Universal ring free

ABSTRACT

A method and system are disclosed for sending notifications asynchronously over a telephony network. The method and system include receiving a request over a first telephony connection from a first communication device associated with a first user identifying a second communication device associated with a second user, sending one or more response communications over the first telephony connection to the first communication device associated with the first user, disconnecting the first telephony connection with the first communication device of the first user, and sending a notification over a second telephony connection to the second communication device associated with the second user, the notification including information sufficient to allow the second user to identify the first user or the first communication device associated with the first user.

RELATED APPLICATION DATA

This application claims priority to U.S. Provisional Application Ser.No. 61/537,536 filed Sep. 21, 2011, the disclosure of which is herebyincorporated by reference in its entirety.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application and the technical disclosures herein are related to themethods and systems of U.S. application Ser. No. 13/217,084, filed Aug.24, 2011, U.S. application Ser. No. 13/095,724, filed Apr. 27, 2011,U.S. application Ser. No. 12/917,255, filed Nov. 1, 2010, U.S.application Ser. No. 12/900,367, filed Oct. 7, 2010, U.S. applicationSer. No. 12/434,181, filed May 1, 2009, U.S. application Ser. No.12/303,339, filed Feb. 10, 2009, U.S. application Ser. No. 12/176,301,filed Jul. 18, 2008, U.S. application Ser. No. 10/558,644, filed Oct.10, 2006, U.S. application Ser. No. 10/562,343, filed Aug. 9, 2006, U.S.application Ser. No. 10/551,154, filed Sep. 28, 2005, U.S. applicationSer. No. 10/556,037, filed May 7, 2004.

TECHNICAL FIELD

The subject matter described relates to telephony services on atelephony network.

BACKGROUND

A substantial number of users of modern telephone networks make use ofprepayment mechanisms to pay for their calls on a network. For example,users of a conventional fixed-line telephone network who use publictelephones will typically use prepayment card accounts which store acredit value which is reduced according to the cost of calls made. Usersof mobile networks who make use of prepaid airtime typically purchase anairtime recharge voucher which has a unique code. The user contacts thenetwork and enters the code, and the balance of the user's prepaidairtime is increased accordingly. As the user makes calls, the balanceis reduced accordingly.

In either case, once the credit value or prepaid airtime is exhausted,the user is prevented from making further use of the network and inparticular making telephone calls until a new prepayment card isobtained (or the existing card account is replenished with a furthercredit value) or further prepaid airtime is “loaded” on the network insome manner.

BRIEF DESCRIPTION OF THE DRAWINGS

For a better understanding of the embodiments described in thisapplication, reference should be made to the Detailed Description below,in conjunction with the following drawings in which like referencenumerals refer to corresponding parts throughout the figures.

FIG. 1 is a flowchart of an exemplary method for asynchronouscommunication according to the disclosed embodiment.

FIG. 2A is a graphical representation comparing the timing ofsynchronous and asynchronous notifications from the callers perspective,according to the disclosed embodiment.

FIG. 2B is a diagram illustrating the difference between synchronous andasynchronous connection methods according to the disclosed embodiment.

FIG. 3A is a graphical representation illustrating a dial streamstep-ladder of an asynchronous messaging protocol, according to thedisclosed embodiment.

FIG. 3B is a graphical representation illustrating a dial streamstep-ladder of the asynchronous messaging protocol which shows theinterworking between ISUP and IP protocols, according to the disclosedembodiment.

FIG. 4 is a flowchart illustrating the operating of the menu responsefeature according to the disclosed embodiment.

DETAILED DESCRIPTION

Reference will now be made in detail to embodiments, examples of whichare illustrated in the accompanying drawings. In the following detaileddescription, numerous specific details are set forth in order to providea sufficient understanding of the subject matter presented herein. Butit will be apparent to one of ordinary skill in the art that the subjectmatter may be practiced without these specific details. Moreover, theparticular embodiments described herein are provided by way of exampleand should not be used to limit the scope of the invention to theseparticular embodiments. In other instances, well-known data structures,timing protocols, software operations, procedures, and components havenot been described in detail so as not to unnecessarily obscure aspectsof the embodiments of the invention.

The disclosed embodiment provides a method and system for providingasynchronous supplementary services in a telephony network by a star “*”(also referred to as the star or asterisk key) dialing feature whichpermits any user to instantly and programmatically deposit a missed callto any phone in the world, without any billing exposure and withoutmanually monitoring and disconnecting the call. Of course, in additionto the star key, any key, button, other user interface element, orcombination of keys or user interface elements can be used.Additionally, rather than having to press a specific key, the stardialing services disclosed herein can be part of user or networksettings for a particular type of account. Although the disclosure makesreference to “star dialing,” it is understood that any of thesevariations can take the place of the star key.

The disclosed embodiment delivers a core managed service whichdisconnects the telephony up and down link in order to accelerate ringback tone (RBT) presentation and free up service.

Further, the disclosed embodiment provides a method for routing servicevia an intermediary switching node, triangulating service delivery bylogically decoupling the telephony up and down links. Users may enter apredetermined code, symbol, or prefix on the mobile device key pad, suchas the Star key before dialing a telephone number (collectively “stardial”) to freely and programmatically deposit rings to any device at anylocation. The star dialing may also include entering a predeterminedcode, or symbol after dialing the telephone number (e.g., beforepressing a send button).

Referring to FIG. 1, a flowchart shows an exemplary method for carryingout asynchronous notifications and communications in a decoupledtelephony network according to the disclosed embodiment. In step 101, aSwitching Node receives a request from a communication device associatedwith a first user (“originator”) over a telephony connection,identifying a second user (“recipient”), or the communication device ofthe recipient. The telephony connection can include Voice over InternetProtocol (VoIP), a public switched telephone network (PSTN), GlobalSystem for Mobile Communications (GSM) and/or any other mobile or fixedtelephony network connection, transport or bearer. Additionally, theSwitching Node can be an Internet Protocol (IP) switch, an ISDN UserPart (ISUP) switch, a Universal Mobile Telecommunications System (UMTS)switch, or one or more similar computing devices, such as one or moreIntelligent Peripherals on the telephony network.

The request can take the form of a “star dial,” as discussed above,where the first user enters an asterisk and then the number of thesecond user. Alternatively, the notification and communication methodmay be invoked by entering, without limitation, any dial prefixincluding * (a single leading star), ** (a double leading star), # (asingle leading pound), ## (a double leading pound), *x (a single leadingstar followed by single or multiple decimal digits), **x (a doubleleading star followed by single or multiple digits), #x (a singleleading pound followed by single or multiple digits), ##x (a doubleleading pound followed by single or multiple digits), or by other userinterface element, or by any network event or condition including,without limitation, information related to the originator (the callerhaving insufficient credit to complete a conventional call, thesubscriber network identity), the recipient (the destination networkdialed, the country dialed), the network (time of day, congestion ortraffic load), and the like.

Additionally, the star dial may be configured to be the default type ofdial for certain types of user accounts, such that users who own thoseaccounts can only star dial and receive incoming calls, but cannot placeregular outgoing calls. The star dial feature can also be incorporatedinto a user device, so that the user presses a star dial button ratherthan a regular connect button to request a call. The star dial featurecan also be automatically activated when the originator has a lowaccount balance or when the recipient is in a certain destinationnetwork or country. For example, an originator may not have enough fundsin a phone account, a credit account, or a calling card, to complete aregular long distance phone call, at which point the phone call may beconverted into a star dial call. Therefore, the “star dial” feature canbe activated without dialing any specific characters when one or moreaccounts associated with the originator are below a preset threshold.The star dial may also be activated in response to factors relating tothe recipient, such as the location of the recipient, the distancebetween the recipient and the originator, or the mobile service providerof the recipient.

At step 102, the Switching Node sends a response communication to theoriginator over the telephony network. This can be a confirmation thatlets the originator know that their request has gone through, and caninclude, for example, a ring back tone (“RBT”) which sounds like theringing of a telephone to the originator. When a RBT is the responsecommunication, the Switching Node preemptively signals that the dialeddestination (e.g. the device associated with the recipient) is ringing,when it has yet to physically connect to the recipient's device andreceive network messages confirming the ring. Accordingly, a “preemptivering” is presented to the originator. In VOIP telephony, using the SIP(Session Initiation Protocol), this early RBT presentation can beachieved by the Switching Node, on receiving a SIP INVITE from thelegacy switch, an MSC (Mobile Switching Center) servicing an originator,instantly returning a “SIP Progress 180” (ringing) message, which inturn translates into an ISUP ACM (Address Complete Message) which inturn results in the MSC notifying the originator that the calledrecipient's phone is ringing, when in reality it is has yet to ring.Alternatively the response communication may be another type of networknotification, including without limitation notifying the originator viaan on-device tone, a voice announcement, an SMS message, an instantmessage, or an Unstructured Supplementary Service Data (“USSD”) message.Additionally, the response communication can include a set of optionspresented to the originator, as will be discussed in greater detailbelow.

Optionally, the step 102 of sending a response communication to theoriginator can be omitted.

At step 103, the Switching Node can automatically terminate theconnection with the originator. Alternatively, the originator may alsoterminate the connection by hanging up or disconnecting after receivingthe response communication from the switch. A combination of bothtechniques can also be used, with the Switching Node terminating theconnection after a preset period of time if the originator has not.

At step 104, the Switching Node delivers a notification to therecipient's communication device over the telephony connection, such asa missed call notification identifying the originator. The notificationprocess is described for a missed call in greater detail below, but canalso take the form of an SMS/text message, an instant message, a binarydata message, a special ring tone on the recipient's device, a voicemail, or any other notification method which identifies the originatorto the recipient. At this point, the recipient can call or otherwisecontact the originator at their discretion and convenience. This processallows the originator to initiate, to “invite” communications with therecipient without the originator incurring any charges.

Asynchronous vs. Synchronous Connections

FIGS. 2A-2B are graphical representations comparing synchronous andasynchronous delivery of call back messaging according to the disclosedembodiment. In the figures, the originator is labeled “A,” the recipientlabeled “B,” and the Switching Node is labeled C. As FIG. 2B shows, insynchronous delivery 201 of a missed call, user A establishes aconnection directly with user B in order to deposit a missed call orother notification. In asynchronous delivery 202, user A connects toswitch C, which can connect with user B after disconnecting with user A.

Conventional synchronous missed calling is restrictive, in that it isonly available to users with sufficient credit to place a call, andresource intensive in that it requires significant network resources toconduct end to end ringing. Conventional missed calling may be usedwhen, for example, a caller A has low credit, sufficient to make a shortcall, but where caller A would prefer to send a notification to a callrecipient B, the notification being some indication for B to call backA, thereby preserving the limited credit available. This is possiblesince the global billing standard is “calling party pays”, and receivingis therefore free. Caller A may dial B's telephone number, wait forestablishing network switching to connect to B's mobile device in B'stelephony network, and disconnect after verifying a ring tone from B'smobile device.

However, as mentioned, the conventional synchronous model is limited inthat it is available only to those with sufficient credit to initiatethe call in the first place. Typically networks do not charge for thetime it takes to initiate the call, however these networks only permitthe caller to initiate the call if the caller has sufficient credit withthe network or the prepaid account has sufficient credits, sufficient tocover at minimum, the first billing increment, which may be mere secondsin a per second billing protocol, or at least the first minute in a perminute billing protocol. This prepaid and “precall” credit check is toensure that the caller has sufficient funds to cover the cost of thecall if it is answered, ensuring that the network is not exposed torevenue loss. Additionally, the conventional synchronous model requiresmanual monitoring of the call in order to terminate before the call isanswered, as well as synchronous “end to end” service delivery betweenusers A and B.

Referring to FIG. 2A, as illustrated by the “synchronous” model (inconventional calls), the latency from the moment A sends a call request(at time 0 seconds) and when A ends a call (typically at time 9 seconds)could be significant as caller A waits for the synchronous switching tooccur in order to connect to call recipient B's telephony network anddevice. Since the RBT can take up to 7 seconds and longer (the durationthat A must wait for switching between time 1-6) this behavior is akinto “cranking the handle and waiting for the phone to ring”.

In an asynchronous model, star dialing permits any user to instantly andprogrammatically deposit a missed call to any phone in the world,without any billing exposure to either the user, who is alreadydisconnected prior to the destination being notified, or the networksince the call is disconnected before the destination answers, andwithout manually monitoring and disconnecting the telephony request. Byswitching service via an intermediary Switching Node, node C, Stardialing “triangulates” delivery, logically decoupling the telephony upand down links. In this model, A sends a call using a star dial prefix,and is instantly connected and disconnected. Then node C, substantiallysimultaneously programmatically establishes the downlink portion of thecall, disconnecting once B rings. That is, the intermediary SwitchingNode C continues with the forward switching of the call toward recipientB, without A having to be on the line and connected waiting for theswitching to complete.

This “doubly disconnected protocol, which “disconnects A then rings anddisconnects B,” without fully connecting either party, keeps the servicewithin the “signaling domain,” permitting it to scale dramatically.Users simply star dial phone numbers to ring and disconnect in a flash.The asynchronous model thus opens the ring to any and all users withzero billing requirement and exposure. Further, as the star prefix maybe set to immediately route off the MSC directly onto the disclosed nodeC, without conventional call authorization and billing verification,star calls may be set to bypass core network nodes critical tosuccessfully processing and completing conventional call requests,thereby reducing network signaling and load and preserving strategicassets.

In such an immediate star call routing configuration, core network nodesincluding the HLR (Home Location Register), which is typically contactedfor call authorization during the “Authorize_Origination_Attempt” PIC(Point In Call) in the Originating BCSM (Basic Call State Model, wellknown to Intelligent Network Artisans), and the Prepaid Billing SCP(Service Control Point) typically contacted during DP3 (Detection PointThree) “Analyze Information” Trigger to determine credit sufficiency,may now be bypassed, since Star calls cannot complete in theconventional sense and may thus be “unauthorized and free”.

One such immediate routing configuration may be achieved by identifyingall star prefixed phone numbers as “locally allowable numbers”(Locally_Allowed_Specific_Digit_String). Well known to skilled switchingartisans, such Locally Allowable numbers route statically within theMSC, avoiding all triggers in the BCSM and obviating the need to conductresource intensive MSC-HLR and MSC-SCP dialogs required for conventionalcall authorization verification and setup. In the Star routing case,Switching Office Data may be required to identify these additional dialpatterns as “locally allowed”.

This immediate call routing is well known and exemplified by “emergencycalling” (112, 911 etc) services, which permits any credit-expired andany anonymous caller (a mobile without a SIM card) to make a freeemergency call. Whereas Legacy “112” emergency calling service may bedescribed as “vertical,” that is between user and PSAP (Public SafetyAnswering Point), a “Star” call, such as a Star emergency call, is“horizontal,” and permits users to directly request assistance,peer-to-peer.

In addition to bypassing core billing nodes such an asynchronous servicerecovers vast wireless network resources. Whereas in the synchronousringing protocol, caller A is typically “on the airwaves” for 9 secondsand longer, in the asynchronously switched protocol disclosed, A isswitched on and off the airwaves typically in just 2 seconds, andrecipient B is separately notified via the legacy fixed line, the VOIPnetwork, which only momentarily touches the wireless networkinfrastructure on the downlink. Star thus provides for speedy missedcall notification features with automatic “2 clicks and 2 seconds”service delivery.

Asynchronous Messaging Protocol

FIG. 3A is a graphical representation illustrating a dial streamstep-ladder of an asynchronous messaging protocol, according to thedisclosed embodiment.

Step 10, shows caller A dialing and sending a call to recipient *B.While step 10 shows prefixing with * to invoke the star dial feature, asdescribed above, any method, including without limitation to any dialprefix (*, **, #, ##, *x, **x, #x, ##x, where “x” is single or multipledigits), and any event or condition including without limitationinformation related to caller A (insufficient credit, subscriber networkidentity), called B (destination network, country), network (time ofday, congestion) and the like may invoke the disclosed notificationmethod.

Step 11 shows the call being routed via an Internet Multimedia Subsystem(IMS) to an Internet Protocol (IP) switching node which implements thedisclosed notification method, however routing may be to other nodes onthe telephony network, including without limitation an IntelligentPeripheral on the telephony network where the B party may be alertedusing switching elements on the legacy originating network.

Steps 12, 13,14 show the early RBT indication issued by the IP switch(12) to the originating switch (13) that results in caller A hearing thedestination ringing (14), even although the destination has yet to benotified of the call request. The RBT played to caller A may be astandard network RBT or may be a custom RBT provided by the service.Alternatively the RBT may be another type of network notification,including without limitation notifying caller A via an on device tone, avoice announcement, SMS message, USSD message.

Steps 15, 16 shows that either the user disconnects manually (15) onhearing the RBT or the system (16) automatically disconnects caller A,typically if no such manual disconnection is indicated.

While steps 14, 15 show caller A disconnection after RBT presentationcaller A may be automatically disconnected at step 12 without RBTpresentation.

Additionally, caller A may disconnect at step 12 without RBTpresentation or in response to other service announcements.

Step 17 shows the IP switch programmatically originating the downlink tothe called destination B, using a SIP INVITE protocol that has thecaller origination identity set to A, even although caller A is nolonger connected to and participating in the call and the notificationprocess, and that typically routes via an outbound Proxy server to thelegacy network servicing the called party B.

Step 18 is where destination device is notified of the incoming call andis where ringing is emitted. While “ringing” typically emits auditorytones, it may be presented “silently”, “vibrationally”, “visually”, orotherwise as configured by device B. Regardless of the notification, atminimum caller A identity is presented to the called party B device fordisplay and access.

Step 19 shows the IP switch programmatically disconnecting B, issuing aSIP CANCEL command, on receiving the SIP Progress 180 (“ringing”) fromthe Proxy, which in turn was signaled by the destination gatewayconnecting through to the network servicing device B, that B was alertedand is ringing.

Step 20 is where the call that was programmatically setup by the IPswitch to called party B, is disconnected and where B consequentlydisplays “a missed call from A”.

While the above description refers to a ring being deposited at callerB, the asynchronous service may deposit other notification typesincluding without limitation a text message (for example a message withcaller party A information, requesting the B party to “call me”), or aspecially configured data message, which similarly displays a “missedcall notification” or call back request on device B.

Steps 12, 16, 17 illustrate the asynchronous processing of caller A'scall request to *B. While, steps 12, 16, 17 are shown as executingsequentially they may execute substantially simultaneously or they mayexecute with additional intermediary logic and intentional servicedelivery delays toward the B party, that perform additional functionsincluding without limitation (velocity checks on the number of suchrequests made by caller A, network time of day, service load conditions,availability of device B) and as such rings deposited to called B fromthe same caller A may be consolidated into fewer rings, where highvolumes of rings may be stored for a period before forwarded todistribute and attenuate network loads, and where the unavailability ofdevice B may trigger notification attempts later or when device B onceagain becomes available to the network.

Interworking of ISUP and IP Protocols

FIG. 3B represents a dial stream step-ladder of the asynchronousmessaging protocol which shows the interworking between ISUP and IPprotocols. After user A star dials user B, a call setup message is sentto the MSC. As discussed earlier, star dialing can include any method ofdialing, including without limitation any dial prefix (*, **, #, ##, *x,**x, #x, ##x, where “x” is single or multiple digits), and any event orcondition including, without limitation, information related to caller A(insufficient credit, subscriber network identity), called B(destination network, country), network (time of day, congestion) andthe like.

The star dialed number is identified as local by the MSC, which can thensends an ISUP Initial Address Message (IAM) to the IMS. The IAMtypically contains the calling and called number, type of service(speech or data) and can contain many more optional parameters. Afterreceiving the IAM, the IMS translates the call setup request into a SIPINVITE request, sent to the IP Switch (labeled “STAR” in FIG. 3B) withthe called recipient set to B or *B. The IP Switch responds with a180/RINGING message, which in turn translates into an ISUP ACM (AddressComplete Message) at the IMS gateway, which in turn results in the MSCsending a RBT back to user A. After this, the IP Switch may send486/BUSY message back to the IMS which is translated into an ISUPRELEASE message routed through the MSC and sent to user A's device whichdisconnects it.

Meanwhile, the IP Switch can send a SIP INVITE to an outbound ProxyServer with the caller origination identity set to user A and therecipient set to user B. This message is translated into an IAM and sentto user B's Gateway Mobile Switching Center (GMSC), which is theinterworking MSC for user B's mobile phone operator. The GMSC deliversthe routing required to determine the current location of device B. Thisresults in user B's device ringing and a ring alert being routed back tothe IP Switch through the GMSC and Proxy Server, where it is received asa SIP 180/RINGING message. Upon receiving this message, the IP Switchimmediately sends a SIP CANCEL response toward device B, which is routedthrough the Proxy Server and GMSC where it translated into an ISUPRELEASE command which disconnects B. The end result is a missed call onuser B's device which identifies user A.

It will be appreciated by the suitably skilled artisan, that variationsin the above messaging dialog and sequence may achieve the desiredresult.

Presenting Options to the Originator via a Menu

The Switching Node may be configured so that rather than, or in additionto, providing a response communication in the form of a confirmation tothe originator after a star dial, the Switching Node presents aplurality of options to the originator.

Referring to FIG. 4, the Switching Node can receive a request from theoriginator at step 401, the request transmitted by star dialing or othermeans as described above,. On receiving the request, rather than, or inaddition to, sending a confirmation to the originator, the switch candirect the servicing mobile network to present a plurality of serviceoptions to the originator. This may be accomplished via InteractiveVoice Response (IVR), Intelligent Peripheral (IP), SMS, or USSD textmenu.

The originator may at this stage choose to dismiss the menu andterminate the connection. Alternatively, the originator may provide oneor more inputs to select a service option. After the originator selectsa service option, the Switching Node receives the selection at step 403.The Switching Node may then terminate the connection with the originatorand deliver the selected service to the recipient.

In the context of asynchronous notifications and calling, the originatormay receive a menu asking them how they would like the recipient to benotified that originator would like to contact them. For example, themenu might state “Send recipient: 1) An SMS, 2) A missed call, 3) Apre-recorded voicemail,” at which point originator can make a selection.The originator may navigate multiple menus and select multiple optionspertaining to the notification to send to recipient, as well aspreferences for being contacted. For example, the originator may selectthe option indicating that they would like to have an SMS sent torecipient, and select another option in a different menu indicating thatthe SMS should state that originator should be contacted for a specificreason or within a specific time frame. Many variations are possible andthese examples are not intended to be limiting. For example, the usermay select an option that permits recording a personal voice mailmessage for delivery to the recipient.

The Switching Node can include one or more processing units (CPU's), oneor more network or other communications interfaces, memory, and one ormore communication buses for interconnecting these components. Thecommunication buses can include circuitry (sometimes called a chipset)that interconnects and controls communications between systemcomponents. The switch can optionally include a user interface, forinstance a display and a keyboard. Memory may include high speed randomaccess memory and may also include non-volatile memory, such as one ormore magnetic disk storage devices. Memory can include mass storage thatis remotely located from the CPU's.

The memory can store the following programs, modules and datastructures, or a subset or superset thereof: an operating system thatincludes procedures for handling various basic system services and forperforming hardware dependent tasks; a network communication module thatis used for connecting the switch to other servers, network componentsand switches, telephony networks, or computers via one or morecommunication networks (wired or wireless), such as the Internet, otherwide area networks, local area networks, metropolitan area networks, andso on. The memory can also store program code and data. One or moreapplications can be loaded into memory and can run on the operatingsystem. Examples of application programs can include schedulers,calendars, transcoders, database programs, word processing programs,HTTP programs, customizable user interface programs, IPSec applications,encryption programs, security programs, VPN programs, SMS messageservers, IM message servers, email servers, account management and soforth. A search module can also be included as an application programwithin applications or as a separate application. Search module can beconfigured to receive search terms from client devices, determine othersearch parameters, perform searches of data sources, provide searchresults, and perform other search related operations.

User communication devices can be any suitable devices. This includes,but is not limited to: mobile devices, landline phones, smart phonescontaining computing components, computers, tablets, PDA's,communications applications running on computing devices, and any otherdevices which are capable of communication over some form of telephonyconnection.

Communication devices can include one or more processing units (CPU's),one or more network or other communications interfaces, memory, and oneor more communication buses for interconnecting these components. Thecommunication buses can include circuitry (sometimes called a chipset)that interconnects and controls communications between systemcomponents. Communication devices can include a user input device, forinstance a display and a keyboard. Memory can include high speed randomaccess memory and can also include non-volatile memory, such as one ormore magnetic disk storage devices. Memory can include mass storage thatis remotely located from the CPU's. Memory can store the followingprograms, modules and data structures, or a subset or superset thereof:an operating system that includes procedures for handling various basicsystem services and for performing hardware dependent tasks; acommunication module that is used for connecting the communicationdevices to the Switches or other computers via one or more communicationnetworks, such as the Internet, telephony, other wide area networks,local area networks, metropolitan area networks, and so on; Memory canfurther includes one or more data storage, which can be utilized bycommunication device to store, among other things, applications and/orother data. For example, data storage can also be employed to storeinformation that describes various capabilities of the communicationdevice. Moreover data storage can be used to store information such asdata received over a network from another computing device orcommunication device, data output by an application on the communicationdevice, data input by a user of the device, or the like. For example,data storage can include data, including cookies, and/or othercommunication device data sent by a network device. Data storage canalso include image files, social networking data, location informationdata, or the like, for display and/or use through various applications.

Applications may include computer executable instructions which, whenexecuted by communications device, transmit, receive, and/or otherwiseprocess messages (e.g., SMS, MMS, IM, email, and/or other messages),audio, video, and enable telecommunication with another user of anothercommunication device. Other examples of application programs includecalendars, search programs, email clients, IM applications, SMSapplications, VOIP applications, contact managers, task managers,transcoders, database programs, word processing programs, securityapplications, spreadsheet programs, games, search programs, and soforth.

The foregoing description, for purpose of explanation, has beendescribed with reference to the disclosed embodiment. However, theillustrative discussions above are not intended to be exhaustive or tolimit the invention to the precise forms disclosed. Many modificationsand variations are possible in view of the above teachings. Inparticular while A and B are sometimes referenced as mobile telephones,either or both may be fixed or VOIP telephones or any combinationsthereof. The embodiment was chosen and described in order to bestexplain the principles of the invention and its practical applications,to thereby enable others skilled in the art to best utilize theinvention with various modifications as are suited to the particular usecontemplated.

What is claimed is:
 1. A computer-implemented method executed by one ormore computing devices, comprising: receiving, by at least one of theone or more computing devices, a request over a first telephonyconnection from a first communication device associated with a firstuser identifying a second communication device associated with a seconduser; sending, by at least one of the one or more computing devices, oneor more response communications over the first telephony connection tothe first communication device associated with the first user;disconnecting, by at least one of the one or more computing devices, thefirst telephony connection with the first communication device of thefirst user; and sending, by at least one of the one or more computingdevices, a notification over a second telephony connection to the secondcommunication device associated with the second user, the notificationincluding information sufficient to allow the second user to identifythe first user or the communication device associated with the firstuser.
 2. The computer-implemented method of claim 1, wherein thereceived request is associated with the activation of one or morecharacters on an input interface of the first communication device ofthe first user.
 3. The computer-implemented method of claim 2, whereinat least one of the one or more characters comprises at least one of: a“*” character, a “#” character, and a “0” character.
 4. Thecomputer-implemented method of claim 1, wherein the received request isassociated with one or more financial conditions related to the firstuser.
 5. The computer-implemented method of claim 4, wherein the one ormore financial conditions related to the first user comprise at leastone of: a balance below a preset threshold on an account held by thefirst user, an available credit amount below a preset threshold on anaccount held by the first user, an available balance below a presetthreshold on a calling card utilized by the first user.
 6. Thecomputer-implemented method of claim 5, wherein the preset threshold isequal to the cost of connecting a call between the first user and thesecond user.
 7. The computer-implemented method of claim 1, wherein thereceived request is associated with a type of telephone service accountused by the first user.
 8. The computer-implemented method of claim 1,wherein the received request is associated with one or more factorsrelating to the second user.
 9. The computer-implemented method of claim8, wherein the one or more factors relating to the second user compriseat least one of: the location of the second user, the distance betweenthe second user and the first user, and the telephone service providerof the second user.
 10. The computer-implemented method of claim 1,wherein the received request is associated with one or more telephonenetwork conditions.
 11. The computer-implemented method of claim 10,wherein the one or more telephone network conditions comprise at leastone of: times of peak network traffic, network congestion, network loadconditions, network time of day, and network geographic coverage. 12.The computer-implemented method of claim 1, wherein the one or moreresponse communications comprises a confirmation.
 13. Thecomputer-implemented method of claim 12, wherein the confirmationcomprises at least one of a ring back tone, a device tone, a voiceannouncement, a voice message, an SMS message, an IM message, a datamessage, and an unstructured supplementary service data message.
 14. Thecomputer-implemented method of claim 1, wherein the one or more responsecommunications comprise an options menu, and further comprising:receiving, by at least one of the one or more computing devices, one ormore selections over the first telephony connection of one or more ofthe options in the options menu.
 15. The computer-implemented method ofclaim 14, wherein the notification sent to the second communicationdevice is based, at least in part, on the one or more options selected.16. The computer-implemented method of claim 1, wherein the first orsecond telephony connections comprise at least one of a voice overInternet Protocol connection and a public switched telephone networkconnection.
 17. The computer-implemented method of claim 1, wherein thenotification comprises at least one of a missed call indicator, a voicemessage, an SMS message, an IM message, a data message, and anunstructured supplementary service data message.
 18. Thecomputer-implemented method of claim 1, wherein the notificationincludes information sufficient to allow the second user to request orestablish a connection with the first communication device using thesecond communication device.
 19. An apparatus, the apparatus comprising:one or more processors; and one or more memories operatively coupled toat least one of the one or more processors and having instructionsstored thereon that, when executed by at least one of the one or moreprocessors, cause at least one of the one or more processors to: receivea request over a first telephony connection from a first communicationdevice associated with a first user identifying a second communicationdevice associated with a second user; send one or more responsecommunications over the first telephony connection to the firstcommunication device associated with the first user; disconnect thefirst telephony connection with the first communication device of thefirst user; and send a notification over a second telephony connectionto the second communication device associated with the second user, thenotification including information sufficient to allow the second userto identify the first user or the communication device associated withthe first user.
 20. The apparatus of claim 19, wherein the receivedrequest is associated with the activation of one or more characters onan input interface of the first communication device of the first user.21. The apparatus of claim 20, wherein at least one of the one or morecharacters comprises at least one of: a “*” character, a “#” character,and a “0” character.
 22. The apparatus of claim 19, wherein the receivedrequest is associated with one or more financial conditions related tothe first user.
 23. The apparatus of claim 22, wherein the one or morefinancial conditions related to the first user comprise at least one of:a balance below a preset threshold on an account held by the first user,an available credit amount below a preset threshold on an account heldby the first user, an available balance below a preset threshold on acalling card utilized by the first user.
 24. The apparatus of claim 23,wherein the preset threshold is equal to the cost of connecting a callbetween the first user and the second user.
 25. The apparatus of claim19, wherein the received request is associated with a type of telephoneservice account used by the first user.
 26. The apparatus of claim 19,wherein the received request is associated with one or more factorsrelating to the second user.
 27. The apparatus of claim 26, wherein theone or more factors relating to the second user comprise at least oneof: the location of the second user, the distance between the seconduser and the first user, and the telephone service provider of thesecond user.
 28. The apparatus of claim 19, wherein the received requestis associated with one or more telephone network conditions.
 29. Theapparatus of claim 28, wherein the one or more telephone networkconditions comprise at least one of: times of peak network traffic,network congestion, network load conditions, network time of day, andnetwork geographic coverage.
 30. The apparatus of claim 19, wherein theone or more response communications comprises a confirmation.
 31. Theapparatus of claim 30, wherein the confirmation comprises at least oneof a ring back tone, a device tone, a voice announcement, a voicemessage, an SMS message, an IM message, a data message, and anunstructured supplementary service data message.
 32. The apparatus ofclaim 19, wherein the one or more response communications comprise anoptions menu, and further comprising: receiving, by at least one of theone or more computing devices, one or more selections over the firsttelephony connection of one or more of the options in the options menu.33. The apparatus of claim 32, wherein the notification sent to thesecond communication device is based, at least in part, on the one ormore options selected.
 34. The apparatus of claim 19, wherein the firstor second telephony connections comprise at least one of a voice overInternet Protocol connection and a public switched telephone networkconnection.
 35. The apparatus of claim 19, wherein the notificationcomprises at least one of a missed call indicator, a voice message, anSMS message, an IM message, a data message, and an unstructuredsupplementary service data message.
 36. The apparatus of claim 19,wherein the notification includes information sufficient to allow thesecond user to request or establish a connection with the firstcommunication device using the second communication device.
 37. At leastone non-transitory computer-readable medium storing computer-readableinstructions that, when executed by one or more computing devices, causeat least one of the one or more computing devices to: receive a requestover a first telephony connection from a first communication deviceassociated with a first user identifying a second communication deviceassociated with a second user; send one or more response communicationsover the first telephony connection to the first communication deviceassociated with the first user; disconnect the first telephonyconnection with the first communication device of the first user; andsend a notification over a second telephony connection to the secondcommunication device associated with the second user, the notificationincluding information sufficient to allow the second user to identifythe first user or the communication device associated with the firstuser.
 38. The at least one non-transitory computer-readable medium ofclaim 37, wherein the received request is associated with the activationof one or more characters on an input interface of the firstcommunication device of the first user.
 39. The at least onenon-transitory computer-readable medium of claim 38, wherein at leastone of the one or more characters comprises at least one of: a “*”character, a “#” character, and a “0” character.
 40. The at least onenon-transitory computer-readable medium of claim 37, wherein thereceived request is associated with one or more financial conditionsrelated to the first user.
 41. The at least one non-transitorycomputer-readable medium of claim 40, wherein the one or more financialconditions related to the first user comprise at least one of: a balancebelow a preset threshold on an account held by the first user, anavailable credit amount below a preset threshold on an account held bythe first user, an available balance below a preset threshold on acalling card utilized by the first user.
 42. The at least onenon-transitory computer-readable medium of claim 41, wherein the presetthreshold is equal to the cost of connecting a call between the firstuser and the second user.
 43. The at least one non-transitorycomputer-readable medium of claim 37, wherein the received request isassociated with a type of telephone service account used by the firstuser.
 44. The at least one non-transitory computer-readable medium ofclaim 37, wherein the received request is associated with one or morefactors relating to the second user.
 45. The at least one non-transitorycomputer-readable medium of claim 44, wherein the one or more factorsrelating to the second user comprise at least one of: the location ofthe second user, the distance between the second user and the firstuser, and the telephone service provider of the second user.
 46. The atleast one non-transitory computer-readable medium of claim 37, whereinthe received request is associated with one or more telephone networkconditions.
 47. The at least one non-transitory computer-readable mediumof claim 46, wherein the one or more telephone network conditionscomprise at least one of: times of peak network traffic, networkcongestion, network load conditions, network time of day, and networkgeographic coverage.
 48. The at least one non-transitorycomputer-readable medium of claim 37, wherein the one or more responsecommunications comprises a confirmation.
 49. The at least onenon-transitory computer-readable medium of claim 48, wherein theconfirmation comprises at least one of a ring back tone, a device tone,a voice announcement, a voice message, an SMS message, an IM message, adata message, and an unstructured supplementary service data message.50. The at least one non-transitory computer-readable medium of claim37, wherein the one or more response communications comprise an optionsmenu, and further comprising: receiving, by at least one of the one ormore computing devices, one or more selections over the first telephonyconnection of one or more of the options in the options menu.
 51. The atleast one non-transitory computer-readable medium of claim 50, whereinthe notification sent to the second communication device is based, atleast in part, on the one or more options selected.
 52. The at least onenon-transitory computer-readable medium of claim 37, wherein the firstor second telephony connections comprise at least one of a voice overInternet Protocol connection and a public switched telephone networkconnection.
 53. The at least one non-transitory computer-readable mediumof claim 37, wherein the notification comprises at least one of a missedcall indicator, a voice message, an SMS message, an IM message, a datamessage, and an unstructured supplementary service data message.
 54. Theat least one non-transitory computer-readable medium of claim 37,wherein the notification includes information sufficient to allow thesecond user to request or establish a connection with the firstcommunication device using the second communication device.