Methods and apparatus for providing expanded telecommunications service

Abstract
System and method for putting control of incoming telephone calls in the hands of subscribers with the aid of computer software and the Internet. In effect, a very efficient multiplexer is provided that does not require a change in the behavior of the called party or the calling party. This system permits the called party to hear a spoken message by the calling party in real time, and the content of the spoken message permits the called party to decide how to handle the call. The system adaptively learns and captures the rules of the called party for handling calls, and learns which callers the called party always wishes to talk to. The system uses special control software on the called party's computer which is connected to the Internet. The system employs a central server in which all of the required intelligence is resident. Audio signals are exchanged via non-data channels provided by the telephone companies and by the Internet. Either a very simple Internet busy pick-up is provided, or a very complex messaging system is provided, as desired. A feature is the monitoring and screening of incoming calls before deciding how to handle them. Another feature is the capturing and storage of the decision making profile.
Description
TECHNICAL FIELD

The present invention relates generally to a telecommunications system, and more particularly to the control of telephone calls in a telecommunication system by use of personal computer software via the Internet.


BACKGROUND OF THE INVENTION

Many telephone subscribers have a personal computer on their desk and frequently the personal computer is logged in to the same telephone line that would normally be used by the telephone. This is for use of the computer on the Internet. Frequently, incoming telephone calls receive a busy signal because the computer is logged on to the Internet. Thus there are many lost calls. Many individuals and small businesses are searching for ways to simplify and control their telecommunications systems. Many of them are reluctant to acquire additional telephone lines at current prices.


Most telecommunications systems today have limited intelligence. It is estimated that 75% of business calls end in voice mail, an often unsatisfactory conclusion. Calls not completed may result in irritated customers and lost sales. The present invention addresses this waste of human and business resources by using the Internet and Internet telephony to deliver control of a customers telecommunication for the individual or small business.


BRIEF SUMMARY OF THE INVENTION

The present invention ranges from an internet busy pick-up through a very complex messaging system. All that is required at the subscribers location is special software for use on a personal computer in connection with the internet. The system of the present invention operates a central server which receives incoming telephone calls when a user is connected to the Internet. The company's central server delivers the calling and called number information to the user's desktop computer for all calls. The user may elect to pick up that call in which case a direct Internet connection is made between the users desktop computer and the telephone system. If the user does not answer the call or the user is not logged on line to the Internet, the company's central server takes the message or optionally forwards the call to a traditional phone line or a cell phone. The information about the call is then spoken to the customer who can again make a decision whether to take that call.


It is presently contemplated that the system of the present invention takes the call only if the subscriber's line is busy and the calling parties number is recorded in memory storage at the central server. It is also contemplated at present that the caller can provide a spoken message which can be played via the Internet to the subscriber at which time the subscriber can make a decision as to how to handle the call. These features are offered without the necessity for a behavior change by either the calling party or the called party. However, other messaging features can be offered, if desired. This makes the system of the present invention as complex as is desired. It can be extremely simple for the unsophisticated customer and yet can offer many advanced features for those that desire them.


Other features of the present invention are disclosed or apparent in the section entitled: “BEST MODE FOR CARRYING OUT THE INVENTION.”





BRIEF DESCRIPTION OF DRAWINGS

For a fuller understanding of the present invention, reference is made to the accompanying drawing in the following detailed description of the Best Mode of Carrying Out the Present Invention. In the drawing, the same reference characters are used to refer to the same elements of the present invention throughout the several figures of the drawing.



FIG. 1 is a schematic representation of one embodiment of the present invention.



FIG. 2 is an example of a typical screen for a control panel.



FIG. 3 is a more detailed version of the communication path of the system of the present invention.



FIG. 4 is a schematic diagram of the call handling process.



FIG. 5 is the process of locating the subscriber.



FIG. 6 is an expansion of FIG. 3 showing how a Telco central office can be connected by way of wireless connections or by way of land line connections to the server.



FIG. 7 is a sequence of steps on a flow chart indicating the handling of a call.



FIG. 8 is a flow chart showing a series of steps in the handling of incoming telephone calls.



FIG. 9 is a flow chart illustrating further steps in the call handling flow chart.



FIG. 10 is a sequence of steps in a flow chart.



FIG. 11 is a flow chart for steps in deciding how the subscriber answers a call.



FIG. 12 illustrates calling back into the central server while an incoming call is being held at the server.



FIG. 13 is a sequence of steps in a method flow chart illustrating capturing the dynamic profile of a subscriber.



FIG. 14 is a schematic diagram indicating how the system can handle undesired incoming calls.



FIG. 15 is a schematic diagram illustrating a second embodiment of the call control system of the present invention.





BEST MODE FOR CARRYING OUT THE INVENTION


FIG. 1 is a schematic representation of the organization of one embodiment of the present invention. FIG. 1 shows a first entity 20 connected to the Public Switched Telephone Network (PSTN) 21. A second entity 22 is also connected to the PSTN 21. The second entity 22 is illustrated as having a first device 23 indirectly connected to the Internet 26 through a PSTN 21 provided dial-up connection shared with the telephone of the second entity 22. The second entity 22 is also shown to have a second device 24 directly connected to the Internet 26. Both devices host a software based Command Center 25. The devices may or may not be logged onto the Internet 26. FIG. 1 also shows a local exchange switch 27 connected to the PSTN 21. The system directs the call and the call information of the first entity 20 through the PSTN 21 to the local exchange switch 27 and then to a gateway 28; said gateway can be implemented as a local gateway 28A near the switching system 27 or a centralized gateway 28B near the server 29. The gateway forwards the call information to the Server (or array of Servers) 29 which then communicates to the Command Center 25 over an Internet Protocol connection that is by a plurality of means, including a single phone line dial up connection (e.g. as shown in the case of the first device 23) an always on landline home connection (for example as shown in the case of the second device 24) an always on landline office connection or an always on wireless connection. The Server 29 and the Command Center 25 then interact to coordinate the dialog with the first entity 20 over the PSTN 21 and the second entity 22 over the appropriate device 23 or 24.


Referring now to FIG. 2 of the drawings, an example of a typical screen for command center 25 a control panel is shown. It should be understood that the control panel may have messages on it other than the ones shown in the figure. The control panel of FIG. 2 would typically show up in a small area of the monitor screen of the subscriber's device desktop (e.g. computer) 23 & 24. For example, the control panel of FIG. 2 may occupy only a 1 inch by 2 inch corner of the screen. The control panel of FIG. 2 displays status of the incoming call and allows the second entity 22 to coordinate interactions with the server 29. The command center interface supports a plurality of call control inputs including a) no input b) transfer call over circuit switching network c) take call over Internet Protocol d) reoriginate the call over circuit switched or Internet Protocol network e) have the server interact with the caller to provide information or record the audible signal.


Referring now to FIG. 3 of the drawings, there is shown a more detailed version of the communication path of the system of the present invention. An incoming call is illustrated as being directed to a home telephone number 30 in the Plain Old Telephone System (POTS) which is passed on to the POTS Network 31. The POTS Network 31 is shown connected to a Signaling System 7 (SS7) 32. The telephone system employs what is known as Common Channel Signaling (CCS). This is a signaling system used in telephone networks that separates signaling information from user data. A specified channel is exclusively designated to carry signaling information for all other channels in the system. The SS7 32 is one of the standard CCS systems used by the telephone company. The SS7 32 is connected to the central server 28. The SS7 32 normally connects between central offices. Because the present invention uses the SS7 32, it appears to be a central office to the telephone companies. The system of the present invention is actually a class 5 telephone office. A message store memory 33 is located at the central server 29 for storing messages. The central server 29 communicates through the internet 26 to the personal desktop computer 25 of the client. The central server 29 is shown as also communicating to a second client having a personal desktop computer 34. A call merger 39 connects from the Internet 26 to a telephone instrument.


When an incoming call comes in to the home telephone number 30, the central server 29 interacts with the caller. It makes a record of the caller's telephone number or prompts the caller to unblock the telephone so as to give the caller's telephone number. The central server 29 may give the caller options that can be answered by a touch tone response, or it may ask for a voice message to be passed on to the subscriber. If an audio message is given to the central server 29, that message is passed along using Voice Over IP (VOIP) which is used in the telephone system and over the internet. The letters IP stand for Internet Protocol.


Teleconferencing over the internet is done using a standard developed by the International Telecommunications Union (ITU). This standard is known as ITU-T H.323. This provides for audio and video in a teleconferencing context. From the standpoint of VOIP, the video component of the teleconferencing signal is ignored and only the audio is used. This permits audio to be transferred from the incoming call at the home telephone number 30 to the client's personal desktop computer 25. The client can listen to the message from the incoming call before making a decision as to the handling of the call. The server communicates to a command center running on a multiplicity of platforms and providing a control interface to the second entity. The command center is a software and device solution that can be hosted alternatively on a personal computer, a handheld computing device, a wireless telephone, a television, a web interface appliance, or a command center server using voice and DTMF tone interaction with a telephone device.


Referring now to FIG. 4, there is shown a schematic diagram of the call handling process. Box 35 indicates the arrival of an incoming call. The options may include forward the call, call forward no-answer, forward the call always, and it may provide for switching the call to a different telephone number, for example that of a cell phone or other device. The caller may be presented with voice mail type options. For example, if you wish to talk with Mr. Jones, press 1, if you wish to talk with Mrs. Jones press 2, if you wish to talk with Susie Jones press 3. The caller may be required to give a touch tone ID, or to provide a touch tone ID of the called party. The dialog process is for the purpose of obtaining as much information as possible as to who is calling, which family member is being called, and why. The caller may be asked to speak a message into the telephone as would be done with an answering machine. This message is recorded and passed on to the subscriber so that he can listen to it to aid him in making the call handling decision. As shown at box 37, the caller's telephone number is noted by the central server 29, or the caller is prompted to unblock the telephone number. Box 36 indicates that a dialog is conducted by the central server 29 with the caller. Box 38 shows the call handling decision. The system identifies the first entity by the following methods: detecting caller ID and or called number information from the call information received from the switch, by means of voice prompts from the system and tone response from the first entity by which the first entity identifies their number, or the person whom they are calling, or by means of capturing an audible signal from the first entity.


The central server 29 may go through a process of locating the subscriber. This is illustrated in FIG. 5. This service is sometimes referred to as find me/follow me. As indicated in FIG. 5, the subscriber may have his home number logged on line for the Internet as indicated in block 40. However, the subscriber may have an additional home number as shown in block 41 or the subscriber may have a business number as shown in block 42. The subscriber may have a personal number as in block 43, or a special number classed as a single purpose number as in block 44. In addition the subscriber may have a cell phone 45 or a pager 46.


It should be understood that as the central server 29 goes through the processes of locating the subscriber, the caller is not aware of any of the procedures that the central server 28 is going through. The caller is unaware of any of the special numbers that the subscriber may have, or equipment such as pagers or cell phones.


It is not necessary for the equipment used by the system such as the central server 29 to be located close to the subscriber or close to the called number. For example, as shown in FIG. 6, the POTS Network 31 can be connected through a Telco central office 47 via the SS7 32 by way of wireless connections 48 or by way of land line connections 50 to the server 29 at a remote location.


It should be understood that the message store memory 33 shown in FIG. 3 may include a list of numbers that the subscriber wishes to speak to always. These may be family members, or business partners, or the like. These may be added to at the subscriber's discretion. Other instructions for call handling may be recorded in the message store memory 33. One of the first things done by the central server 29 is to check to see if there are special instructions for handling of a given incoming call. FIG. 7 shows a sequence of steps on a flow chart indicating the handling of a call. The first box 51 is “begin”. Box 52 is “placing a call from a first entity to a second entity”. Box 53 is “receiving the call at a local exchange switch”. The next step is shown in box 54 as “identifying a number of the first entity”. Box 55 is “directing the call and the number of the first entity to a gateway”. Box 56 is “directing the call, call information, and the number of the first entity to a server”. Box 57 is “determining whether the Command Center of the second entity is communicating with the server”. Box 58 is “sending a message to the Command Center indicating the presence of a call and identifying the number of the first entity and the number of the second entity”. Box 60 is “directing the call to one of a plurality of telephonic devices according to the number of the second entity” and the last block on FIG. 7 is box 61 “end”.



FIG. 8 is a flow chart showing a series of steps in the handling of incoming telephone calls. The first block 62 is “begin”. Block 63 is “receiving at the server a command from the command center to have the server answer the call”. Block 64 is “answering the call through the server”. Block 65 is “playing a message”. Block 66 is “recording a message from the call”. Block 67 is “storing the message from the call in the server”. The last block is 68 “end”.



FIG. 9 is a flow chart illustrating further steps in the call handling flow chart. The first block 70 is “begin”. Block 71 is “determining whether special instructions are stored in the computer regarding forwarding calls”. Block 72 is “forwarding the call to a number designated by the second entity”. Block 73 is “end”.


As has been indicated hereinbefore, an audible message from the caller may be played to the subscriber to aid him in making a decision for handling the call. However, the subscriber may also record messages, and these messages may be played to the caller as well. There may be a number of different messages depending upon the circumstances, and these may be selectively played as desired. Referring now to FIG. 10, there is shown a sequence of steps in a flow chart. Block 74 is “begin”. Block 75 is “recording a plurality of different audio greetings”. Block 76 is “storing said audio greetings in a memory storage device”. Block 77 is “playing a preselected one of said audio greetings to a caller on demand”. Block 78 is “end”. Referring now to FIG. 11, this figure shows a flow chart for steps in deciding how the subscriber answers a call. The first block 80 is “begin”. Block 81 is “developing a data base of important telephone numbers”. Block 82 is “answering a call by the server only if the line is busy and the caller number is in the data base”. Block 83 is “permitting the subscriber to monitor a message from the caller audibly over the Internet”. Block 84 is “permitting the subscriber to make a decision how to handle the call over the Internet”. Block 85 is “permitting the subscriber to specify: always, or this time only, connect the call, transfer the call, take a message, or terminate the call”. Block 86 is “end”.


The client or subscriber has many ways to deal with an incoming call. He can elect not to answer and to take a message, or he can have the call played through the personal desktop computer 25 and talk to the caller via the Internet 26, or he can have the call transferred to a different instrument such as a second telephone 24 (FIG. 1) or a cell phone 45 (FIG. 5). There is another way for the subscriber to handle a call. While the central server 29 is holding the call, the client can pick up a cell phone or a regular POTS phone and call in to the central server 29 and have a call cross-connect right there. This is illustrated in FIG. 12. This figure illustrates an incoming call arriving at the central server 29. It is connected to the Internet 26 and to the client's personal desktop computer 25. Then, the client may elect to make a POTS inbound call to the server 87. This means, for example, picking up a cell phone or a regular POTS phone and dialing the number to the central server 29. At the central server 29, a call cross-connect is made, and the client can talk to the caller making the incoming call.


The central server 29 is able to capture and store the dynamic profile of the subscriber's rules for treatment of incoming calls. This is illustrated in FIG. 13. FIG. 13 is a sequence of steps in a method flow chart. Block 90 is “begin”. Block 91 is “monitoring and screening incoming calls based on properties such as call type, caller number, called number, time of day, family member called”. Block 92 is “locating subscriber using find me, follow me, first or second home phone, business phone, cell phone and various Internet devices”. Block 93 is “allowing subscriber to specify call treatment, e.g., connect the call, transfer the call, take a message”. Block 94 is “observing and noting subscriber treatment of call”. Block 95 is “profiling dynamically call treatment by subscriber”. Block 96 is “reviewing by subscriber of suggested call handling rules”. The subscriber is not asked to enter his rules for handling calls but rather the subscriber is presented with rules determined implicitly by the central server 28. The subscriber than has an opportunity to approve or to reject the proposed rules. Block 97 is “capturing and storing dynamic profile of subscriber call treatment”. This dynamic profile may be stored in the message store memory 33 of the central server 28. In addition an address book may be compiled at that same location so that if the subscriber wishes to place a call, or to return a call following a telephone message, it is easy to initiate using the numbers logged in the address book in the message store memory 33 of the central server 28. In FIG. 13, the last block 98 is “end”.


The central server 28 of the system of the present invention gradually becomes more useful to the subscriber as it learns the subscriber's profile. This profiling also adds another dimension to the system of the present invention. This is an advertising or media dimension. The profiling creates a community of users. People that call each other on the telephone have a community of interests. Thus the profiling information that is stored becomes, in effect, a collaborative filter based on telephone numbers. Recording of calls made to other numbers indicates similar patterns of behavior. This is based on shared interests. Thus, this gradual interactive development of a profile based on decisions made by the client may be used for advertising purposes, if desired.



FIG. 14 is a schematic diagram indicating how the system can handle undesired incoming calls. At the left of FIG. 14 there is illustrated an incoming call 35. The call is coupled to a detector for detecting phone “spam” 100. The incoming call 35 is also connected to a detector for detecting nuisance calls 101. Both of these types of telephone calls are unsolicited, unwanted, and undesirable types of calls. When these types of calls are detected, they are forwarded to block 102 which initiates a “rude” hang-up. This type of hang-up would have an audible message to the caller saying something such as “never call again”. Then, the signal is passed on to block 103 which terminates the call.


Typically, the system only answers calls for the client when the client's telephone line is busy and he is logged on the Internet. However it can be arranged for the system to answer all of the client's incoming calls. This is illustrated in FIG. 15. FIG. 1S is a schematic diagram illustrating a second embodiment of the call control system of the present invention. In this embodiment of the invention, the hard connection from the POTS to the subscriber is broken. This is done by the central server system providing a virtual phone number to the client without providing a telephone instrument. This is illustrated in block 104. The virtual telephone number is given to the client who uses it in his advertising so that all calls will be made to that number but in fact those calls will be intercepted by the system of the present invention.


The present invention has been particularly shown and described with respect to certain preferred embodiments and features thereof. However, it should be readily apparent to those of ordinary skill in the art that various changes and modifications in form and detail may be made without departing from the spirit and scope of the inventions as set forth in the appended claims. The inventions illustratively disclosed herein may be practiced without any element which is not specifically disclosed herein.

Claims
  • 1. A method of processing communications, the method comprising: creating a phone number data base for a first party;receiving at a communication processing system over a network a first call from a first communication initiator intended for the first party;determining a first phone number of the first communication initiator from call signaling associated with the first call;storing in the first party data base the first phone number;receiving at the communication processing system a second call from a second communication initiator intended for the first party;determining a second phone number of the second communication initiator from call signaling associated with the second call;storing in the first party data base the second phone number;receiving an indication of interest by the first party in a subject of an advertisement;storing the first party's indication of interest in the advertisement subject in a data store;identifying a second party using a collaborative filter applied to phone numbers in the first party data base; anddirecting to the second party identified using the collaborative filter one or more advertisements relating to the advertisement subject corresponding to the stored first party's indication of interest.
  • 2. The method as defined in claim 1, wherein the second communication initiator is a plurality of communication initiators.
  • 3. The method as defined in claim 1, wherein the first party data base includes a contact record corresponding to at least one of the first and second communication initiators.
  • 4. The method as defined in claim 1, the method further comprising: placing an outbound communication using a first contact record from the first party data base to the first communication initiator; and,placing an outbound communication using a second contact record from the first party data base to the second communication initiator.
  • 5. The method as defined in claim 1, wherein the first phone number is obtained from the first communication initiator's caller ID (identification).
  • 6. A system comprising: one or more computing devices;nontransitory computer readable memory that stores program code that, when executed by the one or more computing device, performs operations comprising:creating a phone number data base for a first party;receiving over a network a first call from a first communication initiator intended for the first party;determining a first phone number of the first communication initiator from call signaling associated with the first call;storing in the first party data base the first phone number;receiving a second call from a second communication initiator intended for the first party;determining a second phone number of the second communication initiator from call signaling associated with the second call;storing in the first party data base the second phone number; receiving an indication of interest by the first party in a subject of an advertisement;storing the first party's indication of interest in the advertisement subject in a data store;identifying a second party using a collaborative filter applied to phone numbers in the first party data base; anddirecting to the second party identified using the collaborative filter one or more advertisements relating to the advertisement subject corresponding to the stored first party's indication of interest.
  • 7. The method as defined in claim 1, the method further comprising: determining a first call treatment for the first call from the first communication initiator;storing in the first party data base the determined first call treatment;determining a second call treatment for the second call from the second communication initiator;storing in the first party data base the determined second call treatment.
  • 8. The method as defined in claim 1, the method further comprising: recording an audio message from the first communication initiator; and,playing the recorded audio message from the first communication initiator on a computing device of the first party wherein the playing of the recorded audio message is initiated before the termination of the first call.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a is a continuation of U.S. patent application Ser. No. 11/062,182 (filed 18 Feb. 2005), which is a continuation of U.S. patent application Ser. No. 10/255,567 (filed 26 Sep. 2002; now U.S. Pat. No. 6,898,275), which is a continuation of U.S. patent application Ser. No. 09/539,375 (filed 31 Mar. 2000; now U.S. Pat. No. 6,477,246), which claims the benefit of U.S. Provisional Patent Application 60/127,434 (filed 1 Apr. 1999). The entire disclosure of all of these priority applications is hereby incorporated by reference herein.

US Referenced Citations (203)
Number Name Date Kind
3936613 Nishigori et al. Feb 1976 A
3956595 Sobanski May 1976 A
4009337 Sakai et al. Feb 1977 A
4022983 Braun et al. May 1977 A
4277649 Sheinbein Jul 1981 A
4485470 Reali Nov 1984 A
4736405 Akiyama Apr 1988 A
4809321 Morganstein et al. Feb 1989 A
4845743 Lutz Jul 1989 A
4850007 Marino et al. Jul 1989 A
4893336 Wuthnow Jan 1990 A
4994926 Gordon et al. Feb 1991 A
5040208 Jolissaint Aug 1991 A
5046087 Sakai Sep 1991 A
5259022 Kuok et al. Nov 1993 A
5291302 Gordon et al. Mar 1994 A
5321740 Gregorek et al. Jun 1994 A
5361295 Solomon et al. Nov 1994 A
5384831 Creswell et al. Jan 1995 A
5404537 Olnowich et al. Apr 1995 A
5434908 Klein Jul 1995 A
5440620 Slusky Aug 1995 A
5448625 Lederman Sep 1995 A
5459584 Gordon et al. Oct 1995 A
5467388 Reed, Jr. et al. Nov 1995 A
5509052 Chia et al. Apr 1996 A
5526524 Madduri Jun 1996 A
5533102 Robinson et al. Jul 1996 A
5533106 Blumhardt Jul 1996 A
5548636 Bannister et al. Aug 1996 A
5577111 Iida et al. Nov 1996 A
5583918 Nakagawa Dec 1996 A
5619557 Van Berkum Apr 1997 A
5640677 Karlsson Jun 1997 A
5651054 Dunn et al. Jul 1997 A
5668852 Holmes Sep 1997 A
5668861 Watts Sep 1997 A
5721771 Higuchi et al. Feb 1998 A
5751795 Hassler et al. May 1998 A
5774067 Olnowich et al. Jun 1998 A
5796816 Utsumi Aug 1998 A
5805587 Norris et al. Sep 1998 A
5809128 McMullin Sep 1998 A
5812551 Tsukazoe et al. Sep 1998 A
5825867 Epler et al. Oct 1998 A
5832060 Corlett et al. Nov 1998 A
5835570 Wattenbarger Nov 1998 A
5835573 Dee et al. Nov 1998 A
5862208 MeLampy et al. Jan 1999 A
5894504 Alfred et al. Apr 1999 A
5912948 Nelson et al. Jun 1999 A
5920623 Bensman et al. Jul 1999 A
5946386 Rogers et al. Aug 1999 A
5960064 Foladare et al. Sep 1999 A
5960073 Kikinis et al. Sep 1999 A
5963629 Jung Oct 1999 A
5991367 Robuck Nov 1999 A
5995594 Shaffer et al. Nov 1999 A
5995603 Anderson Nov 1999 A
5999806 Kaplan et al. Dec 1999 A
6014436 Florence et al. Jan 2000 A
6023503 Schneider et al. Feb 2000 A
6031896 Gardell et al. Feb 2000 A
6032051 Hall et al. Feb 2000 A
6034956 Olnowich et al. Mar 2000 A
6035031 Silverman Mar 2000 A
6041103 La Porta et al. Mar 2000 A
6044059 Olnowich Mar 2000 A
6055430 Cooper et al. Apr 2000 A
6078581 Shtivelman et al. Jun 2000 A
6084628 Sawyer Jul 2000 A
6100873 Bayless et al. Aug 2000 A
6101249 Weber Aug 2000 A
6104800 Benson Aug 2000 A
6144644 Bajzath et al. Nov 2000 A
6160881 Beyda et al. Dec 2000 A
6167127 Smith et al. Dec 2000 A
6169795 Dunn et al. Jan 2001 B1
6169796 Bauer et al. Jan 2001 B1
6175622 Chiniwala et al. Jan 2001 B1
6178183 Buskirk, Jr. Jan 2001 B1
6181691 Markgraf et al. Jan 2001 B1
6208638 Rieley et al. Mar 2001 B1
6212261 Meubus et al. Apr 2001 B1
6230009 Holmes et al. May 2001 B1
6243378 Olnowich Jun 2001 B1
6253249 Belzile Jun 2001 B1
6278704 Creamer et al. Aug 2001 B1
6282276 Felger Aug 2001 B1
6292478 Farris Sep 2001 B1
6304565 Ramamurthy Oct 2001 B1
6310939 Vamey Oct 2001 B1
6321194 Berestesky Nov 2001 B1
6330317 Garfinkel Dec 2001 B1
6337898 Gordon Jan 2002 B1
6345090 Walker et al. Feb 2002 B1
6350066 Bobo, II Feb 2002 B1
6353660 Burger et al. Mar 2002 B1
6353663 Stevens et al. Mar 2002 B1
6363414 Nicholls et al. Mar 2002 B1
6381459 Gervens et al. Apr 2002 B1
6400806 Uppaluru Jun 2002 B1
6405035 Singh Jun 2002 B1
6411601 Shaffer et al. Jun 2002 B1
6411692 Scherer Jun 2002 B1
6411805 Becker et al. Jun 2002 B1
6430274 Winstead et al. Aug 2002 B1
6438216 Aktas Aug 2002 B1
6438222 Burg Aug 2002 B1
6477246 Dolan et al. Nov 2002 B1
6496569 Pelletier et al. Dec 2002 B2
6496576 Tanaka et al. Dec 2002 B2
6501750 Shaffer et al. Dec 2002 B1
6505163 Zhang et al. Jan 2003 B1
6510162 Fijolek et al. Jan 2003 B1
6510417 Woods et al. Jan 2003 B1
6512930 Sandegren Jan 2003 B2
6519258 Tsukazoe et al. Feb 2003 B1
6519335 Bushnell Feb 2003 B1
6529587 Cannon et al. Mar 2003 B1
6539084 Long Mar 2003 B1
6542596 Hill et al. Apr 2003 B1
6545589 Fuller et al. Apr 2003 B1
6546087 Shaffer et al. Apr 2003 B2
6549612 Gifford et al. Apr 2003 B2
6553222 Weiss Apr 2003 B1
6564264 Creswell et al. May 2003 B1
6564321 Bobo, II May 2003 B2
6567505 Omori et al. May 2003 B1
6574319 Latter et al. Jun 2003 B2
6594257 Doshi et al. Jul 2003 B1
6614896 Rao Sep 2003 B1
6621892 Banister et al. Sep 2003 B1
6631186 Adams et al. Oct 2003 B1
6636590 Jacob et al. Oct 2003 B1
6643034 Gordon et al. Nov 2003 B1
6647257 Owensby Nov 2003 B2
6658100 Lund Dec 2003 B1
6658250 Ganesan et al. Dec 2003 B1
6658254 Purdy et al. Dec 2003 B1
6661785 Zhang et al. Dec 2003 B1
6661886 Huart et al. Dec 2003 B1
6662232 Nicholls et al. Dec 2003 B1
6687362 Lindquist et al. Feb 2004 B1
6690785 Stelter et al. Feb 2004 B1
6721408 Bain et al. Apr 2004 B1
6738461 Trandal et al. May 2004 B2
6748058 Schwend et al. Jun 2004 B1
6751299 Brown et al. Jun 2004 B1
6775370 Burg Aug 2004 B2
6782088 Gabara Aug 2004 B1
6785021 Gordon et al. Aug 2004 B1
6792082 Levine Sep 2004 B1
6792094 Kirkpatrick Sep 2004 B1
6857074 Bobo, II Feb 2005 B2
6879677 Trandal et al. Apr 2005 B2
6898275 Dolan et al. May 2005 B2
6937699 Schuster et al. Aug 2005 B1
6968174 Trandal et al. Nov 2005 B1
6999572 Shaffer et al. Feb 2006 B1
7003087 Spencer et al. Feb 2006 B2
7006455 Fandrianto et al. Feb 2006 B1
7043232 Pelaez et al. May 2006 B2
7103167 Brahm et al. Sep 2006 B2
7209964 Dugan et al. Apr 2007 B2
7254219 Hansen et al. Aug 2007 B1
7289612 Lurie et al. Oct 2007 B2
7388949 Contractor et al. Jun 2008 B2
7397910 Dolan et al. Jul 2008 B2
7412050 Renner et al. Aug 2008 B2
7688958 Dolan et al. Mar 2010 B2
8041604 Glaser Oct 2011 B1
20020010616 Itzhaki Jan 2002 A1
20020035616 Diamond et al. Mar 2002 A1
20020097710 Burg Jul 2002 A1
20020176558 Tate et al. Nov 2002 A1
20030039339 Luehrig et al. Feb 2003 A1
20030055974 Brophy et al. Mar 2003 A1
20030063731 Woodring Apr 2003 A1
20030095541 Chang et al. May 2003 A1
20030123629 Hussain et al. Jul 2003 A1
20030156700 Brown et al. Aug 2003 A1
20030185375 Albal Oct 2003 A1
20040028203 Wurster et al. Feb 2004 A1
20040073566 Trivedi Apr 2004 A1
20040105536 Williams Jun 2004 A1
20040190706 Fleischer, III et al. Sep 2004 A1
20040203406 Moran et al. Oct 2004 A1
20040234064 Melideo Nov 2004 A1
20040249650 Freedman et al. Dec 2004 A1
20040258220 Levine et al. Dec 2004 A1
20050053216 Spencer et al. Mar 2005 A1
20050123118 Terry et al. Jun 2005 A1
20050201534 Ignatin Sep 2005 A1
20050207556 Gonzalez et al. Sep 2005 A1
20050215229 Cheng Sep 2005 A1
20050265322 Hester Dec 2005 A1
20060013374 Fleischer, III et al. Jan 2006 A1
20060227957 Dolan et al. Oct 2006 A1
20070116227 Vitenson et al. May 2007 A1
20070217584 Bi et al. Sep 2007 A1
20090100027 Malik Apr 2009 A1
20120022950 Gilbert et al. Jan 2012 A1
Foreign Referenced Citations (13)
Number Date Country
1329852 May 1994 CA
1 120 954 Aug 2001 EP
10-107901 Apr 1998 JP
10-322462 Dec 1998 JP
10-322465 Dec 1998 JP
10-513632 Dec 1998 JP
11-506292 Jun 1999 JP
2001-168989 Jun 2001 JP
WO 9726749 Jul 1997 WO
WO 9836551 Aug 1998 WO
WO 9914924 Mar 1999 WO
WO0060840 Oct 2000 WO
WO 0176210 Oct 2001 WO
Non-Patent Literature Citations (2)
Entry
Johnson, Dave, “Now You're TALKING-voice-response systems for home offices—Product Information”; Home Office Computing; http://www.findarticles.com; Feb. 1999.
Boorstein, J. “Listen to This-Free Long Distance”, Direct Marketing Business Intelligence; http://www.directmag.com; Jul. 1, 1998; 2 pages.
Provisional Applications (1)
Number Date Country
60127434 Apr 1999 US
Continuations (3)
Number Date Country
Parent 11062182 Feb 2005 US
Child 12167119 US
Parent 10255567 Sep 2002 US
Child 11062182 US
Parent 09539375 Mar 2000 US
Child 10255567 US