System and a method for carrying out personal and business transactions

ABSTRACT

The present invention relates to a system and a method for carrying out personal transactions including financial transactions, e-mail transactions, and voice messaging transactions. A user of the system is issued a ten digit identification number in the form of a telephone number. The identification number may be the user&#39;s actual phone number or a pseudo phone number. The user is also assigned a PIN number which contains a single or multiple digit security element which allows the user to indicate a security problem and its nature by dialing the assigned PIN number and which allows the user to avoid tripping the security elements of the system by using a digit or digits other than that/those assigned as the significantly placed digit(s) in the PIN number. Access to the system is provided either by dialing a central telephone number or via the Internet.

BACKGROUND OF THE INVENTION

The present invention relates to an improved system and method forcarrying out personal and business transactions, such as financialtransactions, e-mail transactions, and voice messaging transactions. Thesystem and method of the present invention may be utilized by hearingindividuals as well as hearing impaired or deaf individuals.

Communication plays an increasingly growing role in today's society.Despite dramatic technological changes in the past years, the telephonecontinues to be a principal means of communication. A growing number ofpeople have cell phones and routinely use them to leave voice messagesfor friends and associates and conduct business transactions. Sometimeshowever the telephone number of the individual or business that they aretrying to contact is not readily available.

Over the years, messaging systems have been developed which allow a userto leave messages for subscribers to the messaging system. U.S. Pat. No.5,450,476 to D'Apuzzo et al., for example, illustrates a nonpublishednumber messaging system which allows a caller to leave a message for aparty having an unpublished telephone number. In this system, calls to adirectory assistance operator are routed to a voice mail serviceprovider. A recorded message left by the caller is delivered to theappropriate party by the provider.

U.S. Pat. No. 5,661,781 to DeJager illustrates a message notificationsystem in which subscribers are automatically notified of newly arrivedmessages in their mailboxes when they initiate a transaction, such as acalling card call or a withdrawal at an ATM. The mail arrivalnotification message is delivered to the subscriber as part of thevalidation process for the credit/debit or calling card number.

U.S. Pat. No. 5,675,507 to Bobo II illustrates a message storage anddelivery system which is connected to a plurality of DID phone lines.The system is designed to receive facsimile messages, voice messages,and data messages. The system assigns a separate telephone number toeach user and is capable of receiving more than one messagesimultaneously for a single user.

The messages are stored in a memory and converted into HTML files. Thesystem is connected to the Internet and notifies the users with ane-mail message each time a message is received. The system is alsocapable of paging a user upon receipt of a message. After receivingnotification, the user can download the message onto his/her computer orsimply preview the message. A user can also telephone the system tolisten to messages.

U.S. Pat. No. 4,878,239 to Solomon et al. describes a method and anapparatus for establishing anonymous telephone communications betweenservice subscribers and responding callers over public telephone lines.Incoming calls from callers are transferred by a system controller andan additional subsystem to a message recording facility or directly tothe desired subscriber.

U.S. Pat. No. 5,767,747 to Yue et al. relates to a personal numbercommunications system which assigns a personal number to each subscriberand receives from each subscriber communication routing information inthe form of one or more hierarchical lists of destinations based on thetime of day and day of the week. The system receives communicationsdirected to the subscriber's personal number and identifies the sourceof the communication. The system then selects a first destination forthe communication from the hierarchical list. At the first destination,the system announces the identified source of the communication andrequests disposition information as to the acceptance, formal rejectionor passive rejection, such as a no answer, of the communication. Ifrejected, the system routes the communication to the default destinationselected by the subscriber. If there is a passive rejection, the systemrequests communication disposition information from the next destinationin the destination list according to the hierarchy selected by thesubscriber. The system continues to request communication dispositioninformation from each sequential destination on the destination listuntil the communication is accepted or until the last destination on thedestination list is reached, at which point the communication is routedto the last destination.

Other voice mail and message delivery systems are shown in U.S. Pat.Nos. 5,301,226 to Olson et al., 5,058,152 to Solomon et al., 5,889,839to Beyda et al., 4,972,461 to Brown et al., 5,761,271 to Karnowski, and5,177,780 to Kasper et al.

Telephones are also being used in connection with credit cardtransactions. For example, U.S. Pat. No. 5,513,250 to McAllisterillustrates a system and a method for enhancing the security of creditcard use through a telephone system wherein the subscriber may establishthrough the telephone network a series of parameters which must besatisfied in order to activate the credit card to permit validation bypassage of the card through the conventional point-of-sale magneticswiping device. The parameters may include subscriber establishment ofan activation time frame, an activation area, a dollar limit onpurchasing power, a temporary PIN valid subject to satisfaction of theother parameters, and voice verification.

Despite these systems, there still is a need for a secure system andmethod for carrying out financial transactions which also allows a userto leave voice messages and e-mails for others. There is also a need fora system and method for carrying out personal and/or businesstransactions which leaves a verifiable trail to the identity of thetransaction originator. Still further, there is a need for an improvedcommunication system for hearing impaired/deaf persons.

SUMMARY OF THE INVENTION

Accordingly, it is an object of the present invention to provide asecure system and method for carrying out personal transactionsincluding financial, e-mail, and voice messaging transactions.

It is another object of the present invention to provide a system andmethod as above which enables the utilization of a universal, personalor individual, open market identification coupled with a unique securetransaction identifier.

It is a further object of the present invention to provide a system andmethod as above which utilizes a PIN number having a security componentwhich uniquely indicates trail activation requirements, as well as, thewell being of the user.

It is yet a further object of the present invention to provide a systemand a method as above which allows a wide variety of financialtransactions to be carried out at a wide variety of locations.

It is still a further object of the present invention to provide asystem and a method as above which allows users to purchase merchandiseover the Internet without having to use and/or expose credit/debitcards.

It is still another object of the present invention to provide a systemand a method as above which allows individuals or entities to purchasemerchandise over the Internet even though they do not have a creditcard.

It is still another object of the present invention to provide a systemand a method which allows hearing impaired or deaf people to leaveemails and voice messages for others.

It is still another object of the present invention to provide a systemand a method which allows hearing impaired or deaf individuals toparticipate in conference calls with others.

The foregoing objects are attained by the system of the presentinvention.

As used herein, the term “on-line service provider” means any serviceprovider including but not limited to on-line service providers orindependent service providers (ISPs).

In accordance with the present invention, a system for carrying outpersonal transactions including financial transactions, e-mailtransactions, and voice messaging transactions is provided. A user ofthe system is issued a ten digit identification number in the form of atelephone number. The identification number may be the user's actualphone number or a pseudo phone number, which pseudo phone number islinkable to the user's actual phone number. The user is also assigned aPIN number which contains a single or multiple digit security elementwhich allows the user to indicate a security problem by dialing theassigned PIN number and which allows the user to avoid tripping thesecurity elements of the system by using one or more digit(s) other thanthose assigned as the security digit(s) in the PIN number.

The system of the present invention allows a user to perform a widevariety of financial transactions including deposits, withdrawals,merchandise purchases, etc. at a wide variety of locations. It alsoallows a user to purchase merchandise over the Internet without using adebit/credit card.

The system of the present invention allows a user, including a deafperson, to transmit and receive e-mails and to be notified when he/sheis a recipient of such e-mails. The system also allows a user to sendmoney to another party and to notify a recipient that money is availableand allows the recipient to receive or retrieve the available money. Thesystem enables a user to receive e-mails and/or money notificationwithout actually having a personal computer.

The system of the present invention also allows a user to receive voicemessages from both subscribers and non-subscribers to the system. Forexample, an individual using a pay phone or a cellular phone may leave amessage for another party, without utilizing that party's answeringmachine, which can be retrieved by the another party from another payphone or another cellular phone.

The system of the present invention also allows hearing impaired or deafpeople to participate in conference calls with other hearing impaired ordeaf individuals and/or hearing individuals.

Methods for using the system of the present invention to accomplish theforegoing are also described.

Other details of the method and system of the present invention, as wellas other objects and advantages attendant thereto, are set forth in thefollowing detailed description and the accompanying drawings whereinlike reference numerals depict like elements.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic representation of a center for performing personaltransactions in accordance with the present invention;

FIG. 2 is a schematic representation of a local area computer networkused in the center of FIG. 1;

FIG. 3 is a flow chart illustrating the opening of an account forperforming financial transactions using the system of the presentinvention;

FIG. 4 is a flow chart illustrating the making of a deposit orwithdrawal at a remote location using the system of the presentinvention;

FIG. 5 is a flow chart illustrating an ATM transaction withdrawing moneyusing the system of the present invention;

FIG. 6 is a flow chart illustrating the purchase of merchandise from aretailer using the system of the present invention;

FIG. 7 is a schematic representation of a system which enables a deafperson to leave a message for another in text or voice form;

FIG. 8 illustrates a schematic representation of a system for allowing ahearing impaired or deaf person to initiate an IM or ICQ session;

FIG. 9 illustrates a schematic representation of a system for issuing anIM or ICQ invitation when either party is not connected at the time;

FIG. 10 illustrates a schematic representation of a system for having aconference call of TTY users;

FIG. 11 illustrates a schematic representation of a system for sharingdata amongst conferencing parties which include hearing impaired or deafparticipants;

FIG. 12 illustrates a schematic representation of a system, for having aweb IM or ICQ session involving TTY users;

FIG. 13 illustrates a schematic representation of a system for a TTYuser to communicate with a voice recipient via a telecommuting operator;

FIG. 14 illustrates an alternative embodiment of a system for a TTY userto communicate with a voice recipient via a telecommuting operator;

FIG. 15 illustrates a system for allowing a voice originator tocommunicate with a TTY user via a telecommuting operator;

FIG. 16 illustrates a flow chart illustrating how speech or other soundscan be slowed down for a hard of hearing person;

FIG. 17 illustrates a system for enabling a hard of hearing person tolisten to a particular speech or sound;

FIG. 18 is a flow chart of a method employed in the system of FIG. 17 toidentify various speaking parties or sounds; and

FIG. 19 is a flow chart of a method employed in the system of FIG. 17 toblock out unwanted speech or sounds.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)

As previously mentioned, the present invention relates to a method and asystem for carrying out various types of personal transactions using anidentification number in the form of a telephone number. The system mayinclude one or more communication centers 10 whose structure will bedescribed hereinafter. Each of the centers 10 is configured to performfinancial, e-mail, and voice messaging transactions as well as othertypes of personal transactions.

One of the transactions that can be carried out using the method andsystem of the present invention is called Fast Cash Transaction (FCT).FCT is a monetary system that allows a user to move money, either in theform of real cash or virtual cash, in a number of ways. Virtual cash, asused herein, is cash moved among temporary or non-temporary accountscalled Cash On Line Accounts (COLA). The FCT system cures the problemsthat present day sundry banking and monetary transactions of cashpayments and receipts are lacking—namely automation, security, andprivacy. Further, the FCT system cures the current problem that mostmonetary transactions are not “at will” and require customers to be inspecific locations at specific times.

Utilizing the FCT portion of the system of the present invention, a usercan go to any retail establishment, such as a chain food store orgasoline station, deposit cash under a set format of transactions andrequest delivery of the cash to a particular third party or to himself.The third party can then go to another retail establishment and redeemthe designated amount in cash. The FCT system also allows a user toobtain cash, that had been deposited in another location by a thirdparty, from an automated teller machine (ATM). A user can also keep acertain amount of cash in a private COLA and simply issue instructionsabout movement of the cash in the account via telephone. If therecipient of the cash being moved has a COLA account, then the amount ofmoney transferred can be credited to his/her COLA account. The recipientcould also receive the money being transferred at an ATM, a kiosk, anFCT terminal, or a retail location without having a standing accountrelationship. The FCT system can also be used to electronically paybills in the form of e-mail notices, such as mortgage payments viae-mail. It is a more cost-effective approach than dedicated web sitesrun by individual goods/services providers.

As will be described in more detail hereinafter, utilizing the FCTsystem, a user can tag a transaction without revealing such tagging ifmoney is being extracted under duress. Alternatively, the user can alerta 911 emergency station via a silent embedded 911 call if a potentialviolent occurrence is related to the withdrawal. The alarm isautomatically activated by a default with each transaction unless turnedoff by the user utilizing a special feature of his/her PIN number.

A center 10 used to perform a FCT transaction is shown in FIG. 1. Thecenter 10 is also preferably used to support voice messaging, e-mailtransaction, and other communication systems in accordance with thepresent invention. The center 10 includes a local area network 12 havingone or more servers and a number of data bases needed to operate thecenter and perform the FCT, voice messaging, e-mail, and othercommunication transactions. Data can be received by the local areanetwork 12 from a web site which can be accessed via the Internetthrough any Internet service provider via data line 14 and router 16.Data line 14 may comprise any suitable data transmission line known inthe art. Similarly, router 16 may comprise any suitable router known inthe art. A firewall 18 is provided to prevent unauthorized personnel,such as hackers, from gaining access to the information stored in thelocal area network 12. The firewall 18 may include blocking routers aswell as dedicated pre-bastion and bastion systems differentiatingbetween systems' read and write authorizations. Any suitable firewalltechnology known in the art may be used for the firewall 18.

The center 10 also has one or more lines for voice transmissions toallow the public to access the center via any telephone system. A pointto point transport media, such as T-1, T-3, or wireless, enablingtransmission between the center 10 and a telephone company (TELCO), thatis further connected by the TELCO to the public network system, such asis presently done by a unit like a DMS 500, enables a large number oftelephone transactions. As shown in FIG. 1, communications coming over avoice line pass through a dual tone multifrequency device (DTMF) 20before being forwarded to the local area network 12.

The center 10 also includes a voice response unit 22. The voice responseunit 22 receives voice and/or DTMF communications from the public andconverts them to digital signals. The voice response unit 22 or anancillary unit communicates the digital signals to the local areanetwork 12 and receives digital instructions from the local area network12 for responses to be made in response to the voice communications. Inthis way, necessary information from a user of the system, such ashis/her identification number, can be inputted and additionalinformation requested. For example, the voice response unit 22 can beinstructed by the local area network 12 to provide the user with voiceinstructions, such as press 1 for e-mail, press 2 for voice messaging,press 3 for cash transactions, etc., to gain more information about thetransaction to be consummated. There are a number of commercial voiceresponse units, such as one sold by Verifone, which can be used for thevoice response unit 22. It should be noted that other ways exist toaccomplish this function. For example, a text to speech unit 28 caninstruct the user in voice based on appropriately triggered questionssubmitted in text and transmitted in voice while the DTMF unit deciphersthe response of the user.

The center 10 further includes a telephone communications system 24 forcommunicating with outside agencies such as the police, fire, otherinstitutions such as banks, etc. While the system 24 can have anydesired configuration, it preferably has a dial out unit 26 and a textto speech unit 28. When performing voice messaging services, thetelephone communications system 24 may be linked to sub-message centers(not shown) located around the country for reasons to be discussedhereinafter.

Access to the center 10 can be gained in a number of ways. For example,the public can access the center 10 using any standard telephone and anydesired telephone service. As discussed above, telephone communicationstravel along the voice line to the dual tone multiple frequency device20 and then to the local area network 12. Alternatively, the center 10may be accessed via the Internet. Data entered in this manner movesalong the line 14 and through router 16 to the local area network 12.Accessing the center 10 in a wireless manner is similar to voicetravelling along a voice line except that the airways replace the landline transport media.

The local area network 12 can have any desired architecture. FIG. 2schematically shows one such architecture where the local area network12 includes a server 30 for operating the network and a server 32dedicated to operating the e-mail function. Other servers can be addedfor specific applications that are independent though relatedconceptually. The local area network 12 also includes a number of databases 34 including, but not limited to, a historical data base, amaintenance data base, a customer data base, a billing and collectiondata base, a statistical data base, an administrative data base, atransactions data base, a data base for holding messages, and a retainedmessage database. The data bases can be combined as appropriate and maybe stored in any suitable storage device known in the art using anysuitable storage media.

The local area network 12 further includes a search engine 36 withaccess to the data bases 34; a set 38 of stored processing instructionswhich govern the operation and has access to the servers 30 and 32; aserver 40 having a set of stored FCT operating instructions to which theserver 30 has access; a server 42 having a set of stored voice messagingsystem operating instructions to which the server 30 has access; asecurity operation and data base 44 to which each of the servers 30, 32,40 and 42 have access; and a billing and statistics data base 46 whichcan be accessed by the servers 30, 32, 40 and/or 42 and to which any ofthe servers can transfer information.

The security system 44 contains instructions for checking both staticand dynamic system states as well as an appropriate data base. Forexample, when checking static system states, the instructions whenimplemented by one of the servers in the network 12 checks for: (1)multiple account numbers with the same pin number; (2) multiple pinnumbers with same or different account numbers; (3) transactionsinvolving similar amounts, days, and/or time of day; (4) frequenttransactions involving a particular user; and (5) the relationship ofthe transaction originator to an account. From this information patterncalculations and variations can be made and elevated states determined.If an elevated state is determined, an alert to the system can beissued. When checking dynamic states, the data base looks at geographictransactions, frequency of usage, and/or sums and patterns. From thesechecks, pattern and magnitude variation calculations are made usingstandard mathematical techniques and from these calculations, elevatedstates are detected. As before, alerts can be issued to the system whenan elevated state is detected.

Each of the servers 30, 32, 40, and/or 42 used in the local area network12 may comprise any suitable computer known in the art programmed usingany suitable program in any suitable language known in the art and anysuitable operating system. For example, each server could be a Tandemcomputer, an uninterruptable Stratus computer, a Hewlett-Packardcomputer, or an IBM compatible computer. The programming used with thecomputers should preferably be multi-user, multi-tasking software. Stillfurther, the operating system for each server can be any operatingsystem known in the art, such as Windows NT or a UNIX version.

As discussed above, the center 10 preferably includes a publiclyaccessible Internet web site for the downloading of free software,client's software, and upgrades, such as those needed to perform FCTtransactions, as well as service, Q&A sessions, and general usersactivity. The web site preferably is operated by its own server (notshown). Preferably, the hardware platform used for the Internet web siteis not a node on the local area network at the center 10 and is freestanding so as to provide a shield between public access and networkoperations. A dedicated hardware platform processes all Public Internettransactions and is shielded from the rest of the FCT systems by firewall architecture 18.

FIG. 3 is a flow chart illustrating the process for a customer toregister with and/or open an account with the FCT system operated by thecenter 10. The customer can use any telephone to open an account in arelatively short amount of time by accessing the FCT system via acentral telephone number such as an 800 number. Alternatively, thecustomer can use his/her personal computer to access the FCT system viathe Internet site operated by the center 10 or via a dedicated FCTInternet access website operated by the center 10.

When a telephone is used, the actions of the customer needed to set upthe account are voice prompted by the voice response unit 22 or the textto speech complex 24. Deaf and hard of hearing customers receive theirprompting in text or sign language as discussed later on. When settingup the account via the Internet, the actions of the customer needed toset up the account are prompted on the customer's monitor viainstructions issued by the FCT system 40 or a FCT related server 50 whenone is used.

In step 101, the customer or user is prompted to provide certainidentification information. For example, the customer may be asked toprovide his/her first name, middle initial, surname, home address, hometelephone, business address, business telephone number, etc.

When registering and/or setting up an account, each customer is assigneda unique identification number, referred to by the FCT System as aTelephone Number Address (TNA), and a PIN number. In step 102, thecustomer is prompted for a ten digit identification number in the formof a telephone number. The identification number may be the customer'sactual telephone number or a fictitious telephone number that he/sheselects or is given by the system. If desired, a customer can requestthe FCT system to randomly allocate an identification number. Fictitiousor pseudo identification numbers are registered with the FCT system andpublished in an internal FCT directory that is stored in the customerdata base.

In step 103, the customer is prompted to select a PIN number. The PINnumber may be one which is requested by the customer or a number whichis assigned to the customer by the FCT system. The assigned PIN numberis stored in the customer data base.

The PIN number is composed of two segments. The segments may beconsecutive or interlaced. The first segment is a standard numeric ofany number of consecutive digits broken only if it is interlaced with acomponent of the second segment. Each digit in the first segment cantake any numerical value in the range of 0 to 9. The second segment is asingle or multiple digit security element. Each digit in the secondsegment can take any numerical value in the range of 0 to 9. The twosegments may be concatenated or interlaced to form a single PINrepresentation. The security element is a security device for bothmonetary value transacted as well as the transacting parties. The FCTsystem and method are designed so that under normal transactionconditions, without any threat to money or persons, the securitydigit(s) given by the customer may be any digit(s) except the digit(s)selected by the customer for the security digit(s). Under adverseconditions, the security digit(s) in the PIN used by the customer arethe numerical value(s) selected for the security digit(s). If thecustomer uses the selected value(s) for the security digit(s), then theFCT system sends an alarm signal to appropriate authorities via thetelephone communication unit 24 at the center 10. The alarm signaltriggers elements that identify the location of the customer or partiesunder duress.

When the customer selects two digits for the second or security segment,a first one of the digits, when used, would signify an adverse conditionbut not one which involves bodily harm to the customer, while the secondone of the digits, when used, would signify an adverse condition whichinvolves potential bodily harm to the customer.

The PIN number may have any desired number of digits. In a preferredembodiment of the present invention, the PIN number has five digits withthe fifth digit in the string being the security digit; however, othercombinations may be used to render similar results, such as the fourth,or any other, digit in a four digit PIN number being the security digit.If desired, one of the digits in the first segment of the PIN mayspecify the location of the second security segment. In step 103, thecustomer selects a plurality of numbers to form the first segment andone or two single digit numbers to form the second segment. Aspreviously mentioned, the customer can select a digit in the firstsegment to indicate which digit in the PIN forms the second segment.

As can be seen from the foregoing description, the PIN number used bythe customer in the FCT system provides improved user security.

In step 104, the customer may be prompted to provide additionalinformation. For example, a customer may be requested to input acredit/debit card number against which system charges can be debited. Instep 104 a, the customer verifies all information. In step 104 b, thecustomer agrees to the terms and conditions under which the FCT systemoperates. The customer also agrees to sign a hard copy of same.

In step 105, the customer can close the registration or account openingsession either by hanging up his telephone or logging off the FCTwebsite. Alternatively, the customer can commence an FCT transactionsuch as depositing funds into his/her newly opened account or withdrawfunds that were already deposited in his/her account after activation byregistering as shown in FIG. 3.

To assist in carrying out certain FCT transactions, each customer can beissued an FCT card containing his/her identification information andaccount number on a magnetic strip, or whatever technology thedebit/credit card industry is using at the time, and a signature line.The card can look like an ordinary credit card. If desired, the card canalso contain a picture of the customer.

FIG. 4 is a flow chart illustrating in schematic form the manner inwhich a customer can make a deposit into, or a withdrawal from, his/heraccount using a point of sale terminal at a store, an outlet, etc.,connecting the information to the FCT center 10. In step 401, thecustomer goes to any desired location having a point of sale terminalthat can be connected to the FCT center 10 and swipes an FCT card, whichis also known as a card on demand (COD). In step 402, the customerresponds to the prompt on the terminal asking for the customer's accountnumber. In response to this prompt, in step 403, the customer keys inhis/her telephone number being used as his/her identification number.This is done by using the key pad on the terminal. The customer in step404 is then prompted for his/her PIN number. In step 405, the customerenters his/her PIN number without tripping the FCT security system asdiscussed above. In step 406, the customer is prompted to press “1” fora deposit or “2” for a withdrawal and the amount of money to bedeposited or withdrawn. In step 407, the customer keys in the choice. Instep 407 a, the customer is prompted for the amount (deposit/withdrawal)and keys in the desired amount in step 407 b. If the customer has notyet signed a written agreement if required, then he/she does it at thecounter (step 407 c) and, in step 407 d, keys in an affirmative responseto any question about such signature. The written agreement may be astandard banking account agreement. In step 408, the operator of theretail store or outlet, who acts as an agent for the FCT system, paysmoney to the customer if the transaction is a withdrawal or receivesmoney from the customer if the transaction is a deposit. Obviously, ifthe transaction is a withdrawal, the customer has previously depositedmonies into his/her account or such funds were deposited on his/herbehalf. If the withdrawal requests exceeds the combined FCT transactionfee and the amount of money in the customer's account, the local areanetwork 12 will issue instructions to cancel the transaction or tomodify the transaction. In step 409, the point of sale terminal issues areceipt identifying the transaction. For a deposit, the receipt is forthe purchase of virtual cash vouchers. On cashing out, the receipt isfor a refund of the virtual cash vouchers.

FIG. 5 illustrates a transaction carried out by a customer at an ATM. Asshown therein, in step 501, the customer inserts any credit card or aCOD card into the ATM. In step 502, the customer is prompted for accountinformation, that is the telephone identification number (TNA) forhis/her account. In step 503, the customer keys in his/heridentification number using the key pad on the ATM machine. In step 504,the customer is prompted for his/her PIN number. In step 505, thecustomer keys in his/her PIN number either in a way which does not tripthe FCT security system or in a way which does trip the FCT securitysystem if the transaction is being made under duress. In step 506, thecustomer is prompted for the dollar amount of the transaction, i.e.money to be withdrawn from his/her account. In step 507, the customerkeys in the dollar amount. As before the FCT system verifies that thecustomer has the requested amount of cash and required transaction feesin his/her account. If the customer does not have sufficient cash inhis/her account, then either the transaction is cancelled or thecustomer is prompted to modify the transaction to a lesser amount. Instep 508, the customer takes his/her credit card or the COD card out ofthe machine along with any cash being dispensed.

As can be seen from the descriptions of FIGS. 4 and 5, the FCT systemand method makes cash deposits and withdrawals much easier to transact.It also provides the convenience of allowing the customer to carry outsuch transactions at a wide range of stores, outlets, non-bankinginstitutions, and ATM machines. It allows an unrelated third party todeposit an amount on behalf of a customer at a geographically remotelocation and the customer can withdraw such amounts at anothergeographically placed ATM or a point of sale (POS) station.

FIG. 6 illustrates a FCT transaction where a customer is purchasingmerchandise. As shown in step 601, the transaction may be initiatedusing a terminal, such as a POS terminal with connectivity to the localarea network 12 or by using a personal computer. Using either device,the user first clicks on a FCT transaction icon if displayed on thescreen associated with the terminal or computer or swipes a card.Transactions may also be accomplished in a similar manner by utilizing aPOS or a standard phone or in certain instances an ATM machine with thecustomer responding to prompts by the system.

In step 602, the customer is prompted by the FCT system to enter his/heridentification number and his/her PIN number. The user has the option tostore these numbers in the system so that the system can automaticallyuse this information and dispense with the need for prompts. Thereafter,the customer is prompted to enter transactional information includingthe URL or on-line service provider enabling access to the retailer atwhich merchandise is purchased on line and also including if desired adollar limit for the transaction. The customer can also indicate adesire for shipping or delivery of goods or services without revealingto the seller, customer identity and/or address. In step 603, theinformation which the customer has entered including the URL or on-lineservice dial-up number or the retailer dial-up number is stored in abuffer located in the computer associated with the terminal or in thepersonal computer being used by the customer.

In step 604, the computer associated with the terminal or the customer'scomputer dials up the FCT center 10. After the information downloaded tothe FCT center 10 has been stored in a buffer, the FCT programming usedby the network 12 opens a temporary folder. This is shown in step 605.As shown in step 606, the FCT program issues a transactionidentification number known as a transaction in waiting or TIW.Preferably, the TIW contains sixteen digits. The details of thestructure of the TiW will be discussed hereinafter. The TIW iscommunicated to the computer being used by the customer and is stored inthe buffer containing the information of the transaction to beconsummated.

The TIW may or may not be known to the customer. In a preferred approachto the FCT system, the TIW is not known to the customer even though itis resident in his/her computer.

In step 607, the FCT center 10 disconnects from the user. In step 608,the FCT center 10 connects to a computer utilized by the retailer suchas the computer used to control the retailer's point of sale terminalsor the retailer's transactions or alternatively routes the customer callto the URL or on-line service previously specified by the customer andheld in buffer 603. The FCT center 10 either then, or upon request bythe retailer, downloads to the retailer's computer, the details of theforthcoming transaction including the TIW number assigned to same.Alternatively, the FCT center 10 downloads only pertinent TIWinformation enabling the customer to purchase on-line.

In step 609, the customer connects to the retailer's web site eitherdirectly or via the on-line service provider. The customer then selectsthe merchandise to be purchased, such as books, CDs, etc., using theretailer's website. When it comes to paying the retailer, as shown instep 610, the consumer downloads the TIW from his computer by using apredetermined keystroke or set of keystrokes. If desired, the retailer'scomputer may be set up to ask the customer for his/her identificationand PIN numbers to further verify that it is the customer purchasing themerchandise. In step 611, the retailer's computer transmits thedownloaded TIW number to the FCT center 10 for transaction authorizationand for debiting the customer's account. In step 612, if the retailerhas an account with the FCT center, the account is credited with theamount of the transaction. If the retailer does not have an FCT account,then the computer network 12 initiates payment to the retailer in analternative manner, e.g. issuing a check to the retailer or partaking inthe electronic settlement of the National Automated Clearing HouseAssociation (NACHA). In step 613, the customer is provided with a listof his/her purchases with the retailer's identification number, a billnumber, and an indication of the total cost to be debited to his/heraccount.

In addition to facilitating the buying of merchandise, the FCT systemcan be used to transfer funds from one individual to another. Such atransaction is similar to that carried out to buy merchandise. Toinitiate such a transaction, the customer accesses the FCT system andenters his/her identification and PIN numbers, the amount to betransferred, the intended recipient's FCT identification number (pseudoor real), the name of the person to whom the money is being transferred,and the type of transaction, i.e. standard or non-standard. To providethe name of the person to whom the money is being transferred, theletters on the number pad of a telephone or a computer keyboard may beused to spell the first name and the first four letters of the last nameof the recipient. After receiving the instructions from the customer,the FCT system opens a TIW for the transaction and keeps the TIW and thecustomer's identification number and PIN number within the local areanetwork 12. A number, which is preferably unknown to the customer, isassigned to the TIW by the FCT system. As before, the TIW represents atemporary account that automatically closes when the value in theaccount is depleted. The individual to whom the money has beentransferred can withdraw the money as desired by accessing the FCTsystem. If desired, the money could be cashed out of any ATM or aparticipating merchant's POS.

One of the advantages to the FCT system is that no transaction in theFCT system occurs without a TIW being open and no transaction iscompleted successfully without properly closing the TIW. The TIWcontains all the historic information related to the transaction, aswell as the needed handshakes for it to be completed successfully. TheTIW may have any desired byte length, for example 136 bytes. The bytesin the TIW describe the transaction. Table I illustrates a typical TIW.TABLE I Byte Number Byte Group Name Remarks/Function  1-12 Time StampTime module. Part of case ID 13-20 Group Serial Number Identify orderwithin a time module  21 Entrance Byte  22 Personal Security  23Business Security  24 Escalation Byte 25-44 Customer's TAN 45-49 PIN50-69 Secondary TAN When transacting for someone else  70 TIW LocatorMatching 71-86 Monetary Sum Five decimal digits are allocated for 87-111 Target TAN 112 Transaction Byte 113 FCTE Byte 114 OtherTransactions 115 Router Bookkeeping 116 Router Verification 117 SecurityByte 118 Security Activation 119 Fees Byte 120-130 CID Bytes 131-136Date of Birth

Since all withdrawals from an FCT temporary account are electronic, itis not possible to take out more money than is in the temporary account.

If the transaction being carried out by the customer is a transfer fromone account to another, the FCT system makes the transferelectronically. This is done by debiting the customer's account andplacing monies into a temporary account. Following the instructionsgiven by the customer, the FCT system then moves the money in thetemporary account to the account of the third party or recipient. Thisis done using standard banking techniques for transferring funds fromone account to another. After the transaction has been completed, thecustomer may receive a printed receipt recording the particulars of thetransaction.

As can be seen from the foregoing description, the FCT system provideswide versatility in making financial transactions. Customers have accessto cash anytime, anywhere. Further, the system makes transactions easysince they can be done by ordinary telephone systems. As a result,customers do not even have to leave home to make financial transactions,even those which include the receipt of cash.

The FCT also allows customers to interact with the Internet marketplace.Using their personal computers, which have been programmed with FCTsoftware (client software), customers can browse the Internet and visitvendors' sites. They can purchase goods using their FCT account in lieuof a credit card, without even disclosing their FCT account numberon-line. Any purchase made by the customer using the FCT account wouldbe honored so long as the customer has sufficient funds to cover thecost of the article and any applicable fees. Customers can fund theirFCT account from home in a variety of manners including credit cards ordebit cards utilizing the phone, or through financial transactionsutilizing a computer and a bank or credit union account. Customers canalso fund their FCT account via the FCT account of a third party or froma point of sale station.

The FCT system can be used by a wide variety of customers for a widevariety of purposes. For example, it could be used by customers in acasino to obtain cash. It could be used by customers who do not qualifyfor regular credit cards. Vacationers can use the system in lieu oftraveler's checks. The system could be used by those who suddenly needto post bail or need to pay unexpected fines. The system could be usedby those who want to use a 900 number, either without a trace to theirtelephone bill, or a pay phone, or a cellular phone. The system couldalso be used to buy lottery tickets from home. In essence, the systemcan be used to keep cash in cyberspace that is available day and nightin cash form rather than in a traditional bank account.

An FCT business transaction is similar to an individual transaction withone major difference. While a business TNA and PIN are used as in theindividual case, access to the business transaction is only through anindividual access. That is an individual needs to enter using his/herown personal TNA and PIN in order to gain access to enter the businessTNA and PIN. Thus the system always has a “fingerprint” of whatindividual performed a transaction for the business. Likewise,individual A can transact for individual B when individual B entrusts toindividual A both individual's TNA and PIN; however, individual A needsfirst to identify himself/herself for the system by entering individualA's TNA and PIN number. While it may appear that individual A once armedwith both the TNA and PIN of individual B can by-pass the individualentry with his/her own TNA and PIN, the system is capable of detectingidiosyncratic differences between individual A and B and can sound analarm.

An adjunct to the FCT system being operated by the communication center10 is an addressless public e-mail network system known as the PublixNetwork system. In this system, a person can send money to a mailbox ofan intended recipient who will be notified when money is in such mailboxand enable retrieval of such funds, whether the recipient has or doesnot have a computer and an active on-line service access. Using thePublix Network system, it does not matter what on-line or ISP vendor isbeing utilized by the sender and the recipient of the e-mail. It can bethe same vendor or different. The Publix Network system is designed tooperate across ISP services. In the Publix Network system, the senderdoes not need to know the recipient's e-mail address to initiate amailing. Similarly, sending a fax or paging a party is easily donewithout the need to know the recipient's fax number or pager and PINnumber.

Publix Network is a paradigm which is based on utilizing the recipient'stelephone number as the address, which telephone number is the same TNAused in the FCT system. The Publix Network system insures that themessage is securely received only by the intended party, even if severalparties are using the same telephone number. In this paradigm, thetelephone number of the recipient, which needs to be unique, does notneed to be a real functioning telephone number and can be a pseudotelephone number chosen by the recipient or by the automated numberallocator of the Publix Network system.

E-mail sent to an office address (i.e. telephone number) can easily bedirected, either by sender or recipient, for delivery at a home e-mailaddress or be available to the recipient at both home and officeaddresses. Likewise, sending the e-mail to a home telephone addresscould be directed to either home, business, or both addresses by eitherthe sender or recipient. Hence, a sender does not need to know the workplace of the recipient, or its e-mail address if the home one is known.Conversely, if the work place number is known, the home number does notneed to be known. Furthermore, should an e-mail recipient changeemployers, mail directed to his or her old address at the previousemployer will be available to him or her at the new employer's addresswithout a need to advise the sender about such change, as long as thee-mail is personal.

The Publix Network service utilized by individual e-mail users orbusinesses, can either be offered to on-line and ISPs as a resource,and/or be utilized independently by the user community.

The Publix Network operation will accord the following added services:(1) notify the e-mail recipient of pending mail arrival while it isstill en-route to him or her and irrespective of how long it will taketo arrive at the recipient's final address destination; (2) notify therecipient of incoming mail and/or its arrival without the need to havehis or her computer connected to the on-line service or the ISP beingutilized; and (3) provide the ability to listen on a standard telephoneto the content of the e-mail before, as well as after, it arrives at therecipient address.

In operation, each user of the Publix Network system is first registeredwith the center 10 as a designated e-mail user. This enables one to sendcash to an e-mail box and likewise retrieve the cash from an e-mail box.The user is assigned an identification number which is in the form of aten digit telephone number (TNA). As previously stated, the telephonenumber may be an actual telephone number or a pseudo telephone number.Each user is also assigned a PIN number which contains theaforementioned first and second segments with the second segmentproviding a security alert feature.

As shown in FIG. 2, the Publix Network system is operated by a dedicatedserver 32. The server 32 preferably has three search engines availableto it. The first search engine, the personal ID search engine,identifies a user by searching for his/her TNA and retrieving his/herfile. The user, besides being an individual, could be a company, anagency, etc. The second engine is a reverse personal ID directory whichis a reverse directory. The user specifies the non Publix e-mail addressof an addressee and obtains the Publix e-mail address for the addressee.The third search engine is a company search directory which enables auser to key in the acronym of a company's name and find out thedescriptor appropriate for the company. When using the company searchdirectory, the user does not need to stay on line to do the search.Rather, the Publix Network system can download to the user's system thecomplete block of descriptors relevant to the specified company nameupon the next on-line connection to the Publix Network system. The usercan scroll and decide about the pertinent descriptor off line.

A registered user of the Publix Network system has three options toaccess electronic mail sent to him/her. They are the traditionalpersonal computer, a telephone for voice delivery of the e-mail, and anindependent postal electronic box (PEB). The PEBs may have threeconfigurations—lowest, medium, or full configuration. The lowest PEBconfiguration contains only an LED which flashes when e-mail is waitingfor the user. The medium PEB configuration contains, in addition to thelowest configuration, minimal memory and an LCD through which the usercan read a list of the parties who have sent mail without retrieving anyof the mail. The full configuration PEB contains, in addition to themedium configuration, an enlarged memory so that messages canautomatically be downloaded upon arrival at the Publix Network. Theconfiguration also has an option of a larger LCD display to enablereading mail waiting directly of the PEB. The full configuration PEB caninterface to a computer and/or a television set in order to enablereading of mail waiting in the PEB.

The Publix Network system may be enabled to provide a personal safetymonitoring service which upon user's request, monitors and ascertainsthat user's personal safety has not been compromised. The user specifiesan activation time, locations for monitoring purposes, and assistancepreferences. The Publix Network system then calls the user at thelocation(s) specified from the time specified at certain intervals. Theuser needs to respond with his/her assigned PIN number to indicate tothe Publix Network system that all is well. Failure to satisfy the PINnumber, and any other elements specified by the user, triggers after aspecified time a third party intervention to assist the user. In apreferred method of operation, the Publix Network system calls theuser's specified number several times at preset intervals with randomtime sub segmentation. The number of times the Publix Network systemcalls is random but no less than three times. The Publix Network systemcalls the user even if the PIN number given in previous calls by theuser is correct.

As indicated hereinbefore, to participate in the Publix Network system,the user, which can be either an individual or a business, must registerwith the system.

The Publix Network system is operated so that the e-mail data istransient and is discarded when one of the following conditions is met:(1) after a designated time period if there is no request by a customerfor a longer than standard hold; (2) the customer retrieved the dataeither actively or passively via a download to a PEB; (3) customerutilized hear mail option; (4) e-mail was forwarded and reached finalon-line or ISP destination; (5) special service for keeping data wasrequested and time is up; and (6) the user ceased being a Publix Networkcustomer and the courtesy retainage time is up.

The transaction form for Publix Network operations is theTransaction-In-Process (TIP) form. In other words, no transaction takesplace without a TIP being opened and no transaction can be completedwithout the TIP being closed. The TIP contains all of the historicinformation relating to a transaction as well as the needed handshakesfor it to be completed successfully. The TIP is formed by a number ofbytes, such as 160 bytes inclusive of the CID. Table II gives themeanings for an exemplary byte group. TABLE II Byte Number Byte GroupName Remarks/Function  1-12 Time Stamp Time module. Part of case ID13-19 Group Serial Number Identify order within a time module  20Entrance Byte  21 Media Byte  22 Device Destination Byte  23 DataDestination Byte 24-43 Customer's TNA 44-48 PIN 49-71 Sender's ReturnAddress  72 Publix Procedural Activities 73-87 Field C and D in IAS 88-112 Secondary OAS 113 Transaction Byte 114 Public phone card Byte115 Completion Pending Procedures 116 Router Bookkeeping 117 RouterVerification 118 Static Security State 119 Dynamic Security State 120Security Activation 121 Administrative Procedure 122-136 CID Bytes131-136 Date of Birth 137-160 Primary OAS The outgoing address segment

The Publix Network system may utilize any suitable set of algorithms fora fast, scalable and reliable search engine. The search process isdivided into three parts: (1) internal tokenizing of the incomingaddress; (2) searching a record via the telephone number address (TNA)and (3) identifying the specific individuals targeted by the addressutilizing the additional identification (AID) provided by the sender.

There are numerous advantages to the Publix Network system. First, itcan be used with recognized and standard e-mail formats, e.g.ns@company.com. Second, it can be used with a specific user ID that iseasily recognized internationally and may be obtained currently fromestablished telephone carriers by dialing information. The PublixNetwork system has the flexibility to be used with old or current e-mailaddresses. Still further, the same ID can be used with e-mail addressfor the home, a person's business or both. The Publix Network system hasthe ability to broadcast mailing to a group of users sharing the samee-mail address and the ability to differentiate specific users, forreceipt of mail, from among a group sharing the same e-mail address. ThePublix Network system is a robust system that can identify specificusers even if part of the user's e-mail address containing their ID iserroneous. The Publix Network system has the ability to use the samee-mail address for fax dispatch and/or for paging a party and/orwireless phone. The Publix Network system has the ability to arrangepersonalized or closed chat room activity with a specificallypredesignated person at a mutually convenient time to all parties. ThePublix Network system also has the aforementioned safety feature whichallows the system to monitor the well being of the setting user or anythird party designated by the user. The Publix Network system has theability to notify e-mail recipients of mail received for them even ifthe receiving party has no personal computer or any other facilitiesexcept a standard telephone. The Publix Network system allows a customeror user to call in and receive a voice read-out of e-mail sent to theuser and provides the ability to notify pending e-mail recipientsregarding e-mail in transit to them without the need to hook up to theInternet or the need to start a personal computer. The Publix Networksystem also allows a recipient of e-mail, who receives the content byphone, to respond in voice, enabling the e-mail sending party to receivesuch response. The Publix Network system has the capability toautomatically download mail to a user's electronic mail box. The systemprovides the ability to identify senders and the subjects of e-mails andfor PEB holders even before downloads and without being connected to theInternet or without a PC. This is a particular advantage because itallows the user to screen out e-mail that is unsolicited advertising,graphics, or attachments.

The software operation of the Publix Network system is divided asfollows. The analysis segment (Segment A) which is of the “Type” in thee-mail address undergoes an analysis to determine the range of servicesrequired by the sender. The search engine locates the particularrecipient's record and enables one to add to the range of services forwhich the user has signed up. The application software is composed ofthree major elements: (1) the Master Operating Procedure (MOP); (2) theMOP Set Up Procedure (MSP); and (3) the Dynamic MOP Procedure (DMP). TheMOP procedure contains all the needed information for actions to deliverthe required service before and during the operation, and the historicdata regarding the specific services rendered after the transaction hasbeen completed. The MSP populates the MOP action bytes for specificoperations. This is basically a toggle switch operation for the specificbits in various bytes, resulting in a decimal equivalent that containsthe operational requirements. The DMP causes action. This softwaresegment visits with each of the action bytes in the MOP and collects thedecimal byte equivalent which it transports to the Action Tablegenerating the service activity.

The following is the typical transaction flow for a specific e-mailpiece received at the Publix system. The e-mail address, e.g.ns@publix.net is confirmed to the sending unit as acceptable forreception. The envelope and body of the e-mail is received. The e-mailaddress is divided into three segments—the type, the telephone numberaddress (TNA) and the auxiliary address segment. Multiple processingoccurs. The TNA is used by the search engine to fetch recipient'srecord. The auxiliary address segment is analyzed by the processing unitbased on input from the record. The type is analyzed for services to berendered. Services indicated by the recipient's record are added to thelist generated by the analysis of the Type. MOP set up procedure takesplace according to the list generated in the previous two steps. Thedynamic MOP procedure goes into effect and attends to each and everybyte in the properly populated MOP. Activation of action proceduresensues based on the results of the Dynamic MOP procedure. The completedMOP is filed in the case data base. Third party data base connectivityis activated to the completed MOP.

Another adjunct to the personal transaction system of the presentinvention is a message center that operates within the environment ofthe communication center 10 and that is able to link messages stored online with the ID of a debit or credit card so as to enable a purchasingretail customer who pays with a debit or charge card to be informed atthe POS terminal that a message awaits him/her and which he/she canlisten to simply by using the closest public telephone. Thus, the debitor charge card is transformed into an individual paging system that isnot restricted by location and distance and is useful on a national andinternational level.

The message center is operated by the network server 30 having access tothe FCT and Publix e-mail servers and the voice messaging instructionaldatabase or by a voice messaging server 42. The message center is acombination of the following mail and telecommunication facilities doneelectronically via a single media, the telephone: mail box, answeringservice, paging service, call forwarding, locator, telegram, andtelephoning. The message center enables any individual or entity to diala central telephone number associated with the center 10 and deposit avoice message. The sender of the message identifies himself/herself tothe system via a TNA and then proceeds to identify the intendedrecipient by the recipient's TNA. The addressee of the voice message canretrieve the message from any touch tone telephone. The addressee isalerted of pending messages when he calls the centralized number, orwhen reaching his home or office, when automatically his phone rings andupon pick up the message alert will be given. Alternatively, whenshopping at a store with a POS terminal, a consumer will be alertedabout pending messages whenever he/she uses his/her debit or creditcharge card. The message center 42 does not require the depositor of thevoice message or its addressee to be pre-registered or have pre-assignedIDs. A user could use the message center to leave him/her a wake-up callor to send timed personalized messages.

Using the message center, a user could be assigned an instantaneoustemporary voice box for the duration of the life of the message.

When a communication is received by the message center, it is dividedinto two parts—a signal part and a message part. The signal part givesaddressor and addressee information and is transmitted via the touchtone keys of a telephone. The message part is transmitted via voiceusing the mouth piece of the telephone. The signal part is routed to thelocal area network 12 and the message part is routed to a storage deviceand stored on computer magnetic media. This enables short timemulti-track on-line storage of simultaneous calls before moving to thelong time storage which is kept until a purging criterion is met. Themessage storage is functionally the physical layout of the relationaldata base governed by its directory. All searches for addressees, thelocations of their data, and the data objectives, are done at the systemlevel. At the storage level, only deposition, retrieval, and erasuretake place, when the appropriate media (magnetic or other) is positionedat a beginning marker and rotates to an ending marker as per systeminstruction.

If desired, there may be a number of sub-message centers located aroundthe country so as to provide local access to customers. Messagesreceived at one sub-message center can be transferred to anothersub-message center as needed. The message information to be transferred(which consists only of the ID with the transfer byte and not thecontent of the message) contains a block of ID messages grouped togethersequentially, and transferred as a packet. The packet transfer can be anindependent transfer whereby only the packet is electronically shippedfrom sub-message center to sub-message center or a tag along transfer,whereby the packet is annexed to other material that is electronicallyshipped from one sub-message center to another sub-message center. Thepacket transfer is triggered by either of the following categories—apredetermined event or an unrelated transfer occurs when a communicationfrom one sub-center to another sub-center takes place with regard to anyunrelated inquiry. In the latter situation, the packet is annexed to therouted information. A predetermined event may be one of the followingcases: (1) a predesignated period, i.e. every hour, at which a packet ofall accumulated messages is transferred; (2) an accumulated threshold,i.e. whenever the number of messages in a packet exceed a predeterminednumber, the transfer is triggered; and (3) an urgent transfer.

An addressee data base may reside at each individual message sub-center.The addressee data base contains the following information: (1)addressee's phone numbers; addressee's identifiers; addressee'sdebit/credit card numbers; addressee's history; the self-learningprocedure of the data base; and the self implementing procedure. Theself implementing procedure is needed to facilitate card paging. Itrequires that there be a correlation between phone numbers of potentialaddressees and their debit/credit card numbers. Any suitable methodknown in the art may be used to create the data base.

The internals of software mechanism by which a request from a user movesthroughout the system and into delivery hinge on three basicelements—the operating system, the command set, and the case serviceprocedure (CSP). The CSP is a menu list through which is transacted inorder as governed by the operating system.

It encompasses all elements of service rendering for each and every casehandled by the system. Therefore, each case has its own CSP. Uponcompletion of service delivery, the CSP is archived. The components ofthe CSP includes the addressee's address pointer, a call processingbyte, an annexed byte, a billing address byte, a billing informationbyte, and a CSP case number.

The operating system works as follows. A series of commands either pullinformation out or deposit information in one of the several data basesand/or operating tables. The procedure is taken out of a masteroperation procedure (MOP) which looks like the CSP but is more basic tothe operation. It has all the steps needed to move among the data basesand the operating tables. The MOP directs the program steps from blockto block throughout the completion of the process. Once a block in thekernel was completed, the MOP pointer is incremented by one and the nextMOP instruction is taken on. There can be more than one MOP existing atone time. Their number depends on the number of cases handled by thesystem.

While the FCT system, the Publix system, and the voice messaging systemhave been shown as being operated at a single site, if desired, thesystems could each be operated at different sites.

In order to provide additional security and redundancy to the personaltransaction system of the present invention, more than one center 10 maybe constructed and utilized for the system. Of course, each of thecenters 10 would be linked to the other centers 10 for informationsharing purposes.

While the center 10 has been shown as having a single web site throughwhich users can access the FCT and Publix systems, the center 10 canhave a web site for the FCT system and a different web site/access forthe Publix system if desired.

One particular advantage to the system of the present invention is thatthe system may be used by deaf people to leave e-mail messages or voicemessages for other individuals. Referring now to FIG. 7, deaf peoplecommunicate by phone using a device 70 called a text telephone or TTY.Typically, deaf people dial a toll free number and an operator, either ahuman operator or a non-human device operator, assists in making callsto hearing persons, with the operator acting as an interpreter betweentext from the TTY and voice or as an interface to the desired service.Prior to the present invention, a deaf person using a TTY was incapableof leaving a message on a standard answering machine, such as machine78, and was unable to send or receive e-mail. With the presentinvention, a deaf person using a TTY 70 can send an e-mail or a voiceequivalent message using the TTY 70 as a transport device by connectingto the communication network of the present invention. To leave ane-mail, the deaf person dials a dedicated number such as an 800 numberfor access to the e-mail services provided by a communication center 10in accordance with the present invention. After the center has beencontacted via relay 72, a number of prompts are sent to the deaf personwho responds using his/her TTY. For example, the deaf person is promptedto (1) provide the number, preferably the TNA, of the party he/she istrying to reach; (2) provide a return number or TNA for the e-mail; and(3) provide the name signature to the message. The deaf person may alsobe prompted to provide the e-mail address for the intended recipient ifhe/she knows it. The responses to the prompts provide the header to thee-mail. The header is then coded by the center 10. Thereafter, the deafperson is prompted for the text of the message. The deaf person inputsthe e-mail text using his/her TTY. When the message is completed, it toois coded by the center 10. The center 10 then assigns a link numberwhich joins the coded header to the coded message.

The e-mail message is then forwarded to the e-mail server 73 where adelivery file is opened. The e-mail is put into the queue for delivery.Processor 74 then extracts the TNA of the intended recipient and startsto dial the intended recipient using a telephone line. When the intendedrecipient is reached, he/she is asked to identify himself/herself and istold that there is a message from a particular person. The intendedrecipient is then asked if he/she would like to have the messagedelivered by voice or by e-mail. If the intended recipient decides tohave the e-mail message read to them, then either the text of themessage is read by an operator or the text of the message is extractedby processor 75 and converted to machine synthesized sounds by text tospeech engine 76.

Using the same approach, the message can be delivered in voice form tothe intended recipient and left on the recipient's answering machine.Heretofore, technology did not exist to allow a deaf person to leave avoice message on another party's answering machine due to the fact thatthere is not enough time for a human operator to interface with themachine, relay its message to the deaf person, and receive the messagefrom the deaf person for the machine all in time before the session inthe answering machine shuts off. One advantage to using the system ofFIG. 7 is that a TTY 70 can be used to leave an e-mail message for aparty who does not have a personal computer. While a deaf person may usea TTY to leave the e-mail or voice message, he/she may use a personalcomputer in lieu of a TTY to leave the e-mail or voice message.Furthermore, in all the cases where a TTY is used to send and receivetext, the deaf person can use specialized equipment provided with acamera, to sign into the camera, and then convert the signing into orfrom text either at the unit 710 or at the TRS 712.

The system of FIG. 8 enables an instant message (IM) or ICQ sessionbetween web users who are on line and TTY users. In this system, thetelephone relay service 712, the LAN server 713 and the web server 714act as a computer/server for a deaf person who does not have a personalcomputer. They determine initially whether the intended recipient ison-line or not. If it is determined that the intended recipient is noton-line, he/she can be summoned to an IM or ICQ session by the deafperson sending an email containing a session request using his/her TTY710. The email, as before, includes a TNA address for the intendedrecipient. As before, the center 10 dials up the intended recipient anddelivers a voice message calling him/her to an IM or ICQ session. Oncecontact has been established between the TTY user 710 and the intendedrecipient using personal computer 715, the deaf person types his/hermessage using his/her TTY 710. The message is then sent to the webserver 714 via TRS 712 and LAN server 713. The web server 714 convertsthe message to the proper format for e-mail. The center 10 thentransmits the converted message to the PC user. The PC user then repliesand sends the reply to the web server 714. The web server 714 convertsthe e-mail into the proper format for receipt by a TTY. Once theconversion has taken place, it is transmitted to the TTY user via theTRS 712. The LAN server 713 enables supervision of the operation of theTRS 712 and the web server 714. As can be seen from the foregoingdiscussion, the system of FIG. 8 enables a deaf person to participate inan IM or ICQ session even though the deaf person does not have apersonal computer.

Referring now to FIG. 9, a system is shown in which an individual at apersonal computer 750 can issue an IM or ICQ request to a hearingimpaired or deaf person who has a personal computer but who is not online. As shown in this figure, the individual at personal computer 750connects to the web site 753 associated with the communication center 10via the public telephone network 751 and line 740. He/she then sends anemail containing the TNA of the intended deaf or hearing personrecipient. At the center 10, the email is routed to telephone relayservice 752 and then to processor 756. As before, the center 10 has aLAN server 757 which supervises the network operation of processor 756.In processor 756, the email text is extracted and converted into aformat compatible with a TTY if appropriate. The processor 756 dials outthe TNA of the intended deaf person recipient and delivers theinvitation to the IM or ICQ session to TTY 758. Alternatively, theprocessor 756 dials out the TNA of the intended hearing person recipientnot then on line and delivers by telephone an invitation to the IM orICQ session to telephone 759.

The system shown in FIG. 9 can also be used by a deaf person to issue anIM or ICQ invitation to a PC user. As before, the deaf person would dialthrough the public network and end at a dedicated line at the center 10for handling TTY messages using his/her TTY 758. The deaf person wouldidentify the intended recipient including his/her telephone numberaddress and would identify himself/herself. The deaf person would issuethe invitation in text form. The invitation communication is received bythe TRS 752 which directs the communication to the processor 756. Theprocessor 756 extracts the TNA of the intended recipient and dials outvia line 742 and public network 751. Once the PC user answers his/hertelephone 759, the invitation to the IM or ICQ session is deliveredeither by an operator at the center 10 when the TRS 752 is utilized orvia machine synthesized sounds. The same method may be used by hearingindividuals, with or without TTYs to invite others to an IM or ICQsession.

Referring now to FIG. 10, a system is shown which enables a conferencecall of hearing impaired or deaf individuals and/or hearing individuals.Heretofore, there has been no effective system for conferencing hearingimpaired or deaf individuals. As shown in this figure, a number ofhearing impaired or deaf individuals and/or hearing individuals accessthe communication center 10 via any public telephone network(s) 808. Thehearing impaired or deaf individuals utilize TTYs 800 and 802 to accessthe communication center 10 via telephone network(s) 808, while thehearing individuals utilize voice connection devices, such as telephones804 and 806. Each communication from a hearing impaired or deafindividual or a hearing individual is forwarded to a standard PBX system810 located in the center 10. In one embodiment, the PBX system 810directs each communication from deaf and hard of hearing persons, andwhen applicable, also hearing persons to a bank 812 of modems. In analternative embodiment, a hearing person can branch out of the PBX 810to a telephone line 820. A bank of switches 814 is provided to connecteach of the modems in the bank 812 to one of the connecting lines in thePBX 812 and to one of the processors 816. Processors 816 are programmedto receive each transmission from a conference participant and toconvert the received transmissions into a form suitable for eachconference participant. Voice communications received from voiceparticipants are converted by operators or speech recognition routine atprocessors 816 to text and written to a pad whose contents are latertransmitted to TTY users 800 and 802. The processors 816 also take thetext transmissions from the TTY users 800 and 802 and converts them tovoice communications which are later transmitted to the voiceconnections 804 and 806. The voice communications may be machinesynthesized sounds or may be generated by operators at the computers 816who are reading the text messages. Processors 816 may comprise anysuitable computers known in the art and may be programmed to perform theforegoing functions using any suitable language. LAN server 818 isprovided to supervise the operation of the processors 816, the bank 814of switches, the bank 812 of modems and where applicable the PBX 810.The PBX 810, the modem bank 812, and the switch bank 814 may compriseany suitable systems known in the art.

Utilizing the system of FIG. 10, the text of each communication duringthe conference call can be displayed on the TTYs 800 and 802.Additionally, the processors 816 and/or their operators convert the textwritten by the deaf or hearing impaired individuals into machine voicecommunications which can be heard by the voice connection users 804 and806. Heretofore, such a system was not available due to the limitationsof TRS equipment and legal restrictions on calling assistants.

Referring now to FIG. 11, a system is shown for sharing data amongstconferencing hearing impaired or deaf individuals. As before, eachhearing impaired or deaf individual utilizes a TTY 840 to communicatedata to the other conference participants. The input from eachconference participant may be transmitted to a communication center 10via any public telephone network 842. Each data stream is received fromthe PBX 843 by an individual modem located in modem bank 844. Thetransmitted data is then forwarded to a processor or computer 848located at the center 10. The processor 848 is programmed to have anumber of modules 850, 852, 854 and 856 which respectively perform thefollowing functions. In module 850, data from each TTY user is copiedonto an intermediary work pad. In module 852, the multiple entries onthe intermediary work pad are cut and pasted onto a general work pad. Inmodule 856, the content of the general work pad, which contains themultiple entries from the individual modems, is copied so that eachconference participant can receive the entire content of the generalwork pad. In module 856, the content of the general work pad is pastedto a number of individual modems in the modem bank 844 for transmissionto each conferencing participant. Thereafter, in module 858, the contentof each general work pad is transmitted to each conference participant.The bank 846 of switches insures that the communications are directed tothe proper modems for transmission to the proper individuals. When theTTY users receive the contents of the general work pad, they receive itin a textual form that allows them to see all of the communications anddata transmitted by the conferencing parties. They can also see it insign language if desired and if they have the equipment for same.Heretofore, there did not exist any such system for allowing multiplehearing impaired or deaf individuals to share data in such a manner. Themodem bank 844 and the switch bank 846 may comprise any suitableequipment known in the art. The processor 848 may comprise any suitablecomputer known in the art which has been programmed in any suitablecomputer language to carry out the identified functions. If desired, anoperator at the processor 848 may perform the various functions outlinedin modules 850, 852, 854, and 856.

Referring now to FIG. 12, a system is shown for hold a web IM or ICQsession with a number of conferencing parties some of whom are hearingimpaired or deaf individuals using TTYs 900 and 902 and individuals,either hearing impaired, deaf, or hearing, using personal computers 904and 906. Using this system, each individual, using his/her TTY orpersonal computer, establishes communication with the center 10 usingany public telephone network 908 for a direct dial up or connectingthrough the network 908 to an ISP provider. In the communication center10, a communication from the conference or session initiator isreceived. This communication contains the TNA for each conference callparticipant and information as to how each participant will participate,i.e. via TTY or personal computer, as well as the identification andtelephone number address of the initiator. The center 10 thencommunicates with each of the participants through the network TRS 910and/or the web server 912. A LAN server 914 enables the switch 920 tosupervise the conference call to insure that communications are beingreceived from and transmitted to each participant. The TRS 910 maycomprise any suitable TRS known in the art. Similarly, the servers 912and 914 and switches 920 may comprise any suitable processors orcomputers known in the art. Using the system of FIG. 12, text messagescontaining the communications from each of the participants will bedisplayed on the TTYs 900 and 902 and on the personal computers 914 and916.

The TTY/email processes previously discussed can utilize the telephonerelay service (TRS) at the communication center 10. The TRS can beutilized in a fully automated or semi-automated fashion, whereby a TRSoperator assists the transaction. The TRS operator can be stationedwithin the center 10 or at a remote location. If stationed at a remotelocation, the TRS operator functions in a telecommuting fashion as asubordinate or pseudo-subordinate to the center 10. In such a system,the communication center 10 passes control to a telecommuting stationwhere the remote (TRS) operator is located, while enabling operationunder its own master control. The following description describessystems where an originating voice call terminates with a TTY or videoreceiving party and where an originating TTY or video call terminateswith a voice receiving party. The systems to be described also extend toemail communication with the facility and/or with standard emailfacilities.

Referring now to FIG. 13, a system is shown for processing anoriginating TTY call destined to a voice recipient. In some instances,the deaf person can originate a video call whereby the deaf person signsinto a camera included with his/her device. As shown in the figure, thecall is originated by the TTY or video user and transmitted to thecommunication center 10 via any public telephone network 1200 and line1210. The originating call is received by PBX 1212 in the center 10 andforwarded via line 1220 to a modem in bank 1214. A switch in bank 1216is set and forwards the call to processor 1218. At any particularinstance of time, a number of telecommuting operators are activelyengaged in handling calls from TTY or video users and a number ofoperators are on line with the center 10 and standing by. Processor 1218is programmed to determine how many telecommuting operators are engaged,and how many telecommuting operators are available or currently on-line.From that information, the processor 1218 determines whether it isnecessary to activate another telecommuting operator to handle theincoming call from the TTY or video user. If the processor 1218determines that another telecommuting operator must be activated, a dialserver 1222 known as a remote access server (RAS) is initiated and dialsout to establish the connection with the new telecommuting operator. Theoutput of the server 1222 is transmitted to one of the modems in modembank 1224. The modem dials out through the PBX 1212 and through thepublic network 1200 to establish the telephone link with the newtelecommuting operator 1219. Through this mechanism the TTY or videocall is forwarded to the new remote telecommuting operator 1219 whoreceives the forwarded TTY or video message on remote electronicequipment 1226. The equipment 1226 may be any suitable equipment forreading the message from the TTY originator in text form or signing formwhere applicable and preferably includes a modem. The remotetelecommuting operator interfaces with the equipment 1226 and relays themessage in voice form to the voice recipient using any suitabletelephone device 1228 known in the art. The response by the voicerecipient is transmitted to the TTY or video originator by reversing theforegoing communication flow. If the telecommuting operator is also asign language interpreter then a camera is added to equipment 1226 whichaccepts sign forms from the interpreter as video input.

If the processor 1218 determines that there is no need to activate a newtelecommuting operator, the message from the TTY or video user isforwarded to one of the telecommuting operators 1217 already on-line andstanding by. The stand-by telecommuting operator also has electronicequipment 1226 including a camera where applicable and a telecommutingoperator's telephone device 1228. The stand-by telecommuting operatorthen translates the message into voice and delivers the voice message tothe voice recipient. Any response by the voice recipient is transmittedto the TTY or video originator by reversing the foregoing communicationflow.

Another system for transmitting a TTY or video originated message to avoice recipient is shown in FIG. 14. In this variation, the TTY or videooriginated communication is forwarded to a communication center 10having PBX 1212 via public telephone network 1200. The PBX 1212transfers the call to remote telecommuting operator station 1232 whereit is received by electronic equipment 1226 having a modem and/or avideo reception portion. The remote telecommuting operator theninterfaces with the equipment 1226, reads the TTY message or views thevideo, and speaks into a telephone device 1228. The operator's voicecontaining the message is transmitted to the intended voice recipientvia a trunk to trunk transfer in the center 10, PBX 1212, and publicnetwork 1200. For the voice recipient to respond to the TTY user, thevoice message travels in the reverse manner to the TTY user.

Referring now to FIG. 15, a system is illustrated for conveying a voicemessage to a TTY or video receiving party. In this system, the voiceoriginator dials up the communication center 10 using public telephonenetwork 1200. The voice message generated by the originator istransmitted to PBX 1212 in the center 10. The PBX 1212 then transmitsthe voice message to the remote telecommuting operator station 1232 viapublic telephone network 1200 and line 1234. The voice message isreceived by the remote telecommuting operator's telephone device or unit1228. The remote operator listens to the message and then inputs it intoelectronic equipment 1226. Such input can be text or alternativelysinging to the camera portion of equipment 1226 where applicable. Asbefore the electronic equipment 1226 has a TTY modem and/or a dial upstandard modem. The converted message is then transmitted via line 1236to the public telephone network 1200 and via the public telephonenetwork 1200 to one of the modems in bank 1214. From the bank 1214, oneor more switches in bank 1216 are thrown to forward the message to PBX1212. PBX 1212 then transmits the text or video message to the TTY orvideo receiving party via the public telephone network 1200.

There are instances where a hard of hearing person needs to understandwhat is being said to him/her by either another person or via a devicewith synthetic speech such as in the prompting by the FCT system. Inparticular, when such a person accesses the communication center 10,there is a need for the person to make certain inputs based on voiceprompting. When a hard of hearing person has difficulty understandingthe prompts, the help of a person, a device, or both, is required. Thus,in another aspect of the present invention, a mechanism is provided fora party to receive induced slowed-down stream of speech that enhancesand/or enables comprehension of such speech by a hard of hearing person.The system of the present invention is designed to allow users whoaccess the communication center 10 by computer, landline telephone, orwireless telephone to slow down the voice component of a voice promptingsystem. In this system, the hard of hearing person receives the speechoutput at a reduced speed. This is achieved by a programmed computerlocated at the center 10 which takes in a stream of speech from a personor another device and transforms it to a slower output with the abilityto provide the same speaker's voice (as well as synthetic speech)transmitted back to the hard of hearing party. FIG. 16 is a flow chartillustrating what occurs within this programmed computer. In box 1601, astream of words and other sounds are received by the computer. In box1602, the stream of words and sounds are stored in any suitable storagedevice known in the art. Alternatively, the words and sounds may bestored with a hearing human operator located at the computer and who isreading a screen. In box 1603, a time delay is introduced between thewords and other sounds. This can be done by slowing down the stream ofwords as a whole. In box 1604, the output of the computer is transmittedto the hard of hearing person. The output can be through a device or aspeaking human operator.

This slow down procedure is introduced to a hard of hearing personthrough one of the voice prompts that the person receives when heestablishes contact with the communication center 10. For example, theprompt may say “press 4 to slow down prompts and other voicecommunications”. The center 10 is preferably designed so that the hardof hearing person can activate the speech slow down procedure at anytime during a session.

Sometimes slowing down a stream of speech is insufficient as white noiseor other people who are talking in the vicinity make it difficult for ahard of hearing individual to transact with the communication center 10or listen to an isolated voice or sound by choice. In yet another aspectof the present invention, the system allows the hard of hearing user toquickly calibrate to a particular sound or voice that will be recognizedhenceforth and any other sound or voice will either be reduced involume, effectually making then non-existent for the hard of hearingperson, or be eliminated from the environmental sounds and voicesexisting at that moment. FIGS. 17-19 illustrate a system for enabling ahard of hearing person to eliminate environmental sounds and concentrateon what is being said by one or more individuals.

Using the system of FIG. 17, a hard of hearing person in a public place,such as a restaurant uses a wireless telephone 1701 to establishcommunication with the communication center 10. A land line and standardtelephone capabilities can be used for connectivity with equipment suchas RJ-11, if available, as well as hook-up to a microphone. A microphone1703 potentially with receiving and processing is connected to thetelephone 1701 to receive and transmit the voices of the various peoplein the public place and to receive and transmit other external sounds.After a connection has been established, the hard of hearing person isprompted by the processor 1802 to indicate whether or not he/she iswearing a hearing aid device. If the answer is yes, the processor 1802knows that communications to be sent to the hard of hearing person areto be sent to a hearing aid and thus triggers adjustments to the soundlevel accordingly. If the answer is no, the processor 1802 knows thatcommunications are to be sent to some other speaker that is near, or in,the ear of the user and again sound level is adjusted accordingly.

Referring now to FIG. 18, the hard of hearing person and the otherpeople with whom a conversation is being held speak into the microphone1703 associated with telephone 1701. In the communication center 10, thespeech is picked up and routed through a TRS to a processor unit 1802.The processor unit 1802 is used to determine whether an individualspeaking at any moment is a recognized speaker whose voice pattern is ina data base associated with the processor unit 1802. If the processordetermines that the speaker is in the data base, it identifies thespeaker and does not proceed with a new ID procedure. If the processor1802 determines that the speaker is not in the data base, it initiates anew identification procedure. First, it finds out if the ID procedure islocal to the device. If it is, the speaker is identified. If it is notlocal, an external identification procedure is used where the hard ofhearing person assigns or keys in a number, a letter, or initials toidentify the speaking person, which number, letter, or initials arestored in the processor unit 1802. Individual attributes of the speaker,such as voice signature, are also stored in processor unit 1802 withreference to the speaker's ID.

Once all of the speakers, and their voice signatures, have beenidentified by the processor unit 1802, the hard of hearing person canidentify which speaker he is interested in listening to. Referring nowto FIG. 19, once the hard of hearing person has signified the person oreven sound of interest, the characteristics of the person or the soundare identified by the processor unit 1802. The identifiedcharacteristics are used to single out the desired speaker or sound.Thereafter, any sound or speech which does not have the identifiedcharacteristics is blocked out by the processor unit 1802 and notdelivered to the ear of the hard of hearing person. Alternatively, thevolume of the sound or speech of no immediate interest to the hard ofhearing may be lowered. If the sound or speech does have the identifiedcharacteristics, the sound or speech are delivered to the ear of thehard of hearing person via the telephone relay system and the wirelesstelephone. As before, the hard of hearing person can prompt thecommunication center 10 to enhance the volume of the singled out soundor speech. The delivered speech may be delivered by the telephone eitherto an ear piece in the user's ear or to the user's hearing aid. One ofthe advantages to this system is that a hard of hearing person does nothave to invest in expensive equipment to be able to hold a conversationwith another person in a noisy environment. The only piece of equipmentrequired by the hard of hearing person in the system of the presentinvention is a telephone such as a wireless telephone and the microphoneunit.

In yet another embodiment of the system of the present invention, asystem similar to that of FIG. 8 may be used to allow a deaf person toparticipate in a chat room. To do this, the deaf person again uses thecommunication center 10 as a web access unit via server 714. Usinghis/her TTY 710, the deaf person identifies for the center 10 the chatroom to which he/she would like to connect. The center 10 then uses itsweb server 714 to establish contact with the chat room. Communicationsfrom the chat room are transmitted to the web server 714 and put into abuffer. The communications are then converted to a format which can beread by a TTY or alternatively changed into a video stream of signlanguage and transferred at a slow speed for text and alternativelyappropriate video speed to the deaf person's TTY or video 710. Bytransferring the communications at a slow speed, the deaf person isbetter able to read them all. To reduce the number of communicationsbeing transmitted, the deaf person using his/her TTY 710 can tell theweb server 714 which individual(s) communications should be displayed.To participate in the chat room, the deaf person uses his/her TTY 710 tocompose a message. The message is then delivered over the telephoneconnection between the TTY 710 and the center 10 to the TRS 712 and thento the web server 714. In the web server 714, the message is convertedto a format compatible with the format being used for the chat room andthen transmitted to the chat room. Alternatively, if the deaf person'sunit 710 contains a camera and certain processing capabilities, suchperson can communicate with the chat room via sign language. In thisembodiment, the text transmitted to the deaf person is converted to signlanguage he/she can view, while their signing to the camera is convertedto text sent to the chat room. In this embodiment, the actual image ofthe deaf person is never transmitted and is deciphered to text which issent out. Heretofore, deaf people could not participate in chat roomsusing a TTY because telephone systems were not configured to do this.

It is apparent that there has been provided in accordance with thepresent invention a personal transaction system and method which fullysatisfies the means, objects and advantages set forth hereinbefore.While the present invention has been described in the context ofspecific embodiments thereof, other variations, alternatives, andmodifications will become apparent to one skilled in the art afterreading the foregoing description. Therefore, it is intended to embraceall variations, alternatives, and modifications that fall within thebroad scope of the appended claims.

1-91. (canceled)
 92. A system for enabling communication between a deafperson and a hearing person comprising: providing means for receivingand transmitting communications at a first location remote from saiddeaf person and said hearing person; means at said first location fordetermining the availability of an operator and the location of saidavailable operator; means for transferring a communication received fromat least one of said deaf person and said hearing person to saidoperator; and means for enabling said operator to receive saidcommunication from said at least one of said deaf person and saidhearing person and for enabling said operator to communicate by at leastone of other means and voice with at least one of said voice recipientand other communicating parties.
 93. The system according to claim 92,wherein said availability determining means determines whether a newtelecommuting operator must be added and said transferring meanscomprising means for transferring said communication to said newtelecommuting operator.
 94. The system according to claim 93, furthercomprising a server for dialing out to said new telecommuting operatorconnected to said determining means.
 95. The system according to claim92, wherein said deaf person communicates with said receiving means viaat least one of a TTY, a computer, a wireless mobile apparatus and acommunication means.
 96. The system according to claim 92, wherein saidreceiving means comprises a PBX.
 97. A system for enabling communicationbetween a deaf person and a hearing person comprising: means located ata first location for receiving at least one of a TTY, computer, andwireless mobile apparatus communication from said deaf person viacommunication means and for transferring said communication to atelecommuting operator located at a second location remote from saidfirst location; means at said second location for enabling saidtelecommuting operator to receive said communication and for convertingsaid communication into a voice message; means for transmitting saidvoice message to at least one of said first location and voicerecipient; and means at said first location for transmitting said voicemessage from said first location to said voice recipient. 98-121.(canceled)
 122. The system according to claim 92, wherein said operatoris a telecommuting operator located at a second location remote fromsaid first location and said enabling means is located at said secondlocation.
 123. The system according to claim 92, wherein said enablingmeans comprises means for allowing said operator to handle callsoriginating in voice, and at least one of a TTY text, non-TTY text, anda video.
 124. The system according to claim 92, further comprising meansfor enabling at least one of a deaf person, a hearing person, atelephone relay service, a video relay service, a communication center,a server, an operator, an Intranet, and an Internet website to generateand transmit communications.
 125. The system according to claim 124,wherein said means for enabling generation and transmission ofcommunications comprises at least one of a TTY, a computer, a wirelessmobile apparatus, a voice capturing and transmitting apparatus and avideo camera for capturing sign language.
 126. The system according toclaim 92, further comprising means for determining how many remotelylocated operators are actively engaged, how many operators areavailable, and how many additional operators are needed.
 127. The systemaccording to claim 92, further comprising means for allowing said voicerecipient to respond with a voice message, and said operator receivingsaid voice message, forming a converted message in at least one of textand sign language, and transmitting said converted message to said deafperson.
 128. The system according to claim 128, wherein said system isaccessible through an Internet website.
 129. The system according toclaim 92, wherein said computer is a sign language interpreter.