Online encounter enhancement systems and methods

ABSTRACT

Computing systems and methods are described in which video calls or other online communications are established or enhanced among two or more live participants. In some variants one or more preferences are gleaned from a first participant&#39;s behavior so as to streamline a call establishment with one or more qualified recipients. Alternatively or additionally, enriched auditory message data may be received privately from a sender without leaving a shared space.

RELATED APPLICATIONS

This application is a continuation-in-part of U.S. application Ser. No.16/541,558 (“Methods and Systems for Placing a Video Call Over aCommunication Network”), which is incorporated herein by reference inits entirety for all purposes.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a transatlantic arrangement of one or more systems inwhich one or more improved technologies may be incorporated.

FIG. 2 depicts a physical proximity of a mobile device user who caninitiate and modify an interpersonal communication in which one or moreimproved technologies may be incorporated.

FIG. 3 depicts a network that can facilitate interpersonal messagecomponent deliveries within a section or across section boundaries inwhich one or more improved technologies may be incorporated.

FIG. 4 depicts a block diagram of a single-action video call in whichone or more improved technologies may be incorporated.

FIG. 5 depicts a system in which a network allows various communicationsat least between two endpoints in which one or more improvedtechnologies may be incorporated.

FIG. 6 depicts a client device in which one or more improvedtechnologies may be incorporated.

FIG. 7 depicts a server in which one or more improved technologies maybe incorporated.

FIG. 8 depicts an application stack in which one or more improvedtechnologies may be incorporated.

FIG. 9 depicts a system in which another network allows variouscommunications at least between two endpoints in which one or moreimproved technologies may be incorporated.

FIG. 10 depicts another block diagram of a single-action video call inwhich one or more improved technologies may be incorporated.

FIG. 11 depicts a flow diagram in which one or more improvedtechnologies may be incorporated.

FIG. 12 depicts another flow diagram in which one or more improvedtechnologies may be incorporated.

DETAILED DESCRIPTION

The detailed description that follows is represented largely in terms ofprocesses and symbolic representations of operations by conventionalcomputer components, including a processor, memory storage devices forthe processor, connected display devices, and input devices.Furthermore, some of these processes and operations may utilizeconventional computer components in a heterogeneous distributedcomputing environment, including remote file servers, computer servers,and memory storage devices.

It is intended that the terminology used in the description presentedbelow be interpreted in its broadest reasonable manner, even though itis being used in conjunction with a detailed description of certainexample embodiments. Although certain terms may be emphasized below, anyterminology intended to be interpreted in any restricted manner will beovertly and specifically defined as such.

The phrases “in one embodiment,” “in various embodiments,” “in someembodiments,” and the like are used repeatedly. Such phrases do notnecessarily refer to the same embodiment. The terms “comprising,”“having,” and “including” are synonymous, unless the context dictatesotherwise. “Additional,” “after,” “application-specific,” “associated,”“at least,” “auditory,” “authorized,” “automatic,” “based,” “before,”“component,” “comprising,” “communication,” “configured,” “connected,”“corresponding,” “defined,” “eligible,” “excluded,” “expressed,”“facilitated,” “first,” “identified,” “immediate,” “implemented,” “in,”“indicative,” “interpersonal,” “invoked,” “natural,” “manifested,”“new,” “obtained,” “of,” “other,” “particular,” “partly,” “private,”“selective,” “such,” “permitted,” “prospective,” “public,” “qualified,”“remote,” “responsive,” “second,” “simultaneous,” “signaled,” “so as,”“special-purpose,” “third,” “targeted,” “temporary,” “transmitter-side,”“triggered,” “unique,” “wherein,” or other such descriptors herein areused in their normal yes-or-no sense, not merely as terms of degree,unless context dictates otherwise. In light of the present disclosure,those skilled in the art will understand from context what is meant by“remote” and by other such positional descriptors used herein. Likewise,they will understand what is meant by “partly based” or other suchdescriptions of dependent computational variables/signals. “Numerous” asused herein refers to more than one dozen. “Instantaneous” as usedherein refers to having a duration of less than 0.1 seconds unlesscontext dictates otherwise. “Immediate” as used herein refers to havinga duration of less than 5 seconds unless context dictates otherwise.Circuitry or data items are “onboard” as used herein if they are aboarda vehicle or denoting or control 109led from a facility or featureincorporated into the main circuit board of a computer or computerizeddevice unless context dictates otherwise. Circuitry is “invoked” as usedherein if it is called on to undergo voltage state transitions so thatdigital signals are transmitted therefrom or therethrough unless contextdictates otherwise. Software is “invoked” as used herein if it isexecuted/triggered unless context dictates otherwise. One number is “onthe order” of another if they differ by less than an order of magnitude(i.e., by less than a factor of ten) unless context dictates otherwise.As used herein “causing” is not limited to a proximate cause but alsoenabling, conjoining, or other actual causes of an event or phenomenon.

Terms like “processor,” “center,” “unit,” “computer,” or other suchdescriptors herein are used in their normal sense, in reference to aninanimate structure. Such terms do not include any people, irrespectiveof their location or employment or other association with the thingdescribed, unless context dictates otherwise. “For” is not used toarticulate a mere intended purpose in phrases like “circuitry for” or“instruction for,” moreover, but is used normally, in descriptivelyidentifying special purpose software or structures.

Reference is now made in detail to the description of the embodiments asillustrated in the drawings. While embodiments are described inconnection with the drawings and related descriptions, there is nointent to limit the scope to the embodiments disclosed herein. On thecontrary, the intent is to cover all alternatives, modifications andequivalents. In alternate embodiments, additional devices, orcombinations of illustrated devices, may be added to, or combined,without limiting the scope to the embodiments disclosed herein.

FIG. 1 schematically illustrates one or more distributed or otherdata-handling system 100 configured to facilitate trans-oceanicmonitoring and comprising transistor-based circuitry 128 in one or moredata networks 150, in which one or more technologies may be implemented.In the interest of concision and according to standard usage ininformation management technologies, the functional attributes ofmodules described herein are set forth in natural language expressions.It will be understood by those skilled in the art that such expressions(functions or acts recited in English, e.g.) adequately describestructures identified below so that no undue experimentation will berequired for their implementation. For example, any session parametersor other informational data identified herein may easily be representeddigitally as a voltage configuration on one or more electrical nodes(conductive pads of an integrated circuit, e.g.) of an event-sequencingstructure without any undue experimentation. Each electrical node ishighly conductive, having a corresponding nominal voltage level that isspatially uniform generally throughout the node (within a device 600 orother system as described herein, e.g.) at relevant times (at clocktransitions, e.g.). Such nodes (lines on an integrated circuit orcircuit board, e.g.) may each comprise a forked or other signal pathadjacent one or more transistors. Moreover, many Boolean values(yes-or-no decisions, e.g.) may each be manifested as either a “low” or“high” voltage, for example, according to a complementarymetal-oxide-semiconductor (CMOS), emitter-coupled logic (ECL), or othercommon semiconductor configuration protocol. In some contexts, forexample, one skilled in the art will recognize an “electrical node set”as used herein in reference to one or more electrically conductive nodesupon which a voltage configuration (of one voltage at each node, forexample, with each voltage characterized as either high or low)manifests a yes/no decision or other digital data.

Such circuitry 128 may comprise one or more integrated circuits (ICs),for example, optionally mounted on one or more circuit boards. Whetherimplemented in a distributed cloud or within one or more (apparatusesat) endpoints described herein, transistor-based circuitry 128 comprisesan event-sequencing structure generally as described in U.S. Pat. Pub.No. 20150094046 but configured as described herein. Transistor-basedcircuitry 128 may (optionally) include one or more instances of controlcomponents 131 configured for local processing, for example, eachincluding an electrical node set 141 upon which one or more operationalparameters described herein are represented digitally as a correspondingvoltage configuration 151. Transistor-based circuitry 128 may likewiseinclude one or more instances of response components 132 configured forlocal processing, for example, each including an electrical node set 141upon which one or more criteria described herein are representeddigitally as a corresponding voltage configuration 152. Transistor-basedcircuitry 128 may (optionally) include one or more instances of routingcomponents 133 configured for local processing, for example, eachincluding an electrical node set 141 upon which one or more datadestinations described herein are represented digitally as acorresponding voltage configuration 153. Transistor-based circuitry 128may likewise include one or more instances of notification components134 configured for local processing, for example, each including anelectrical node set 141 upon which one or more messages described hereinare represented digitally as a corresponding voltage configuration 154.Transistor-based circuitry 128 may likewise include one or moreinstances of invocation components 135 configured for delegation orother distributed processing, for example, each including an electricalnode set 141 upon which one or more memory addresses described hereinare represented digitally as a corresponding voltage configuration 155.Transistor-based circuitry 128 may (optionally) include one or moreinstances of recognition components 136 configured for local processing,for example, each including an electrical node set 141 upon which one ormore patterns as described herein are represented digitally as acorresponding voltage configuration 156. Transistor-based circuitry 128may likewise include one or more instances of authorization components137 configured for local processing, for example, each including anelectrical node set 141 upon which one or more contingent responsedescribed herein are represented digitally as a corresponding voltageconfiguration 157. Transistor-based circuitry 128 may likewise includeone or more instances of interface components 138 configured for localprocessing, for example, each including an electrical node set 141 uponwhich one or more queries or other prompts described herein arerepresented digitally as a corresponding voltage configuration 158. Insome variants, for example, a server or other endpoint 162 in NorthAmerica may manifest an instance of a communication channel from aconnection-initiating endpoint 161 (e.g. a client device, hub, or user10 in North Africa) featuring one or more instances of circuitrycomponents like these. Data flow diagrams and other structuresdescribing such channels 117 are provided below.

In some variants an establishment 183, modification 184, or terminationof a call 114, visit 115, or other online interaction via channel 117 isdescribed below. Moreover interpersonal communications may ariseorganically from one or more (instances of) tasks 188, needs 189, orother items on a list 187 of a client device user at a first endpoint161 as shown. In some contexts, for example, a user's time or activitieswithin a virtual reality zone 124 may be monitored to result in one ormore counts 125 or other indexes 127 that characterize a user's interestin a topic without needing to query the user and wait for a result.Alternatively or additionally users in an online conference zone 124(with one or more users at one or more respective additional endpoints162) may experience more sophisticated modes of interpersonalcommunication than were ever possible even in real life.

FIG. 2 depicts a physical proximity 295 of a user of a mobile device ata first endpoint 161 featuring one or more on-screen boxes 206, buttons206, codes 208, or other controls 209 in which one or more technologiesmay be implemented to initiate an interpersonal communication (e.g. asingle-action video call 114). Alternatively or additionally in somevariants the device may be configured to read (through one or morecameras and other interfaces) printed media items 267 (e.g. placards orbusiness cards) that are configured to trigger a video call 114 forconsultation in regard to a topic of interest (e.g. with a docent inregard to an artwork on display) as shown.

To pinpoint and enrich suitable interpersonal consultations, one or moreresponse components 132 may be configured to monitor and update topicalindexes 127 according to which of several electronic resources 202A-Care accessed prior to the triggering of the interpersonal communication.This can occur, for example, in a context in which a preference 218,ranking 219, or other indication 120 can be gleaned according to howmuch time or how many records 216 or other resources 202A were reviewedvia a first connection 204A; in which an online site 222, service 223,product 224, skill identifier 226, label, index 228, or other suchcontent 230 is associated with a second section of online resources 202Breviewed via a second metered connection 204B; in which repository ofemail 263 or social media 265 or other such media 269 is associated witha third section of online resources 202C reviewed via a third meteredconnection 204C; and in which two or more such sectioned resources202A-C are each respectively associated with an appropriate specialistof exceptional skill in that respective resource. As described below asingle-action button 206, link, a single-action QR code 208, or othersuch customized controls 209 as described below.

FIG. 3 schematically illustrates a data-handling system 300 that mayconnect with or instantiate the above-described systems 100, 200. Anetwork 350 thereof may likewise connect with or instantiate network 150or include one or more instances of resource 202A, of resource 202B, ofresource 202C, or of more than one of these. As further described below,network 350 may include, determine, or otherwise facilitate one or more(instances of) functions 313, sessions 314, intervals 315, of auditorydata 321A with associated elements 322A comprising content 330A, ofauditory data 321B with associated elements 322B comprising content330B, of records 316A-B that each associate one or more identifiers 326with one or more indexes 327.

In some contexts a crowd of multiple users 10A-H may each belong at agiven moment to zero, one or more subsets or other sections 302A-C asshown and further described below. Some or all such users 10A-H may havea connection 304A-E with a network 150, 350 or may have peer-to-peerconnections or other bilateral or other relationships 303A-G among themin contexts, of a trial courtroom, a consultant community, a concert orfestival, a marketplace, a classroom, a virtual reality or augmentedreality contest, or some other complex and needful interpersonalgathering in which some or all users 10A-H may want to interact onlinein a controllable, appropriate, and selective manner.

FIG. 4 schematically depicts a block diagram of a single-action videocall 114 according to one or more embodiments. In this protocol apatient or other needful user 10A will see a textual or otherdescription 401 pertaining to one or more consultants or other potentialproviders. A notification 405 like “VIDEO CALL ESTABLISHED” and one ormore faces of call-receiving entities (e.g. users 10B-H) are immediatelypresented in a quick response video conference. In some variants inwhich transmitting user 10A has a video camera available for use, acall-receiving entity also sees user 10A (provided that user 10A haschosen to enable the camera). The calling user 10A and thecall-receiving user(s) each include an interface having a hang up button206, 406 or similar control 209 that allows them to terminate the (call114 or other) session 314.

FIG. 5 schematically depicts a system 500 in which a network 550 allowsvarious calls 114 or other session 314 described herein according to oneor more embodiments. In some variants endpoints 561, 562 may connectdirectly via a peer-to-peer signal path 506. Alternatively oradditionally endpoints 561, 562 as shown may connect directly via one ormore networks 350, 550 incorporating one or more connection servers700A. Such servers might be hosted in the cloud or in a local instancesoperated by user 10B. Control channels 117 in network 550, for example,may manage call establishments 183, intermissions, reconnections orother modifications 184, and terminations 185 according to one or moreembodiments. In some variants, a user-selected label 227 or otherdigital expression of an intention of user 10A to initiate a video call114 to one or more suitable recipients (e.g. at one or more endpointdevices 502) is relayed via linkage 503 to the connection server 700that has a subscriber database 505. A subscriber database 505 holds thenetwork location and IP address of the receiver endpoint 532 andnotifies the receiver endpoint 532 via linkage 504 of a session request1127 (e.g. to connect via video). If receiver endpoint 532 accepts avideo call 114 or other session 314, then connection server 700establishes an appropriate connection 204, 304 (e.g. via a peer-to-peerpath 506 or via a connection server signal path 507). Endpoints 561, 562as shown may (optionally) comprise a browser in a computer system 100,200, 300, 500 or a mobile smartphone or an app in a smartphone system100, 200, 300, 500. In some variants a browser/app are each capable ofestablishing a video connection 204, 304.

FIG. 6 schematically depicts a (smartphone or other) computing devicewith an application configured to initiate or otherwise facilitate asingle-action call 114 according to some variants. In one embodiment, acomputer with a browser stack 609 has the following components. It has abrowser with WebRTC stack or equivalent 601 which allows video streamsto be encoded and decoded. It has a call manager 602 which coordinatesthe control messages to and from the connection server 700. It has aninteraction manager 603 that coordinates interaction of a first user 10Avia the stack with another user 10B-H. It has an Application User 10AInterface (UI) 604 that enables the interaction of the first user 10Awith the video call 114.

Referring now to FIG. 6, there is shown a client device 600 in which oneor more technologies may be implemented. Client device 600 may includeone or more instances of processors 602, of memories 605, of user inputs608, of (speakers 611 or screen displays 612 or other local)presentation hardware all interconnected along with the networkinterface 606 via a bus 616. One or more network interfaces 606 allowdevice 600 to connect via the Internet or other networks 150). Memory605 generally comprises a random-access memory (“RAM”), a read onlymemory (“ROM”), and a permanent mass storage device, such as a diskdrive.

Memory 605 may contain one or more instances of operating systems 610,of web browsers 614, of other local apps 624, or of other modules thatfacilitate operations described herein. These and other softwarecomponents may be loaded from a non-transitory computer readable storagemedium 618 into memory 605 of the client device 600 using a drivemechanism (not shown) associated with a non-transitory computer readablestorage medium 618, such as a floppy disc, tape, DVD/CD-ROM drive, flashcard, memory card, or the like. In some embodiments, software or otherdigital components may be loaded via the network interface 606, ratherthan via a computer readable storage medium 618. Special-purposecircuitry 622 (implementing a security feature 660, e.g.) may, in somevariants, include some or all of the event-sequencing logic describedherein. In some embodiments client device 600 may include many morecomponents than those shown in FIG. 6, but it is not necessary that allconventional components of a mobile device be shown in order to disclosean illustrative embodiment.

Referring now to FIG. 7, there is shown a server 700 in which one ormore technologies may be implemented. Server 700 may include one or moreinstances of processors 702, of memories 705, user inputs 708, and of(speakers or other) presentation hardware 712 all interconnected alongwith the network interface 706 via a bus 716. One or more networkinterfaces 706 allow server 700 to connect via the Internet or othernetworks 150). Memory 705 generally comprises a random-access memory(“RAM”), a read only memory (“ROM”), and a permanent mass storagedevice, such as a disk drive.

Memory 705 may contain one or more instances of operating systems 710,of websites 714, of aggregation modules 726, or of preferenceimplementation services or other such control 109 modules thatfacilitate modeling the preferences of a user/client. These and othersoftware components may be loaded from a non-transitory computerreadable storage medium 718 into memory 705 of the server 700 using adrive mechanism (not shown) associated with a non-transitory computerreadable storage medium 718, such as a floppy disc, tape, DVD/CD-ROMdrive, flash card, memory card, or the like. In some embodiments,software or other digital components may be loaded via the networkinterface 706, rather than via a computer readable storage medium 718.Special-purpose circuitry 722 may, in some variants, include some or allof the event-sequencing logic described herein. In some embodimentsserver 700 may include many more components than those shown in FIG. 7,but it is not necessary that all conventional components of a server beshown in order to disclose an illustrative embodiment.

FIG. 8 schematically depicts a diagram of different modules inside asmartphone 800 with an application for a single-action call 114according to one or more embodiments. If a first user 10 is using anapplication in a smartphone or similar computer system then in somevariants an a stack 801 (e.g. instead of a browser) may use a mediamodule such as a system-in-a-package (SIP) module or equivalent. Asshown the stack 800 may also have a call manager 802, interactionmanager 803, and application user interface 804 as described above.

FIG. 9 depicts flow diagram for scanning using a session triggering code208 according to one or more embodiments. In some variants as shown inFIG. 9, a first user 10A can see a QR code 208 in a printed material anduse a scanner 901 on the first user's smart phone. Scanningsingle-action URL code 208 triggers the browser immediately and a callmanager 802A inside the browser 902 starts a video call 114. The videocall 114 is sent through an internet protocol (IP) or other digitalnetwork 950 to the call recipient (e.g. user 10B) using a call manager802B in a browser or app 904. If a recipient user accepts, then thevideo call 114 is established through interaction manager 803 as shown.

In a typical implementation a receiver endpoint 962 will not impose arequirement that a session-initiating first endpoint 961 be known and asshown it is anonymous insofar that “single-action” indicates that thevideo call 114 will be established regardless of prior designation of aparticular receiver endpoint 962. In some variants, however, a candidatereceiver endpoint 962 may require some information from the firstendpoint 961, and such a candidate may require information via one ormore prompts 1079 (e.g. on a form to be filled out) to be answered priorto a video call establishment 183 relating to a notification like thatof FIG. 10.

FIG. 10 schematically depicts another call 114 as a flow diagram forsingle-action scanning according to one or more embodiments. After auser takes either option 402 (e.g. allowing a user to initiate a callmerely by using an on-screen control 209 with a human-readable label 227like “VIDEO CALL WITH US”) or option 403 (e.g. allowing a user toinitiate a call merely by scanning a card or other printed physical item267 that has a QR code and a human-readable label 227 like “SCAN THIS QRCODE TO VIDEO CALL”), the first endpoint 161, 561, 961 is presented aform having one or more to be filled out (at option 1001 or otherstructured dialog after which the video call 114 will be established.

Although the algorithm has been described as having step 1001 happeningbefore connecting stage of video call 114, it could be implemented thatthe video call 114 is established first and then the form is shown tothe first endpoint 161, 561, 961. One skilled in the art will recognizethat there are other possible combinations of these stages which stillexpress the same essential methodology.

FIG. 11 depicts a particular scenario and progressive data flow 1100 inwhich one or more improved technologies may be incorporated. Flow 1100relates two or more client devices 600A-E (see FIG. 6) each operated bya respective user 10 (see FIG. 3) at respective endpoints. Theseendpoints may communicate either directly or via one or more (routingservers 700 or server components 131-138 in one or more) public networks1150A such as the Internet as described herein. Alternatively oradditionally, these endpoints may likewise communicate via one or more(session control servers 700 or server components 131-138 in one ormore) private networks 1150B or other secure connections 204, 304 asdescribed herein.

As shown one or more interpersonal connection criteria 1114 are obtainedfor some potential connection recipients (e.g. using devices 600B, 600C,and 600E as shown) but not others (e.g. using devices 600A and 600D asshown). Patterns and protocols of such criteria allow an incomingcommunication to be routed appropriately according to one or more dailyavailability schedules, topical specialties, or other suchsuitability-indicative criteria 1114. Alternatively or additionally,updated indicia of real time availability 1116A-B (e.g. indicating apotential recipient user 10 coming online) may be provided atspontaneous times as shown. When a visit 1118 (e.g. by a user of device600A) to a web site 222 or other online zone 124 occurs, user behaviorsare thereby tracked (e.g. by conducting counts of actions 1122A-D,interaction intervals, or other indexes 127, 327 signaling degrees ofapparent topical interest) via linkage 1119. This allows one or moreassignments 1125A-B (e.g. of indexes or best-matched potentialconnection recipients. For some best-matched potential connectionrecipient endpoints 562 (see FIG. 5), in fact more than one device orconnection modality may be in effect. This can occur, for example, in acontext in which a recipient user may be on call for extended periodsand in which connection response time is of the essence.

In various embodiments repeatedly updated assignments 1125 may be basedon one or more online user tasks 188 recorded, explicitly expressed orother needs 189 (e.g. manifested in a search term or online section 302selected), preferences 218 or other indications 220, or other tablecontents manifesting a user profile. From this profile in response to anactuation 1126 of a user control 209 or similar consequential action, animmediate intent to trigger an interpersonal connection is signaled tospecial-purpose circuitry 722 residing in private network 1150B asshown, which immediately transmits requests 1127 selectively (e.g. tosuitable prospective client endpoints 162, 562, 962 comprising someavailable devices 600B, 600D but not other available devices 600C,600E). Immediately in response at least one such device 600B in responsesignals a receiver-side action 1146 so as to complete at least abilateral connection 1147 and thereby establish a video chat.

In some variants a single-action call request 1127 is routed to multipleusers. This can occur, for example, in a context in which a user 10Acalls a sales line of a product or service provider; in which a system100, 200, 300, 500, 900 is configured to route calls 114 to allqualifying users 10G-H (e.g. in a caller-preferred section 302C) thathave indicated they are available to take a call 114 based on one ormore caller-specific criteria 1114 as described herein; and in which anincoming call 114 triggers (at least) matched transmitter and receiverendpoints to ring. In some variants whichever qualifying user 10Hanswers first will receive the call 114. Alternatively or additionallysuch calls 114 may be directed based on a round-robin protocol or may bebased on a time of day (or both). It is also possible to connect asingle-action call 114 based on an expressed or inferred languageproficiency (e.g., so as to accommodate a calling user 10A who hasuttered several phrases matched by recognition component 136 to Spanishlanguage patterns) or location (e.g. manifesting an inferred preference218 to connect a California-resident caller to a receiving user 10F inLos Angeles) as described herein.

FIG. 12 depicts another scenario and progressive data flow 1200 in whichone or more improved technologies may be incorporated. Flow 1200likewise relates two or more client devices 600A-E (see FIG. 6) eachoperated by a respective user 10 (see FIG. 3) at respective endpoints.These endpoints may communicate either directly or via one or more(routing servers 700 or server components 131-138 in one or more) publicnetworks 1150A such as the Internet as described herein. Alternativelyor additionally, these endpoints may likewise communicate via one ormore (session control servers 700 or server components 131-138 in one ormore) private networks 1150B or other secure connections 204, 304 asdescribed herein.

As shown one or more interpersonal connection criteria 1214 are obtainedfor some potential connection recipients (e.g. using devices 600C, 600D,and 600E as shown) but not others (e.g. using device 600B as shown).Patterns and protocols of such criteria allow an incoming communicationto be accepted automatically, rejected automatically, or screen with aquery to a device user who receives targeted content 330A. (As usedherein content is said to be “targeted” if it is directed to at leastone recipient in, but less than 75% of, an audience or similar cohort ofhuman beings in a group chat, streamed broadcast audience, or similaronline crowd. And the content is said to be “non-targeted” if it isdirected to a larger percentage of such a cohort irrespective of areceptivity of some members.) In some contexts such potential contentrecipients may modify one or more personal content screening criteria1214 so as to allow some message types (e.g. urgent messages) but notothers or to allow incoming content 330A from some message senders (e.g.attorneys, published authors, or other certified individuals) but notothers. Alternatively or additionally, a content delivery requestrecipient may implement one or more personal screening criteria 1214 soas to allow some strangers to approach (e.g. selectively allowing afirst- or second-degree-of separation connection, a ranking, or othersuch a scalar indication 220 of reputation exceeding a threshold) butnot others. Alternatively or additionally, updated indicia of real timereceptivity (e.g. indicating a potential recipient user 10 becomingreceptive to a triaged encounter with a partially qualified individual)may be provided at spontaneous times.

In some contexts a celebrity or other privileged performer may providelive content 1230A (e.g. via one or more devices 600D) that includesauditory message data 321B for use as a livestreamed broadcast 1223 tomany recipient devices 600B, 600C, 600E that constitute a live onlineaudience. For a classroom, in some contexts such privileged messagecontent 1230A may likewise be delivered from an authorized instructor toa (virtual breakout room or other) selectively targeted recipientsubset.

When a less-privileged user (e.g. of device 600B) transmits content1230B, in some variants as shown, (one or more recipient-targeting orother operational elements 322A of) such content 1230B may establishcontext data 1226 signaling what recipient-defining attributes areneeded. For an audience member having a medical emergency, for example,there does not need to be any occasion to scream “does anyone here knowabout ______?” as might have been considered in a real-world conferenceor ceremony. Rather, an appropriate section 302A may be identified towhich one or more lecture audience devices 600C belong, which matchingevent may be recognized during a recipient assignment 1125C as shown,and in response one or more transmissions of hybrid data 1266A (e.g.simultaneously or otherwise including both a broadcast 1223 and auditorymessage data 321A corresponding to the one or more context-specifyingoperational elements 322A into a single auditory channel 117) as shown.

To approach a more selective member of such a cohort successfully, insome contexts it may be necessary to begin with a request 1267 for sucha connection. In such contexts an authorization 1257 for the partialintrusion may depend upon an exclusive human user (e.g. of device 600E)receiving convincing elements 322A associated with the auditory messagedata 321A. When and if such authorization 1257B arrives, hybrid data1266B may be delivered as shown. This can occur, for example, even whenan identity of the second endpoint 162, 562, 962 is not yet resolved asone or more servers 700 implement the communication until after a singlereceiver-side action 1146 (e.g. answering a call 214 or otherwiseaccepting the communication by actuating a receiver-side control 209)occurs.

Although the present invention has been described in terms of variousembodiments, it is not intended that the invention be limited to theseembodiments. Modification within the spirit of the invention will beapparent to those skilled in the art. For example, the connection server700 may reside in the receiver endpoint 162, 562, 962 or one or morenetworks 350, 550, 950 that the receiver endpoint 162, 562, 962 isoperating on. Also, even though an IP network 950 is specificallymentioned, the same system 100, 200, 300, 500, 900 can operate on an ATMnetwork or other non-IP networks.

Although a “single transmitter-side action” may be preceded by multiplephysical movements of a user 10A (e.g., moving a mouse so that a mousepointer is over a button 206, 406), the single transmitter-side actiongenerally refers to a single event performed at the transmittingendpoint device that indicates the user's inferred intention to allow avideo call 114 or similar communication session 314 to be establishedimmediately and without further transmitter-side (user) action.

In light of teachings herein, numerous existing techniques may beapplied for configuring special-purpose circuitry or other structureseffective for managing auditory communication channels or otherwiseenhancing online interpersonal engagement as described herein withoutundue experimentation. See, e.g., U.S. patent Ser. No. 10/872,322(“System and method for collaborative shopping, business andentertainment”); U.S. patent Ser. No. 10/819,950 (“Altering undesirablecommunication data for communication sessions”); U.S. patent Ser. No.10/791,409 (“Improving a user experience localizing binaural sound to anAR or VR image”); U.S. patent Ser. No. 10/776,073 (“System and methodfor managing a mute button setting for a conference call”); U.S. patentSer. No. 10/242,032 (“Virtual world system supporting a consumerexperience”); U.S. Pat. No. 9,883,042 (“Teleforum participantscreening”); U.S. Pat. No. 8,924,482 (“Method and system for policingevents within an online community”); U.S. Pat. No. 8,890,919 (“Videoconferencing display and method to facilitate enhanced eye contact”);U.S. Pat. No. 8,861,707 (“Method and apparatus for simultaneouslymonitoring computer user screen and telephone activity from a remotelocation”). These documents are incorporated herein by reference to theextent not inconsistent herewith.

Also in light of teachings herein, numerous existing techniques may beapplied for configuring special-purpose circuitry or other structureseffective for compatibility and reputation scoring, single-actionresponse protocols, and other such content and engagement management asdescribed herein without undue experimentation. See, e.g., U.S. patentSer. No. 10/182,720 (“System and method for interacting with andanalyzing media on a display using eye gaze tracking”); U.S. patent Ser.No. 10/127,574 (“Internet marketing analytics system”); U.S. Pat. No.9,904,712 (“Systems, methods, and interfaces for aggregating andproviding information regarding legal professionals”); U.S. Pat. No.9,900,227 (“Analyzing changes in web analytics metrics”); U.S. Pat. No.8,688,701 (“Ranking and selecting entities based on calculatedreputation or influence scores”); U.S. Pat. No. 8,326,964 (“Website datacontent access progression”); U.S. Pat. No. 7,532,232 (“System andmethod for single action initiation of a video conference”); U.S. Pub.No. 20190026122 (“Redirecting multimedia output of a virtual desktop toa mobile device using image scanning”); U.S. Pub. No. 20180343135(“Method of establishing a video call using multiple mobilecommunication devices”); U.S. Pub. No. 20170300882 (“Videoconferencingwith a customer device”); U.S. Pub. No. 20160021207 (“Method and systemfor a uniform resource identifier (URI) broker”); U.S. Pub. No.20150324946 (“System and method for embedding of a two dimensional codewith an image”); U.S. Pub. No. 20150189227 (“System and method forimplementing video calls”); U.S. Pub. No. 20140280490 (“Systems andmethods for visual communication”). These documents are incorporatedherein by reference to the extent not inconsistent herewith.

Referring again to FIGS. 1-12 above, there are shown various systems100, 200, 300, 500, 900 in which one or more methods of establishing orotherwise facilitating interpersonal communication (e.g. a video call114 or other prospective communication session 314 at least) among atleast first and second endpoints. In some variants an instance of acontrol component 131 configure one or more control channels 117 orservers 700 (or both) that host information about the second endpoint162, 562, 962 including a topical or other non-unique description 401 ofthe second endpoint (e.g. one or more topical sections 302 or othercriteria 1114 pertaining to several eligible second endpoints but not toone or more destinations that are ineligible by virtue of not meetingthe non-unique description 401).

An instance of a response component 131 responds to only a singletransmitter-side action 1116 at the first endpoint 161, 561, 961 bytransmitting a connection request 1126 to establish a (video callchannel 117 or other) session connection 204, 304 via the one or moreservers 700. Another (instance of a) response component 131 generates orotherwise obtains a network location indication 220 partly based on aconnection request 1126 from the first endpoint 161, 561, 961 and partlybased on one or more counts 125 or other indexes 127, 327 pertaining toa user 10A of the first endpoint 161, 561, 961 (e.g. signaling how longa user 10A spends in an online zone 124 or other topical section 302).This can occur, for example, in a context in which a notificationcomponent 134 designates the second endpoint 162, 562, 962 of theconnection request 1126 uniquely and establishing a connection 204, 304(at least) among the first and second endpoints partly based on thenetwork location indication 220 and partly based on the second endpoint162, 562, 962; in which the connection request 1126 is obtained as acomponent of the interpersonal communication that is between firstendpoint 161, 561, 961 and the second endpoint 162, 562, 962; in whichan interface component 138 could not otherwise obtain a reliableindication of which second endpoint 162, 562, 962 might be most suitablewithout having to query the user and await a response; and in which anauthorization 1257 is received from a third endpoint that authorizes (atleast) some targeted auditory message data 321A to be received privatelyfrom the second endpoint (e.g. device 600B) at the third endpoint.

Some variants comprise a preference-gleaning method of responding to auser 10A of a first communication device 600A (e.g. identified by ausername, phone number, IMEI number, account number, or IP address), themethod including obtaining an availability commencement signal from eachof multiple resources 290 including first and second resources 202A-B,wherein the first resource 202A is associated (by a first record 316A atleast) with a first subject identifier 326 and wherein the secondresource 202B is associated (by a second record 316B at least) with asecond subject identifier 326. The method also includes obtaining afirst interactive volume index 127, 327 (e.g. as a function 313 ofseconds or megabytes during a current session 314 or time interval 315)between the (user 10A of the) first communication device 600A and(content 229, 330 associated (by one or more records 116, 316 at least)with) the first subject identifier 318. The method also includesobtaining a second interactive volume index 227, 327 (e.g. as a function313 of seconds or megabytes during a current session 314 or timeinterval 315) between the (user 10A of the) first communication device600A and (content 330B associated by one or more records 116, 316 atleast with) the second subject identifier 326. The method also includes“directly” responding to an (activation of a single control 209 orarticulation or gesture or other) intentional activation signal (by theuser 10A on or otherwise) via the first communication device 600A byestablishing an “immediate” (videoconference or other) connection 204,304 between the first communication device 600A and the first resource202A associated with a first subject identifier 326 partly based on (ascreen display 612 of) the first communication device 600A not recently(i.e. at the time of the activation selectively presenting or within 30seconds or otherwise) having been selectively connected to the content330B associated with the second subject identifier 326 and partly basedon the first interactive volume index 127, 327 (e.g. as a function 313of seconds or megabytes during a current session 314 or time interval315) between the (user 10A of the) first communication device 600A and(content 330A associated (by one or more records 116, 316 at least)with) the first subject identifier 326 exceeding a threshold (associatedwith or otherwise) corresponding to the second interactive volume index227, 327 (e.g. as a function 313 of seconds or megabytes during acurrent session 314 or time interval 315) between the (user 10A of the)first communication device 600A and (content 330B associated (by one ormore records 116, 316 at least) with) the second subject identifier 326.This can occur, for example, in a context in which the system 100, 200,300, 500, 900 would otherwise be unable to establish any such“immediate” connection 204, 304 without first having to wait for theuser 10A to (explicitly identify or otherwise selectively) express aprimary (preference 218, ranking 219, or other hierarchical indication220 of apparent) interest in the (content 230 of the) first subjectidentifier 226, 326 or a degree of disinterest in the (object of the)second subject identifier 226, 326.

Although various operational flows are presented in a sequence(s), itshould be understood that the various operations may be performed inother orders than those which are illustrated or may be performedconcurrently. Examples of such alternate orderings may includeoverlapping, interleaved, interrupted, reordered, incremental,preparatory, supplemental, simultaneous, reverse, or other variantorderings, unless context dictates otherwise. Furthermore, terms like“responsive to,” “related to,” or other past-tense adjectives aregenerally not intended to exclude such variants, unless context dictatesotherwise.

While various system, method, article of manufacture, or otherembodiments or aspects have been disclosed above, also, othercombinations of embodiments or aspects will be apparent to those skilledin the art in view of the above disclosure. The various embodiments andaspects disclosed above are for purposes of illustration and are notintended to be limiting, with the true scope and spirit being indicatedin the final claim set that follows.

In the numbered clauses below, first combinations of aspects andembodiments are articulated in a shorthand form such that (1) accordingto respective embodiments, for each instance in which a “component” orother such identifiers appear to be introduced (e.g., with “a” or “an,”)more than once in a given chain of clauses, such designations may eitheridentify the same entity or distinct entities; and (2) what might becalled “dependent” clauses below may or may not incorporate, inrespective embodiments, the features of “independent” clauses to whichthey refer or other features described above.

CLAUSES

1. (Independent) A method of establishing, configuring, or otherwisefacilitating interpersonal communication (e.g. a video call 114 or otherprospective communication session 314 at least) among at least a firstendpoint 161, 561, 961 and a second endpoint 162, 562, 962, the methodcomprising:

invoking transistor-based circuitry (e.g. an instance of a controlcomponent 131) configured to cause a control channel 117 and one or moreservers 700 that host information about the second endpoint 162, 562,962 including a (topical or other) non-unique description 401 of thesecond endpoint 162, 562, 962 (e.g. one or more topical sections 302 orother criteria 1114 pertaining to eligible second endpoints 162, 562,962 but not to one or more destinations that are ineligible by virtue ofnot meeting the description 401);

invoking transistor-based circuitry (e.g. one or more responsecomponents 132) configured to respond to a single transmitter-sideaction 1122D at the first endpoint 161, 561, 961 by transmitting aconnection request 1127 to establish a (video call channel 117 or other)session connection 204, 304 via the one or more servers 700;

invoking transistor-based circuitry (e.g. an instance of a routingcomponent 133) configured to obtain a network location indication 220partly based on the connection request 1127 from the first endpoint 161,561, 961 and partly based on one or more indexes 228, 328 pertaining toa user 10A of the first endpoint 161, 561, 961 indicating the non-uniquedescription 401; and

invoking transistor-based circuitry (e.g. an instance of a notificationcomponent 134) configured to notify the second endpoint 162, 562, 962 ofthe connection request 1127 and establishing a connection 204, 304(between or otherwise) among the first and second endpoints partly basedon the network location indication 220 and partly based on the secondendpoint 162, 562, 962 granting the connection request 1127 as acomponent of the interpersonal communication.

2. The method of Clause 1 comprising:

obtaining (a default or other) authorization 1257 from (at least oneuser 10D of) a third endpoint that authorizes (at least) some targetedauditory message data 321A to be received privately from the secondendpoint at the third endpoint;

obtaining (broadcast, ambient musical, lecture, or other) secondauditory message data 321B from a device 600D of a fourth endpoint atleast to a device 600C of the third endpoint;

causing a communication device 600C of the third endpoint to present (atleast) the targeted auditory message data 321A from the second endpointand the auditory message data 321B from the fourth endpoint so as toattenuate or otherwise demote the auditory message data 321B from thefourth endpoint relative to the targeted auditory message data 321A fromthe second endpoint (at least partly) based on the third endpointauthorizing the targeted auditory message data 321A to be receivedprivately from the second endpoint.

3. The method of Clause 2 wherein at least one communication device 600Cof the third endpoint handles targeted auditory message data 321A fromthe second endpoint and auditory message data 321B from a fourthendpoint so as to demote the auditory message data 321B from the fourthendpoint relative to the targeted auditory message data 321A from thesecond endpoint (at least) by delaying the auditory message data 321Bfrom the fourth endpoint more than the targeted auditory message data321A from the second endpoint by more than one second.

4. The method of Clause 2 or Clause 3 wherein causing a communicationdevice 600C of the third endpoint to present targeted auditory messagedata 321A from the second endpoint and auditory message data 321B from afourth endpoint simultaneously (is included and) comprises:

causing the communication device 600C of the third endpoint to present(at least) the targeted auditory message data 321A from the secondendpoint partly based on the third endpoint authorizing the targetedauditory message data 321A to be received (at least) privately from thesecond endpoint and partly based on a metadata element 322A pertainingto the targeted auditory message data 321A matching one or more limitingattributes (e.g. of a shared section 302A comprising one or more commoninterests, language fluencies, or other such criteria 1114).

5. (Independent) A method of establishing, configuring, or otherwisefacilitating interpersonal communication between at least or otherwiseamong at least a first endpoint 161, 561, 961 and a second endpoint 162,562, 962, the method comprising:

invoking transistor-based circuitry (e.g. one or more authorizationcomponents 137) configured to obtain (default or other) authorization1257 from (at least one user 10B-C of) the second endpoint 162, 562, 962that (selectively or otherwise) authorizes (at least) some targetedauditory message data 321A to be received (at least selectively) fromthe first endpoint 161, 561, 961 at the second endpoint 162, 562, 962;and

invoking transistor-based circuitry (e.g. an instance of routingcomponent 133) configured to obtain a broadcast or other additionalauditory message data 321B from a third endpoint at least to the secondendpoint 162, 562, 962;

invoking transistor-based circuitry (e.g. one or more interfacecomponents 138) configured to cause a communication device 600 of thesecond endpoint 162, 562, 962 to present (at least) the targetedauditory message data 321A from the first endpoint 161, 561, 961 and theauditory message data 321B from the third endpoint so as to (delay,attenuate, or otherwise partially) demote the auditory message data 321Bfrom the third endpoint relative to the targeted auditory message data321A from the first endpoint 161, 561, 961 (at least partly) based onthe second endpoint 162, 562, 962 authorizing the targeted auditorymessage data 321A to be received (at least selectively) from the firstendpoint 161, 561, 961.

6. The method of ANY of the above method clauses wherein a first one ofone or more selection criteria 1114 used in establishing a connection204, 304 to the second endpoint 162, 562, 962 selectively (at leastpartly) based on a time of day but excludes a connection 204, 304 to thesecond endpoint 162, 562, 962 at other times of day.

7. The method of ANY of the above method clauses wherein anotherendpoint declines a connection request and wherein a control channel 117continues a connection attempt to one or more other receiver endpointsin response until the second endpoint 162, 562, 962 is found thataccepts the connection request.

8. The method of ANY of the above method clauses wherein a first one ofone or more selection criteria 1114 used in establishing a connection204, 304 to the second endpoint 162, 562, 962 selectively is (at leastpartly) based on a language indication 220 but excludes a connection204, 304 to a second endpoint 162, 562, 962 based on the languageindication 220.

9. The method of ANY of the above method clauses wherein a particularone of one or more selection criteria 1114 to a select a particularsecond endpoint 162, 562, 962 in a round robin fashion (e.g. by favoringuser 10H because other eligible users 10C-G were connected more recentlythan user 10H).

10. The method of ANY of the above method clauses wherein a singletransmitter-side action communication (e.g. a call 114 or otherprospective session 314) is established by touching a smartphone screen.

11. The method of ANY of the above method clauses wherein a singletransmitter-side action communication (e.g. a call 114 or otherprospective session 314) is initiated using an utterance or otheruser-provided sound.

12. The method of ANY of the above method clauses wherein the secondendpoint 162, 562, 962 requires the first endpoint 161, 561, 961 toidentify itself before accepting the communication (e.g. a call 114 orother prospective session 314).

13. The method of ANY of the above method clauses wherein a system 100,200, 300, 500, 900 thereof is configured so that a singletransmitter-side action communication (e.g. a call 114 or otherprospective session 314) will be initiated by a user having clicked on amouse button 206 when it points to a particular URL (e.g. as anidentifier 226 of one or more sections 302 or other resources 202) of aweb site 222.

14. The method of ANY of the above method clauses wherein a singletransmitter-side action communication (e.g. a call 114 or otherprospective session 314) is configured to be initiated by a scanner 901scanning a QR code 208.

15. The method of ANY of the above method clauses wherein a singletransmitter-side action communication (e.g. a call 114 or otherprospective session 314) is configured to be initiated by someone havingclicked on a mouse button 206 when it points to a particular URL (e.g.as an identifier 226 of one or more sections 302 or other resources 202)in an email 263.

16. The method of ANY of the above method clauses wherein a call 114 isallowed only if a count 125 of how many calls from a particular web site222 is below a predetermined threshold.

17. The method of ANY of the above method clauses wherein targetedauditory message data 321A is detected via at least a first sensor (e.g.a microphone as user input 608) at the first endpoint 161, 561, 961 andstreamed from the first endpoint 161, 561, 961 to the second endpoint162, 562, 962 so that a presentation of the targeted auditory messagedata 321A begins at the second endpoint 162, 562, 962 before aconclusion of the targeted auditory message data 321A has been capturedvia at least the first sensor at the first endpoint 161, 561, 961.

18. The method of ANY of the above method clauses wherein a click of amouse button 206 triggers the interpersonal communication (e.g. a call114 or other prospective session 314) only during certain time of theday and wherein such a click at other times of the day will not triggerany interpersonal communication.

19. The method of ANY of the above method clauses wherein a timer orother counter having a count 125 that starts when the communication(e.g. a call 114 or other prospective session 314) is established andwherein the call 114 is terminated when it reaches a count threshold.

20. The method of ANY of the above method clauses wherein a singletransmitter-side action communication (e.g. a call 114 or otherprospective session 314) is established only if it is as a result ofclicking on a mouse button on a web site 222.

21. The method of ANY of the above method clauses wherein a secondendpoint 162, 562, 962 and first endpoint 161, 561, 961 thereof usedifferent control protocols.

22. The method of ANY of the above method clauses wherein a secondendpoint 162, 562, 962 thereof is using Session Initiation Protocol anda first endpoint 161, 561, 961 thereof is using WebRTC protocol toestablish the interpersonal communication.

23. The method of ANY of the above method clauses wherein the controlchannel 117 establishes an interpersonal communication (e.g. a call 114or other prospective session 314) and terminates the communication (e.g.a call 114 or other prospective session 314).

24. The method of ANY of the above method clauses wherein a receiverendpoint 532 thereof comprises a (smartphone or other) computing device600 that includes at least a first microphone and first camera.

25. The method of ANY of the above method clauses wherein no uniqueidentifier 226 of a user 10 of the second endpoint 162, 562, 962 isknown to the first endpoint 161, 561, 961 when the connection request1127 is transmitted.

26. The method of ANY of the above method clauses wherein a firstendpoint 161, 561, 961 thereof comprises a (smartphone or other)computing device 600 that includes at least a first microphone and firstcamera.

27. The method of ANY of the above method clauses wherein no uniqueidentifier 226 of the second endpoint 162, 562, 962 is known to thefirst endpoint 161, 561, 961 when the connection request 1127 istransmitted.

28. The method of ANY of the above method clauses comprising:

receiving the connection request 1127 under control of a single-actioncommunication authorization component 137 of the one or more servers700.

29. The method of ANY of the above method clauses wherein a description401 of the second endpoint 162, 562, 962 does not uniquely identify thesecond endpoint 162, 562, 962 to the first endpoint 161, 561, 961 (atleast) until after the connection request 1127 is transmitted.

30. The method of ANY of the above method clauses wherein a description401 of the second endpoint 162, 562, 962 does not uniquely identify thesecond endpoint 162, 562, 962 to the first endpoint 161, 561, 961 sothat the second endpoint 162, 562, 962 remains anonymous throughout theinterpersonal communication.

31. The method of ANY of the above method clauses wherein an identity ofthe second endpoint 162, 562, 962 is not yet known to a control channel117 that connects the endpoints when a single receiver-side action 1146that authorizes the interpersonal communication occurs at the secondendpoint 162, 562, 962.

32. The method of ANY of the above method clauses wherein an identity ofthe second endpoint 162, 562, 962 is not yet resolved at one or moreservers 700 implementing the communication until after a singlereceiver-side action 1146 (e.g. answering a call 114 or otherwisesignaling a specific intent to start an immediate interpersonalcommunication, such as by actuating a control 209) occurs.

33. The method of ANY of the above method clauses comprising:

configuring one or more records 216 so as to associate one or moretopical identifiers 226 or other such connection criteria 1114 with eachof several (prospective candidate) receiving endpoints; and

retrieving at least a network location indication 220 specificallypertaining to the second endpoint 162, 562, 962 from the one or morenetwork location records 216 in response to a connection request 1127from the first endpoint 161, 561, 961 wherein the second endpoint 162,562, 962 is one of the several receiving endpoints.

34. The method of ANY of the above method clauses wherein an element322A of the interpersonal communication comprises an uttered recipientdesignation (e.g. identifying a user of the second endpoint 162, 562,962) that is part of a connection request 1127 presented to (at leastone user 10B-C of) the second endpoint 162, 562, 962 before the auditorymessage data 321A is transmitted to the second endpoint 162, 562, 962.

35. The method of ANY of the above method clauses wherein an element322A of the interpersonal communication comprises a (section identifier226 or other) topic designation that is part of a connection request1127 presented to at least (one user 10B-C of) the second endpoint 162,562, 962 before auditory message data 321A is transmitted from the firstendpoint 161, 561, 961 to the second endpoint 162, 562, 962.

36. The method of ANY of the above method clauses wherein an element322A of the interpersonal communication comprises an urgency designationthat is part of a connection request 1227 presented to (at least oneuser 10B-C of) the second endpoint 162, 562, 962 before auditory messagedata 321A is transmitted from the first endpoint 161, 561, 961 to thesecond endpoint 162, 562, 962.

37. The method of ANY of the above method clauses wherein an element322A of the interpersonal communication comprises an urgency designationthat is part of a connection request 1227 presented to (at least oneuser 10B-C of) the second endpoint 162, 562, 962 before an authorization1257 is obtained from the second endpoint 162, 562, 962.

38. The method of ANY of the above method clauses wherein an element322A of the interpersonal communication comprises a topic designationthat is part of a connection request 1227 presented to (at least oneuser 10B-C of) the second endpoint 162, 562, 962 before an authorization1257 is obtained from the second endpoint 162, 562, 962.

39. The method of ANY of the above method clauses wherein an element322A of the interpersonal communication comprises an (individual,corporate, or other) uttered recipient identifier 226 that is part of aconnection request 1227 presented to (at least one user 10B-C of) thesecond endpoint 162, 562, 962 before an authorization 1257 permits anytargeted auditory message data 321A to be received from the firstendpoint 161, 561, 961 at the second endpoint 162, 562, 962.

40. The method of ANY of the above method clauses wherein an element322A of the interpersonal communication comprises an (individual,corporate, or other) uttered recipient identifier 226 that is part of aconnection request 1227 presented to (at least one user 10B-C of) thesecond endpoint 162, 562, 962 before an authorization 1257 permits anytargeted auditory message data 321A from the first endpoint 161, 561,961 to be presented at the second endpoint 162, 562, 962.

41. The method of ANY of the above method clauses wherein the one ormore metadata elements 322A pertaining to targeted auditory message data321A include at least a first reputation indication 220 that describes auser 10A of the first endpoint 161, 561, 961 whereby the targetedauditory message data 321A as a component of the interpersonalcommunication is selectively and automatically authorized before thetargeted auditory message data 321A.

42. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 handlestargeted auditory message data 321A from the first endpoint 161, 561,961 and auditory message data 321B from a third endpoint so as toattenuate or otherwise partially demote the auditory message data 321Bfrom the third endpoint.

43. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 handlestargeted auditory message data 321A from the first endpoint 161, 561,961 and auditory message data 321B from a third endpoint so as toattenuate or otherwise partially demote the auditory message data 321Bfrom the third endpoint relative to the targeted auditory message data321A from the first endpoint 161, 561, 961.

44. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 handlestargeted auditory message data 321A from the first endpoint 161, 561,961 and auditory message data 321B from a third endpoint so as to demotethe auditory message data 321B from the third endpoint relative to thetargeted auditory message data 321A from the first endpoint 161, 561,961 by delaying the auditory message data 321B from the third endpointmore than the targeted auditory message data 321A from the firstendpoint 161, 561, 961.

45. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 handlestargeted auditory message data 321A from the first endpoint 161, 561,961 and auditory message data 321B from a third endpoint so as to demotethe auditory message data 321B from the third endpoint relative to thetargeted auditory message data 321A from the first endpoint 161, 561,961 (at least) by delaying the auditory message data 321B from the thirdendpoint more than the targeted auditory message data 321A from thefirst endpoint 161, 561, 961 by more than one second.

46. The method of ANY of the above method clauses wherein causing acommunication device 600 of the second endpoint 162, 562, 962 to presenttargeted auditory message data 321A from the first endpoint 161, 561,961 and auditory message data 321B from a third endpoint (is includedand) comprises:

causing the communication device 600 of the second endpoint 162, 562,962 to present (at least) the targeted auditory message data 321A fromthe first endpoint 161, 561, 961 partly based on the second endpoint162, 562, 962 authorizing the targeted auditory message data 321A to bereceived (at least selectively) from the first endpoint 161, 561, 961and partly based on a metadata element 322A pertaining to the targetedauditory message data 321A matching one or more limiting attributes(e.g. of a shared section 302A comprising one or more common interests,language fluencies, or other such criteria 1114).

47. The method of ANY of the above method clauses wherein causing acommunication device 600 of the second endpoint 162, 562, 962 to presenttargeted auditory message data 321A from the first endpoint 161, 561,961 and auditory message data 321B from a third endpoint simultaneously(is included and) comprises:

causing the communication device 600 of the second endpoint 162, 562,962 to present (at least) the targeted auditory message data 321A fromthe first endpoint 161, 561, 961 partly based on the second endpoint162, 562, 962 authorizing the targeted auditory message data 321A to bereceived (at least selectively) from the first endpoint 161, 561, 961and partly based on a message language identifier 227 (e.g. as ametadata element 322A pertaining to the targeted auditory message data321A) matching one or more natural languages that a recipient user 10Bhas previously identified (e.g. as a section 302A or otherwise as havinga fluency).

48. The method of ANY of the above method clauses wherein (users 10A-Bof) the first and second endpoints share a (teleconference, virtualreality environment, or other) section 302A in common with (users 10C-Eof at least) third and fourth endpoints and wherein targeted auditorymessage data 321A from the first endpoint 161, 561, 961 is delivered“privately” to the second endpoint 162, 562, 962 insofar that at leastthe third and fourth endpoints never receive it.

49. The method of ANY of the above method clauses wherein (users 10A-Bof) the first and second endpoints share a (breakout room or othermeeting) section 302A in common with third and fourth endpoints andwherein targeted auditory message data 321A from the first endpoint 161,561, 961 is delivered “privately” to the second endpoint 162, 562, 962insofar that at least the third and fourth endpoints never receive itand wherein auditory message data 321B from the third endpoint (e.g. inuse by a lecturer, witness, or other primary speaker) is simultaneouslyreceived by an audience comprising the first, second, and fourthendpoints.

50. The method of ANY of the above method clauses wherein (users 10A-Bof) the first and second endpoints share a (teleconference, virtualreality environment, or other) section 302A in common with third andfourth endpoints and wherein targeted auditory message data 321A fromthe first endpoint 161, 561, 961 is delivered “privately” to the secondendpoint 162, 562, 962 insofar that at least the third and fourthendpoints never receive it and wherein livestreamed auditory messagedata 321B from the third endpoint is received (nominally) simultaneouslyby a live audience comprising (respective users 10 of) the first,second, and fourth endpoints.

51. The method of ANY of the above method clauses wherein (users 10A-Bof) the first and second endpoints share a (teleconference, virtualreality environment, or other) section 302A in common with (users 10C-Eof at least) third and fourth endpoints and wherein targeted auditorymessage data 321A from the first endpoint 161, 561, 961 is delivered“privately” to the second endpoint 162, 562, 962 insofar that at leastthe third endpoint never receives it and wherein auditory message data321B from the third endpoint (e.g. in use by a lecturer, witness, orother primary speaker) is received by the first, second, and fourthendpoints (e.g. as a.

52. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 plays viaat least a first speaker 611 of (a device 600 of) the second endpoint162, 562, 962 targeted auditory message data 321A from the firstendpoint 161, 561, 961 and the auditory message data 321B from a thirdendpoint (e.g. an instance of device 600 operated by user 10H).

53. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 presentsvia at least a first speaker 611 of (a device 600 of) the secondendpoint 162, 562, 962 targeted auditory message data 321A from thefirst endpoint 161, 561, 961 and the auditory message data 321B from athird endpoint simultaneously.

54. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 presentsvia at least a first speaker 611 of the second endpoint 162, 562, 962targeted auditory message data 321A from the first endpoint 161, 561,961 and the auditory message data 321B from a third endpointsimultaneously with the auditory message data 321B from the thirdendpoint temporarily softened (e.g. by more than 1 decibel for more thanone second so as to make the targeted auditory message data 321A easierfor the recipient to hear).

55. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 presentsvia at least a first speaker 611 of the second endpoint 162, 562, 962targeted auditory message data 321A from the first endpoint 161, 561,961 and the auditory message data 321B from a third endpoint so as todemote the auditory message data 321B from the third endpoint partiallyby delaying the auditory message data 321B from the third endpoint untilafter most of the targeted auditory message data 321A has been presentedbased on the second endpoint 162, 562, 962 authorizing the targetedauditory message data 321A to be received privately from the firstendpoint 161, 561, 961 and partly based on one or more metadata elements322A pertaining to a reputation of a sender (e.g. user 10A) of thetargeted auditory message data 321A.

56. The method of ANY of the above method clauses comprising:

demoting auditory message data 321B from a third endpoint relative totargeted auditory message data 321A from the first endpoint 161, 561,961 partly based on the second endpoint 162, 562, 962 authorizing thetargeted auditory message data 321A to be received (at leastselectively) from the first endpoint 161, 561, 961 and partly based onone or more metadata elements 322A pertaining to a reputation of asender of the targeted auditory message data 321A.

57. The method of ANY of the above method clauses wherein at least onecommunication device 600 of the second endpoint 162, 562, 962 presentsvia at least a first speaker 611 of the second endpoint 162, 562, 962targeted auditory message data 321A from the first endpoint 161, 561,961 and the auditory message data 321B from a third endpoint so as to(delay, attenuate, or otherwise partially) demote the auditory messagedata 321B from the third endpoint relative to the targeted auditorymessage data 321A from the first endpoint 161, 561, 961 partly based onthe second endpoint 162, 562, 962 authorizing the targeted auditorymessage data 321A to be received (at least selectively) from the firstendpoint 161, 561, 961 and partly based on one or more metadata elements322A pertaining to a reputation of a sender (e.g. user 10A) of thetargeted auditory message data 321A.

58. The method of ANY of the above method clauses wherein one or moremetadata elements 322A pertaining to targeted auditory message data 321Ainclude a crowdsourced indication 220 that describes a user 10A of thefirst endpoint 161, 561, 961 whereby the communication is automaticallyauthorized.

59. The method of ANY of the above method clauses wherein one or moremetadata elements 322A pertaining to targeted auditory message data 321Ainclude a high-enough reputation indication 220 (e.g. exceeding athreshold specified by the recipient user 10A of the first endpoint 161,561, 961) that describes a user 10A of the first endpoint 161, 561, 961whereby the communication is automatically authorized.

60. The method of ANY of the above method clauses wherein one or moremetadata elements 322A pertaining to targeted auditory message data 321Ainclude a recipient-specified reputation indication 220 that describes auser 10A of the first endpoint 161, 561, 961 whereby the communicationis automatically authorized.

61. The method of ANY of the above method clauses wherein one or moremetadata elements 322A pertaining to targeted auditory message data 321Ainclude a ranking 219 that describes a user 10A of the first endpoint161, 561, 961 whereby the communication is automatically authorized.

62. The method of ANY of the above method clauses wherein a first secondendpoint 162, 562, 962 receives an incoming communication (e.g. a call114 or other prospective session 314) and an other endpoint does notreceive the incoming communication (at least partly) based on one ormore matching criteria 1114 that include a prospective receiving user10F (indicated by one or more records 216 as) being able to communicatein a specified natural language designated for use with a requestinguser 10A.

63. The method of ANY of the above method clauses wherein a(prospective) first second endpoint 162, 562, 962 receives an incomingcommunication (e.g. a call 114 or other prospective session 314) and another endpoint does not receive the incoming communication (at leastpartly) based on one or more matching criteria 1114 that include thesecond endpoint 162, 562, 962 (apparently) being in a regional or othergeographical proximity (e.g. identified by a place name or distancetherebetween) with a requesting user 10A and the second endpoint 162,562, 962 not being in the geographical proximity with a requesting user10A.

64. The method of ANY of the above method clauses wherein the secondendpoint 162, 562, 962 receives an incoming communication (e.g. a call114 or other prospective session 314) and an other endpoint does notreceive the incoming communication (at least partly) based on one ormore matching criteria 1114 that include a section 302B to which thesecond endpoint 162, 562, 962 has been selectively assigned beingassociated with a specified natural language (e.g. with a label 227 of“Spanish” or “Español”) designated for use with a requesting user 10Aand to which the other endpoint has not been selectively assigned.

65. The method of ANY of the above method clauses wherein a first secondendpoint 162, 562, 962 receives an incoming communication (e.g. a call114 or other prospective session 314) and an other endpoint does notreceive the incoming communication (at least partly) based on one ormore matching criteria 1114 that include a section 302B to which thefirst second endpoint 162, 562, 962 has been selectively assigned beingassociated with a regional or other geographical proximity (e.g.identified by a place name or coordinate range) associated with arequesting user 10A and to which the other endpoint has not beenselectively associated.

66. (Independent) A system 100, 200, 300, 500, 900 of facilitatinginterpersonal communication (e.g. a video call 114 or other prospectivecommunication session 314 at least) among at least a first endpoint 161,561, 961 and a second endpoint 162, 562, 962, the method comprising:

transistor-based circuitry configured to cause a control channel 117 andone or more servers 700 that host information about the second endpoint162, 562, 962 including a (topical or other) non-unique description 401of the second endpoint 162, 562, 962 (e.g. one or more topical sections302 or other criteria 1114 pertaining to eligible second endpoints 162,562, 962 but not to one or more destinations that are ineligible byvirtue of not meeting the description 401);

transistor-based circuitry configured to respond to a singletransmitter-side action 1116 at the first endpoint 161, 561, 961 bytransmitting a connection request 1127 to establish a (video callchannel 117 or other) session connection 204, 304 via the one or moreservers 700;

transistor-based circuitry configured to obtain a network locationindication 220 partly based on the connection request 1127 from thefirst endpoint 161, 561, 961 and partly based on one or more indexes228, 328 pertaining to a user 10A of the first endpoint 161, 561, 961indicating the non-unique description 401; and

transistor-based circuitry configured to notify the second endpoint 162,562, 962 of the connection request 1127 and establishing a connection204, 304 (at least) among the first and second endpoints partly based onthe network location indication 220 and partly based on the secondendpoint 162, 562, 962 granting the connection request 1127 as acomponent of the interpersonal communication.

67. (Independent) A system 100, 200, 300, 500, 900 of facilitatinginterpersonal communication between at least or otherwise among at leasta first endpoint 161, 561, 961 and a second endpoint 162, 562, 962, themethod comprising:

transistor-based circuitry configured to obtain (default or other)authorization 1257 from (at least one user 10B-C of) the second endpoint162, 562, 962 that (selectively or otherwise) authorizes (at least) sometargeted auditory message data 321A to be received (at leastselectively) from the first endpoint 161, 561, 961 at the secondendpoint 162, 562, 962; and

transistor-based circuitry configured to obtain a second (targeted orother) auditory message data 321B from a third endpoint at least to thesecond endpoint 162, 562, 962; and

transistor-based circuitry configured to cause a communication device600 of the second endpoint 162, 562, 962 to present (at least) thetargeted auditory message data 321A from the first endpoint 161, 561,961 and the auditory message data 321B from the third endpoint so as to(delay, attenuate, or otherwise partially) demote the auditory messagedata 321B from the third endpoint relative to the targeted auditorymessage data 321A from the first endpoint 161, 561, 961 (at leastpartly) based on the second endpoint 162, 562, 962 authorizing thetargeted auditory message data 321A to be received (at leastselectively) from the first endpoint 161, 561, 961.

With respect to the numbered claims expressed below, those skilled inthe art will appreciate that recited operations therein may generally beperformed in any order. Also, although various operational flows arepresented in sequence(s), it should be understood that the variousoperations may be performed in other orders than those which areillustrated or may be performed concurrently. Examples of such alternateorderings may include overlapping, interleaved, interrupted, reordered,incremental, preparatory, supplemental, simultaneous, reverse, or othervariant orderings, unless context dictates otherwise. Furthermore, termslike “responsive to,” “related to,” or other such transitive,relational, or other connections do not generally exclude such variants,unless context dictates otherwise.

What is claimed is:
 1. A method of configuring an interpersonal videocall among at least a first endpoint, a second endpoint, and a thirdendpoint, said method comprising: invoking transistor-based circuitryconfigured to obtain a receiver description from said first endpointwherein said receiver description is associated with each of severalprospective receiving endpoints by one or more records; invokingtransistor-based circuitry configured to respond to a firstauthorization from a first one of said several prospective receivingendpoints by establishing said first one of said several prospectivereceiving endpoints as said second endpoint wherein said firstauthorization allows at least some targeted auditory message data to bereceived selectively and privately from said first endpoint at saidsecond endpoint; invoking transistor-based circuitry configured toobtain non-targeted additional auditory message data from a thirdendpoint at least to said second endpoint; and invoking transistor-basedcircuitry configured to cause a communication device of said secondendpoint to present said targeted auditory message data from said firstendpoint and said non-targeted additional auditory message data fromsaid third endpoint simultaneously so as to attenuate said non-targetedadditional auditory message data from said third endpoint temporarilyrelative to said targeted auditory message data from said first endpointpartly based on said second endpoint authorizing said targeted auditorymessage data to be received selectively and privately from said firstendpoint and partly based on one or more metadata elements pertaining tosaid targeted auditory message data.
 2. The method of claim 1 whereinsaid targeted auditory message data is received selectively andprivately insofar that a fourth endpoint in communication with saidsecond and third endpoints does not receive any auditory message datafrom said first endpoint.
 3. The method of claim 1 wherein said targetedauditory message data is received selectively and privately insofar thata fourth endpoint that receives said non-targeted additional auditorymessage data from said third endpoint does not get any opportunity toreceive said targeted auditory message data.
 4. The method of claim 1wherein obtain said non-targeted additional auditory message data fromsaid third endpoint at least to said second endpoint comprises:obtaining at least one of music, a broadcast, or a public presentationas said non-targeted additional auditory message data from said thirdendpoint at least to said second endpoint.
 5. The method of claim 1wherein at least said first and second endpoints use different controlprotocols and wherein a control channel establishes said interpersonalvideo call so as to accommodate said different control protocols.
 6. Themethod of claim 1 wherein a description of said second endpoint does notuniquely identify said second endpoint to said first endpoint untilafter said connection request is transmitted and wherein a finaldetermination of an identity of said second endpoint is not yet knownwhen a single receiver-side action that authorizes said interpersonalvideo call occurs at said second endpoint.
 7. The method of claim 1wherein an identity of said second endpoint is not yet resolved at oneor more servers implementing said interpersonal video call until after asingle receiver-side action accepting said interpersonal video calloccurs.
 8. The method of claim 1 wherein an element of saidinterpersonal video call comprises a topic designation that is part of aconnection request presented to said second endpoint before saidtargeted auditory message data is transmitted from said first endpointto said second endpoint.
 9. The method of claim 1 wherein said targetedauditory message data is detected via at least a first sensor at saidfirst endpoint and streamed from said first endpoint to said secondendpoint so that a presentation of said targeted auditory message databegins at said second endpoint before a conclusion of said targetedauditory message data has been captured via at least said first sensorat said first endpoint.
 10. The method of claim 1 wherein an element ofsaid interpersonal video call comprises an urgency designation that ispart of a connection request presented to said second endpoint beforesaid authorization is obtained from said second endpoint.
 11. The methodof claim 1 wherein an element of said interpersonal video call comprisesa topic designation that is part of a connection request presented tosaid second endpoint before said authorization is obtained from saidsecond endpoint.
 12. The method of claim 1 wherein an element of saidinterpersonal video call comprises an uttered recipient identifier thatis part of a connection request presented to said second endpoint beforesaid authorization permits any targeted auditory message data to bereceived from said first endpoint at said second endpoint.
 13. Themethod of claim 1 wherein an element of said interpersonal video callcomprises an uttered recipient identifier that is part of a connectionrequest presented to said second endpoint before said authorizationpermits any targeted auditory message data from said first endpoint tobe presented at said second endpoint.
 14. The method of claim 1 whereincausing said communication device of said second endpoint to presentsaid targeted auditory message data from said first endpoint and saidnon-targeted additional auditory message data from said third endpointsimultaneously comprises: causing said communication device of saidsecond endpoint to present said targeted auditory message data from saidfirst endpoint partly based on said second endpoint authorizing saidtargeted auditory message data to be received selectively and privatelyfrom said first endpoint and partly based on a message languageidentifier matching one or more natural languages that a recipient userhas previously identified.
 15. The method of claim 1 wherein causingsaid communication device of said second endpoint to present saidtargeted auditory message data from said first endpoint and saidnon-targeted additional auditory message data from said third endpointsimultaneously comprises: attenuating said non-targeted additionalauditory message data from said third endpoint by more than 1 decibelduring a presentation of said targeted auditory message data from saidfirst endpoint wherein said presentation of said targeted auditorymessage data from said first endpoint lasts less than one minute andwherein said targeted auditory message data from said first endpoint ispresented simultaneously without attenuation.
 16. The method of claim 1wherein said one or more metadata elements pertaining to said targetedauditory message data include at least a first reputation indicationthat describes a user of said first endpoint whereby said targetedauditory message data from said first endpoint as a component of saidinterpersonal communication is selectively and automatically authorizedbefore said first endpoint transmits said targeted auditory messagedata.
 17. The method of claim 1 wherein obtaining said receiverdescription from said first endpoint comprises: retrieving at least anetwork location indication specifically pertaining to said secondendpoint from one or more network location records in response to aconnection request from said first endpoint.
 18. A method of configuringan interpersonal video call among at least a first endpoint and a secondendpoint, said method comprising: invoking transistor-based circuitryconfigured to obtain a receiver description from said first endpointwherein said receiver description is associated with each of severalprospective receiving endpoints by one or more records; invokingtransistor-based circuitry configured to respond to a firstauthorization wherein said first authorization allows at least sometargeted auditory message data to be received selectively and privatelyfrom said first endpoint at said second endpoint; invokingtransistor-based circuitry configured to obtain additional auditorymessage data from a third endpoint at least to said second endpoint; andinvoking transistor-based circuitry configured to cause a communicationdevice of said second endpoint to present said targeted auditory messagedata from said first endpoint and said additional auditory message datafrom said third endpoint so as to attenuate said additional auditorymessage data from said third endpoint relative to said targeted auditorymessage data from said first endpoint partly based on said secondendpoint authorizing said targeted auditory message data to be receivedselectively and privately from said first endpoint and partly based onone or more metadata elements pertaining to said targeted auditorymessage data.
 19. A system of configuring an interpersonal video call(between or otherwise) among at least a first endpoint and a secondendpoint, said system comprising: transistor-based circuitry configuredto obtain a receiver description from said first endpoint wherein saidreceiver description is associated with each of several prospectivereceiving endpoints by one or more records; transistor-based circuitryconfigured to respond to a first authorization wherein said firstauthorization allows at least some targeted auditory message data to bereceived selectively and privately from said first endpoint at saidsecond endpoint; transistor-based circuitry configured to obtainadditional auditory message data from a third endpoint at least to saidsecond endpoint; and transistor-based circuitry configured to cause acommunication device of said second endpoint to present said targetedauditory message data from said first endpoint and said additionalauditory message data from said third endpoint so as to attenuate saidadditional auditory message data from said third endpoint relative tosaid targeted auditory message data from said first endpoint partlybased on said second endpoint authorizing said targeted auditory messagedata to be received selectively and privately from said first endpointand partly based on one or more metadata elements pertaining to saidtargeted auditory message data.