers a query to its SCP 42 via STP 44. In particular, SSP 50 sendsthe query over the signaling network via STP 44 to SCP 42 as it wouldsend a network signaling protocol 60. The query preferably contains the10 digit telephone number of calling party 32. Preferably, SSP 50 hassoftware with an associated computer processor and memory whichrecognizes the network signaling protocol identifying an incoming callattempt. In response, SSP 50 software formulates the trigger query andtransmits it to STP 44 as it would a network signal protocol message.

The triggered query requests SCP database 43 to identify the terminatingservices available to the called party 52. For example, SCP database 43may contain information identifying the terminating services availablefor each telephone number in the form of a database or lookup table in amemory storage device such as random access memory, or a magnetic oroptical disk drive, known to those skilled in the art. Of course, acombination of different memory storage devices or other types ofdevices may be used. The memory storage device preferably stores theservice information in a data record such as an array, lookup or pointertable or other data structure known to those skilled in the art. Uponreceiving the triggered query, SCP 42 preferably indexes the calledparty's telephone number into SCP database 43 to obtain the informationregarding the services available to the called party 52. If calleridentification is available, SCP 42 will attempt to determine the nameof the calling party 32. In the preferred embodiment, the trigger querycontains the calling party's 10 digit telephone number.

Referring now to FIG. 2, SCP 42 (FIG. 1) determines 72 whether thecalling party's telephone number has been received. If the telephonenumber has been received, SCP 42 determines 74 whether the calling party32 has placed any restrictions on the disclosure of his name byrequesting that it not be disclosed. If there are no restrictions, SCP42 performs 76 an initial analysis of the calling party's ten digittelephone number. Preferably, SCP 42 analyzes the first six digits ofthe telephone number to determine whether the calling party name iswithin SCP database 43. The first six digits of a ten digit telephonenumber are typically referred to as a NPANXX combination. For example, aNPANXX contains an area code and prefix such as 312-321. Alternatively,SCP 42 may analyze the first three digits of the calling party'stelephone number to determine whether a calling party is within database43.

Preferably, SCP 42 analyzes the NPANXX by searching database 43containing all of the combinations of the NPANXX of all the phonenumbers available within the database. If NPANXX of the calling party'stelephone number is found within the database, then the calling partyname is available and can be determined by matching the last 4 digits ofthe calling party number.

However, in some instances, the combination of the first six digits ofthe calling party's telephone number is identified as not being listedwithin the local database 43. This may occur, for example, if the nameof the calling party cannot be determined, the calling party 32 and thecalled party 52 are typically from different calling regions serviced bydifferent SCPs which do not share name and number information. Ratherthan providing the called party 52 no information regarding the callingparty 32, the current embodiment will access remote databases in anattempt to identify the calling party 32.

Referring now to FIG. 2 the method of the current embodiment isinitiated after local SCP 42 (FIG. 1) searches 76 a local database 43for the combination of the first six digits of the calling party'stelephone number to determine whether that combination is listed withinlocal SCP database 43. If SCP 42 determines 78 that the calling party'stelephone number is not listed within local database 43, SCP 42identifies which remote SCP 22 is likely to contain the calling party'stelephone number. SCP 42 also determines 80 whether the call is gappingenabled such that remote SCP 22 cannot handle the impending query.Provided that the call is not gapping enabled, local SCP 42 willformulate 82 an appropriate query based upon TR1188 protocol. TR1188protocol is chosen as a default protocol because it is assumed that anySCP will be able to respond to an appropriate query that is formulatedaccording to the TR1188 protocol.

After the proper query is formulated, it is sent 84 by local SCP 42 toremote SCP 22 according to TR1188 protocol. The query can be sent overthe network as a point code in order to increase the chances of findingthe name corresponding to the calling party's number. When remote SCP 22receives the query, remote SCP 22 searches its database 23 for thecombination of the first six-digits of the calling party. If SCP 22finds 86 the combination within the database 23, SCP 22 retrieves thecorresponding name and delivers the name and telephone number in theform of a response. The response is sent from remote SCP 22 to local SCP42. Local SCP 42 checks 88 to ensure that a name was received byanalyzing the response and determining that the name is not blank. Ifthe name is not blank, SCP 42 determines 90 whether there are anyrestrictions on presenting the found name. If there are no restrictionson presentment, SCP 42 delivers 92 the telephone number andcorresponding name to the SSP 50 of the called party 52.

The present embodiment may be implemented with software and logic asknown to those of skill in the art. For example, the present embodimentmay be written in a high level programming language such as Pascal, C orC++. The present embodiment may be written and compiled to run on astandard UNIX operating system microcomputer implemented within the SCP.

It is to be understood that foregoing detailed description is exemplaryand explanatory and is intended to provide further explanation of theinvention as claimed. Numerous modifications and variations arepossible. The invention, together with the further objects and intendedadvantages, will best be understood by reference to the followingdetailed description, taken in conjunction with the accompanyingdrawings.

1. A method of identifying a name that corresponds to a telephonenumber, the method comprising: formulating a query that requests a namethat corresponds to a telephone number in response to a received query;and transmitting the formulated query to a remote location afterdetermining the remote location is able to process the formulated query.2. The method of claim 1, wherein the received query includes thetelephone number.
 3. The method of claim 1, wherein the second queryincludes the telephone number.
 4. The method of claim 1, wherein theremote location comprises a service control point.
 5. The method ofclaim 1, wherein formulating a query comprises formulating a query inaccordance with a TR1188 signaling protocol.
 6. The method of claim 1,wherein transmitting the formulated query comprises transmitting theformulated query in accordance with a TR1188 signaling protocol.
 7. Themethod of claim 1, further comprising identifying the name thatcorresponds to the telephone number.
 8. The method of claim 1, furthercomprising transmitting the name that corresponds to the telephonenumber from the remote location.
 9. The method of claim 1, furthercomprising transmitting the name that corresponds to the telephonenumber to a called party.
 10. A system for identifying a namecorresponding to a telephone number, the system comprising: means forformulating a query that requests a name that corresponds to a telephonenumber in response to a received query; and means for transmitting theformulated query to a remote location after determining the remotelocation is able to process the formulated query.
 11. The system ofclaim 10, further comprising means for determining whether the remotelocation is able to process the formulated query.
 12. The system ofclaim 10, further comprising means for transmitting the name thatcorresponds to the telephone number to a called party.
 13. The system ofclaim 10, wherein the remote location comprises a service control point.14. A computer usable medium comprising a set of instructions foridentifying a name that corresponds to a telephone number, the set ofinstructions to direct a processor to perform acts of: formulating aquery that requests a name that corresponds to a telephone number inresponse to a received query; and transmitting the formulated query to aremote location after determining the remote location is able to processthe formulated query.
 15. The computer usable medium of claim 14,further comprising a set of instructions to direct a processor toperform acts of: determining whether the remote location is able toprocess the formulated query.
 16. The computer usable medium of claim14, further comprising a set of instructions to direct a processor toperform acts of: transmitting the name that corresponds to the telephonenumber to another location.
 17. The computer usable medium of claim 14,further comprising a set of instructions to direct a processor toperform acts of: transmitting the name that corresponds to the telephonenumber to a called party.