Network-based subscriber calling restrictions

ABSTRACT

Methods and systems are provided that enable communication with a wireless device. In one such method, a communication event that is intended for a wireless device is detected and a user account associated with the wireless device is identified. Information associated with the user account is identified and a determination is made as to whether the information permits the communication event to occur. If the determination is that the information does not permit the communication event to occur, the communication event is terminated. If the determination is that the information permits the communication event to occur, the communication event is enabled.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.11/489,410, now U.S. Pat. No. 7,711,344, filed Jul. 19, 2006, thecontent of which is incorporated by reference herein in its entirety.

BACKGROUND

In some applications involving wireless devices such as a cellulartelephone, it is desirable to restrict the calls—whether the call isvoice or data—that can be placed or received. For example, a Firefly™cellular telephone is designed to be used by children and has limitedfunctionality for a child to place or receive calls. Typically, a parentadds a number of a party the child is permitted to call to an internalphone book. The phone usually has one or more buttons that allow thechild to place a call to the stored number, but does not provide a meansfor dialing numbers that are not stored in the phone book. In addition,the parent may select an option whereby the phone will reject anincoming call that is not from one of the stored numbers. Thus, thechild can be restricted to placing calls to and receiving calls fromparties who are “approved” by the parent or emergency services (e.g.,911).

Conventionally, the phone book and call restrictions are stored in andmaintained by the hardware in the device. Thus, the restrictions arespecific to the device itself. If the device's Subscriber IdentityModule (SIM) card, which contains the user account information necessaryto activate the device, is removed and placed into another compatibledevice, the new device will not be restricted to the numbers in thephone book. Thus, technically sophisticated children may be able tobypass their parent's restrictions by placing the SIM card into anotherdevice.

A device that has the functionality of the SIM card built-in (i.e.,manufactured as part of the hardware of the device and thereforeincapable of being removed without causing damage to the device) couldaddress this issue. Unfortunately, manufacturing customized devices thathave integrated SIM functionality could be more expensive thanmanufacturing a device that uses a standard SIM card. It may also bedesirable to allow the user to move the SIM card from one device toanother for interoperability or upgrade purposes. In addition,manufacturing a SIM card that could itself store the restrictions wouldmost likely be significantly more expensive than using a standard SIMcard.

Other situations also may involve restricted calling. For example, acompany that issues telephones to its employees for certain tasks maywish to restrict calls to a certain geographic area, work-relatedparties, emergency services, etc. In addition, the company may wish tolimit data transfers—such as text messages, audio or video information,or other types of data—to approved parties.

The Global System for Mobile communication standard (GSM) provides(using a standard called “Fixed Dialing Number” (FDN)) for a devicefeature that enables restrictions to be placed on outgoing calls. Therestrictions may be placed using a “wildcard” setting, such as404-236-****, where a call may be placed to any number that begins withthe 404 area code and 236 prefix. The restrictions, however, are limitedto a GSM-compliant device that has a SIM card (or Universal IntegratedCircuit Card) that supports FDNs and has the feature turned on. Inaddition, the restrictions are only for outgoing calls; incoming callsare unaffected.

As noted above, device-based restrictions have significant drawbacks inthat a sophisticated user can circumvent the restrictions by removingthe SIM card and using another device. A network-based restriction wouldeliminate this problem by associating the restrictions with a user'saccount, which will always be effective regardless of which device theuser is using. A conventional mechanism for establishing a network-basedcalling restriction involves international dialing. Typically, acellular service provider has a default setting that does not allow acellular telephone to dial international numbers. If a user wishes tomake such calls, the user must contact a customer service representativeof the cellular service provider and request the change. Because theinternational calling restriction is network-based it is independent ofthe device being used. For example, if a user removes the SIM card fromhis or her phone and inserts it into another phone, the restrictionswill still be in place because the network will still access the user'saccount to check for any calling restrictions. Requiring the user tocontact a customer service representative, however, is very inconvenientfor most users, especially if the user wishes to create a list ofapproved numbers for incoming and/or outgoing calls. In such a case, theuser would be forced to have a lengthy conversation with the customerservice representative to enter all of the approved numbers, and wouldhave to call in again every time the user wished to revise the numbers.

Thus, it can be seen a need exists for a user to have the ability tomore easily place restrictions on incoming and/or outgoing calls in anetwork-based and device-independent manner. The present inventionaddresses this need.

SUMMARY

In view of the above shortcomings and drawbacks, methods and systems areprovided that enable communication with a wireless device. In one suchmethod, a request to initiate a communication event from a firstwireless device is detected and a first user account associated with thefirst wireless device is identified. First information associated withthe first user account is accessed, and a determination is made as towhether the first information permits the communication event to occur.If the determination is that the information does not permit thecommunication event, the request to initiate the communication event isdenied. If the determination is that the information permits thecommunication event, the communication event is permitted to occur.

In another such method, a communication event that is intended for awireless device is detected and a user account associated with thewireless device is identified. Information associated with the useraccount is identified and a determination is made as to whether theinformation permits the communication event to occur. If thedetermination is that the information does not permit the communicationevent to occur, the communication event is terminated. If thedetermination is that the information permits the communication event tooccur, the communication event is enabled.

In one such system, a database that stores user account data isprovided. A core network component that is in operative communicationwith the database detects a communication event that is intended to orinitiated by a user. The core network component also accesses the useraccount data and determines whether a communication restriction isassociated with the user account. If a restriction is associated withthe user account, the core network component determines whether thecommunication event is permissible according to the user account data.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing Summary, as well as the following detailed description, isbetter understood when read in conjunction with the appended drawings.For the purpose of illustrating various embodiments, there is shown inthe drawings example embodiments; however, embodiments are not limitedto the specific methods and instrumentalities disclosed. In thedrawings:

FIG. 1 is a diagram illustrating a high-level overview of a GeneralPacket Radio Service architecture in which aspects of the invention maybe implemented;

FIG. 2A is a flowchart illustrating an example method of placing,modifying or deleting a restriction according to an embodiment; and

FIG. 2B is a flowchart illustrating an example method of call processingaccording to an embodiment.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The subject matter of the various embodiments is described withspecificity to meet statutory requirements. However, the descriptionitself is not intended to limit the scope of this patent. Rather, theinventors have contemplated that the claimed subject matter might alsobe embodied in other ways, to include different steps or elementssimilar to the ones described in this document, in conjunction withother present or future technologies. Moreover, although the term “step”may be used herein to connote different aspects of methods employed, theterm should not be interpreted as implying any particular order among orbetween various steps herein disclosed unless and except when the orderof individual steps is explicitly described.

For purposes of explanation, embodiments of the invention are describedherein in connection with the Global System for Mobile Communication(GSM). The references to GSM are not exclusive, however, as it should beappreciated that embodiments may be implemented in connection with anytype of wireless access system such as, for example, CDMA or the like.

GSM is one of the most widely-used wireless access systems in today'sfast growing communication systems. GSM provides circuit-switched dataservices to subscribers, such as mobile telephone or computer users.General Packet Radio Service (GPRS), which is an extension to GSMtechnology, introduces packet switching to GSM networks. GPRS uses apacket-based wireless communication technology to transfer high and lowspeed data and signaling in an efficient manner. GPRS optimizes the useof network and radio resources, thus enabling the cost effective andefficient use of GSM network resources for packet mode applications.

FIG. 1 illustrates a segmental view of the architecture of a typicalGPRS network in that the network is segmented into four groups: users300, radio access network 310, core network 320, and interconnectnetwork 330. Users 300 may comprise any number of end users; in FIG. 2only mobile subscribers 305 and 305′ are shown. Radio access network 310comprises a plurality of base station subsystems such as BSS 312 and312′, which include BTS 314 and 314′ and BSC 316 and 316′, respectively.Core network 320 comprises a host of various network elements, asillustrated in FIG. 2 it comprises Mobile Switching Center (“MSC”) 321,Service Control Point (“SCP”) 322 and gateway MSC 323, although othercomponents may also be present. Interconnect network 330 comprises ahost of various networks and other network elements, as illustrated inFIG. 2 it comprises Public Switched Telephone Network (“PSTN”) 332,Fixed-End System (“FES”) or Internet 334, firewall 338 and CorporateNetwork 339.

As will be discussed below, client 340 (which may be any type ofcomputing device such as, for example, a user's PC) may communicate withone or more components of core network 320 by way of Internet 334.Alternately, server 341 may communicate with client 340 on behalf ofcore network 320 (such as when a third party hosts a web site on behalfof core network 320, for example).

A mobile switching center can be connected to a large number of basestation controllers. At MSC 321, depending on the type of traffic, thetraffic may be separated in that voice may be sent to Public SwitchedTelephone Network (“PSTN”) 332 through Gateway MSC (“GMSC”) 323, anddata may be sent to SGSN 326, which then sends the data traffic to GGSN328 for further forwarding. When MSC 321 receives call traffic, forexample, from BSC 316, it sends a query to a database hosted by SCP 322.SCP 322 processes the request and issues a response to MSC 321 so thatit may continue call processing as appropriate.

Home Location Register (“HLR”) 324 is the central database for all usersto register to the GPRS network. It stores static information about thesubscribers such as the International Mobile Subscriber Identity(“IMSI”), subscribed services and a key for authenticating thesubscriber. HLR 324 also stores dynamic subscriber information such asthe current location of the mobile subscriber. Associated with HLR 324is AuC 325, which may include a database that contains the algorithmsfor authenticating subscribers and the necessary keys for encryption tosafeguard the user input for authentication.

As discussed above, a subscriber may wish to place incoming and/oroutgoing call restrictions on the subscriber's account. For ease ofexplanation, the discussion herein refers to “call” restrictions. Itwill be appreciated that the use of the word “call” is merely ashorthand reference to any type of communication that may be performedusing a wireless device. The wireless device may be in communicationwith another wireless device, with a wired “POTS” telephone, or anyother type of device. A non-limiting list of example “calls” mayinclude, for example: a telephone conversation, text message, videomessage, “push to talk” message, voice message, picture message,Multimedia Messaging Service (MMS) message, Internet browsing session,instant messaging message, and the like. Thus, when a reference to a“call” is made herein, the reference refers to any type ofcommunication.

Call restrictions may involve, for example, phone numbers of parties whoare either expressly permitted to or forbidden from calling or beingcalled by the specified subscriber's account. It will be appreciatedthat the subscriber may place a restriction on his/her own account, orone or more phone lines associated with a single or multiple accounts,for example. Thus, a parent may place a restriction on a child's phoneline, an employer may place a restriction on an employee's phone line,etc.

Phone number-specific restrictions are not the only type of restrictioncontemplated by an embodiment. Rather, any type of restriction may beused. For example, a geographic restriction may be specified using anarea code, an area code plus a prefix, or the like. Alternately, ageographic restriction may involve a specified geographic region inwhich a call may (or may not) originate (or terminate). Restrictions mayalso be time-based, and such time-based restrictions may be used inconnection with other restrictions, or as a stand-alone restriction. Forexample, an employee's account may involve a restriction that allows theemployee to only make or receive calls during business hours. As afurther non-limiting example, a child's restriction may only permitcalls to or from approved friends outside of school hours. Thus, it willbe appreciated that any type or combination of restrictions arecontemplated by an embodiment.

In an embodiment, caller restrictions may be stored in HLR 324 or in anyother core network 320 component such as, for example, a VisitorLocation Register (now shown in FIG. 1), AuC 325, a component that isaccessible to a core network 320 component, or the like. For example, asubscriber may access the caller restrictions by way of a web site orother type of electronic interface. The web site may be hosted by server341, or a component of core network 320. The subscriber may access theweb site using a personal computer, PDA or the like, as represented byclient 340. Alternately, or in addition to client 340, the subscribermay access the website/electronic interface using mobile subscriberequipment 305 or 305′, by way of radio access network 310, core network320 and/or interconnect network 330.

The caller restrictions may be stored as one or more additional fieldsin a subscriber's account information, or may be stored as a separatedata entity. Any data format may be used to store caller restrictions,and the format of storage, as well as the mechanisms by which suchrestrictions are created, stored and accessed may be conventional.

A subscriber may access, for example, a web site to create, modify ordelete caller restrictions. In one embodiment, the management of suchrestrictions may be the sole purpose of the web site. Alternately, theweb site may have other purposes, such as, for example, accountinformation (billing, usage, etc.). When a subscriber adds, modifies ordeletes a restriction, the change may be reflected immediately, or aftera delay, which may be due to network latency, or due to subscriberpreference (i.e., the subscriber may specify a date and/or time at whichthe change is to become effective).

Now that examples of caller restrictions—as well as examples of themechanisms by which such restrictions may be created, stored andaccessed—have been discussed, example non-limiting methods of placing acaller restriction, as well as processing a call is described. Suchmethods may, in one embodiment, performed by a computer that reads andexecutes computer-readable instructions that are stored on acomputer-readable medium (e.g., RAM, CD-ROM, encoded signal, etc.). Insuch an embodiment, the computer-readable instructions may direct thecomputer to perform the steps recited below.

FIG. 2A is a flowchart representing an example method 200 of placing,modifying or deleting a caller restriction according to an embodiment.At step 201, a subscriber accesses his or her account. For example, inan embodiment where a web site is provided to the subscriber, thesubscriber may log in to his or her account using a personal computer,PDA, or the like. The log in mechanism may be conventional such as, forexample, a user name and password screen. The web site itself may be asubscriber's account web site where the subscriber can perform otheraccount-related functions such as viewing and paying bills, changingservices, etc. Alternately, the web site may be specifically for callerrestrictions. In another alternate embodiment, a subscriber may be ableto access caller restrictions by calling into an audio-based accountsystem. Such a system may use keypad inputs, voice recognition and/orthe like. Regardless of the mechanism used to enable a subscriber toaccess the caller restrictions, any type of authentication or securityprecautions may be used (such as, for example, the aforementioned username and password).

The caller restriction placed by the subscriber may be for any wirelessdevice associated with the subscriber. For example, if the subscriberhas more than one wireless device (e.g., the subscriber has afamily-oriented plan with a wireless device for each family member, abusiness plan with a wireless device for several employees, or thelike), the subscriber may place the restriction for each deviceindividually, globally (i.e., the subscriber may specify that therestriction applies to all wireless devices associated with theaccount), or according to some other criteria. For example, thesubscriber may specify that his or her children's wireless devices willhave the caller restrictions, but his or her spouse's device will not.Likewise, a businessperson subscriber may specify that a certain classof employees will have the caller restriction, but that another class(e.g., executives, managers and the like) will not.

At step 203, an update to a subscriber's caller restrictions (i.e., thecreation, modification or deletion of one or more caller restrictions,etc.) is saved and associated with the subscriber's account informationon a wireless network. As discussed above, the caller restriction may bestored along with other subscriber account information, or may be storedseparately. Any type of data storage mechanism may be used in connectionwith step 203, and such mechanism may be conventional.

At step 205, the caller restriction is applied to a call made to or froma wireless device with which a caller restriction is associated. Variousactions that may take place in connection with step 205 is now discussedin connection with method 250 of FIG. 2B.

FIG. 2B is a flowchart illustrating an example method of call processingaccording to an embodiment. It will be appreciated that method 250 may,in one embodiment, take place in connection with step 205 of FIG. 2A. Atstep 251, a call that is placed (i.e., a request to initiate acommunication event) either to or from a subscriber is detected by oneor more components of a servicing network. In one embodiment, such anetwork may be as was discussed above in connection with FIG. 1,although it should be appreciated that any type of wirelesscommunication network may be used in connection with an embodiment.

At step 253, a determination is made by one or more components of thenetwork as to whether a calling restriction is associated with thesubscriber's (i.e., the calling and/or the called party) account. Forexample, in one embodiment, an MSC may access a caller's accountinformation, which may be stored in a HLR, VLR or the like, to determinewhether any caller restrictions are present. If the result of thedetermination of step 253 is that a restriction is not associated withthe subscriber's account, then at step 255 the call is approved. It willbe appreciated that if the determination of step 253 was with respect toa calling party, an additional determination may need to take place withrespect to the called party. Thus, “approval” of the call may eitherinvolve the first step of verifying the caller's restriction status,pending the verification of the called party's status, or may involvecompleting the call (e.g., if both parties' restriction statuses havebeen checked and the call is permissible, or if one or both parties donot have restrictions, or the like).

If, however, the result of the determination of step 253 is that arestriction is associated with the subscriber's account, then at step257 the restrictions associated with the account are accessed. At step259, a determination is made as to whether the restrictions associatedwith the subscriber's account permit the call connection to be made. Aswill be appreciated, if method 250 is being performed on behalf of acalling party, the determination of step 259 may be whether therestriction permits the outgoing call to be placed. Likewise, if method250 is being performed on behalf of a called party, the determination ofstep 259 may be whether the restriction permits the incoming call to beaccepted. If the determination of step 259 is that the call is permittedaccording to the restriction(s), then at step 255 the call is approved,as was discussed above.

If, however, the determination of step 259 is that the call cannot becompleted, then at step 261 the call is terminated (i.e., the request toinitiate a communication event is denied). As part of step 261, thecalling party may be notified that the call cannot be completed. Areason may or may not be given, depending on any number of factors. Forexample, a subscriber may or may not want a calling party to know thatthey have not authorized their calls to be connected. In one embodiment,a called party may be notified that a call has been blocked. Inembodiments where the call is a text message, a return text message maybe sent explaining that the subscriber is not available or permitted toreceive messages, for example.

While the various embodiments have been described in connection with thepreferred embodiments of the various figures, it is to be understoodthat other similar embodiments may be used or modifications andadditions may be made to the described embodiment for performing thesame function of the various embodiments without deviating therefrom.Therefore, the embodiments should not be limited to any singleembodiment, but rather should be construed in breadth and scope inaccordance with the appended claims.

1. A method comprising: receiving a modification via an electronicinterface to modify a caller restriction for a first user account;detecting a request to initiate a communication event from a firstwireless device associated with the first user account, wherein therequest is directed to a second wireless device; determining whether themodification permits the communication event to occur; if thedetermination is that the modification does not permit the communicationevent, denying the request to initiate the communication event; and ifthe determination is that the modification permits the communicationevent: identifying a second user account associated with the secondwireless device; accessing information associated with the second useraccount; determining whether the information permits the communicationevent to occur; if the determination is that the information does notpermit the communication event to occur, denying the request to initiatethe communication event; and if the determination is that theinformation permits the communication event to occur, permitting thecommunication event to occur and enabling communication between thefirst wireless device and the second wireless device.
 2. The method ofclaim 1, wherein the communication event is at least one of a telephoneconversation, a text message, a video message, a push to talk message, avoice message, a picture message, a Multimedia Messaging Service (MMS)message, an Internet browsing session, and an instant messaging message.3. The method of claim 1, wherein the first wireless device is at leastone of a cellular telephone and a Personal Digital Assistant.
 4. Themethod of claim 1, wherein denying the request to initiate thecommunication event further comprises sending a message to the firstwireless device that the communication event will not occur.
 5. Themethod of claim 1, wherein the modification identifies at least one ofat least one second wireless device with which communication ispermitted, a time period in which communication is permitted, atelephone area code within which communication is permitted, and aprefix within which communication is permitted.
 6. The method of claim1, wherein the modification identifies at least one of: at least onesecond wireless device with which communication is not permitted, a timeperiod in which communication is not permitted, a telephone area codewithin which communication is not permitted, and a prefix within whichcommunication is not permitted.
 7. The method of claim 1, wherein theinformation identifies at least one of the second wireless device, anumber associated with the second wireless device, and a location of thesecond wireless device.
 8. The method of claim 1, wherein the electronicinterface is a web site.
 9. A method comprising: receiving amodification to modify first information associated with a subscriberaccount; detecting that a communication event is intended for a wirelessdevice from a calling party, wherein the wireless device is associatedwith the subscriber account; accessing the first information associatedwith the subscriber account; determining whether the modificationpermits the communication event; if the determination is that themodification does not permit the communication event, terminating thecommunication event; and if the determination is that the modificationpermits the communication event: accessing second information associatedwith the calling party; determining whether the second informationpermits the communication event to occur; if the determination is thatthe second information does not permit the communication event to occur,terminating the communication event; and if the determination is thatthe second information permits the communication event to occur,permitting the communication event to occur.
 10. The method of claim 9,wherein the communication event is at least one of a telephoneconversation, a text message, a video message, a push to talk message, avoice message, a picture message, a Multimedia Messaging Service (MMS)message, an Internet browsing session, and an instant messaging message.11. The method of claim 9, wherein the wireless device is at least oneof a cellular telephone and a Personal Digital Assistant.
 12. The methodof claim 9, wherein the first information identifies at least one of aparty with which communication is permitted, a telephone area codewithin which communication is permitted, a prefix within whichcommunication is permitted, a time within which communication ispermitted and a location within with communication is permitted.
 13. Themethod of claim 9, wherein the second information identifies at leastone of the calling party, a number associated with the calling party,and a location of the calling party.
 14. The method of claim 9, furthercomprising: providing an electronic interface with which a subscribermay access the subscriber account; and receiving, via the electronicinterface, input from the subscriber that specifies at least one of themodification, the first information, and the second information.
 15. Themethod of claim 14, wherein the user interface is a web site.
 16. Asystem for enabling communication with a wireless device, comprising: adatabase that stores subscriber account data associated with at leastone wireless device, wherein the at least one wireless device isassociated with at least one user of the wireless device; and a corenetwork component that is in operative communication with the database,wherein the core network component is configured to: receive amodification to modify the subscriber account data associated with theat least one wireless device; detect a communication event intended forthe at least one wireless device from a calling party; access thesubscriber account data; determine whether the modification permits thecommunication event; if the determination is that the modification doesnot permit the communication event, terminate the communication event;and if the determination is that the modification permits thecommunication event: access information associated with the callingparty; determine whether the information permits the communication eventto occur; if the determination is that the information does not permitthe communication event to occur, terminate the communication event; andif the determination is that the information permits the communicationevent to occur, permit the communication event.
 17. The system of claim16, wherein the information identifies at least one of the callingparty, a number associated with the calling party, and a location of thecalling party.
 18. The system of claim 16, wherein the database isstored in at least one of a Home Location Register and a VisitorLocation Register.
 19. The system of claim 16, wherein the core networkcomponent is at least one of a Mobile Switching Center, a Gateway MobileSwitching Center, an Authentication Center, a General Packet RadioService Support Node, and a Gateway General Packet Radio Service SupportNode.
 20. The system of claim 16, further comprising an electronicinterface that enables a subscriber to modify the subscriber accountdata, and wherein the electronic interface causes the user account datato be saved in the database.
 21. The system of claim 20, wherein theelectronic interface is a web site.