US20050047575A1 - Secure valet telephone system - Google Patents

Secure valet telephone system Download PDF

Info

Publication number
US20050047575A1
US20050047575A1 US10/889,410 US88941004A US2005047575A1 US 20050047575 A1 US20050047575 A1 US 20050047575A1 US 88941004 A US88941004 A US 88941004A US 2005047575 A1 US2005047575 A1 US 2005047575A1
Authority
US
United States
Prior art keywords
operator
call
subscriber
set forth
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/889,410
Inventor
Stephen Parker
James Fox
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LUXEFONE CIRCLES Inc
SO DELAWARE Corp
Original Assignee
LUXEFONE CIRCLES Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LUXEFONE CIRCLES Inc filed Critical LUXEFONE CIRCLES Inc
Priority to US10/889,410 priority Critical patent/US20050047575A1/en
Assigned to LUXEFONE CIRCLES, INC. reassignment LUXEFONE CIRCLES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FOX, JAMES, PARKER, STEPHEN
Priority to PCT/US2004/027816 priority patent/WO2005022880A1/en
Priority to EP04782315A priority patent/EP1702452A1/en
Publication of US20050047575A1 publication Critical patent/US20050047575A1/en
Priority to US11/581,685 priority patent/US8103261B2/en
Assigned to PARKER, STEPHEN reassignment PARKER, STEPHEN ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FOX, JAMES
Assigned to SO DELAWARE CORPORATION reassignment SO DELAWARE CORPORATION CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SILICON OPTIX INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
    • H04M3/4931Directory assistance systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/51Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
    • H04M3/5108Secretarial services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/60Semi-automatic systems, i.e. in which the numerical selection of the outgoing line is under the control of an operator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/20Aspects of automatic or semi-automatic exchanges related to features of supplementary services
    • H04M2203/2072Schedules, e.g. personal calendars
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6009Personal information, e.g. profiles or personal directories being only provided to authorised persons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42085Called party identification service
    • H04M3/42102Making use of the called party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/54Arrangements for diverting calls for one subscriber to another predetermined subscriber

Definitions

  • the invention relates to the field of telephone communications and, more particularly, to a secure valet telephone system.
  • Directory assistance has long been available to individuals seeking assistance in obtaining telephone numbers.
  • current directory assistance techniques have several shortcomings. First, they do not aid in increasing call productivity as they do not distinguish between an individual's various numbers and normally do not include cellular numbers.
  • current directory assistance techniques contain a security concern because the operator has access to telephone numbers of the individuals on the system. In today's security conscious environment, this may be undesirable to many people.
  • a secure valet telephone system for enabling system subscribers to achieve improved call connection efficiency.
  • the system comprises a live operator who can access upon request contact information for contact parties contained within a private encrypted database.
  • the operator accesses the database via a computer.
  • the computer uses the information stored within the database to determine a preferred contact number for the desired contact party. This facilitates more efficient calling by connecting the calling party with the call location at which the contact party is most likely to be reached.
  • the actual number dialed is concealed from the operator in the interests of privacy and security.
  • the system may further include a method to update the database after each call to include information about the call attempt or call completion. Additionally, the system may further include a method to quickly and easily put a subscriber in touch with the operator such as via an autodialer, a one button connection, or a voice activated connection.
  • FIG. 1 is a diagram of an exemplary system in accordance with one embodiment of the present invention.
  • FIG. 2 is a flow chart illustrating the steps involved in an outbound call by a subscriber using a system in accordance with one embodiment of the present invention.
  • FIG. 3 is an exemplary record for a subscriber contained within a private encrypted database in accordance with one embodiment of the present invention.
  • FIG. 4 is a flow chart illustrating the steps involved in an inbound call to a subscriber using a system in accordance with one embodiment of the present invention.
  • FIG. 1 shows an exemplary embodiment of a secure valet telephone system in accordance with the present invention.
  • FIG. 1 shows an example of a telephone network 100 that incorporates a system in accordance with one embodiment of the present invention.
  • a standard telephone network comprises numerous telephones, both wireless and wire lines, interconnected to each other via a network of wire lines and wireless communication channels managed by numerous telephone companies.
  • the exemplary network 100 shown in FIG. 1 comprises wire line telephones ( 101 , 102 ) and wireless telephones ( 103 , 104 ) that communicate with the network via transmission towers ( 105 , 106 ).
  • the network 100 is in communication with a secure valet system 110 . This communication may be achieved using various standard telephone network connections, for example, trunked telephone lines, although alternative connections including wireless connections could also be employed.
  • the system 110 employs a live operator 112 , who is in communication with transmissions to and from the network 100 via standard telephone switching equipment 116 .
  • the system also contains a computer 118 capable of accessing a database 114 .
  • the term “computer” is used herein to describe a processing unit, such as a Central Processing Unit (CPU) with a graphical user interface (GUI). However, any number of alternatives may also be employed, such as a server residing on a distributed network.
  • the live operator can access selected information stored within the private encrypted database 114 .
  • the database 114 is a private encrypted database that contains phone number information that is secure and may only be accessed by authorized personnel.
  • the private encrypted database 114 contains contact information on various parties as provided by subscribers to the system, as further discussed below.
  • Subscribers There are two types of callers who may access the system, “subscribers” and “users.”
  • the term “subscribers” is used herein to refer to individuals who are part of the community of people belonging to the system 110 in accordance with an embodiment of the present invention.
  • the term “users” is used herein to refer to individuals who may access the system 110 as part of a communication with a subscriber, but are not subscribers of the system (for example, a “user” may be directed to the system when calling a “subscriber”).
  • Subscribers provide contact information on various parties, which is stored in the database 114 .
  • a party about whom information is stored comprises the target of the call.
  • a party may or may not also be a subscriber to the system.
  • FIGS. 2 and 3 illustrate calling methods in accordance with the illustrated embodiment of the invention.
  • the process by which a subscriber places an outbound call is discussed with reference to FIG. 2 .
  • a subscriber desires to place an outbound call (step 201 )
  • access is facilitated by using an auto-dialer or auto-router installed in the wireline phone in the subscriber's home or place of business.
  • the subscriber initiates a call by lifting the handset, the appropriate connection to an operator is made automatically.
  • the subscriber may access the system via a wireless phone.
  • access via a wireless phone is achieved by pressing a soft-programmable key on the phone.
  • This “one-touch” access removes the need for the subscriber to memorize or store a number to dial in order to access the system, and also removes the need to enter a plurality of keystrokes into the phone.
  • This one-touch access can also allow subscribers who may have difficulty operating a conventional phone (e.g., small children, visually impaired individuals, etc.) to gain access to the secure valet system quickly and easily.
  • the subscriber is placed in contact with a live operator (step 203 ).
  • a live operator the secure valet system avoids requesting a series of prompts or entries from the subscriber, which may be difficult for some individuals to enter into the phone, as discussed above. Additionally, by providing a live operator instead of a series of prompts the system assures a rapid response in an emergency.
  • the subscriber places a request with the operator to contact a party.
  • the operator is then provided with the requested party's contact information as contained in the private encrypted database (step 205 ).
  • the private encrypted database comprises a compilation of data provided by each subscriber.
  • the data includes the various contact locations and associated numbers for parties that are included in the subscriber's database. Such information has been previously provided by the subscriber for individuals that he or she specified, such as individuals that the subscriber calls most frequently.
  • a preferred contact location is retrieved from the private encrypted database (step 207 ), as further described below, and provided to the operator in order to allow the operator to complete the call (step 209 ).
  • the actual phone numbers associated with a contact location are never seen by the operator. This alleviates the main concerns with live operator systems, which are compromising privacy and security. In the prior art, live operator systems necessitated providing information to the operator. In today's security conscious environment, this is not desirable.
  • the operator is given selections for completing the call, normally displayed on a GUI provided via the computer. The display lists only the order of contact options, without displaying any actual phone numbers. For example, when attempting to contact John Smith, the information retrieved from the private encrypted database might be displayed as “John Smith cell—#1 option,” “John Smith work—#2 option,” etc.
  • the operator can now complete the call by choosing a location to which to direct the subscriber's call, normally to the preferred contact location for the user (Step 211 ) unless otherwise instructed by the subscriber. This may be accomplished using conventional telephone switching equipment to route the call over the outbound trunked phone lines into an existing telephone network.
  • the private encrypted database may be updated to include a record of the current call (step 213 ) as further described below.
  • the operator is provided with a contact selection that is most likely to result in a successful call completion (i.e., most likely to allow the subscriber to reach the called party).
  • the preferred contact number is selected by the system from the private encrypted database in accordance with a number of predetermined criteria. Additionally, the predetermined criteria can be edited/updated both periodically by a request from a subscriber and automatically in response to system use. For example, initially a subscriber provides a series of preferred contact locations for parties he or she desires to be included in his or her information within the database. Referring to FIG. 3 , an exemplary record from the private encrypted database for a particular subscriber is illustrated.
  • the subscriber is referred to as “Jane Doe” and the individual she is attempting to contact is referred to as “John Smith.”
  • a record within the private encrypted database has previously been created from information provided by Jane Doe containing a schedule of preferred contact numbers for John Smith corresponding to various times during the week. For example, if Jane Doe is attempting to contact John Smith at 10:00 am on a Monday morning, the operator is given a first choice option corresponding to John Smith's work number, which has been previously stored in the private encrypted database.
  • the system may also be programmed to provide a default backup number. For example, a second choice number may be John Smith's cell number for Monday at 10:00 am.
  • the system may also be programmed to override the scheduled numbers in certain situations to improve call efficiency.
  • the information in the private encrypted database is dynamically updated to include a record of the history of calls from Jane Doe to John Smith.
  • a call was placed from Jane Doe to John Smith at 9:45 am on Monday, which in this example is 15 minutes prior to the Monday 10:00 a.m. attempt.
  • the call was completed via John Smith's cell phone number.
  • the system evaluates the prior call record to determine if any calls were placed within a predetermined time period. For example, the predetermined time period may be 30 minutes.
  • the system evaluates the prior call record and determines that a call was completed 15 minutes earlier, which is within the predetermined 30 minute period. Since it is logical to believe that contact with John Smith can be made at the same number used in the prior call, because only a short time has elapsed since the prior call, the prior contact number is provided to the operator as the primary contact choice, overriding the date/time schedule.
  • the private encrypted database is updated to reflect a history of such a call. This information can be used for the next call attempt (e.g., to determine the time elapsed since the last successful connection as discussed above) or to later determine the success/failure rate of contact attempts at particular numbers.
  • errors in the system e.g., a wrong number programmed into the private encrypted database
  • times and locations that have a poor connection rate and may need adjustment e.g., 9:00 am on Monday is programmed to use a party's work number, but the completion rate of calls between 9:00 am and 9:15 am at the work number is low and the completion rate during the same period is higher for the cell number; thus, this information indicates to the subscriber that updating the database to use the cell number during this time period would improve call completion efficiency
  • a subscriber receives an inbound call.
  • a user i.e., someone accessing the system for the purpose of contacting a subscriber
  • John Smith desires to contact a subscriber (step 401 ), for example, Jane Doe, he does so by placing a call via his telephone to one of Jane Doe's phone numbers (step 403 ).
  • the incoming call is routed to the system including a live operator and a computer (step 405 ).
  • the computer receives the inbound call information and extracts the preferred contact location from the private encrypted database and displays the information to the operator (step 407 ).
  • the contact information may be displayed to the operator via a GUI interface.
  • the operator can then complete the call by selecting a connection from the prioritized choices provided (step 409 ).
  • the primary designated location to reach a subscriber for an inbound call at a particular day/time may be checked against the dynamically updated record of recent call activity to determine if a higher call completion rate may be achieved at an alternate number. For example, as previously described, if Jane Doe was contacted by a caller within a previously predetermined time period (e.g., 15 minutes), the operator is provided with the contact information of the number at which the previous call reached Jane Doe as the primary choice, overriding any day/time number designation.
  • a previously predetermined time period e.g. 15 minutes
  • the private encrypted database is updated to reflect the instant call (step 411 ).
  • the instant call information is now available to be used in evaluating subsequent requests to contact the subscriber.
  • the system in accordance with an exemplary embodiment of the present invention provides several advantageous features. Subscribers communicate with a live operator, which is the preferred method of communication for many individuals. A live operator provides a level of service and customer satisfaction above that which can be achieved from an automated system. Additionally, call efficiency (i.e., the success rate at which call completions are achieved) is improved using the preferred contact locations provided by the system as described herein. Finally, the ability of the system in accordance with an exemplary embodiment of the present invention to dynamically update the database containing the information regarding the preferred contact location further improves the call efficiency rate.

Abstract

A secure valet telephone system is provided having a computer accessible by a live operator, a private encrypted database containing a plurality of contact numbers for one or more parties, with the contact numbers accessible by the computer, a telephone number through which a caller may contact the live operator and be connected by the live operator to a preferred contact number of a party chosen by the computer based upon data in said database, wherein the preferred contact number is hidden from the live operator. This system facilitates more efficient calling by connecting the calling party with the call location at which the contact party is most likely to be reached. The actual number dialed is concealed from the operator in the interests of privacy and security.

Description

    RELATED APPLICATION
  • The present invention claims priority to provisional application No. 60/499,257 filed on Aug. 29, 2003.
  • FIELD OF THE INVENTION
  • The invention relates to the field of telephone communications and, more particularly, to a secure valet telephone system.
  • BACKGROUND OF THE INVENTION
  • Today telephone networks have become increasing complex. In the not so distant past, contacting an individual normally meant calling a phone number for the individual's home or business. All of the residents of a household typically shared one telephone number, and often all individuals at a place of business shared one or a few telephone numbers. Today, this is rarely the case. Nearly every individual now has a plurality of numbers through which they can be contacted. For example, an individual may have at least one home number, a cell number, a pager number, an office direct dial number, an office main number, etc. As a result of today's changing world, it has become necessary to maintain a much more extensive catalog of phone numbers than was previously needed.
  • Additionally, because of the numerous contact numbers at which a particular individual might be reached, making productive call connections can be difficult. In order to reach a particular individual, several potential contact numbers might need to be called before the correct contact number (i.e., the number at which the individual can be reached at that particular moment) is found.
  • In order to help maintain extensive catalogs of contact numbers, electronic devices have been developed to store many phone numbers for a given person. For example, most cellular phones now have an address book capability that allows storage of numerous contact numbers. However, those devices require a substantial investment of time to enter all of the data into them, and an amount of technical savvy and manual dexterity to retrieve the information. Often, entering and retrieving information can be difficult. For example, it can be difficult to page through an electronic phonebook while one is driving. Some individuals have additional difficulties in accessing information stored in this manner (e.g., visually impaired individuals). Additionally, such a device containing a substantial amount of private contact information may be lost or stolen, resulting in the loss of all the sensitive personal information stored within the device.
  • Directory assistance has long been available to individuals seeking assistance in obtaining telephone numbers. However, current directory assistance techniques have several shortcomings. First, they do not aid in increasing call productivity as they do not distinguish between an individual's various numbers and normally do not include cellular numbers. Moreover, current directory assistance techniques contain a security concern because the operator has access to telephone numbers of the individuals on the system. In today's security conscious environment, this may be undesirable to many people.
  • SUMMARY
  • A secure valet telephone system is provided for enabling system subscribers to achieve improved call connection efficiency. The system comprises a live operator who can access upon request contact information for contact parties contained within a private encrypted database. The operator accesses the database via a computer. The computer uses the information stored within the database to determine a preferred contact number for the desired contact party. This facilitates more efficient calling by connecting the calling party with the call location at which the contact party is most likely to be reached. The actual number dialed is concealed from the operator in the interests of privacy and security.
  • The system may further include a method to update the database after each call to include information about the call attempt or call completion. Additionally, the system may further include a method to quickly and easily put a subscriber in touch with the operator such as via an autodialer, a one button connection, or a voice activated connection.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For the purpose of illustrating the invention, there is shown in the drawings a form which is presently preferred; it being understood, that this invention is not limited to the precise arrangements and instrumentalities shown.
  • FIG. 1 is a diagram of an exemplary system in accordance with one embodiment of the present invention.
  • FIG. 2 is a flow chart illustrating the steps involved in an outbound call by a subscriber using a system in accordance with one embodiment of the present invention.
  • FIG. 3 is an exemplary record for a subscriber contained within a private encrypted database in accordance with one embodiment of the present invention.
  • FIG. 4 is a flow chart illustrating the steps involved in an inbound call to a subscriber using a system in accordance with one embodiment of the present invention.
  • DETAILED DESCRIPTION
  • The figures show an exemplary embodiment of a secure valet telephone system in accordance with the present invention.
  • FIG. 1 shows an example of a telephone network 100 that incorporates a system in accordance with one embodiment of the present invention. A standard telephone network comprises numerous telephones, both wireless and wire lines, interconnected to each other via a network of wire lines and wireless communication channels managed by numerous telephone companies. The exemplary network 100 shown in FIG. 1 comprises wire line telephones (101, 102) and wireless telephones (103, 104) that communicate with the network via transmission towers (105,106). In the illustrated embodiment, the network 100 is in communication with a secure valet system 110. This communication may be achieved using various standard telephone network connections, for example, trunked telephone lines, although alternative connections including wireless connections could also be employed.
  • The system 110 employs a live operator 112, who is in communication with transmissions to and from the network 100 via standard telephone switching equipment 116. The system also contains a computer 118 capable of accessing a database 114. The term “computer” is used herein to describe a processing unit, such as a Central Processing Unit (CPU) with a graphical user interface (GUI). However, any number of alternatives may also be employed, such as a server residing on a distributed network. Using computer 118, the live operator can access selected information stored within the private encrypted database 114. In the illustrated embodiment, the database 114 is a private encrypted database that contains phone number information that is secure and may only be accessed by authorized personnel. The private encrypted database 114 contains contact information on various parties as provided by subscribers to the system, as further discussed below.
  • There are two types of callers who may access the system, “subscribers” and “users.” The term “subscribers” is used herein to refer to individuals who are part of the community of people belonging to the system 110 in accordance with an embodiment of the present invention. The term “users” is used herein to refer to individuals who may access the system 110 as part of a communication with a subscriber, but are not subscribers of the system (for example, a “user” may be directed to the system when calling a “subscriber”). Subscribers provide contact information on various parties, which is stored in the database 114. A party about whom information is stored comprises the target of the call. A party may or may not also be a subscriber to the system.
  • FIGS. 2 and 3 illustrate calling methods in accordance with the illustrated embodiment of the invention. The process by which a subscriber places an outbound call is discussed with reference to FIG. 2. When a subscriber desires to place an outbound call (step 201), he or she accesses the system via a telephone. In one embodiment, access is facilitated by using an auto-dialer or auto-router installed in the wireline phone in the subscriber's home or place of business. When the subscriber initiates a call by lifting the handset, the appropriate connection to an operator is made automatically. Alternatively, the subscriber may access the system via a wireless phone. In one embodiment, access via a wireless phone is achieved by pressing a soft-programmable key on the phone. This “one-touch” access removes the need for the subscriber to memorize or store a number to dial in order to access the system, and also removes the need to enter a plurality of keystrokes into the phone. This one-touch access can also allow subscribers who may have difficulty operating a conventional phone (e.g., small children, visually impaired individuals, etc.) to gain access to the secure valet system quickly and easily.
  • Once access is initiated by a subscriber, the subscriber is placed in contact with a live operator (step 203). By using a live operator, the secure valet system avoids requesting a series of prompts or entries from the subscriber, which may be difficult for some individuals to enter into the phone, as discussed above. Additionally, by providing a live operator instead of a series of prompts the system assures a rapid response in an emergency. After accessing the system, the subscriber places a request with the operator to contact a party. The operator is then provided with the requested party's contact information as contained in the private encrypted database (step 205). The private encrypted database comprises a compilation of data provided by each subscriber. The data includes the various contact locations and associated numbers for parties that are included in the subscriber's database. Such information has been previously provided by the subscriber for individuals that he or she specified, such as individuals that the subscriber calls most frequently.
  • A preferred contact location is retrieved from the private encrypted database (step 207), as further described below, and provided to the operator in order to allow the operator to complete the call (step 209). In a preferred embodiment, the actual phone numbers associated with a contact location are never seen by the operator. This alleviates the main concerns with live operator systems, which are compromising privacy and security. In the prior art, live operator systems necessitated providing information to the operator. In today's security conscious environment, this is not desirable. In the secure valet system in accordance with the invention, the operator is given selections for completing the call, normally displayed on a GUI provided via the computer. The display lists only the order of contact options, without displaying any actual phone numbers. For example, when attempting to contact John Smith, the information retrieved from the private encrypted database might be displayed as “John Smith cell—#1 option,” “John Smith work—#2 option,” etc.
  • The operator can now complete the call by choosing a location to which to direct the subscriber's call, normally to the preferred contact location for the user (Step 211) unless otherwise instructed by the subscriber. This may be accomplished using conventional telephone switching equipment to route the call over the outbound trunked phone lines into an existing telephone network. After the call has been completed, the private encrypted database may be updated to include a record of the current call (step 213) as further described below.
  • In order to improve call efficiency, the operator is provided with a contact selection that is most likely to result in a successful call completion (i.e., most likely to allow the subscriber to reach the called party). The preferred contact number is selected by the system from the private encrypted database in accordance with a number of predetermined criteria. Additionally, the predetermined criteria can be edited/updated both periodically by a request from a subscriber and automatically in response to system use. For example, initially a subscriber provides a series of preferred contact locations for parties he or she desires to be included in his or her information within the database. Referring to FIG. 3, an exemplary record from the private encrypted database for a particular subscriber is illustrated. In the illustrated example, the subscriber is referred to as “Jane Doe” and the individual she is attempting to contact is referred to as “John Smith.” A record within the private encrypted database has previously been created from information provided by Jane Doe containing a schedule of preferred contact numbers for John Smith corresponding to various times during the week. For example, if Jane Doe is attempting to contact John Smith at 10:00 am on a Monday morning, the operator is given a first choice option corresponding to John Smith's work number, which has been previously stored in the private encrypted database. The system may also be programmed to provide a default backup number. For example, a second choice number may be John Smith's cell number for Monday at 10:00 am.
  • In accordance with one exemplary embodiment of the present invention, the system may also be programmed to override the scheduled numbers in certain situations to improve call efficiency. The information in the private encrypted database is dynamically updated to include a record of the history of calls from Jane Doe to John Smith. In the example shown in FIG. 3, a call was placed from Jane Doe to John Smith at 9:45 am on Monday, which in this example is 15 minutes prior to the Monday 10:00 a.m. attempt. The call was completed via John Smith's cell phone number. The system evaluates the prior call record to determine if any calls were placed within a predetermined time period. For example, the predetermined time period may be 30 minutes. The system evaluates the prior call record and determines that a call was completed 15 minutes earlier, which is within the predetermined 30 minute period. Since it is logical to believe that contact with John Smith can be made at the same number used in the prior call, because only a short time has elapsed since the prior call, the prior contact number is provided to the operator as the primary contact choice, overriding the date/time schedule.
  • Each time a call is placed the private encrypted database is updated to reflect a history of such a call. This information can be used for the next call attempt (e.g., to determine the time elapsed since the last successful connection as discussed above) or to later determine the success/failure rate of contact attempts at particular numbers. This can be used to identify errors in the system (e.g., a wrong number programmed into the private encrypted database) or to identify times and locations that have a poor connection rate and may need adjustment (e.g., 9:00 am on Monday is programmed to use a party's work number, but the completion rate of calls between 9:00 am and 9:15 am at the work number is low and the completion rate during the same period is higher for the cell number; thus, this information indicates to the subscriber that updating the database to use the cell number during this time period would improve call completion efficiency).
  • Referring to FIG. 4, the process by which a subscriber receives an inbound call is illustrated. When a user (i.e., someone accessing the system for the purpose of contacting a subscriber), for example, John Smith, desires to contact a subscriber (step 401), for example, Jane Doe, he does so by placing a call via his telephone to one of Jane Doe's phone numbers (step 403). Using a call forwarding feature, the incoming call is routed to the system including a live operator and a computer (step 405). The computer receives the inbound call information and extracts the preferred contact location from the private encrypted database and displays the information to the operator (step 407). For example, the contact information may be displayed to the operator via a GUI interface. The operator can then complete the call by selecting a connection from the prioritized choices provided (step 409).
  • Similar to the process involved with outbound calls, the primary designated location to reach a subscriber for an inbound call at a particular day/time may be checked against the dynamically updated record of recent call activity to determine if a higher call completion rate may be achieved at an alternate number. For example, as previously described, if Jane Doe was contacted by a caller within a previously predetermined time period (e.g., 15 minutes), the operator is provided with the contact information of the number at which the previous call reached Jane Doe as the primary choice, overriding any day/time number designation.
  • Once the call has been completed, the private encrypted database is updated to reflect the instant call (step 411). The instant call information is now available to be used in evaluating subsequent requests to contact the subscriber.
  • The system in accordance with an exemplary embodiment of the present invention provides several advantageous features. Subscribers communicate with a live operator, which is the preferred method of communication for many individuals. A live operator provides a level of service and customer satisfaction above that which can be achieved from an automated system. Additionally, call efficiency (i.e., the success rate at which call completions are achieved) is improved using the preferred contact locations provided by the system as described herein. Finally, the ability of the system in accordance with an exemplary embodiment of the present invention to dynamically update the database containing the information regarding the preferred contact location further improves the call efficiency rate.
  • A variety of modifications to the embodiments described will be apparent to those skilled in the art from the disclosure provided herein. Thus, the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof and, accordingly, reference should be made to the appended claims, rather than to the foregoing specification, as indicating the scope of the invention.

Claims (20)

1. A secure valet telephone system comprising:
a computer accessible by a live operator;
a private encrypted database containing a plurality of contact numbers for one or more parties, said contact numbers being accessible by said computer;
a telephone number through which a caller may contact said live operator and be connected by said live operator to a preferred contact number of a party chosen by said computer based upon data in said database, wherein said preferred contact number is hidden from said live operator.
2. The system as set forth in claim 1, wherein said private encrypted database is updated to include a record of said call from said caller to said party via said operator.
3. The system as set forth in claim 1, wherein said preferred contact number comprises a number at which a previous connection was made if said previous connection occurred within a predetermined time period.
4. A secure valet telephone system comprising:
a computer accessible by a live operator;
a private encrypted database containing a plurality of contact numbers for subscribers to said system and being accessible by the computer;
a telephone number through which a user may contact said live operator and be connected by said live operator to a preferred contact number of a selected subscriber to said system chosen by said computer based upon data in said database, wherein said preferred contact number is hidden from said live operator.
5. The system as set forth in claim 4, wherein said user contacts said operator by placing a call to a phone number associated with said subscriber and wherein said call is forwarded via a call forwarding feature to said operator.
6. The system as set forth in claim 4, wherein said private encrypted database is updated to include a record of said call from said user to said subscriber via said operator.
7. The system as set forth in claim 4, wherein said preferred contact number comprises a number at which a previous connection was made if said previous connection occurred within a predetermined time period.
8. A secure valet telephone system comprising:
a private encrypted database containing one or more contact numbers for a party;
a telephone access number through which a subscriber can obtain access to the system;
means accessible by a live operator to connect the subscriber to the live operator and operable by the live operator to connect the subscriber to a preferred contact number for said party based upon data contained in said database, wherein said preferred contact number is hidden from said live operator.
9. The system as set forth in claim 8, wherein said subscriber contacts said operator via an autodialer feature.
10. The system as set forth in claim 8, wherein said subscriber contacts said operator via a phone having one-touch feature for connecting to said operator.
11. The system as set forth in claim 8, wherein said subscriber contacts said operator via a voice activated command.
12. The system as set forth in claim 8, wherein said private encrypted database is updated to include a record of said call from said subscriber to said party via said operator.
13. The system as set forth in claim 8, wherein said preferred contact number comprises a number at which a previous connection was made if said previous connection occurred within a predetermined time period.
14. A method for connecting a caller with of a secure valet telephone system to a user comprising the steps of:
placing a call to said system by said caller;
connecting said caller to said system, said system comprising a computer accessible by a live operator;
searching a private encrypted database accessible by said computer in response to a request by said caller to contact a party;
retrieving from said database a preferred contact location for said party; and
connecting said caller to said party at said preferred contact location.
15. The method as set forth in claim 14, wherein said preferred contact location is determined in accordance with the time of the call.
16. The method as set forth in claim 14, wherein said preferred contact location comprises a location at which a previous connection was made if said previous connection occurred within a predetermined time period.
17. The method as set forth in claim 14, wherein a phone number associated with said preferred contact location is hidden from said operator.
18. A method as set forth in claim 14, wherein said placing step further comprises the step of:
placing a call to a phone number associated with a subscriber to the system; and
forwarding said call to said system via a call forwarding feature.
19. A secure valet telephone system for connecting a caller to a party comprising:
means for connecting a caller to a computer system accessible by a live operator;
means for determining a preferred contact location for said party; and
means for directing a call from said caller to said party at said preferred contact location.
20. The method as set forth in claim 19, further comprising means for hiding a phone number associated with said preferred contact location from said operator.
US10/889,410 2003-08-29 2004-07-12 Secure valet telephone system Abandoned US20050047575A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US10/889,410 US20050047575A1 (en) 2003-08-29 2004-07-12 Secure valet telephone system
PCT/US2004/027816 WO2005022880A1 (en) 2003-08-29 2004-08-27 Personal directory service via live operator with destination numbers hidden from operator
EP04782315A EP1702452A1 (en) 2003-08-29 2004-08-27 Personal directory service via live operator with destination numbers hidden from operator
US11/581,685 US8103261B2 (en) 2003-08-29 2006-10-16 Secure valet telephone system apparatus and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US49925703P 2003-08-29 2003-08-29
US10/889,410 US20050047575A1 (en) 2003-08-29 2004-07-12 Secure valet telephone system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/581,685 Continuation-In-Part US8103261B2 (en) 2003-08-29 2006-10-16 Secure valet telephone system apparatus and method

Publications (1)

Publication Number Publication Date
US20050047575A1 true US20050047575A1 (en) 2005-03-03

Family

ID=34221736

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/889,410 Abandoned US20050047575A1 (en) 2003-08-29 2004-07-12 Secure valet telephone system
US11/581,685 Expired - Fee Related US8103261B2 (en) 2003-08-29 2006-10-16 Secure valet telephone system apparatus and method

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/581,685 Expired - Fee Related US8103261B2 (en) 2003-08-29 2006-10-16 Secure valet telephone system apparatus and method

Country Status (3)

Country Link
US (2) US20050047575A1 (en)
EP (1) EP1702452A1 (en)
WO (1) WO2005022880A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130259229A1 (en) * 2012-04-02 2013-10-03 Viswanatha Rao Thumparthy User managed number privacy and call accessibility
US20160094709A1 (en) * 2014-09-29 2016-03-31 Qualcomm Incorporated Intelligent options in redial screens of communication devices
EP3123706A1 (en) * 2014-03-28 2017-02-01 Vipconn B.V. Mobile device and server for voice and/or data exchange
CN110691170A (en) * 2019-08-29 2020-01-14 深圳市珍爱捷云信息技术有限公司 Method, device, computer equipment and storage medium for realizing virtual number calling
US20210150010A1 (en) * 2015-10-14 2021-05-20 Pindrop Security, Inc. Fraud detection in interactive voice response systems
US11205153B1 (en) 2013-11-15 2021-12-21 Grubhub Holdings, Inc. System and method for determining time of delivery of order
US11256864B2 (en) * 2020-06-19 2022-02-22 Apple, Inc. Contacts autocomplete keyboard

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7933897B2 (en) 2005-10-12 2011-04-26 Google Inc. Entity display priority in a distributed geographic information system
US8358766B1 (en) * 2006-08-10 2013-01-22 At&T Mobility Ii Llc Operating a directory assistance call center based upon directory assistance database and caller ID data
US20080281760A1 (en) * 2007-04-30 2008-11-13 Bellsouth Intellectual Property Corporation Service Negotiation
US8108001B2 (en) * 2007-12-03 2012-01-31 Trg Systems and methods for a simplified mobile phone
US20120059910A1 (en) * 2010-06-10 2012-03-08 Cricket Communications, Inc. Unlimited media access over wireless infrastructure
GB201019360D0 (en) * 2010-11-16 2010-12-29 Care Monitoring 2000 Ltd Reverse look up monitoring system
US8874888B1 (en) 2011-01-13 2014-10-28 Google Inc. Managed boot in a cloud system
US9135037B1 (en) 2011-01-13 2015-09-15 Google Inc. Virtual network protocol
US9063818B1 (en) 2011-03-16 2015-06-23 Google Inc. Automated software updating based on prior activity
US8533796B1 (en) 2011-03-16 2013-09-10 Google Inc. Providing application programs with access to secured resources
US9237087B1 (en) 2011-03-16 2016-01-12 Google Inc. Virtual machine name resolution
US9075979B1 (en) 2011-08-11 2015-07-07 Google Inc. Authentication based on proximity to mobile device
US8966198B1 (en) 2011-09-01 2015-02-24 Google Inc. Providing snapshots of virtual storage devices
US8958293B1 (en) * 2011-12-06 2015-02-17 Google Inc. Transparent load-balancing for cloud computing services
US8800009B1 (en) 2011-12-30 2014-08-05 Google Inc. Virtual machine service access
US8983860B1 (en) 2012-01-30 2015-03-17 Google Inc. Advertising auction system
US8996887B2 (en) 2012-02-24 2015-03-31 Google Inc. Log structured volume encryption for virtual machines
US8677449B1 (en) 2012-03-19 2014-03-18 Google Inc. Exposing data to virtual machines
US9069806B2 (en) 2012-03-27 2015-06-30 Google Inc. Virtual block devices
US9232394B2 (en) 2013-01-02 2016-01-05 International Business Machines Corporation Authentication of phone caller identity
CN112202964A (en) * 2020-09-30 2021-01-08 泰州翔升科技服务有限公司 Caller identification method

Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5339352A (en) * 1992-10-01 1994-08-16 Bell Atlantic Network Services, Inc. Directory assistance call completion via mobile systems
US5487111A (en) * 1993-07-29 1996-01-23 At&T Ipm Corp. Telecommunications system sequence calling
US5706339A (en) * 1994-11-30 1998-01-06 At&T Technique for use in processing personal telephone calls
US5724411A (en) * 1995-03-22 1998-03-03 At&T Corp. Method for selectively alerting multiple telephones of an incoming call
US5737700A (en) * 1994-04-28 1998-04-07 Metro One Telecommunications, Inc. Providing assistance to a mobile telephone subscriber travelling from a location to a desired location
US5742674A (en) * 1995-12-22 1998-04-21 At&T Corp. Automatic call-back system and method using data indicating best time to call
US5797092A (en) * 1994-04-28 1998-08-18 Metro One Telecommunications, Inc. Method for monitoring the connection between the subscriber and the destination telephone and providing directory assistance upon detection of predetermined tone
US5905789A (en) * 1996-10-07 1999-05-18 Northern Telecom Limited Call-forwarding system using adaptive model of user behavior
US5917891A (en) * 1996-10-07 1999-06-29 Northern Telecom, Limited Voice-dialing system using adaptive model of calling behavior
US5940493A (en) * 1996-11-26 1999-08-17 Bellsouth Corporation System and method for providing directory assistance information
US5943417A (en) * 1994-04-28 1999-08-24 Metro One Telecommunications, Inc. Method and system for personalized directory assistance services
US5986448A (en) * 1991-12-27 1999-11-16 Ntn Corporation Revolving speed detecting device with reduced eddy current loss
US6035217A (en) * 1997-10-29 2000-03-07 Sony Corporation Of Japan One button cellular phone, system, and method for use
US6130938A (en) * 1996-07-08 2000-10-10 Mitel Corporation Automatic call forwarding
US20020057784A1 (en) * 1997-03-13 2002-05-16 Metro One Telecommunications, Inc. Method and apparatus for monitoring telephonic members and providing directory assistance
US6404884B1 (en) * 1999-10-08 2002-06-11 Grape Technology Group, Inc. Personalized assistance system and method
US20030007627A1 (en) * 2000-03-07 2003-01-09 Elsey Nicholas J. Technique for providing information assistance including concierge-type services
US20030007620A1 (en) * 1997-03-13 2003-01-09 Elsey Nicholas J. Technique for effectively providing concierge-like services in a directory assistance system
US20030007625A1 (en) * 2000-01-31 2003-01-09 Robert Pines Communication assistance system and method
US20030026405A1 (en) * 1999-11-12 2003-02-06 Metro One Telecommunications, Inc. Enhanced directory assistance service providing individual or group directories
US6546005B1 (en) * 1997-03-25 2003-04-08 At&T Corp. Active user registry
US20030165223A1 (en) * 2000-03-07 2003-09-04 Timmins Timothy A. Technique for providing a telecommunication service including information assistance
US20030190475A1 (en) * 2002-04-09 2003-10-09 Everett Carpenter Magnetic nanoparticles having passivated metallic cores
US6678366B1 (en) * 1999-08-31 2004-01-13 Ulysses Esd, Inc. System and method for locating subscribers using a best guess location algorithm
US20040062373A1 (en) * 2002-09-30 2004-04-01 Baker Nathan Bryant Technique for invoking information assistance and services during a call
US20040096043A1 (en) * 2002-11-18 2004-05-20 Timmins Timothy A. Technique for assisting a user with information services at an information/call center
US6934378B2 (en) * 2002-05-31 2005-08-23 Metro One Telecommunications, Inc. Technique for enhanced information assistance call routing
US6994279B2 (en) * 2002-06-20 2006-02-07 Denso Corporation Fuel injection device

Family Cites Families (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4277649A (en) 1980-01-18 1981-07-07 Bell Telephone Laboratories, Incorporated Method and apparatus for screening telephone calls
US5206900B1 (en) * 1991-05-31 1998-06-09 David Callele Automated attendant
US5259026A (en) * 1991-12-18 1993-11-02 Bell Communications Research, Inc. Method for speed calling automatic update
US5327486A (en) 1993-03-22 1994-07-05 Bell Communications Research, Inc. Method and system for managing telecommunications such as telephone calls
JPH08506710A (en) * 1993-06-11 1996-07-16 ノーザン・テレコム・リミテッド User-controlled call management service method and apparatus
US6628772B1 (en) 1994-04-28 2003-09-30 Metro One Telecommunications, Inc. Method for providing enhanced directory assistance upon command using out-of-band signaling
US5592541A (en) 1995-05-31 1997-01-07 Southwestern Bell Technology Resources, Inc. Apparatus and method for forwarding incoming calls
KR0146169B1 (en) * 1995-06-30 1998-12-01 김주용 Pulse transmission apparatus for post-charge-logic
US5987110A (en) 1995-08-07 1999-11-16 Bellsouth Intellectual Property Corporation Method and system to bypass alternate routing plans applied to directory numbers
US6975708B1 (en) 1996-04-17 2005-12-13 Convergys Cmg Utah, Inc. Call processing system with call screening
US5896448A (en) * 1996-12-17 1999-04-20 Bellsouth Corporation Method and apparatus for routing calls based on call success history
US6075860A (en) * 1997-02-19 2000-06-13 3Com Corporation Apparatus and method for authentication and encryption of a remote terminal over a wireless link
US6587867B1 (en) 1997-05-22 2003-07-01 Mci Communications Corporation Internet-based subscriber profile management of a communications system
US6249579B1 (en) * 1998-05-29 2001-06-19 Lucent Technologies Inc. Apparatus, method and system for personal telecommunication speed calling utilizing an affinity database
US6813346B2 (en) 1998-08-10 2004-11-02 Sbc Properties, L.P. System and method for selecting a destination number upon receiving a dialed number from a calling party
US20020128033A1 (en) * 1998-11-30 2002-09-12 Burgess Shelia Jean Communications control method and apparatus
US6792082B1 (en) 1998-09-11 2004-09-14 Comverse Ltd. Voice mail system with personal assistant provisioning
FR2788914B1 (en) 1999-01-22 2001-03-23 Sfr Sa AUTHENTICATION METHOD, WITH ESTABLISHMENT OF A SECURE CHANNEL, BETWEEN A SUBSCRIBER AND A SERVICE PROVIDER ACCESSIBLE VIA A TELECOMMUNICATION OPERATOR
US6647107B1 (en) 1999-05-27 2003-11-11 Alcatel Multi-user answering system and method
US6771761B1 (en) 1999-12-29 2004-08-03 Bellsouth Intellectual Property Corporation System and method for caller-selectable call routing from a single telephone number
DE10002216C1 (en) * 2000-01-20 2001-08-09 Deutsche Telekom Mobil Procedure for subscriber-initiated automatic subscription
US6804338B1 (en) * 2000-05-04 2004-10-12 Cybiotronics, Inc. Electronic telephone directory
EP1158814B1 (en) 2000-05-26 2008-03-26 Nokia Siemens Networks Gmbh & Co. Kg Method for destination control in an intelligent network
US6968179B1 (en) 2000-07-27 2005-11-22 Microsoft Corporation Place specific buddy list services
CA2327610A1 (en) 2000-12-05 2002-06-05 Diaphonics, Inc. Method and apparatus for uniquely identifying an electronic transaction
US7561872B1 (en) 2001-03-19 2009-07-14 At&T Intellectual Property I, L.P. Methods and systems for accessing communications services
US6862350B2 (en) 2001-04-27 2005-03-01 Adtran, Inc. Integrated access device resident mechanism for automatically routing call to specified number upon off hook signaling event
US6944442B2 (en) 2001-05-01 2005-09-13 Agere Systems Inc. Wireless phone forwarding based on phone location
US6959077B1 (en) * 2001-06-25 2005-10-25 Bellsouth Intellectual Property Corp. System and method for re-routing incoming calls
US6668049B1 (en) * 2001-12-19 2003-12-23 Bellsouth Intellectual Property Corporation Systems and methods for intelligent third-party redirection of an incoming call via a display-based communication center
US6754325B1 (en) 2002-03-29 2004-06-22 Bellsouth Intellectual Property Corporation Caller control of call forwarding services
US6947730B2 (en) 2002-06-27 2005-09-20 Inventec Appliances Corp. Method enabling mobile telephones to have automatic multiple telephone number dialing capability to a same called party
US6999573B2 (en) 2002-11-07 2006-02-14 International Business Machines Corporation Locale based call forwarding with automated creation of new locales
US6928279B2 (en) 2003-02-27 2005-08-09 Avaya Technologies Corp. Peer-to-peer discovery for location-based forwarding
US7024183B2 (en) * 2003-07-30 2006-04-04 Motorola, Inc. Communication device with intelligent communication management and method therefor
US7680259B2 (en) 2004-01-12 2010-03-16 At&T Intellectual Property, I,L.P. Rule-based intelligent call forwarding
CN100488303C (en) 2004-04-08 2009-05-13 深圳市点睛科技有限公司 Method of terminal and called communication with mobile terminal relation
US20050272410A1 (en) 2004-06-03 2005-12-08 Inventec Corporation Monitoring system for use status of computer apparatus

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5986448A (en) * 1991-12-27 1999-11-16 Ntn Corporation Revolving speed detecting device with reduced eddy current loss
US5339352A (en) * 1992-10-01 1994-08-16 Bell Atlantic Network Services, Inc. Directory assistance call completion via mobile systems
US5487111A (en) * 1993-07-29 1996-01-23 At&T Ipm Corp. Telecommunications system sequence calling
US6788931B2 (en) * 1994-04-28 2004-09-07 Metro One Telecommunications, Inc. Directory assistance method and apparatus
US5737700A (en) * 1994-04-28 1998-04-07 Metro One Telecommunications, Inc. Providing assistance to a mobile telephone subscriber travelling from a location to a desired location
US5797092A (en) * 1994-04-28 1998-08-18 Metro One Telecommunications, Inc. Method for monitoring the connection between the subscriber and the destination telephone and providing directory assistance upon detection of predetermined tone
US6396920B1 (en) * 1994-04-28 2002-05-28 Metro One Telecommunications, Inc. System for selectively providing a higher level of directory assistance services
US20040082320A1 (en) * 1994-04-28 2004-04-29 Metro One Telecommunications, Inc. Directory assistance method and apparatus
US6754486B2 (en) * 1994-04-28 2004-06-22 Metro One Telecommunications, Inc. Method and system for directory assistance services having messaging or paging capability
US5943417A (en) * 1994-04-28 1999-08-24 Metro One Telecommunications, Inc. Method and system for personalized directory assistance services
US5706339A (en) * 1994-11-30 1998-01-06 At&T Technique for use in processing personal telephone calls
US5724411A (en) * 1995-03-22 1998-03-03 At&T Corp. Method for selectively alerting multiple telephones of an incoming call
US5742674A (en) * 1995-12-22 1998-04-21 At&T Corp. Automatic call-back system and method using data indicating best time to call
US6130938A (en) * 1996-07-08 2000-10-10 Mitel Corporation Automatic call forwarding
US5917891A (en) * 1996-10-07 1999-06-29 Northern Telecom, Limited Voice-dialing system using adaptive model of calling behavior
US5905789A (en) * 1996-10-07 1999-05-18 Northern Telecom Limited Call-forwarding system using adaptive model of user behavior
US5940493A (en) * 1996-11-26 1999-08-17 Bellsouth Corporation System and method for providing directory assistance information
US20020085702A1 (en) * 1997-03-13 2002-07-04 Metro One Telecommunications, Inc. Method and apparatus for monitoring telephonic members and providing directory assistance
US6456709B1 (en) * 1997-03-13 2002-09-24 Metro One Telecommunications, Inc. Method and apparatus for monitoring telephonic members and providing directory assistance
US6917678B2 (en) * 1997-03-13 2005-07-12 Metro One Telecommunications, Inc. Method and apparatus for monitoring telephonic members and providing directory assistance
US20030007620A1 (en) * 1997-03-13 2003-01-09 Elsey Nicholas J. Technique for effectively providing concierge-like services in a directory assistance system
US6754326B2 (en) * 1997-03-13 2004-06-22 Metro One Telecommunications, Inc. Method and apparatus for monitoring telephonic members and providing directory assistance
US20020057784A1 (en) * 1997-03-13 2002-05-16 Metro One Telecommunications, Inc. Method and apparatus for monitoring telephonic members and providing directory assistance
US20020057788A1 (en) * 1997-03-13 2002-05-16 Patrick M. Cox Method and apparatus for monitoring telephonic members and providing directory assistance
US6546005B1 (en) * 1997-03-25 2003-04-08 At&T Corp. Active user registry
US6035217A (en) * 1997-10-29 2000-03-07 Sony Corporation Of Japan One button cellular phone, system, and method for use
US6678366B1 (en) * 1999-08-31 2004-01-13 Ulysses Esd, Inc. System and method for locating subscribers using a best guess location algorithm
US6668055B2 (en) * 1999-10-08 2003-12-23 Grape Technology Group, Inc. Personalized assistance system and method
US6404884B1 (en) * 1999-10-08 2002-06-11 Grape Technology Group, Inc. Personalized assistance system and method
US20020196922A1 (en) * 1999-10-08 2002-12-26 Evan Marwell Personalized assistance system and method
US20030026405A1 (en) * 1999-11-12 2003-02-06 Metro One Telecommunications, Inc. Enhanced directory assistance service providing individual or group directories
US20030007625A1 (en) * 2000-01-31 2003-01-09 Robert Pines Communication assistance system and method
US20030165223A1 (en) * 2000-03-07 2003-09-04 Timmins Timothy A. Technique for providing a telecommunication service including information assistance
US20030007627A1 (en) * 2000-03-07 2003-01-09 Elsey Nicholas J. Technique for providing information assistance including concierge-type services
US20030190475A1 (en) * 2002-04-09 2003-10-09 Everett Carpenter Magnetic nanoparticles having passivated metallic cores
US6934378B2 (en) * 2002-05-31 2005-08-23 Metro One Telecommunications, Inc. Technique for enhanced information assistance call routing
US6994279B2 (en) * 2002-06-20 2006-02-07 Denso Corporation Fuel injection device
US20040062373A1 (en) * 2002-09-30 2004-04-01 Baker Nathan Bryant Technique for invoking information assistance and services during a call
US20040096043A1 (en) * 2002-11-18 2004-05-20 Timmins Timothy A. Technique for assisting a user with information services at an information/call center

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130259229A1 (en) * 2012-04-02 2013-10-03 Viswanatha Rao Thumparthy User managed number privacy and call accessibility
US9565556B2 (en) * 2012-04-02 2017-02-07 Viswanatha Rao Thumparthy User managed number privacy and call accessibility
US11205153B1 (en) 2013-11-15 2021-12-21 Grubhub Holdings, Inc. System and method for determining time of delivery of order
EP3123706A1 (en) * 2014-03-28 2017-02-01 Vipconn B.V. Mobile device and server for voice and/or data exchange
CN106664341A (en) * 2014-03-28 2017-05-10 唯品康公司 Mobile device and server for voice and/or data exchange
US10277738B2 (en) 2014-03-28 2019-04-30 Vipconn B.V. Mobile device and server for voice and/or data exchange
US20160094709A1 (en) * 2014-09-29 2016-03-31 Qualcomm Incorporated Intelligent options in redial screens of communication devices
US10110737B2 (en) * 2014-09-29 2018-10-23 Qualcomm Incorporated Intelligent options in redial screens of communication devices
US20210150010A1 (en) * 2015-10-14 2021-05-20 Pindrop Security, Inc. Fraud detection in interactive voice response systems
US11748463B2 (en) * 2015-10-14 2023-09-05 Pindrop Security, Inc. Fraud detection in interactive voice response systems
CN110691170A (en) * 2019-08-29 2020-01-14 深圳市珍爱捷云信息技术有限公司 Method, device, computer equipment and storage medium for realizing virtual number calling
US11256864B2 (en) * 2020-06-19 2022-02-22 Apple, Inc. Contacts autocomplete keyboard

Also Published As

Publication number Publication date
US20070123276A1 (en) 2007-05-31
US8103261B2 (en) 2012-01-24
EP1702452A1 (en) 2006-09-20
WO2005022880A1 (en) 2005-03-10

Similar Documents

Publication Publication Date Title
US20050047575A1 (en) Secure valet telephone system
US8081742B2 (en) Technique for effectively providing a personalized information assistance service
US8938060B2 (en) Technique for effectively providing personalized communications and information assistance services
US20040058710A1 (en) Technique for synchronizing data in user devices through an information service
CA2431154C (en) Technique for providing personalized information and communications services
US6944279B2 (en) Enhanced directory assistance service providing individual or group directories
US9094507B2 (en) System, method, and computer program product for providing information associated with a remote geographic location of a called party
JP3636266B2 (en) Web phone dialer system
US20010036258A1 (en) Telecommunication service for prioritizing and enhancing privacy of incoming calls
US8693672B2 (en) Technique for effectively assisting a user during an information assistance call
US5428678A (en) Telephone calling method and apparatus
EP0608654A1 (en) Telephone directing method and apparatus
US20040006557A1 (en) Technique for effective management of directory information
WO2008005924A2 (en) Temporary voicemail greeting for cellular phones: instant away messaging
US5727046A (en) Personal electronic telephone directory apparatus with remote accessibility
US20100172484A1 (en) Intelligent Speed Dialing
US6807264B1 (en) Computer telephony integration
US8335495B1 (en) Displaying business directory information on a mobile handset
CA2453499A1 (en) Technique for effectively providing personalized communications and information assistance services
CA2453501A1 (en) Technique for effectively providing a personalized information assistance service
WO2003039172A1 (en) Procedure and system for creation of information
EP2008433A2 (en) Adding an identified caller's other devices to a voice mail system

Legal Events

Date Code Title Description
AS Assignment

Owner name: LUXEFONE CIRCLES, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PARKER, STEPHEN;FOX, JAMES;REEL/FRAME:015573/0702;SIGNING DATES FROM 20040611 TO 20040708

AS Assignment

Owner name: PARKER, STEPHEN, PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FOX, JAMES;REEL/FRAME:018872/0565

Effective date: 20070115

STCB Information on status: application discontinuation

Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION