Selective facsimile denial

ABSTRACT

A method includes determining whether an incoming call to a first destination is authorized at a switch of a communication network. The method includes, in response to determining that the incoming call is not authorized, determining whether the incoming call is a facsimile call, routing the incoming call to the first destination when the incoming call is not the facsimile call, and routing the incoming call to the first destination when the incoming call is the facsimile call.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 12/636,115, filed Dec. 11, 2009, which is a continuation ofU.S. patent application Ser. No. 11/274,364, filed Nov. 15, 2005 (nowU.S. Pat. No. 7,653,184), which is a continuation of U.S. patentapplication Ser. No. 10/967,100, filed Oct. 15, 2004 (now U.S. Pat. No.7,006,612). Each of the above-referenced applications is incorporated byreference herein in its entirety.

FIELD OF THE DISCLOSURE

The present disclosure relates to systems for handling incomingfacsimile transmissions.

BACKGROUND

Junk faxes and other unwanted advertisements are often transmitted tobusiness facsimile machines. This results in wasted paper and toner andfrustration for the business owner and its employees.

Many residential owners of facsimile machines use their telephone linefor facsimile purposes only on an occasional, outgoing basis. Thesefacsimile machine owners do not wish to have their phone ring duringinconvenient hours due to unwanted, incoming faxes, but still wish toreceive incoming voice calls.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is pointed out with particularity in the appendedclaims. However, other features are described in the following detaileddescription in conjunction with the accompanying drawings in which:

FIG. 1 is a flow chart of an embodiment of a method of blocking unwantedfaxes in a telephone network;

FIG. 2 is a block diagram of an embodiment of a system for blockingunwanted faxes in the telephone network; and

FIG. 3 is a flow chart of another embodiment of a method of blockingunwanted faxes in a telephone network.

DETAILED DESCRIPTION

In a particular embodiment, a system includes a switch and a controlmodule coupled to the switch. The control module is configured todetermine whether an incoming telephone call to a telephone line is afacsimile call or a voice call. The control module is also configured todetermine, based on a telephone number associated with the incomingtelephone call, whether facsimile calls are authorized to be routed tothe telephone line. When facsimile calls are authorized, the controlmodule is further configured to instruct the switch to route theincoming telephone call to the telephone line. When facsimile calls arenot authorized and the incoming call is a voice call, the control moduleis configured to instruct the switch to route the incoming telephonecall to the telephone line. The control module is also configured toinstruct the switch to deny routing of the incoming telephone call tothe telephone line when facsimile calls are not authorized and theincoming call is a facsimile call.

In another particular embodiment, a method also includes detecting anincoming call at switch of a telephone network. The method includesdetermining whether facsimile calls are authorized to be routed to adestination. The method further includes routing the incoming call tothe destination when facsimile calls are authorized. The method includesdetermining whether the incoming call includes a facsimile tone whenfacsimile calls are not authorized. The method also includes routing theincoming call to the destination when the incoming call does not includethe facsimile tone. The method further includes denying routing of theincoming call to the destination and routing the incoming call to asecond destination when the incoming call includes the facsimile tone.

In another particular embodiment, a computer-readable storage mediumincludes instructions, that when executed by a computer, cause thecomputer to detect an incoming call and determine whether facsimilecalls are authorized to be routed to a destination. The instructionsalso cause the computer to route the incoming call to the destinationwhen facsimile calls are authorized. When facsimile calls are notauthorized, the instructions further cause the computer to selectivelyroute the incoming call to the destination based on whether the incomingcall includes a facsimile tone.

Embodiments of the present disclosure block or re-route an unwanted,incoming facsimile transmission call by sensing for a presence of a faxtransmission tone within an element of a public telephone network beforethe telephone network completes the call to a called party. Asubscriber-updateable list, table or other data structure that containsauthorized calling party identifiers is stored and accessed within thetelephone network. The authorized calling party identifiers indicatetelephone numbers from which calls are authorized to be completed to thesubscriber's location for purposes of fax transmission. The telephonenetwork uses the list to determine whether or not to complete anincoming call as dialed, and whether or not to further analyze the callfor the presence of a fax transmission tone, such as a CNG tone. If thetelephone network detects the fax tone, the telephone network eitherblocks or re-routes the incoming call. The telephone network can use anAdvanced Intelligent Network (AIN) architecture or alternativearchitecture to control the handling of calls once the presence orabsence of the fax tone is determined.

Embodiments of the present disclosure are described with reference toFIG. 1, which is a flow chart of an embodiment of a method of blockingunwanted faxes in a telephone network 8, and FIG. 2, which is a blockdiagram of an embodiment of a system for blocking unwanted faxes in thetelephone network 8. The telephone network 8 may be part of a publicswitched telephone network, a Voice over Internet Protocol (VoIP)telephone network, or a non-traditional phone network.

As indicated by block 10, the method comprises storing, as data 12 in adatabase 14 of a service control point (SCP) 16, one or more callingparty identifiers from which fax transmission calls are authorized to becompleted to a telephone line 22 at a subscriber's location 20.Optionally, the database 14 also stores data 23 indicating one or moreother calling party identifiers from which fax transmission calls areexplicitly unauthorized to be completed to the telephone line 22 at thesubscriber's location 20.

The calling party identifiers may comprise ten-digit calling numbersand/or portions of ten-digit calling numbers. An example of a portion ofa ten-digit calling number is a six-digit NPA-NXX number, where NPA is athree-digit area code and NXX are three digits identifying a specifictelephone central office in the area code. When included in theauthorized data 12, the NPA-NXX data authorizes completion of faxtransmission calls from any telephone number having the NPA-NXX. Use ofNPA-NXX combinations in the data 12 is useful where the subscriber has alarge number of potential callers within the same NPA-NXX. For example,the subscriber may want to receive faxes from a firm whose headquartersis at a single location and has a large number of potential callerswithin the same NPA-NXX. In this case, the subscriber would not need tostore all of the headquarters' ten-digit numbers in the data 12 of thedatabase 14.

For purposes of illustration and example, consider the data 12indicating that the subscriber has authorized reception of faxtransmission calls from a first party 24 whose ten-digit number is512-555-0121, a second party whose ten-digit number is 512-555-0145, andany party whose NPA-NXX is 847-555. Those having ordinary skill willrecognize that the data 12 generally can include any number ofauthorized calling party identifiers.

Optionally, as indicated by block 26, the method further comprisesstoring, as data 28 in the database 14 of the SCP 16, days and/or timesat which facsimile reception using the telephone line 22 is acceptableor unacceptable to the subscriber. The times may indicate times of day,and the days may indicate specific dates and/or specific days of theweek, on which facsimile reception is acceptable or unacceptable. Thedata 28 is used to provide an additional restriction mechanism forincoming faxes. For example, the subscriber may wish to block allincoming faxes received after business hours.

Subscriber data 30, which includes the data 12, 23 and 28, can beupdated by the subscriber using a Web interface 32 and/or an interactivevoice response (IVR) system 34. The subscriber can view a visual displayof the calling party identifiers from the data 12 or 23 using the Webinterface 32, or can hear an audible display of the calling partyidentifiers from the data 12 or 23 using the IVR system 34. Thesubscriber can add or remove calling party identifiers (whether they befull ten-digit numbers or NPA-NXX numbers) from the data 12 or 23 byissuing commands using the Web interface 32 and/or the IVR system 34.Further, the subscriber can add or remove days/times to the data 28, ormay choose to turn the fax blocking feature on or off by issuingcommands using the Web interface 32 and/or the IVR system 34. The IVRsystem 34 may be receptive to both voice commands and DTMF commands.

Optionally, a telephone network element may automatically add to thedata 23 a list of one or more unauthorized calling numbers whose callsto the telephone line 22 have been previously blocked by the subscriber.

As indicated by block 36, a telephone network switch such as a serviceswitching point (SSP) 40 detects an incoming call from a calling partythat is intended for the telephone line 22 of the subscriber. Based ondetecting the incoming call, the SSP 40 hits a termination attemptadvanced intelligent network (AIN) trigger, and sends a query message tothe SCP 16 based on the AIN trigger.

As indicated by block 42, the SCP 16 receives the query message with aten-digit triggered number of the telephone line 22 as the key.

As indicated by block 44, the SCP 16 accesses the subscriber data 30 ofthe database 14 based on the key. The data 12 of the subscriber data 30is accessed to determine if the subscriber has authorized reception ofincoming faxes from the calling number of the calling party. If the data12 indicates that the subscriber has authorized reception of incomingfaxes from the calling party, then optionally the SCP accesses the data28 of the database to determine if fax reception is acceptable at thecurrent time and/or day, as indicated by block 45.

If the calling party is authorized based on the data 12 and the time/dayis acceptable based on the data 28, then the SCP 16 sends a responsemessage to the SSP 40 to instruct the SSP 40 to complete the call to thetelephone line 22, as indicated by block 46. As indicated by block 47,the call is completed to the telephone line 22 as dialed. If the callincludes an incoming fax transmission, the subscriber can receive thefax transmission using a fax machine 48 coupled to the telephone line22. If the call is a voice call, the subscriber can answer the voicecall and vocally communicate with the calling party using a telephone 49coupled to the telephone line 22.

If the calling party is authorized based on the data 12 but the time/dayis unacceptable based on the data 28, or if the calling party isunauthorized based on the data 12 or 23, then an act of playing anannouncement to the caller is performed as indicated by block 50. Theannouncement may comprise an audible phrase such as “please hold whilewe attempt to complete your call” or a recorded ring. Use of therecorded ring makes the call screening process inconspicuous, or ideallyindiscernible, to human callers. Regardless of its audible content, theannouncement may be a four-second or other duration AIN switchannouncement.

As indicated by block 52, a telephone network element senses for apresence of a fax transmission tone from the calling party over theduration of the announcement and before the call has been routed to thetelephone line 22. The telephone network element may comprise aplain-old telephone system (POTS) network element or a Voice overInternet Protocol (VoIP) network element, for example.

Sending facsimile machines generate an on-off cadence of faxtransmission tones until a receiving facsimile machine generates aresponse thereto. Thus, the act indicated by block 52 is used by thetelephone network to determine whether or not the calling party issending a fax in the call.

In one embodiment, the fax transmission tone comprises a CNG tone andthe response comprises a CED (CallEd station iDentification) tone. Anideal CNG tone comprises a 1100-Hz signal for 0.5 seconds followed by nosignal for 3 seconds. According to ITU T.30, an acceptable CNG tone iswithin a frequency tolerance of ±38 Hz and a timing tolerance of ±15% ofthe aforementioned ideal CNG tone.

The telephone network comprises a CNG detector 54 to detect if anacceptable CNG tone has been generated by the calling party during theannouncement. The CNG detector 54 waits to collect one digit during theannouncement. If a digit has not been collected by the end of theannouncement (e.g. by the end of about four seconds) or if a collecteddigit does not equal 1100Hz±38 Hz, it is assumed that the call is absentan acceptable CNG tone. If the collected digit is within 1100Hz±38 Hz,it is assumed that the call has an acceptable CNG tone.

If a fax transmission tone from the calling party is present in the call(e.g. the CNG detector 54 detects an acceptable CNG tone), then the callis considered to be a fax call either from an unauthorized calling partybased on the data 12 or 23, or at an unacceptable day/time based on thedata 28. To block these fax calls from being completed to the telephoneline 22, flow of the method is directed to block 56 which indicates anact of playing a denial announcement to the calling party, and block 60which indicates an act of terminating the call. As an alternative toblocking and terminating these unwanted fax calls, an act of re-routingthese fax calls to a different fax machine location having a differenttelephone line may be performed. Either way, the SSP 40 is instructed bythe SCP 16 to deny completion of the call to the telephone line 22.Optionally, as indicated by block 61, the calling party identifier (e.g.the telephone number) of the calling party is added to a list ofunauthorized calling party identifiers in the data 23. As a result, thedatabase 14 includes a calling party identifier of the calling party toindicate that subsequent facsimile transmission calls from the callingparty are unauthorized to be completed to the telephone line 22 of thesubscriber.

If the call is absent a fax transmission tone from the calling party(e.g. the CNG detector 54 does not detect an acceptable CNG tone), thenthe call is considered not to be a fax call but rather a voice call.Since non-fax calls are allowed to be completed, flow of the method isdirected to block 46 which comprises the SCP 16 sending a responsemessage to the SSP 40 to instruct the SSP 40 to complete the call to thetelephone line 22. This allows a son/daughter to call his/her parents inthe middle of the night even when the telephone network is screening faxcalls intended for the parents' telephone line, for example.

The above acts can be repeated for additional incoming calls intendedfor the telephone line 22.

For purposes of illustration and example, consider how theherein-described method and system process the following threehypothetical calls.

Call 1

The caller 24, whose telephone number is 512-555-0121, places a call tothe telephone line 22. Since the telephone number of the caller 24 is anauthorized number in a table in the data 12, and the call has beenplaced during acceptable hours as indicated by the data 28, thetelephone network completes the call as dialed. The subscriber mayanswer the call using either the fax machine 48 or the telephone 49.

Call 2

A caller 62, whose telephone number is 512-555-0120, places a call tothe telephone line 22. Since the telephone number of the caller 62 isnot in a table of authorized numbers in the data 12, the caller 62 hearsan audible announcement such as “please hold while we attempt tocomplete your call”. The call is analyzed, within the telephone network,for a CNG tone. If a CNG tone is present, the call is denied and anaudible termination announcement is played to the caller 62. If a CNGtone is not present, the telephone network completes the call as dialed.

Call 3

A caller 64, whose telephone number is 847-555-0130, places a call tothe telephone line 22. The NPA-NXX combination of 847-555 of the caller64 is in a table of authorized numbers in the data 12, however the callis placed after normal business hours as indicated by the data 28. Thecaller 64 hears an audible announcement such as “please hold while weattempt to complete your call”. The call is analyzed, within thetelephone network, for a CNG tone. If a CNG tone is present, the call isdenied and an audible termination announcement is played to the caller64 because fax calls are not accepted after normal business hours. If aCNG tone is not present, the telephone network completes the call asdialed.

The herein-disclosed method and system can be used to block and/orre-route incoming facsimile transmissions for multiple subscribers. Thedatabase 14 would include respective subscriber data for eachsubscriber, such as the subscriber data 30 for the example subscriberdescribed herein. Each subscriber would be able to access and modifyhis/her subscriber data using the Web interface 32 and/or the IVR 34.

FIG. 3 is a flow chart of another embodiment of a method of blockingunwanted faxes in a telephone network. This embodiment includes the sameacts described with reference to FIG. 1, but with an alternative flowtopology. Each act indicated by a primed reference numeral in FIG. 3corresponds to a respective act having the same, but non-primedreference numeral in FIG. 1.

The alternative flow topology can be summarized as follows. If thecalling party is authorized based on the data 12 or the time/day isacceptable based on the data 28, then the SCP 16 sends a responsemessage to the SSP 40 to instruct the SSP 40 to complete the call to thetelephone line 22, as indicated by block 46′. If the calling party isnot authorized based on the data 12 or 23 and the time/day isunacceptable based on the data 28, then acts of playing an announcementto the caller and sensing for the presence of a CNG tone are performedas indicated by blocks 50′ and 52′.

The acts performed by each of the herein-disclosed components can bedirected by respective computer program code embodied in acomputer-readable form on a computer-readable medium. Each of theherein-disclosed components may comprise a respective computer processorresponsive to the computer program code to perform the acts.

It will be apparent to those skilled in the art that the disclosedembodiments may be modified in numerous ways and may assume manyembodiments other than the particular forms specifically set out anddescribed herein.

The above disclosed subject matter is to be considered illustrative, andnot restrictive, and the appended claims are intended to cover all suchmodifications, enhancements, and other embodiments which fall within thescope of the present disclosure. Thus, to the maximum extent allowed bylaw, the scope of the present disclosure is to be determined by thebroadest permissible interpretation of the following claims and theirequivalents, and shall not be restricted or limited by the foregoingdetailed description.

What is claimed is:
 1. A method comprising: determining whether anincoming call to a first destination is authorized at a switch of acommunication network; and in response to determining that the incomingcall is not authorized: determining whether the incoming call is afacsimile call; routing the incoming call to the first destination whenthe incoming call is not the facsimile call; and denying routing of theincoming call to the first destination when the incoming call is thefacsimile call.
 2. The method of claim 1, further comprising, inresponse to determining that the incoming call is authorized, routingthe incoming call to the destination.
 3. The method of claim 1, furthercomprising routing the incoming call to a second destination when theincoming call is the facsimile call.
 4. The method of claim 1, whereindetermining whether the incoming call to the first destination isauthorized is based on a telephone number of a source of the incomingcall.
 5. The method of claim 4, further comprising determining whetherthe telephone number is included in a list of authorized telephonenumbers.
 6. The method of claim 1, wherein determining whether theincoming call to the first destination is authorized is based on a dateof the incoming call, a time of the incoming call, or a combinationthereof.
 7. The method of claim 6, further comprising determiningwhether the time of the incoming call is within an authorized timerange.
 8. The method of claim 1, further comprising adding a telephonenumber of a source of the incoming call to a list of unauthorizedtelephone numbers after determining that the incoming call is thefacsimile call.
 9. The method of claim 1, further comprising providingan audible message to a source of the incoming call after determining todeny routing of the incoming call to the first destination.
 10. Themethod of claim 1, wherein determining whether the incoming call is thefacsimile call comprises determining whether the incoming call includesa facsimile tone.
 11. The method of claim 10, wherein the facsimile tonecomprises a CNG tone.
 12. The method of claim 11, wherein the CNG toneincludes a tone loop comprising a half-second 1100 hertz signal and athree-second silence.
 13. A system comprising: a processor configuredto: determine whether an incoming call to a destination is authorized;in response to a determination that the incoming call is not authorized:determine whether the incoming call is a facsimile call; instruct aswitch coupled to the processor to route the incoming call to thedestination when the incoming call is not the facsimile call; andinstruct the switch to deny routing of the incoming call to thedestination when the incoming call is the facsimile call; and a memorycoupled to the processor.
 14. The system of claim 13, wherein the memoryis configured to store restriction information including a first list ofauthorized telephone numbers, a second list of unauthorized telephonenumbers, an authorized time range, an authorized date range, or acombination thereof.
 15. The system of claim 14, wherein the restrictioninformation is received via a web interface.
 16. The system of claim 14,wherein the restriction information is received via an interactive voiceresponse interface.
 17. The system of claim 13, wherein a servicecontrol point includes the processor, and wherein the service controlpoint and the switch are elements of a Voice over Internet Protocolnetwork.
 18. A computer readable storage device including instructionsthat, when executed by a processor, cause the processor to performoperations including: determining whether an incoming call to adestination is authorized at a switch of a communication network; and inresponse to determining that the incoming call is not authorized:determining whether the incoming call is a facsimile call; routing theincoming call to the destination when the incoming call is not thefacsimile call; and denying routing of the incoming call to thedestination when the incoming call is the facsimile call.
 19. Thecomputer readable storage device of claim 18, wherein determiningwhether the incoming call to the destination is authorized is based on atelephone number of a source of the incoming call, a date of theincoming call, a time of the incoming call, or a combination thereof.20. The computer readable storage device of claim 18, wherein theoperations further include providing an audible message to a source ofthe incoming call while determining whether the incoming call is thefacsimile call.