Efficient communication through networks

ABSTRACT

A method and device that interrogates the availability of a called party before placing a communication from the calling party to the called party. A callback may be initiated so that both communications are completed simultaneously. The routing of communication may take place through any one of a number of different networks and at another time of the day, even if the caller does not otherwise have access to those networks.

CROSS-REFERENCE TO COPENDING PATENT APPLICATIONS

This is a continuation-in-part of U.S. patent application Ser. No.08/320,269, filed Oct. 11, 1994.

FIELD OF THE INVENTION

The present invention relates to a system for providing transparentaccess to different types of communication networks that may beincompatible with each other and some of which may be incompatible withthe equipment used by the calling party or the called party, least costrouting in such a system, maintaining quality of communication in such asystem, prioritizing the routing of such communications, evaluatingdifferent communication access locations to determine where to send acommunication, synchronizing communications, blocking incomingcommunications while waiting for the synchronizing to be completed, andminimizing the cost of communications using such a system. This systemalso monitors and records the services used on each of the unrelatedservice providers. This information is then utilized for billingpurposes and for paying the service providers.

BACKGROUND OF THE INVENTION

Presently when communication services are offered on a global basis,communications are established through the equipment of a plurality ofservice providers located in various countries. This communication isdominated by large carriers which have formed the global network throughreciprocal agreements. Smaller competing carriers, who may offer thesame service at lower prices, currently do not have reciprocalagreements between them.

The invention provides these smaller competing carriers with access toeach other without the use of the large carriers. Such access providesthe calling party (e.g., a subscriber of the smaller competing carrier)with the option of obtaining optimum service at lower prices whileensuring that the appropriate service providers get paid. The callingparty can now have cheaper access to different types oftelecommunication networks that the party may not have access to underthe current large carrier system. It may be cheaper or preferred for thecalling party to use smaller carriers to communicate with anotherlocation by routing the communication over a digital data network ratherthan an analog voice network, or by routing the communication over apaging network rather than a cellular network or a combination ofnetworks.

SUMMARY OF THE INVENTION

One objective of the invention is to provide communication betweenotherwise incompatible communication networks in a manner that istransparent to the calling party (that is, the subscriber of the serviceinitiating the communication), while assuring that each service providerthat renders service in routing that communication gets paid.Preferably, the communication is routed based on the results from anevaluation of all available communication networks even though thecalling party may have direct access to only one type of communicationnetwork.

In accordance with the invention, control information in the form of aninquiry of the availability status of the party to be called may be sentthrough different networks by routing it through a control location ofthe inventive system that converts it into a compatible form. Forinstance, the called party may be using one type of network, such as adata network having E-mail, while the calling party is using another,such as a cellular network.

With a conventional data network, sending an E-mail message to anaddress on the data network does not indicate the availability of aparty on a cellular network to communicate. In accordance with oneembodiment of the invention, however, the control location of theinventive system is connected with both the data network and thecellular network to convert the control information associated withE-mail into a form compatible on the cellular network for making aninquiry and then transmits the inquiry over the cellular network.

The inventive system may have external or internal software and hardwarethat intercepts the normal transmission to route it appropriately. Thesystem effects further routing, which may include converting betweendifferent forms of communication networks, compressing voice into datapackets or decompressing data packets into voice, coding and decodingtransmissions for security reasons, and multiplexing communications overthe same lines. The system records the various routing transactionsinvolved in the communication and calculates the billing of thetransactions in a manner that is transparent to the calling party.

Another objective of the invention is to interrogate the called partynumber's communication availability prior to conferencing the callingparty and called party. The inventive system may have a control locationthat receives both a calling party and a called party access number oridentification. After receiving these access numbers, the systeminitiates an inquiry to the called party from the control location andwaits for a status signal as to the called party location's availabilityto take incoming calls. If the status signal indicates an availablestatus, a first communication is initiated to the called party accessnumber from the control location and a second communication is initiatedto the calling party access number from the control location.Thereafter, the first and second communications are bridged using thesame or different networks.

In addition to interrogating the called party's availability status, thecontrol location determines where to route the call by examining factorssuch as transmission cost, the appropriate network for the desiredtransmission, the service provider that provides this kind of networkand the plurality of available called party locations that service thecalled party access number. The control location also considerscommunication networks that are available to the called party locationsand the identity of service providers who provide those communicationnetworks across the various called party locations. After receiving thecalling party and called party access numbers, the control locationperforms an inquiry as to which service provider and which network canroute the transmission.

In addition to technological considerations, the control location alsostudies the various cost to perform the desired transmission and recordssuch information for both monitoring and billing purposes. An authorizeruses such information to monitor all incoming and outgoing transactionsbetween the network service providers and provide clearance insuringpayment and settlement of all transaction for each of these operators.

In routing communications, the control location takes into considerationcustomer defined preference criteria relating to preferences forparticular types of communication network, transmission quality, cost,security, and priority of transmission. For example, if the quality of atransmission is not acceptable, the transmissions may be rerouted to anyother available network that can transmit with better quality, therebyensuring that the quality of the transmission satisfies the customer'spreference criteria for transmission quality. The calling party accessnumber itself may include a message or protocol containing preferencecriteria selections.

Another objective of the invention involves synchronizing the completionof callback from the control location to the calling party and calledparty legs of communication. The synchronization involves thecalculation of the waiting time that is necessary before the controllocation commences each callback. The waiting time may be fixed or readfrom memory off a data base located at the control location. Thissynchronization may result in completion of both communicationssimultaneously or with minimal delay, i.e., a significantly shorterdelay than without the synchronization. Such synchronization results inmore efficient use of the network at a lower cost.

While the control location is waiting to initiate completion of one ofthe callback legs of communication, an incoming communication may blockthe completion of that one leg and thereby interrupt the synchronizationfrom taking place. The blocking period may be for a fixed time period ormay be based on information in a data base that includes informationrelating to the expected waiting time for completing communications.

In accordance with all embodiments of the invention, the communicationbeing established may be two-way.

BRIEF DESCRIPTION OF THE DRAWING

For a better understanding of the present invention, reference is madeto the following description and accompanying drawing, while the scopeof the invention is set forth in the appended claims.

FIG. 1 is a conceptual block diagram indicating the principles ofoperation of the inventive method to interrogate over a data network andtransmit voice over the data network.

FIG. 2 is a schematic diagram of a system overview having two servers atnodes connected to an Internet backbone.

FIG. 3 is a schematic diagram of a telephony server.

FIG. 4 is a functional block diagram of the embodiment of FIG. 2.

FIG. 5 is a schematic diagram of a flow chart showing routing forversatility and priority of transmission.

FIG. 6 is a schematic diagram of a flow chart showing synchronizingconnection.

FIGS. 7A-7G are schematic diagrams showing different types ofcommunication routing techniques.

FIG. 8 is a schematic representation of a central local node interactingwith networks in accordance with the invention.

FIG. 9 is a conceptual block diagram that is a further variation of thatof FIG. 1.

DESCRIPTION OF THE PREFERRED EMBODIMENT

Turning to FIG. 1, a schematic drawing depicting a method of sending avoice or digital transmission to a local node is shown. For ease inunderstanding, this drawing is the same as FIG. 1 of the copending U.S.patent application Ser. No. 08/320,269 (the '269 application), filedOct. 11, 1994 by the present inventor and entitled METHOD OF AND SYSTEMFOR EFFICIENT USE OF TELECOMMUNICATION NETWORKS (as amended), whosecontents are incorporated herein by reference.

The '269 application describes a technique by which hotels, and othersimilarly situated establishments, can make use of internationalcallback technology. The reference numbers in FIG. 1 of the '269application are the same as those in FIG. 1 of the present application,i.e., a telecommunications network 10, calling location 12, calledlocation 14, transparent telecommunications node or intercept 16, firstcentral local node 18, data network 20, central office 22, secondcentral local node 24, phonecall 26, link 28 to central local node 18,link 30 to the external channel 20, link 32 to the second central localnode 24, line 36 over which a first phonecall 27 is made to interrogatethe called location 14 and over which is sent back a call supervisionstatus signal 38, a callback 40, an uncompleted call signal 42, amessage 44, a reverse answer supervision signal 47 and a callinglocation 48 that places a call 50A or receives a callback 52A.

The calling location 12 may be where a data transmission originates orwhere a voice communication originates for eventual receipt by thecalling location 14. While phonecalls are certainly one form ofcommunication envisioned, the invention covers any type ofcommunication, whether it involves public service telephone networks,cellular networks, paging networks, data networks, analog networks, etc.A call is to be interpreted as any form of communication over a networkand not limited just to voice phonecalls.

While such a technique is particularly suited to callback situationsthat employ a voice network, it is also applicable to employing digitaldata based networks such as the internet computer network For instance,instead of routing a call direct between locations A and B usingtechnology X, it may be cheaper to use callbacks from location C tolocation A and from location C to location B using technology Y.

As used in this application, the term “calling party” designates theinitiator of the transmission or communication, which may includecallers over phone networks, subscribers that use data, cellular orpaging networks, etc. The term “called party” designates the ultimatereceiver of the transmission or communication from the calling party andwith whom communication is being effected. The called party may includeusers of phone networks, cellular networks, paging networks, datanetworks, etc. whose access device on the network serve as thedestination to which the transmission or communication is directed fromthe calling party.

In addition to transmitting voice through the telecommunication network10, the voice may be converted into digital form in a conventionalmanner, e.g., compressed into data packets or sampled. At the firstcentral local node 18, the call from the calling location 12 isconverted to a data signal which is then sent over a data network suchas the data network 20 to the called location or destination 14. Priorto reaching the called party, the data signal is reconverted into voiceat the central office 22 (or control location) to be transmitted to thedestination 14 via a public communications network or other connectionline 36. Such a transaction bypasses the use of the internationaltelephone networks and utilizes local calls instead. All internodeconnections are via the data network.

In addition, by transmitting voice over a data network, the need forcallback over a telephone network to save costs is obviated. Since datatransmissions are virtually instantaneous, the costs associated with thewaiting times for transmitting voice over conventional phone networks isavoided and even the costs associated with waiting times for makingconnection in a callback over a conventional phone network are avoided.

Each node is capable of communicating with other nodes for purposes ofrouting the communication and act as a transit node, making inquiries todetermine availability of the party at the destination to receive thecommunication, and even tracking down which network the party ispresently accessing so that the communication may be routed there. Forinstance, a node at the called party may be preprogrammed with alldifferent forms of communication networks and contact identificationsthat the party may be accessing, together with their addresses, accessnumbers, or other types of identification information to access themfrom the node.

Upon receipt of a request inquiring as to the availability of the partyto receive a communication, the node at the called party having the mainidentification or number associated with the called party checks thestatus of each of these communication networks at different accesslocations to determine whether any are being accessed by the party atthat time. In this connection, the called party would have previouslydesignated the main identifications (addresses, etc.) or phone numberswhere it wants to be reached and what networks are to be employed.

For instance, the check may reveal that the called party's computer islogged in or that the phone is hooked up, etc. If so, then the node hasidentified where the party rnay be accessed and then contacts theinquiring node to forward an authorization code for billing creditpurposes so that the called party node may effect communication throughthis identified communication network. The authorization code limits theduration and services that may be provided. Alternatively, the systemmay send the authorization code together with the inquiry.

The node that made the inquiry request sends the authorization codeafter checking in with a central node responsible for clearing alltransactions and which registers every event on the network. The centralnode may be part of a distributed network of central nodes that areresponsible for billing. After the called party node receives theauthorization code and authenticates it for billing purposes,communication may be established to the party through the identifiedcommunication network that was tracked down and found to be accessibleall transparent to the end user. An appropriate signal is transmitted tothe requesting node that communication may commence between the parties.

An example of tracking down the called party will now be described.Assume that the party spends half the year in North America using NACNcellular network and the remainder in Europe using GSM internet networkhookup using Laptop computer. Under normal situations, these two formsof networks are not compatible so direct communication is not possible.However, in accordance with the invention, such a situation is rectifiedby communicating with a node that is programmed with information as towhich of the possible networks the party may be using. If the node is incontact with the NACN system, it is also in contact with a node that isin contact with the GSM system Both nodes check their respectivecellular systems to locate on which the party is or has been accessingor which has been turned off. Once the accessible location isidentified, contact can be made from regular telephone to the laptopconverting and routing the voice over data to the laptop on which it isconverted back into voice.

As an example of operation, the subscriber of the service provider firstcontacts a central local node by providing the calling party's identityaccess number or identification and the called party access number oridentification, as well as the type of service desired as concernsrouting preferences, service providers, level of transmission quality,timing of transmission, etc.

The central local node polls the called party nodes to locate thenetwork which the called party is accessing. For instance, one calledparty node may be programmed with access information on all the possiblenetworks that the called party may be using, e.g., cellular, computer,paging, etc. This called party node then searches to find where thecalled party is or is likely to be and then informs the central localnode that the communication may be sent to it upon receipt of anauthorization number for the transaction.

The central local node provides such authorization, perhaps afterchecking with the central node first that handles billing anddetermining that the calling party or service providers satisfyfinancial conditions for permitting service and future settlement. Ifthe central local nodes do a least cost routing analysis, for instance,and determine that a callback from the called party is the cheaper wayto complete the transaction and both the calling party's serviceprovider and called party's service provider has received authorization,then the originating service provider will be billed. The central noderecords all such transactions for billing purposes.

One application of the invention that allows the Internet or other datanetwork to function like a telephone and fax machine will now beexplained. Callers are allowed to dial anywhere in the world for theprice of a local access and service fee and avoid using long distancecarriers. Users may make such calls to have voice conversations and tosend faxes to remote locations. For making voice calls, a local systemis dialed via computer access or regular phone which prompts the usersfor the called party number or identification and then connects them tothe called party over the Internet or other data network, such as byconnecting them via a node through a local call or through othernetworks. For example, a calling party may access a node that convertsthe transmission into data to support the network that it chooses. Forinstance, it may connect to another node that converts the transmissioninto voice and then connects the communication into a local call to thecalled party with the called party node being operated by an independentservice provider located elsewhere such as in another country. Ofcourse, the connection takes place only after authorization is receivedto complete the local call.

For sending faxes, the calling party sends a fax into a central localnode and the fax is then forwarded to the called party over the Internetor other data network The fax may be sent in real time or as a store anda forward mode for later sending as part of a subsequent batchtransmission, depending upon the preferences of the calling party.

The present invention envisions the option of using a singlecommunication device, such as a multimedia laptop computer, to initiateand receive all forms of communication by contacting a node or beingcontacted by a node in accordance with the invention and providing itwith an identification access address and a called party access address,phone number or other type of identity code and any preferencesconcerning the transmission, such as level of quality of transmission,service providers, time of cost, transmission (e.g., real time or storeand forward later), security, encryption, etc.

Transparent to the calling party that is using the laptop, the nodetakes care of all further action such as tracking down the called party,handling financial billing and obtaining authorization for completingtransactions via individual remote service providers, determining thepreferred path to route communications even if over otherwiseincompatible networks by converting the transmissions accordingly,checking the level of quality of transmission and making sure thetransmission satisfies preferences.

In addition to having access to a data network, the laptop may haveappropriate software/hardware that give it access to a cellular digitalpacket data and, via a built-in fax modem, to a phone network. Thus, thelaptop may be in contact with the node through any of these differentcommunication networks and communicate over any of these communicationnetworks as well, including performing two way voice calls.

Other applications of the invention concern transmissions throughconventional switched frame relay, conventional switched asynchronoustransfer mode and other conventional data networks such as the Internet.Frame relay is an international standard for efficiently handlinghigh-speed data over wide area networks that uses network bandwidth onlywhen there is traffic to send. Asynchronous transfer mode allows usersto combine voice, video and data on a single phone line and operates atup to Gigabyte-per-second speeds in which usable capacity is segmentedinto fixed-size cells each consisting of header and information fieldsallocated to services on demand. The Internet network differs from framerelay switching and asynchronous transfer mode by using transmissioncontrol protocol/Internet program, which is a set of protocols developedby the Department of Defense to link dissimilar computers across avariety of other networks and protocols.

Referring to FIG. 2, several remote nodes 50, 52, 54 are shown on theInternet backbone 56. Each remote node has a telephone server 60 and anInternet server 62, although a common server may be used instead toprovide both functions. The Internet server 62 has access to theInternet backbone 56. Both servers 60, 62 are networked usingtransmission control protocol/Internet program TCP/IP, which is a set ofprotocols that link dissimilar computers across a variety of othernetworks and protocols as conventionally used on local area networks,minicomputers and mainframes, or are networked with a router in the caseof an ATM. Subscribers 64 dial into and are serviced by the telephoneserver 60, which is a computer based machine with conventional voice andfax processing hardware and software, so as to establish a connectionwith one of the remote nodes. Subscribers access the servers by usingany of the conventional off-the-shelf phone and fax machines.

Referring to FIG. 3, a calling party interface 70, operator interface 72and a public switched telephone network PSTN interface 74 are shown. Thesubscriber interface 70 provides subscribers or calling parties withinternet phone and fax service via the Internet is Server 62 of theremote nodes (see FIG. 2). The calling party may dial into thesubscriber interface 70 through voice or data lines, for instance, witha computer or laptop. The PSTN interface 74 has lines that are used forinbound calls and lines that are used for outbound calls. These linesfor inbound calls lead to industry standard dialogic hardware or a modemsuch that when a particular number is called, the identification orpassword of the calling party is checked for validity of identity.

If determined to be valid, the calling party is requested to indicatewhat service is desired so that the communication may be routedaccordingly over voice or data networks. The called party is contactedto determine availability for receiving the communication. If available,communication is established over the desired service. Otherwise, ifreal time communication is desired, the calling party is notified thatcontact is unavailable.

If store and forward is the desired method of communication, then thecalled party is monitored until contact becomes available, at which timethe communication may be transmitted. A store and forward typecommunication is one in which a desired communication, such as atelecopier transmission, is stored until it may be sent in accordancewith other criteria, such as in batch format at off peak rates.

Voice processing entails call processing and content processing. Callprocessing involves physically moving the call around such as throughswitching. Content processing involves actually interacting with thecall's content, such as digitizing, storing, recognizing, compressing,multiplexing, editing or using it as input to a computer program.

The operator interface 72 includes designated representatives of theservice provider to interact with the system by means of a personalcomputer console to perform essential functions such as subscriberadministration, rate schedule management, billing and systemadministration. These functions are remotely accessible by dial up.

FIG. 4 shows the functional hardware in accordance with the invention.In addition to the previously mentioned fundamental external interfaces,the internal functional blocks that are necessary for the presentinvention include, as represented by blocks in the diagram, a data base76, call management 78, switching, voice and fax messaging 80. Thehorizontal links 82 on either side of the switching and voice messagingblock 80 are voice paths. The remaining links 84 are all data flowpaths.

The data base 76 is a database management system that is used as arepository for subscriber information, rate schedules, call details, andconfiguration information required to operate the system and thefranchise. Switching via block 80 is required to establish voice or faxbetween the source and the called party. Pre-recorded audio messages areplayed back onto a voice pathway by voice messaging for purposes ofgreeting, indicating normal call setup progress, and checking systemload status, subscriber account status, and error calculations. Voicemessaging refers to a small set of system wide messages and not toarbitrary voice mail messages.

Calls originating from the PSTN interface side are detected by theswitching voice messaging block 80, which also communicates with callmanagement 78 to establish a link with the called party node via theInternet server 62 of FIG. 2 or a voice or data line and to determinewhich message to playback if any. The call management 78 handles callset up requests from either the subscriber interface 70 side or PSTNinterface 74 side to issue call set up commands to the subscriberinterface 70 and to the switching voice messaging 80. It maintainsstatus information on the subscriber interface and PSTN lines. The callmanagement 78 is configurable to verify credit availability beforesetting up a call with other nodes if necessary, and monitor the call toissue voice messaging and call termination commands upon creditdepletion. It handles call take down situations by recording call detailinformation in the database for eventual billing purposes and issuingrelevant commands directly to subscriber interface 70.

For establishing a call, the following steps may take place:

The dialogic hardware answers the call. The switching voice messaging 80sends a message to the answered call via the voice processing unitrequesting entry of a called party access number, which after its entryis received and stored. The call management 78 checks the data base 76for the user's billing status. If invalid, the voice processing unitplays a message and the call is disconnected. Otherwise, for validcallers, the call management 78 initiates the subscriber interface 70 tosend a request packet over the Internet other data or voice line; therequest packet consists of the called party number or identification andmay include an authorization code.

Upon receipt of the packet at a remote central local node, the remotecentral local node will dial the called party number or enter itsaddress, perform a call analysis and send the result back to thesubscriber interface at the origination node. Call management 78 checksthe analysis result. If a connection link was established, then the callbegins. Otherwise, the switching voice messaging 80 prompts the user viathe voice processing unit with a message and options, such as dialanother number or leave a message in a voice mailbox. Upon completion ofthe call, billing information will be stored in the data base 76 forfurther processing by the operator interface 72.

FIG. 5 illustrates a technique for gaining access to a greater number oftelecommunication networks. The normal transmission from an accessdevice is intercepted by an intercept device, which routes thetransmission to a central local node. At the central local node, aninvestigation is made as to what route is available for the specificservice.

After determining which route is available, the central local nodedetermines all available nodes that can provide such a service for thecalled party end. The central local node then selects a specificavailable node based on considerations such as cost, line quality andsecurity and priority. The central local node checks with an internaldata base to determine the available networks at the called party end,the identity of the service providers who provide those networks acrossdifferent nodes, and the different transmission costs associated withcustomer defined criteria. The network access devices supported at thecalled party end could be a telecopier, telex, voice telephone, cellularphone, radio phone, data entry terminal, etc. (different types ofcommunication access devices). Transmission costs associated withcustomer defined criteria include customer preference for particulartypes of networks, encryption security, and/or priority of transmissionsuch as transmit in real time or in a store and forward format asdefined in the customer's message.

A software defined network may be used to maintain quality (e.g., upondetection of degradation in quality, the bandwidth of the transmissionmay be widened in accordance with or prioritization of transmissioninstructions). If data packets do not arrive quick enough, then qualitymay be enhanced by increasing the bandwidth within predeterminedbandwidth parameters on account of other voice data users.

Another embodiment of the application of this invention concernssecurity. A calling party may prefer that the transmission take placeover a secure, dedicated line, but does not is care about the routetaken by the acknowledgment or reply to the transmission. As a result,the acknowledgement or reply may be routing over non-dedicated lines andthrough any communication networks, even from among selected networks ofthe calling party's choosing. For instance, the calling party may wantthe acknowledgement or reply to be routed over either cellular orcomputer network services.

In accordance with the invention, such customer preferences may be foundin the data base associated with the calling party and interpreted bythe central local nodes. The central local nodes then instruct nodesresponsible for the routing back of the reply or acknowledgement tofollow the desired preference.

Another example of the application of this invention relates to acustomer's preference that a telecopier message be transmittedimmediately instead of in delayed batch format or vice versa. Thetelecopier message is sent to a central local node (at the origin).After initializing the system, i.e., setting a carrier default 90,checking customer preferences for an operator of a service provider 92and checking customer preference for selecting the desired service 94,the central local node determines 96 if there are any more central localnodes (CLN) from a least cost routing (LCR) table, which contains a listof central local nodes connected with service providers of differentnetworks and their costs for providing service.

If there are more central local nodes, the next one is selected 98. Adetermination 100 is made as to whether peak or off peak rates apply bybasing it on the current time. Reference to a data base table 102 may bemade to determine the average call length of service to the location bythe customer to help figure out the most cost efficient route based onhistory of usage. A least cost routing comparison 104 is made todetermine whether the new central local node's connection to the serviceprovider offers the more favorable rate based on the average length ofcommunication that what was being offered through the previouslyconsidered central local node. If better, the newly considered centrallocal node (and its associated service provider) is selected. If worse,the previously selected central local node (and its associated serviceprovider) will remain selected.

This process is repeated 108 for each central local node and therebyeach service provider. When done, the format of the call, theappropriate service provider, network and time of day are selected forsending the transmission to the selected central local node 110 and thebilling information is updated 112.

By selecting the appropriate network, it may be ascertained that it isless expensive to transmit the telecopier message in digital form over adata network than to transmit the telecopier message in voice callbackformat through the long distance carriers. Thus, the data network may bethe network of choice for purposes of selecting the least cost betweennodes. On the other hand, the central local node should give priority tothe customer's preferences, which could mean that the transmission berouted through the most secure route which may not be the data networkInstead, a secure transmission would be through a different routing andwould result in an increase in transmission cost.

FIG. 6 shows a flow chart for establishing a synchronized connection ofboth call legs, that is, synchronizing the completion of callback andcalled party communications by selecting specific system time and speedof callback time. A user is allowed to stay on a line or hang up to waitfor a callback while the routing unit time the completion of bothcommunications from the routing unit to the calling party access numberand the called party access number and ensures that both occursimultaneously or according to cost efficiency of transaction. Therouting unit checks an internal data base to determine how long to waitbefore commencement of opening communications with both so as to ensuresynchronization of the callback and called party calls. This may bebased on the historical performance of placing the callback and calledparty calls or placing a data call or tracking down a party.

A routing unit initially receives the first leg 120 (location, city,destination) of the calling party and the second leg 122 (location,city, destination) of the called party and then looks up in a statuscall back table in memory 124 for the least estimated connection time.The difference 126 is calculated between the connection times of the twolegs and the leg with the longer connection time needed is dialed 128. Atimer 130 is set to the difference and counts down to zero 132.

When the counting down is completed, the timer triggers the actuation toopen communication with the leg with the shorter connection time 134 toestablish the call 136. If a called party is to be called that is notfound in the status call back table in memory 124, then the actuation toopen communication takes place in the sequence of the called party legfirst and then the other leg. The average connection times are thenstored in the table in memory 124 for future synchronization of the twolegs. The table is continuously updated every time calls are placed. Theaverage connection times for both legs and the service providers thatare available for connection to the called party location and city codesare stored in the table for retrieval upon demand.

Another aspect of the invention concerns blocking the channels so noother incoming calls can interrupt during the time the routing unitperforms the callback and called party calls. The intercept unit onlyreleases the blocked channel a few seconds before the time specified inthe history of completion of the callback and called party calls.Alternatively, the time delay may be based on a fixed minimum timeperiod common for placing those types of calls. For instance, if a longdistance call takes 10 to 15 seconds depending upon the called party,the time delay period that is set could always be 9 or 10 seconds underthe time required to make that call. Thus, there is only a short timeperiod during which an incoming call can interrupt the routing unit'ssynchronization of the completion of the callback and called partycalls. It should be noted that the data base checked by the interceptunit may not be the same data base checked by the routing unit, althoughtheir contents could be the same. Such call blocking features arecommercially available from VoiceSmart in software and hardware underthe designation transparent local node (TLN) and hotel local node (HLN).By blocking such incoming calls, service providers no longer face therisk of bearing the expense of completing the second callback leg if thefirst callback leg becomes busy due to an incoming call.

FIGS. 7A-7G exemplify different techniques for efficient routingcommunications in accordance with the invention. Access devices 150 and156 (FIGS. 7A-7G) and nodes 152 (FIGS. 7A-7C, 7E-7F), 154 (FIGS. 7A-7G)and 160 (FIG. 7C) on a network are shown, but each node may be locatedin the same or different geographical region or country. The accessdevice 150 may have an intercept capability to render the ensuingrouting connections transparent to the users. Node 158 (FIG. 7B)represents an access device on a different network. For purposes ofexample, links 170 (FIGS. 7A-7G) and 174 (FIGS. 7A-7G) may be consideredvoice transmission lines and links 172 (FIGS. 7A-7C, 7F) and 173 (FIG.7D) may be considered data transmission lines. Link 176 (FIG. 7B) may bea paging or cellular line. Links 178 (FIGS. 7E and 7G) and 180 (FIG. 7E)may be data lines. Links 182, 184 and 186 (FIG. 7F) may also be datalines. Each node may perform the function of terminating the call, suchas when authorization is not forthcoming for carrying out thetransaction.

FIG. 7A shows nodes 152 and 154 effecting communication with theirrespective access devices 150 and 156, as would be done for simultaneouscallback Initially, the initiator access device 150, transmits itsidentification and that of the other access device 156 to node 152. Node152 requests node 154 to make an inquiry on the availability of accessdevice 156. If available, then callback is made over respective links170, 174, preferably for simultaneous communication. The two callbacksare bridged over link 172. Nodes 152 and 154 convert voice transmissionsinto data transmission and vice versa so that data transmissions travelbetween nodes 152 and 154 and voice transmissions travel from the accessdevices to the associated nodes 152, 154. Links 170, 172 and 174 mayhandle voice or data communications.

FIG. 7B works in the same way as in FIG. 7A, except that node 154 pagesthe called party via paging device 158 over paging network 176. Oncepaged, the called party calls node 154 through access device 156 andcommunication is established by bridging over link 172. During theinterim between paging of the called party and the calling to the node154 by the called party through the access device 154, the access device150 may either be waiting for communication to be established with node152 or be called back by node 152 after node 152 is advised that theaccess device 156 has contacted the node 154.

FIG. 7C is the same as that of FIG. 7A, except that an additional node160 between nodes 152, 154 is shown to illustrate that the routingbetween nodes 152, 154 may not be direct, and also showing that accessdevice 150 is communicating directly with node 152 rather than as aresult of callback as in FIG. 7A and using two different data links 172and 173.

FIG. 7D shows that communication may be through a single node 154,rather than through two nodes as in FIGS. 7A-7C as in case where accessdevice 150 is a computer that has direct access to data link 172.

FIG. 7E shows also that communication may be through a single node 152,rather than through two nodes, but also shows that such communication isestablished after access device 150 communications with node 154 saythrough E-mail that communication is desired with access device 156.Instead of routing the transmission through node 154, node 154 signalsto node 152 to make contact with access devices 150 and 156 directly.

FIG. 7F shows a callback type of arrangement in which a request forestablishing communication from access device 150 to access device 156is made through one kind of network, but the actual callback is doneover a different kind of network, although both kinds of networks sharethe same nodes 152, 154. As an example, the request could be through adata network 182, 184, 186 and the callback could be through two voicelinks 170, 174 from respective access devices 150, 156, with the twovoice links being bridged by a data link 172. The nodes 152, 154 convertvoice transmissions into data transmissions and vice versa as desired.

FIG. 7G is the same as FIG. 7E, except that node 154 also performs thefunction of node 152 in FIG. 7E and thereby routes the transmissionsthrough itself. In this case, a request for establishing communicationwith access device 156 from access device 150 is effected over a datalink 178, such as through E-mail. In response, node 154 calls bothaccess devices 150, 156, preferably so that each is contactedsimultaneously, over a different network such as over voice lines 170,174.

In each of these examples of FIGS. 7A-7G, billing is handled transparentto the parties using the access devices 150, 156. Each of the nodes arein contact with a central node (or network of central nodes) that mustclear the transaction before the termination nodes take action through aglobal authorizer. Once the transaction cleared, an authorization codeis provided to the node. The authorization code may either be forwardedto some other node at the time a request is made to establishcommunication or may be in response for such from that other node.

The central node, which includes the global authorizer, would check thetotal open credit or debit for the originating node, check for patternsof fraud, check for rights to terminate communication early based onavailable credit, and check the calling party credit standings withthird parties. Based on the results of such checking, the globalauthorizer of the central node either approves or disapproves of theproposed transaction. Once the transaction is complete, the noderesponsible communicates such completion to the central node, which thenupdates account information accordingly. If a node is being shut down,the central node also communicates such shutdown to all other nodes sothat they remove the shutdown node from the stored routing table ofavailable nodes.

FIG. 8 shows a central local node A interacting with a calling partyaccess device interface and a global network of high capacity datanetworks. Access devices may communicate with central local nodesdirectly or through intercept devices which direct the communication tothe central local node. Access devices are exemplified by telephones,pagers, cellular phones, laptops, facsimile machines, multimediacomputer workstations, etc.

The subscriber access device interface includes communication networkssuch as digital and analog telephone, paging and cellular, and data. Thecentral local node includes an authorizer, converters for eachcommunication network, a main processor and router, a main data base,compression and coding system and decompressing and decoding system. Theglobal networks of high capacity data networks include the internet,frame relay and digital and analog voice lines.

The authorizer is responsible for providing clearing transactions toprovide authorization for making communication. The authorizer checkswith a main data base within the central local node to determine whetherthe subscriber's credit is good and to what extent to ensure thatservice providers get paid. The data base may contain a history of thesubscriber's usage and outstanding unpaid balance and other informationrelating to credit history. The main data base's information may beupdated from information in other nodal data bases and vice versa,including that of the central node, which should contain the mostcurrent information and whose global authorizer may be responsible forauthorizing all transactions in advance. By the same process, the globalauthorizer can check on the creditworthiness of service providers if theservice providers will be responsible for paying each other.

The converters convert the form of the communication to suit theparticular network over which the communication will be routed, e.g.,voice into data, etc. The main processor and router is responsible forchecking with the main data base to determine which service providersand communication networks to utilize and to access circuitry tocompress or decompress the communications as needed and to accesscircuitry to code or decode the communications for security purposes.

The main processor and router route the communications throughappropriate converters if necessary to suit the network being utilizedfor routing, i.e., internet, frame relay and ATM, or digital and analogvoice lines. The main processor and router also direct the communicationto the ultimate destination, i.e., access devices of the called party.In so doing, other central local nodes B or C may be used for part ofthe routing or else route directly to the access devices via theassociated intercept if any for the access device. These interceptdevices are also for directing communications.

Converters are available conventionally, such as Texas Instrumentdigital signal processors which convert voice to data and vice versa.Intercepts are available from VoiceSmart by ordering TLN or HLN and areavailable conventional from phone companies. The intercept may be partof or separate from the access devices. The intercept evaluates whethersavings may be achieved by routing to a node and, if so, routes thetransmission to the central local node A of FIG. 8 and identifies thesubscriber and called party or service type.

The node receiving the routing from the intercept polls other nodes totrace the called party number or identification address. In this manner,the main processor and router of the node serves as an interrogator thatinterrogates the availability of the called party number oridentification address. The node accesses a main data bank to check thecommunication network, call format and user preferences to determine thebest connection between locations 150 and 156 of FIGS. 7A-7G. The node,through its authorizer, checks whether completing the routing of thetransmission is authorized and obtains an authorization code from theglobal authorizer at the central node. The node converts thetransmission if necessary for compatibility and records billinginformation to ensure proper end user billing. Also, the node updatesuser statistical usage and access for future use. Each of these tasksthat are performed by the node are carried out in a manner that istransparent to the calling party.

FIG. 9 is a variation of that of FIG. 1, but shares the same componentsthat are identified by the same reference numerals. Additional two-waydirect link connections 46A, 46B, 46C, 46D and 46E are included. Forinstance, one route for sending a request as to availability may be fromthe calling party access device 12 to the local access node 18 eitherdirectly or through the intercept 16 and then directly to either thecommunications network 10, the data network 20 or another network 200such as a cellular network, ATM, and/or frame relay. The centralswitching unit 22 then receives the request from the network as toavailability to check on the availability of the called party accessdevice 14. Once the availability becomes known, an appropriate signalmay be sent directly back to the central local node 18 eitherbacktracking through the same route or through the second central localnode 24 to either the communications network 10 or the data network 20to thereafter reach the local access node 18, Note that the secondcentral local node 24 may be considered a local access node for thecalled party access device 14.

A central local node global authorizer 220 is shown to which permissionmust be obtained by confirming authorization requests before routingconnections between the calling and called parties may take place. Thisglobal authorizer 220 may be part of the central node to which all thecentral local nodes are in communication. In FIG. 8, for instance, theconnection from the main data base to the other node data bases wouldinclude connection with the central node and thereby with this globalauthorizer. Authorization requests would be sent to the globalauthorizer 220 via the applicable one or more of the networks 10, 20,200.

All the routing paths of FIGS. 7A to 7G are applicable to the blockdiagram of FIG. 9. Also, the representation of the interaction of thecentral local node with various networks as shown in FIG. 8 isapplicable to FIGS. 1 and 9.

FIG. 9 shows some links as bi-directional lines and others as twosingle-directional lines in opposite directions. This was done forconvenience and is in no way intended to be limited to one form or theother. Routes may be through any path available, except that the routingthrough links 53A, 53B and 53C only arises if calling location 48communicates in a manner compatible with the applicable one of thenetworks 10, 20 or 200. Otherwise, routing will have to be done throughthe central local node 18.

If the calling party location uses a laptop computer and thus connectsdirectly with the data network 20 and bypasses the central local node,the path of communication would still pass through either the centraloffice 22 or the central local node 24 before reaching the called partyaccess device 14. At the central office 22 or the central local node 24,therefore, the applicable billing information may be recorded.

While intercept 16 and central local node 18 are shown as separateunits, they may be combined together. Similarly, while the centraloffice 22 and central local node 24 are shown as separate units, theymay be combined together. By being combined together, a unitary devicewould provide the functions of both.

While the foregoing description and drawings represent the preferredembodiments of the present invention, it will be understood that variouschanges and modifications may be made without departing from the spiritand scope of the present invention.

1-37. (canceled)
 38. A method for communication between two accessdevices via a data network, comprising the steps: receiving data to betransmitted at a first access device; sending the data on a route havingat least a first portion and a second portion between a first accessdevice and a second access device; performing a first conversionconverting the data from a first format to a second format, the data tobe transmitted being transmitted on the first portion of the route inthe first format and the data to be transmitted being transmitted on thesecond portion of the route in the second format, the second formatbeing an internet protocol; performing a second conversion convertingthe data from the second format to the first format so that the messageis in the first format at the second access device.
 39. The method ofclaim 38, wherein the first access device and the second access devicecomprise telecommunication nodes and said first format is atelecommunication protocol.
 40. The method of claim 39, wherein saidstep of sending comprises sending the data from the first access deviceserially to a first central node, the data network, a second centralnode, and the second access device.
 41. The method of claim 38, whereinsaid step of sending comprises sending data related to voicecommunication for a phone call from a calling party connected to thefirst access device to a called party connected to the second accessdevice.
 42. The method of claim 38, wherein the second portion of theroute is in a data network.
 43. The method of claim 38, wherein thefirst portion of the route is in a public communication network.
 44. Themethod of claim 38, wherein a calling party is connected to the firstaccess device for transmitting voice communication and a called party isconnected to the second access device for receiving the voicecommunication and at least the second portion of the route is throughthe Internet.
 45. The method of claim 38, wherein the second conversionis performed at the second access device.
 46. The method of claim 38,wherein said second access device is a central office of atelecommunication network.
 47. The method of claim 38, furthercomprising the step of selecting the route based on at least onecriteria defined by user preference.
 48. The method of claim 47, whereinthe at least one criteria comprises a specified level of transmissionquality.
 49. The method of claim 47, wherein the at least one criteriacomprises credit availability of a calling party.
 50. The method ofclaim 47, wherein the at least one user criteria comprises cost ofrouting.
 51. The method of claim 38, wherein said step of sendingcomprises execution of a call setup procedure.
 52. The method of claim38, further comprising the step of storing at least one of subscriberinformation, rate schedules, and call details.
 53. The method of claim38, wherein the data network uses Asynchronous Transfer Mode.
 54. Themethod of claim 38, wherein the data network uses Transmission ControlProtocol/Internet Protocol.
 55. The method of claim 38, wherein the datanetwork uses Frame Relay techniques.
 56. The method of claim 38, whereinthe data to be transmitted is related to a fax transmission.
 57. Themethod of claim 38, wherein the data to be transmitted comprisessignaling messages.
 58. In a system for transmitting communications froma calling party to a called party, a communication node accessible bythe calling party using a telecommunication network, said node beingarranged and dimensioned for receiving a communication in a first formatfrom the calling party, converting the communication received from thecalling party from the first format to a second format, wherein thesecond format is compatible with a data network, and transmitting theconverted communication to a further node capable of connecting a localcall to the called party on a further telecommunication network.
 59. Thenode of claim 58, wherein said node is a telecommunication node and saidfirst format is a telecommunication protocol.
 60. The node of claim 58,wherein the data network is the Internet and said second formatcomprises an Internet protocol.
 61. The node of claim 58, furthercomprising means for converting communications initiated by the calledparty and received from the data network from said second format to saidfirst format.
 62. The node of claim 58, further comprising means forreceiving a local call from the calling party.
 63. The node of claim 62,further comprising means for determining a called party number from thecalling party by communicating using the local call.
 64. The node ofclaim 58, further comprising an Internet server for connecting the nodeto the Internet and a telephone server for connecting the node to acircuit switched network.
 65. The node of claim 58, wherein thetelephone server comprises a Public Switched Telephone NetworkInterface.
 66. The node of claim 58, wherein the node is furtherarranged and dimensioned for selecting a route to the called party basedon at least one criteria of user preference.
 67. The node of claim 58,wherein the at least one criteria comprises a specified level oftransmission quality.
 68. The node of claim 58, wherein the at least onecriteria comprises credit availability of a calling party.
 69. The nodeof claim 58, wherein the at least one user criteria comprises cost ofrouting.