IE960329A1 - Apparatus for providing access to a call identification¹device for identifying the telephone number of a telephone¹line of a telephone network - Google Patents
Apparatus for providing access to a call identification¹device for identifying the telephone number of a telephone¹line of a telephone networkInfo
- Publication number
- IE960329A1 IE960329A1 IE960329A IE960329A IE960329A1 IE 960329 A1 IE960329 A1 IE 960329A1 IE 960329 A IE960329 A IE 960329A IE 960329 A IE960329 A IE 960329A IE 960329 A1 IE960329 A1 IE 960329A1
- Authority
- IE
- Ireland
- Prior art keywords
- telephone
- identification device
- line
- telephone number
- call
- Prior art date
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
Apparatus (1) for providing access from a telephone line (7) of a telephone network (2) to a call identification device (5) installed in a digital telephone exchange (6) of the telephoe network (2) for enabling the telephone number of any of the telephone lines (4) to be identified. The apparatus (1) is connected by a dedicated telephone line (18) to the telephone network (2) through a main distribution frame (9). The apparatus (1) is accessible by dialling the number of the dedicated telephone line (18) on any of the telephone lines (4) in the telephone network (2) using a DTMF telephone (8). Within the apparatus (1) a plurality of spoken phrases are stored which correspond to phrases which are to be relayed from the apparatus (1) during the course of identifying the telephone number to the telephone line (4). The numbers zero through one to nine are also stored in spoken form so that the telephone number of the telephone line can be transmitted to the DTMF telephone (8) on the line (4) by the apparatus (1) in spoken form. <Figs. 1 and 2>
Description
Apparatus for providing access to a call identification device for identifying the telephone number of a telephone line of a telephone network
TRUE COPY AS lodged ' 900329
The present invention relates to apparatus for providing access to a call identification device of a telephone exchange of a telephone network for identifying the telephone number of a call originating telephone line of the telephone network.
There are many occasions on which it is necessary to check the telephone number assigned to a cable pair of a telephone line in a telephone network. In general, this requires connecting a telephone to the cable pair and dialling the telephone number of an operator in the telephone exchange of the network. The telephone operator by accessing specific apparatus which is provided in the telephone exchange for the purpose of identifying the telephone number assigned to each telephone line obtains the number of the telephone line. This data is then relayed to the technician on the telephone line the number of which has been identified by the operator in the telephone exchange. This, it will be appreciated is a relatively costly, time consuming and cumbersome arrangement.
OPEN TO PUBLIC INSPECTION
UNDER
SECTION 28 AND RULE 23
JNL. No. OF
In the majority of digital telephone exchanges, call identification devices are provided for enabling the identity of the telephone number of a call originating telephone line to be determined. Such devices are, for example, malicious call identification devices, devices which permit exchange to exchange signalling, as well as many other such devices. Malicious call identification devices are provided for enabling the identification of the source of malicious calls to specific telephone numbers. In general, such devices are embedded in the digital telephone exchange, and provide output means for outputting relevant data, such as, the details of the source and destination of calls, and the times at which the calls are made. Other such call identification devices, in general, also comprise output means for outputting similar type data. In general, such data is either outputted on a visual display screen or printer. However, in all cases, it is necessary for an operator to be present to read the data from the screen or printer, which may be provided in the telephone exchange, or at a remote location. It is not possible to obtain the data from such devices without having a printer, visual display screen or the like.
There is therefore a need for apparatus for enabling the identification of the telephone number of a telephone line to be readily easily determined which overcomes these problems .
The present invention is directed towards providing such an apparatus .
According to the invention there is provided apparatus for providing access from any telephone line of a telephone network to a call identification device in a telephone exchange of the telephone network, the call identification device being of the type which is suitable for identifying the telephone number of a call originating telephone line, the apparatus comprising a first interface means for interfacing the apparatus with the call identification device, a second interface means for interfacing the apparatus with the telephone network through a dedicated telephone line, a first input/output means for outputting an instruction to the call identification device for instructing the call identification device to identify the telephone number of the telephone line which originated the call to the apparatus, and for receiving the telephone number of the telephone line from the call identification device, the first input/output means communicating with the first interface means, a second input/output means for receiving a call
800329 set up on the telephone line, the telephone number of which is to be identified and for outputting the telephone number of the telephone line, the second input/output means communicating with the second interface means, and a means for converting the telephone number of the telephone line being identified from digital form to spoken form for outputting the telephone number in spoken form through the second input/output means.
Preferably, the means for converting the telephone number of the line being identified from digital form into spoken form comprises a storing means for storing a plurality of phrases in speech form and a plurality of numbers in speech form, and a selecting means for selecting an appropriate phrase in speech form and appropriate numbers in speech form from the stored phrases and numbers in response to the telephone number received through the first input/output means from the call identification device for outputting through the second input/output means onto the dedicated telephone line.
In one aspect of the invention the storing means comprises a read only memory.
Advantageously, the phrases in speech form and the r
numbers in speech form are stored in the storing means in the form of a look-up table, the respective phrases and numbers being cross-referenced to digital signal outputs from the call identification device.
In one aspect of the invention the second interface means permits interfacing of the apparatus with a plurality of dedicated telephone lines for facilitating the handling of a plurality of calls requesting identification of the telephone number of respective telephone lines, simultaneously.
In another aspect of the invention the first interface means permits interfacing of the apparatus with the call identification device through a plurality of data ports or data links for facilitating the handling of a plurality of telephone number identification requests simultaneously.
The invention will be more clearly understood from the following description of a preferred embodiment thereof which is given by way of example only, with reference to the accompanying drawings, in which:
Fig. 1 is a block representation of a telephone network which comprises apparatus according to the invention for providing access to a malicious call f 969329 identification device for identifying the telephone number of a telephone line of the telephone network,
Fig. 2 is a block representation of the apparatus of Fig. 1, and
Fig. 3 is a flowchart of a computer programme for controlling the operation of the apparatus of Fig. 1.
Referring to the drawings there is illustrated apparatus according to the invention indicated generally by the reference numeral 1 for connecting into a telephone network 2. The apparatus 1 provides access from any telephone line 4 of the telephone network 2 to a call identification device of a telephone exchange which in this embodiment of the invention is a malicious call identification device 5 located in a telephone exchange 6 of the telephone network 2 for identifying the telephone number of the telephone line 4 on which a call is originated. The apparatus 1 outputs the telephone number in spoken form on the telephone line 4 for which a request for identification of the number has been made. For convenience and for ease of understanding the invention, the telephone line 4 of the telephone k 06032 θ network 2, the telephone number of which is to be identified is referred to as the originating telephone line 7. In order to access the apparatus 1 a DTMF telephone 8 is connected to the originating telephone line 7 for enabling two way communication between the DTMF telephone 8 and the apparatus 1. The apparatus 1 is such that it receives instructions in digital form from the telephone 8 which are keyed into the telephone 8 through the keypad of the telephone 8 by a technician or other individuals wishing to have identification of the telephone number of the originating telephone line 7. This is described in detail below.
The malicious call identification device 5 is a conventional device of the type which is associated with a digital telephone exchange which provides identification of the source of telephone calls to specific telephone numbers. The specific telephone numbers are entered into the malicious call identification device 5 by authorised personnel, and the malicious call identification device 5 identifies and logs the source of all calls identified by their telephone number which are made to the specific telephone numbers. The times at which the calls are made is also logged. This information may be outputted on a visual display screen or printer (neither of which are shown) at the request of authorised personnel.
•«0329
The malicious call identification device 5 is located within and associated with the digital telephone exchange 6, and may be embedded in the exchange 6. A main distribution frame 9 connects the telephone lines 4 of the telephone network 2 to the exchange 6. The connection of such telephone exchanges with a main distribution frame, and the association of such a malicious call identification device within a digital telephone exchange will be well known to those skilled in the art.
The apparatus 1 comprises a microprocessor 10 which under the control of a computer programme described below controls the apparatus 1. A first input/output means, namely, a first input/output port 11 communicates the apparatus 1 through a first interface means, namely, a communicating link 12 with a corresponding input/output port in the digital telephone exchange 6 which in turn communicates the apparatus 1 with the malicious call identification device 5 through a link 13. A second input/output means, namely, a second input/output port 16 of the apparatus 1 is interfaced with the telephone network 2 through a second interface means, namely, a dedicated telephone line 18 the number of which is dialled on the DTMF telephone 8 on the originating line 7. The telephone number in spoken form is applied to the
86032$ telephone line 18 by the apparatus 1 through the second input/output ports 16 as will be described below.
The apparatus 1 comprises a storing means, namely, a read only memory 19 for storing the computer programme which is described below for operating the apparatus 1. The read only memory 19 stores in look-up table form a plurality of phrases in speech form which are applied on the line 18 to the telephone 8 for enabling communication in spoken form between the apparatus 1 and the telephone 8. The numbers 0 through 1 to 9 also in speech form are stored in the read only memory 19 for facilitating the apparatus 1 to speak the number of the telephone line 7 for reception by the telephone 8. The phrase and numbers in speech form are stored in look-up tables against digital signals which correspond to data received by the apparatus 1 from the malicious call identification device 5 so that appropriate phrases and numbers can be selected and compiled in response to signals received by the apparatus 1 from the malicious call identification device 5. The relevant phrases and numbers are selected and compiled by the microprocessor 10 under the control of the computer programme and are delivered through a digital to analog converter 20 in electronic speech signal form through the second input/output port 16 onto the dedicated line 18. Typical phrases which are stored in
980 3 2 9 speech form in the look-up table in the read only memory 19 are as follows:
Vocal number identification - please wait, Please key your access code,
That is not a valid code,
That code is not authorised,
The number of your line is being checked,
The number of your line is
The operation of the apparatus under the control of the computer programme will now be described with reference to the flowchart of Fig. 3. Block 30 starts the computer programme and the computer programme moves to block 31 which causes the computer programme to wait for a call on the dedicated line 18. Block 32 checks if there is a call on the dedicated line 18. Should block 32 determine that there is no call on the dedicated line 18, the computer programme moves to block 33 which carries out appropriate housekeeping sub-routines. Such housekeeping sub-routines will be known to those skilled in the art. At appropriate intervals, the computer programme returns to block 31 from block 33. On block 32 determining that there is a call on the dedicated line 18, the computer programme moves to block 34 which answers the call and moves the computer programme to block 35. Block 35 selects the phrase vocal number identification - please wait from the look-up table in the read only memory 19, and applies the phrase through the digital to analog converter 20 and the second input/output port 16 to the line 18 which is relayed to the line 7 for reception in speech form by the telephone 8. The computer programme then moves to block 38.
In this embodiment of the invention the computer programme provides for security for restricting access to the apparatus 1 to authorised personnel only. The security may or may not be activated. Block 38 checks if security has been activated and if so, the computer programme moves to block 39 which selects the phrase please key in your access code from the look-up table in the read only memory 19, and applies the phrase through the digital to analog converter 20 and the second input/output port 16 to the dedicated telephone line 18 where it is relayed on the line 7 to the telephone 8 for reception in speech form. The computer programme then moves to block 40, and waits for the access code. The technician or other individual keys in the access code through the keypad to the DTMF telephone 8, and on reception of the access code the computer programme moves to block 41 which reads the access code. The computer programme then moves to block 42 which checks if the access code is a valid code. If the access code is not a valid code, the computer programme moves to block 43 which selects the phrase that is not a valid code from the look-up table in the read only memory 19, and applies the phrase as described above on the dedicated line 18 for relay to the telephone 8 for reception in speech form. The computer programme then moves to block 44 which checks if three attempts have been made by the technician at the telephone 8 to enter an access code. If three attempts have not been made the computer programme returns to block 39. On the other hand, if three attempts have been made to enter an access code, the computer programme moves to block 45 which logs off and terminates the telephone call, and then moves to block 46 which calls up a sub-routine for logging the call which in turn logs the fact that a call was made and any relevant details of the call. The computer programme then moves to block 47 which returns the computer programme to block 30.
On block 42 determining that the access code is a valid access code the computer programme moves to block 50 which checks if the access code is an authorised code.
If block 50 determines that the access code is not authorised, the computer programme moves to block 51 which selects the phrase that code is not authorised from the look-up table in the read only memory 19, and applies the phrase as described above to the dedicated telephone line 18 for relay to the telephone 8 where it is received in speech form. The computer programme then moves to block 44 which has already been described. On the access code being determined by block 50 as being an authorised access code, the computer programme moves to block 55. In the event that block 38 determines that security has not been activated the computer programme moves to block 55.
Block 55 selects the phrase the number of your line is being checked which is applied in the manner already described to the dedicated telephone line 18 for reception in speech form by the telephone 8. The computer programme then moves to block 56 which sends a digital code to the malicious call identification device 5 through the link 12 and the link 13 requesting identification of the telephone number of the originating telephone line 7. On receiving the request, the malicious call identification device 5 identifies the number of the originating line 7. The apparatus 1 then moves to block 57 which requests the malicious call identification device 5 to output the identification of the number of the line 7. The computer programme then moves to block 58 which waits for the results of identification from the device 5 and moves to block 59. Block 59 checks if a result has
032 g been received from the malicious call identification device 5. If no result has been received the computer programme moves to block 60 which checks the elapsed time from the time the call was connected through to the malicious call identification device 5 by the apparatus 1 has exceeded a predetermined time, typically, twenty seconds. If the elapsed time has not reached a predetermined time, the computer programme returns to block 58. On the other hand, if block 60 determines that the elapsed time has exceeded the predetermined time period the computer programme returns to block 56 which reconnects the line 18 to the malicious call identification device 5. On block 59 determining that a result has been received the computer programme moves to block 65 which reads the result and moves to block 66. Block 66 compiles the number which has been received in digital form from the malicious call identification device 5 into spoken form by selecting the appropriate numbers in spoken form from the look-up table in the read only memory 19.
Block 66 also selects the phrase the number of your line is, and combines this phrase with the spoken telephone number and moves to block 67. Block 67 transmits the results in spoken form as The number of your line is ******* to the dedicated telephone line 18 which is in turn relayed onto the originating telephone line 7 to the DTMF telephone 8 where it is received by the technician in spoken form. The computer programme then moves to block 68 which logs the call, and in turn moves to block 69 which logs off and terminates the call. The computer programme then moves to block 70 which returns the computer programme to block 30.
Accordingly, to operate the apparatus 1 a technician on a remote site connects a DTMF telephone 8 into any line 4 of the telephone network 2, the telephone number of which is to be identified. The engineer then dials the number of the dedicated line 18 on the keypad of the telephone 8 which thus accesses the apparatus 1 and initiates the apparatus 1 to go through the steps of the computer programme of Fig. 3 which has just been described. The telephone number is then spoken to the engineer through the telephone 8.
It is envisaged that while the apparatus has been described for connecting into a malicious call identification device of a telephone exchange, the apparatus may be connected into a telephone exchange for use with any other type of call identification devices, which devices will be well known to those skilled in the art.
While the apparatus has been described as comprising a
F 900329 second interface means for interfacing the apparatus with one dedicated telephone line, it will be appreciated, and will be readily apparent to those skilled in the art that the second interface means of the apparatus 1 may interface the apparatus 1 with a plurality of dedicated telephone lines for facilitating the handling of a plurality of calls from different originating telephone lines simultaneously.
Additionally, it will be appreciated and will be readily apparent to those skilled in the art that the first interface means instead of interfacing the apparatus 1 to the call identification device through a single telephone line, the first interface means may comprise a plurality of telephone lines or data links for handling a plurality of calls simultaneously to the call identification device. In which case a corresponding number of designated telephone numbers would be entered into the call handling device.
It is also envisaged that as well as outputting the identified telephone number in spoken form onto the dedicated telephone line, or lines as the case may be, the apparatus 1 may also output the results in digital form or in DTMF form for reception by a suitable remotely located portable apparatus.
Claims (7)
1. Apparatus for providing access from any telephone line of a telephone network to a call identification device in a telephone exchange of the telephone 5 network, the call identification device being of the type which is suitable for identifying the telephone number of a call originating telephone line, the apparatus comprising a first interface means for interfacing the 10 apparatus with the call identification device, a second interface means for interfacing the apparatus with the telephone network through a dedicated telephone line, a first input/output means for outputting an 15 instruction to the call identification device for instructing the call identification device to identify the telephone number of the telephone line which originated the call to the apparatus, and for receiving the telephone number of the telephone line from the 20 call identification device, the first input/output means communicating with the first interface means, a second input/output means for receiving a call set up on the telephone line, the telephone number of which is to be identified and for outputting the 25 telephone number of the telephone line, the second input/output means communicating with the second interface means, and a means for converting the telephone number of the telephone line being identified from digital form to spoken form for outputting the telephone number in spoken form through the second input/output means. 5
2. A method as claimed in Claim 1 in which the means for converting the telephone number of the line being identified from digital form into spoken form comprises a storing means for storing a plurality of phrases in speech form and a plurality of numbers in speech form, 10 and a selecting means for selecting an appropriate phrase in speech form and appropriate numbers in speech form from the stored phrases and numbers in response to the telephone number received through the first input/output means from the call identification device 15 for outputting through the second input/output means onto the dedicated telephone line.
3. Apparatus as claimed in Claim 2 in which the storing means comprises a read only memory.
4. Apparatus as claimed in Claim 2 or 3 in which the 20 phrases in speech form and the numbers in speech form are stored in the storing means in the form of a lookup table, the respective phrases and numbers being cross-referenced to digital signal outputs from the call identification device. ! 960329
5. Apparatus as claimed in any preceding claim in which the second interface means permits interfacing of the apparatus with a plurality of dedicated telephone lines for facilitating the handling of a plurality of 5 calls requesting identification of the telephone number of respective telephone lines, simultaneously.
6. Apparatus as claimed in any preceding claim in which the first interface means permits interfacing of the apparatus with the call identification device 10 through a plurality of data ports or data links for facilitating the handling of a plurality of telephone number identification requests simultaneously.
7. Apparatus for providing access to a call identification device in a telephone exchange of a 15 telephone network for identification of the telephone number of a telephone line, the apparatus being substantially as described herein with reference to and as illustrated in the accompanying drawings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IE960329A IE960329A1 (en) | 1995-05-09 | 1996-05-03 | Apparatus for providing access to a call identification¹device for identifying the telephone number of a telephone¹line of a telephone network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IES950327 IES65205B2 (en) | 1995-05-09 | 1995-05-09 | Apparatus for providing access to a call identification device for identifying the telephone number of a telephone line of a telephone network |
IE960329A IE960329A1 (en) | 1995-05-09 | 1996-05-03 | Apparatus for providing access to a call identification¹device for identifying the telephone number of a telephone¹line of a telephone network |
Publications (1)
Publication Number | Publication Date |
---|---|
IE960329A1 true IE960329A1 (en) | 1996-11-13 |
Family
ID=26319814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IE960329A IE960329A1 (en) | 1995-05-09 | 1996-05-03 | Apparatus for providing access to a call identification¹device for identifying the telephone number of a telephone¹line of a telephone network |
Country Status (1)
Country | Link |
---|---|
IE (1) | IE960329A1 (en) |
-
1996
- 1996-05-03 IE IE960329A patent/IE960329A1/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4656651A (en) | System for providing remote services | |
US5384822A (en) | Computer controlled test facility for a telecommunication switch | |
US5136634A (en) | Voice operated facsimile machine network | |
US5444769A (en) | Data communications system for establishing links between subscriber stations and broadcast stations | |
EP0753956A2 (en) | Telephone switching system, automatic call distributor and method using a computer network to connect to remote agent computer terminals | |
US6104784A (en) | Arrangement for communicating between public safety answering points and an automatic location identifier database | |
US6049601A (en) | Method of and apparatus for establishing call forwarding service for subscriber's telephone terminal in switching system with verification function | |
CN100570636C (en) | Transmit the method and system of distribution by wireless transmission | |
GB2300785A (en) | Identifying a used line with a CLI device | |
IE960329A1 (en) | Apparatus for providing access to a call identification¹device for identifying the telephone number of a telephone¹line of a telephone network | |
US5390240A (en) | Data dial system and method | |
JP3227368B2 (en) | Transfer device | |
US9455954B2 (en) | Remote diagnosis system and method and printing machine having the system | |
GB2300784A (en) | Remote line testing | |
IE960328A1 (en) | Apparatus for providing access to a line test device for¹testing a characteristic of a telephone line of a telephone¹network | |
US4866753A (en) | Telephone installation having a radio link | |
US6853709B1 (en) | Apparatus for direct communication with a phone entry system | |
KR0165080B1 (en) | Measuring method of subscriber line of exchange system | |
KR200246096Y1 (en) | Credit inquiry relay device using mobile phone | |
EP0066597B1 (en) | Telephone exchange | |
KR100247425B1 (en) | Method for varying/registering personal identification number of subcriber | |
JP3131864B2 (en) | Message response connection method | |
KR100229435B1 (en) | How to recall CFNs in private exchanges | |
JPS6064557A (en) | Call restriction system | |
NO990526L (en) | Device and method of telecommunication equipment |