Browse Prior Art Database

PRIORITIZED CALL BLOCKING

IP.com Disclosure Number: IPCOM000008327D
Original Publication Date: 1997-Sep-01
Included in the Prior Art Database: 2002-Jun-06
Document File: 2 page(s) / 99K

Publishing Venue

Motorola

Related People

Thomas Hentges: AUTHOR

Abstract

Typically users of a communication system have a natural grouping of individuals and within that grouping an associated priority. An example may be that within a company you have managers, supervisors and employees which could be grouped by priority within the company hierachy.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

MO-LA Technical Developments

8

PRIORITIZED CALL BLOCKING

by Thomas Hentges

BACKGROUND

  Typically users of a communication system have a natural grouping of individuals and within that grouping an associated priority. An example may be that within a company you have managers, supervisors and employees which could be grouped by priority within the company hierachy.

PROBLEM

  Situations exist where a supervisor may elect not to be accessible for communication with the employees, but would accept a communication request from other supervisors or the group manager. Today, the supervisor in this scenario has only one option: to turn off their radio. This makes them unaccessible to other system users the supervisor feels is important enough to have access to that user. The Public Switch Telephone Network does not support this concept of prioritizing users within a group of system users within its system. The closest technology is the Caller ID feature which identifies the caller but may allow the phone to ring, interrupting the called party anyway.

SOLUTION

  Prioritized call blocking would allow a system user to select from their radio handset the priority level of those individuals whose calls to this user should be blocked and for how long it will be in affect. An example system configuration would consist of a central controller and many site

controllers covering a geographic area. Priority levels would be established by the customer for individuals and stored in the system's central controller database. A system user activates priori- tized call blocking by selecting the priority level of the calls to be blocked. (Note: the priority level the user chooses includes that priority level and priority levels below that.) This signal is sent through the network to the central controller containing that users unique identifier and the priority level to block. The central controller would store this information to be utilized in future call access to that user.

  If a one-to-one call (Telephone Interconnect C...