Methods and apparatus for returning a call over a telephony system

ABSTRACT

The present invention provides a call-return process and system, wherein a called party can return a missed call to a caller&#39;s private number. A forwarded call is received by a call management system, wherein the forwarded call was originally directed by a caller to a first telephone line associated with a user. The call management system receives call signaling information, including a phone number, associated with the caller. The call management system then determines whether the phone number is a private phone number or a public phone number. If the phone number is private, the call management system notifies the user of the call, and without revealing the caller&#39;s phone number to the user, enables the user to return the caller&#39;s call.

PRIORITY CLAIM

This application is a continuation of U.S. patent application Ser. No. 10/033,020 filed Nov. 1, 2001, now U.S. Pat. No. 6,738,461, the contents of which are incorporated herein in their entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention is related to methods and systems for telecommunications, and in particular, to methods and systems for processing calls.

2. Description of the Related Art

In today's public telephone network there is no convenient way to return a missed call to a private number. Typically, if the called party does not have the caller's phone number, the called party will not be able to return the call. To address this problem, there exist conventional telephony systems that do offer a convenient return call function to a public telephone number. These conventional telephony systems allow a user who misses a call to return the call by entering a predetermined touch tone code, such as *69, but do not offer this feature when the caller has a “private” number, that is, has caller-ID blocking turned on.

SUMMARY OF THE INVENTION

The present invention is related to methods and systems for a “return-call” process. In contrast to many conventional telephony systems, the return call process in accordance with the present invention enables a call to be returned to a “private” calling number that has caller-ID blocking. Further, the present invention allows the return process to be performed without revealing the return call phone number to the person returning the call.

This is in contrast to conventional telephony systems. By way of example, if a missed call on a busy, ring-no-answer, or do-not-disturb condition is answered by a Voice Mail or Internet Call Answering service, conventional telephony systems do not offer a way to return the call if it originated from a private number.

One example embodiment of the present invention will now be described in greater detail. While this example embodiment includes an Internet call answering apparatus and method, the present invention is not so limited. A call to a called party's phone line is forwarded to a call manager system, along with signaling information that includes the calling party's phone number The signaling can be performed using SS7 or other signaling methods that provide caller identification even if the caller has caller-ID blocking on. The call may be forwarded because the called party's phone line is busy, the called party failed to answer the phone, or because the called party has activated a do-not-disturb function.

The call manager system answers the forwarded call. A determination is made from the signaling information as to whether the caller's phone number is “private,” that is, whether the calling party has Caller-ID blocking activated, or whether the phone number is “public,” that is, does not have Caller-ID blocking activated.

The call manager system notifies the called party of the call. The notification can be presented on a web page accessed by the called party's computer terminal over the Internet or other computer network, can be emailed to the called party's email address, or can be transmitted to the called party's computer terminal over the Internet or other computer network upon detecting that the called party is online, whereupon the notification is displayed by a telecommunications client application executing on the computer terminal. If the phone number is public, then the notification informs the called party of the call and displays the calling number or otherwise identifies the caller.

If the call manager determines that the phone number is private, in order to protect the caller's privacy the caller's phone number is either not transmitted with the notification, or is transmitted but is not displayed to the called party. The telecommunications client application then offers to return the call using either the called party's conventional POTs telephone or via the computer terminal, if the computer terminal is VoIP enabled. The return call is then performed in accordance with the called party's selection. If the called party elects to have the call returned using the POTs telephone, then the computer modem dials the phone number provided in the call manager message, and the called party picks up the telephone handset to communicate with the original caller in a normal fashion. If the called party elects to have the call placed using VoIP, then the VoIP software transmits the phone number provided in the call manager message to a VoIP gateway which connects the call to the original caller. The called party can then communicate with the original caller using the computer terminal handset.

Alternatively, to further protect the caller's privacy when the phone number is private and might show up in the call detail in a phone bill, the return call is placed using a bridging operation performed by the call manager. Using this technique, the caller's telephone number does not need to be transmitted to the called party's computer terminal. Rather, the client application, web site, or notified device sends a return call request back to the call manager system identifying the call to bridge. The call manager system then calls the called party's (subscriber's) phone number and the caller's private phone number and bridges the two calls. Because the call was not placed from the called party's (subscriber's) residence, the caller's private telephone number will not be exposed in the subscriber's measured wireline, wireless, or long distance phone bill.

One embodiment of the present invention is a method of performing a return-call operation, comprising: receiving a forwarded call originally directed by a caller to a first telephone line associated with a user; receiving signaling information, including a phone number associated with the caller; determining whether the phone number is one of a private phone number and a public phone number; generating a display message, the display message notifying the user of the call, wherein the display message includes the phone number when the phone number is public, and the display message does not include the phone number when the phone number is private; and enabling the user to return the call to the caller without revealing the phone number to the user when the phone number is private.

Another embodiment of the present invention is a method of processing a call the method comprising: receiving a first call from a caller at a call management system, wherein the first call had been intended for a first telephone line associated with a called party and forwarded to the call management system; receiving at the call management system a private phone number associated with the caller; initiating the transmission of a message over a computer network to a computer terminal used by the called party, the message configured to provide a notification related to the call without displaying the private phone number; and enabling the called party to return the call to the caller.

Still another embodiment of the present invention is a method of performing a return-call operation, comprising: receiving a first plurality of forwarded calls originally directed by a corresponding plurality of callers to a first telephone line associated with a user; receiving signaling information for the plurality of callers, the signaling information including phone numbers corresponding to the callers; determining for each of the first plurality of phone numbers whether the phone number is one of a private phone number and a public phone number; generating a display message, the display message notifying the caller of the calls, wherein the display message includes for each of the first plurality of calls the corresponding phone number when the corresponding phone number is public, and the display message does not include the corresponding phone number when the corresponding phone number is private; receiving an instruction from the user to return one of the plurality of calls, wherein the one of the plurality of calls is associated with a first private phone number; and initiating the call return to the first private phone number at least partly in response to receiving the instruction.

Yet another embodiment of the present invention is a call processing apparatus, comprising: a first instruction configured to answer a first call from a caller, wherein the first call was directed to a first telephone line associated with a first user and was forwarded to a second telephone line; a second instruction configured to receive a private phone number associated with the caller; and a third instruction configured to transmit a message over a network to a computer terminal associated with the first user, the message configured to provide a notification of the first call without revealing the private phone number to the first user; and a fourth instruction configured to return the call to the caller without revealing the private phone number to the first user in response to a command from the first user.

Thus, the present invention provides systems and methods for a call-return system that enables an online user to be notified of a missed call and to initiate a return-call process using a computer terminal, even when the caller phone number is private.

BRIEF DESCRIPTION OF THE DRAWING

These features will now be described with reference to the drawings summarized below. These drawings and the associated description are provided to illustrate preferred embodiments of the invention, and not to limit the scope of the invention.

FIG. 1 illustrates an example telecommunications system in accordance with one embodiment of the present invention.

FIG. 2 illustrates an example return-call process in accordance with the present invention.

FIG. 3 illustrates an example process for returning a call using an encrypted phone number.

FIG. 4 illustrates an example return-call notification.

Throughout the drawings, like reference numbers are used to reference items that are identical or functionally similar.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

The present invention is related to methods and systems for a “return-call” process. In contrast to many conventional telephony systems, the return call process in accordance with the present invention enables a missed call to be returned to a “private” phone number without revealing the private number.

By way of example, a user may not be able to take an incoming call because the user's line is busy, the user is not home, or because the user does not want to be disturbed. To better manage such calls, the user's telephone line can be provisioned through the local phone company to forward incoming calls to a call manager system. The call manager system receives signaling information corresponding to the forwarded call. The signaling information includes the calling party's phone number even if the calling party's number is private.

The call manager system transmits a communication, including the caller phone number and a call-received notification, over a computer network to a computer terminal associated with the user. The notification is displayed on the user's computer terminal and informs the user that a call was received from the caller. If the caller phone number is public, the number is displayed as well. However, if the caller's phone number is private, the caller's number is not displayed to the user but is stored in the user's computer terminal memory for later use in returning the call. Upon receipt of the notification, the user can elect to return the call. In response to a user command, the computer terminal initiates the call using the stored caller phone number, still without displaying the phone number to the user.

Alternatively, rather than including the caller's private phone number in the communication to the user, the communication only includes a notification that a call was received. If the user elects to return the call, the call manager performs a call bridging operation without revealing the caller's private phone number to the user. This approach ensures that the user's phone bill will not include the caller's phone number. Further, because the phone number is not provided to the user, the user cannot improperly derive the caller's phone number from the call manager communication.

Throughout the following description, the term “Web site” is used to refer to a user-accessible network site that implements the basic World Wide Web standards for the coding and transmission of hypertextual documents. These standards currently include HTML (the Hypertext Markup Language) and HTTP (the Hypertext Transfer Protocol). It should be understood that the term “site” is not intended to imply a single geographic location, as a Web or other network site can, for example, include multiple geographically distributed computer systems that are appropriately linked together. Furthermore, while the following description relates to an embodiment utilizing the Internet and related protocols, other networks, such as networked interactive televisions, and other protocols may be used as well. In addition, unless otherwise indicated, the functions described herein are preferably performed by executable code and instructions running on one or more general-purpose computers. In addition, a communications line is referred to as “busy” when the communication line is being utilized in such a way that a conventional incoming call will not be connected to the communications line. Thus, for example, if a user is utilizing a conventional line capable of only conducting one of a conventional voice session and a data session at a time for a data session, the line will be busy.

FIG. 1 illustrates an example telecommunications system 100 that can be used in accordance with the present invention. As illustrated, the telecommunications system 100 includes a plurality of user telephone stations. The telephone stations can be wired, such as stations 106, 108. However, the present invention is not limited to use with wireline phones. For example, the present invention can be used with wireless stations, such as stations 102, 104. The wired stations 106, 108 are connected via telephone lines 118, 120 to a PSTN 114 configured to process calls from fixed or standard telephone stations. The wired stations 106, 108 can be conventional POTS (Plain Old Telephone System) telephones.

The telephone lines 118, 120 may be shared with one or more computer terminals 110, facsimile machines or the like. The computer terminal 110 can be a personal computer having a monitor, keyboard, a disk drive, and a modem, such as a standard V.90 56K dial-up modem. The modem can optionally be configured to dial-up a number under control of an application, such as a contact manager application or telecommunications client application phone dialer, stored and executing on the computer terminal 110. In addition, the computer terminal 110 can be an interactive television, a networked-enabled personal digital assistant (PDA) or the like. Optionally residing and executing on the computer terminal 110 is a telecommunications client application 112. The telecommunications client application 112 is used to provide enhanced communication services, as discussed in greater detail below. The telecommunications client application 112 is connected to and communicates with a call manager system 124 via the Internet 126 or the like. The telephone lines 118, 120 can be used to establish a dial-up connection for computer terminals, such as terminal 110 via the modem, to an Internet Service Provider (ISP).

In addition, the computer terminal 110 can be equipped with VoIP (Voice over Internet Protocol) software 138 and a handset 140, including a microphone and speaker, allowing voice communications to be conducted over the Internet 126 using Internet Protocol. VoIP communicates data via packet switching, which opens a connection just long enough to send a packet of data, including digitized voice data. In particular, the computer terminal 110 divides the voice data into small packets. Each packet includes a destination address informing the network where to send the packet. If the receiving station is also a VoIP terminal, then when the receiving terminal receives the packets, VoIP software executing on the receiving terminal reassembles the packets into the original data stream. The data stream is then converted to a voice signal. If the receiving station is a conventional telephone, then a VoIP gateway converts the packets into a voice signal which is then connected to the conventional telephone.

In one embodiment, the VoIP process is performed using the H.323 standardized protocol established by the International Telecommunications Union (ITU). Advantageously, H.323 provides specifications for real-time, interactive videoconferencing, data sharing and audio applications such as IP telephony. Alternatively, the Session Initiation Protocol (SIP), established by the Internet Engineering Task Force (IETF), can be used. SIP is generally more efficient than the H.323 protocol as SIP is specifically intended for IP telephony.

In particular, the telephone stations 106, 108 and/or computer terminal 110 are coupled via the fixed PSTN 114 to corresponding local exchange switches 136, 142, used to connect and route calls, and to and from local exchange switches and remote exchanges via tandem switching offices (the fixed PSTN). The telephone stations are connected to a telephone server system 122 in the call manager system 124, coupled to the fixed PSTN 114 through a trunk system 134. Thus, advantageously the call manager system 124 does not have to be coupled to the same local exchange as the calling or called terminal. Indeed, the call manager system 124 can be located in a different country than the called and calling parties and does not have to be positioned between the local exchange switch and the calling station.

The call manager system 124 optionally hosts a Web site used by subscribers of the call manager system 124 to setup and manage their accounts and to view a return call web page, such as that illustrated in FIG. 4. Other embodiments of the call manager system 122 are described in U.S. patent application Ser. No. 09/539,375, filed Mar. 31, 2000, the contents of which are incorporated herein in their entirety by reference. The call manager system 122 is optionally configured as, or to appear as, a telephone central office and can interface with the PSTNs 114, 116 as a Class 5 switch.

The telephone trunk system 134 has associated signaling channels. The present invention is not limited to a particular signaling convention. For example, as illustrated, the present invention can be utilized with a Common Channel Signaling system, such as Signaling System 7 (SS7), having separate voice/user data and signaling channels. In addition, the present invention can be used with other signaling methods, such as ISDN, Advanced Intelligent Network (AIN), and/or inband signaling. The selected signaling system provides caller identification, wherein the caller's telephone number is provided to the called party. Thus, for example, ANI (Automatic Number Identification) information is provided, wherein the caller's local telephone company transmits the calling or billing telephone number along with the call.

The wireless stations 102, 104 are coupled to a PSTN 116, configured to handle mobile, wireless stations via wireless communications towers configured to broadcast and receive cellular radio frequency communications. The wireless towers can be, for example, CDMA or GSM cellular mobile base stations. The PSTN 116, in turn, is connected to the call manager system 124 via the trunk system 134. The call manager system 124 can communicate via the Internet mobile 128 with other Internet capable devices, including wireless stations 102, 104, configured to receive Internet communications, including, but not limited to, text messages.

When a user attempts to place a call via station 102 to station 108, the call is routed through a mobile base station system to the PSTNs 114, 116. If the line 120 for station 108 is busy, not answered or has a do-not-disturb indication, the PSTN 114 forwards the call to a local or toll-free number associated with the call manager system 124. The call manager 124 then processes the call as described in greater detail below.

The call manager system 124 manages communications with the telecommunications client application 112 and with forwarded calls. The call manager can interact with callers and called parties through voice prompts, voice commands, and dtmf touch-tone entries. The call manager system 124 can be configured to perform additional functions, such as acting as a telephone answering system that answers call, plays outgoing messages, records incoming messages, and bridges calls.

One such Internet answering system is operated by CallWave, Inc. As is well known in the field of Internet telecommunications, CallWave, Inc. provides an Internet answering service that works with the “Call Forward On Busy” feature of a standard phone line to answer calls while the subscriber is online and is using the phone line to access the Internet. Once activated, callers no longer get annoying busy signals when the subscriber is online. Instead, callers hear a brief greeting after which they can leave a short message. The recording can be streamed in substantially real-time or sent within seconds after recording has completed to the subscriber over the Internet.

The call manager system 124 is connected to the Internet 126, 128 as a computer host. As previously discussed, the call manager system 124 can also host a Web site used to manage subscriber accounts and to provide a call return interface. When a user or subscriber connects to the Internet using, for example, a dial-up ISP, the telecommunications client application 112 executing on the subscriber's computer terminal can make the subscriber's online presence known to the call manager system 124. In particular, the call manager system 124 includes a presence detection system 130 that communicates with the telecommunications client application 112 executing on the computer terminal 110 to determine whether the computer 110 is online. Presence detection can be performed by the presence detection system 130 polling or pinging the computer terminal 110 via the telecommunications client application 112, or by the telecommunications client application transmitting an “I'm alive” message and subsequent periodic “keep alive” messages to the presence detection system 130. The client application 112 is optional, and is not needed in some embodiments. The call manager system 124 further includes an encryption server 144, which is described in greater detail below.

A user can access a data network, such as the Internet 126, by establishing a telephone dial-up connection to an ISP. The Internet 126 is coupled to the PSTNs 114, 116, via a trunk or backbone system 132. Text, graphic and voice communications can be communicated between the call manager system 122 and the computer terminal 110. For example, communications are transmitted from the call manager system 122 over the PSTN 114, via the trunk system 132 to the computer terminal 110 via the Internet 126. Similarly, communications are transmitted from the computer terminal 110, over the Internet 126, through trunk system 132 to the to the telephone and presence servers 122, 130. The user is preferably a registered subscriber to the call manager system 124.

The example telecommunications system illustrated in FIG. 1 can be used with one embodiment of the return-call process in accordance with the present invention. FIG. 2 illustrates an example return-call process 200, wherein a called party, referred to as Party A, misses a call from a calling party, referred to as Party B, and then returns Party B's call. It is assumed for the purposes of this example that the called party's line is provisioned with “Call Forward On Busy,” call forward on “Ring-No-Answer”, and/or call forward when the user has activated a “do-not-disturb” feature.

Beginning at start state 202, the process 200 proceeds to state 204. At state 204, Party B calls Party A's phone line using, by way of example, the wired station 106 illustrated in FIG. 1. At state 210, Party B's call is forwarded to the call manager system 124 over the PSTN, such as PSTN 114, along with signaling information. The signaling information includes Party B's phone number via ANI (Automatic Number Identification). Because Party B's call is being forwarded to the call manager system, the call manager system infers that Party 's line is busy or that Party A is otherwise not available to take the call. Further, because the call manager is configured as a central telephone office and receives SS7 signaling information, even if Party B has caller-ID blocking on, so that Party B's telephone number is designated as “private,” the call manager receives Party B's telephone number. The “private” designation is provided by a presentation indicator associated with each call that designates the calling party as private or public.

In one embodiment, Party A's line is configured so that calls are forwarded over the PSTN to either a local telephone number or a toll-free number associated with the call manager system when Party A's line is busy. The toll-free number may be an “800” or “888” number, by way of example. Because Party B's call is being forwarded to a toll-free number, even if Party B has caller-ID blocking on, and even if the call manager system is not configured as a central office, the calling number is transmitted to the call manager system.

At state 208, the call manager system answers Party B's call. Party B is provided the option of recording a voice message on the call manager system for delivery to Party A. At state 209, the call manager can also ask the Party B if Party A is to be notified of the call so that Party A can return the call. In this embodiment, if the caller declines, then no return call notification is provided to Party A, and the process 200 ends. If Party B does want a return call notification provided to Party A, the process 200 proceeds to state 210.

A determination is made at state 210 as to whether Party B's number is “private,” with Caller-ID blocking activated. If Party B's number is not “private,” it is designated as “public.” If Party B's number is public, then at state 212 the call manager transmits a message to Party A's computer terminal notifying Party A that Party B has attempted to call Party A, the message including Party B's phone number. In one embodiment, a telecommunications client application executing on Party A's computer terminal displays the message, including Party B's phone number, on the computer terminal's monitor. Optionally, the call manager waits to receive a presence indication, in the form of a log-on or a “keep alive” communication from the client application before transmitting the message. Alternatively or in addition, Party A can access a “missed calls” page, such as that illustrated in FIG. 4, from a web site operated in association with the call manager. Further, the call manager can email the message to Party A.

Optionally, the call manager can access a reverse number database or a contact database associated with Party A to locate a name or other identifier associated with Party B's phone number. If a corresponding name or other identifier is located, it can be included for display in the message provided to Party A. The contact database can be stored on Party A's terminal or the call manager system.

In addition, if Party B recorded a voice message, that message can be transmitted or streamed to Party A's computer terminal for playback in substantially real-time. At state 214, the telecommunications client application or call manager system inspects Party A's contact database to determine if a record exists for Party B's number. If not, the telecommunications client application or call manager offers to create a contact record for Party B. If Party A agrees to have a contact record created for Party B, the telecommunications client application or call manager automatically populates the contact record with Party B's phone number, and if available, name, and enables Party A to edit or add information to the record. Party A can then instruct that the contact record be saved and closed. Party A can later place calls to Party B using the stored contract information.

If Party B's number is “private,” the process 200 proceeds from state 210 to state 220. As discussed above, even if Caller-ID blocking is on, the call manager system still receives Party B's phone number. However, in order to protect the caller's privacy and if needed to comply with federal or other regulations, the call manager system notifies Party A that a call was received, but does not provide for display Party B's phone number unless authorized by the calling party in response to a request from the call manager system. The authorization can be provided through one or more voice prompt interactions. However, if Party B recorded a voice message, the call manager system transmits the voice message to Party A's computer for playback by Party A.

Proceeding to state 222, the telecommunications client application or call manager system inspects Party A's contact database to determine if a record exists for Party B's number. If not, the telecommunications client application or call manager system offers to create a contact record for Party B. If Party A agrees to have a contact record created for Party B, the telecommunications client application or the call manager encryption server 144 illustrated in FIG. 1, automatically encrypts the caller's number with an encryption key so that Party A cannot read the number, and populates the record with Party B's encrypted phone number, and other available, non-private information. The encryption key is stored on a call manager encryption server so that the encrypted number can be later decrypted. Party A can edit or add information to the record. For example, Party A can tag the encrypted number with a text identifier, such as the caller's name, to help Party A be able to later locate and call Party B using the contact database record. Party A can then instruct that the contact record be saved and closed. Party A can later place calls to Party B using the stored contact information.

Alternatively, the private phone number can be stored on the call manager system server and an index or pointer to the phone number is stored on Party A's computer system. When Party A wants to later call Party B, Party A initiates the transfer of the index to the call manager, which then transfers the phone number to Party A's telecommunications client application. The telecommunications client application then initiates a call to Party B without displaying the phone number to Party A. A calling process using the encrypted phone number is described below with reference to FIG. 3.

Proceeding to state 216, Party A can be offered a choice of returning Party B's call using Party A's conventional POTs telephone, via Party A's VoIP-enabled terminal, or by a call bridging operation performed by the call manager. In one example method, if Party B's number is designated as private, Party A may be limited to returning Party B's call by the call bridging operation.

If Party A elects to have the call placed using a conventional telephone, then the process proceeds to state 218, where a call is initiated over Party A's telephone. In particular, the computer modem dials the phone number provided in the call manager message, and the Party A picks up the telephone handset to talk with Party B when Party B answers.

If Party A elects to have the call placed using VoIP, then the process proceeds to state 224, where a call is initiated by Party A's computer terminal. The VoIP software transmits the phone number provided in the call manager message to a VoIP gateway that converts the call data from packets into a form suitable for telephonic communications with the caller's phone, and connects the call via the PSTN to the original caller. The called party can then communicate with the original caller using the computer terminal handset. Using VoIP to return the call avoids having Party B's phone number appear on Party A's phone bill.

If Party A elects to have the call placed using a bridging operation, then the process proceeds to state 226, where a call is bridged between Party A and Party B by the call manager. A notification is sent from Party A's client application, call manager web-site, or other notification device of Party A's desire to return a call to Party B. Included in Party A's request is a unique identifier, such as a database pointer or index, that allows the call manager system to determine Party B's phone number from a database of stored/encrypted numbers. The call manager system first calls Party A's phone number which is specified in Party A's request. The call can be placed, by way of example, as a POTs or VoIP call. Next, the call manager system calls Party B's line and bridges Party A with Party B. Alternatively, the call manager system first calls Party B's phone number, then the call manager system calls Party A's line and bridges Party A with Party B. Other bridging techniques which are well known to those of ordinary skill in the industry, and hence not explained in detail herein, can be used as well. The process ends at state 232. Alternatively, rather than asking Party A to select whether the call is to be placed using the telephone or using VoIP, the telecommunications client application detects if Party A is online. If so, the call is automatically placed using VoIP. If Party A is offline, the call is automatically placed via the telephone, with the computer modem performing the dial-up operation.

If multiple calls to Party A are forwarded to the call manager system, a log is kept of each call. By way of example, the log includes each caller's phone number, the time of the call, and whether the caller recorded a message. This information is then used to generate a missed/return-call notification for Party A, as discussed in greater detail below with respect to FIG. 4.

FIG. 3 illustrates an example process 300 for calling a called party whose phone number is stored on the calling party's computer terminal in an encrypted format and hence unknown to the calling party. Beginning at state 302, when Party A wants to place a call to Party B, Party A opens the contact record stored on Party A's computer system, and instructs that a call be placed to Party B. At state 304, the telecommunications client application retrieves the corresponding encryption key from the call manager system and decrypts the phone number. Alternatively, the call manager retrieves the encrypted phone number from the computer system, decrypts the phone number using the encryption key, and transmits the decrypted phone number back to the computer system. At state 306 the call is placed using the decrypted phone number, but without revealing the encrypted phone number to Party A.

In another embodiment, rather than storing Party B's phone number on Party A's computer terminal, the phone number is instead stored on the call manager system and a pointer to the phone number is stored on Party A's computer terminal. When Party A wants to call Party B, the client application passes the number to the call manager system, which then performs a call bridging operation between Party A and Party B. This ensures that Party B's phone will not be displayed on Party A's phone bill.

FIG. 4 illustrates an example missed/return-call notification presented via a browser to a called party. The browser can be executing on a computer terminal, such as a Wireless Application Protocol (WAP)-enabled phone, a PDA or the like. The notification can be accessed by supplying the appropriate URL to the browser and optionally providing log-on information, such as a user name and a password. In addition or alternatively, the missed/return-call notification can also be transmitted to the telecommunications client application discussed above for display on the computer terminal.

The notification lists missed calls, including the caller identity when known, the caller's phone number, when public, the time of the call, and whether the caller left a message. If caller's phone number is “private,” then as discussed above, the phone number is not displayed to the called party. Instead, the phrase “Private Number” or the like is displayed. If a contact record has been previously stored in the called party's database, as previously discussed with respect to FIG. 2, then a text message entered in association with the encrypted private number is displayed. In the example illustrated in FIG. 4, the name “Jane Doe” is a text message previously stored by the called party in association with the encrypted private number.

When a called party clicks on the caller's name, phone number, or the phrase “Private Number,” a return call is initiated by the called party's computer system as described above with reference to FIGS. 2 and 3. If the called party clicks on or otherwise activates the “playback” link, the message left by the caller will be played back by the computer system to the called party. Alternatively, the messages can be played back by the called party's terminal in substantially real-time as the messages are being recorded so long as the messages do not overlap in time.

Thus, as described above, the present invention provides systems and methods for a call-return system that enables an online user to be notified of a missed call and to initiate a return-call process using a computer terminal, even when the caller phone number is private.

Although this invention has been described in terms of certain preferred embodiments, other embodiments that are apparent to those of ordinary skill in the art are also within the scope of this invention. 

1. A method of performing a return-call operation to a caller's private number so as not to reveal the private number to a called party, the method comprising: receiving at a call management system a call from a caller, the call intended for a user; receiving signaling information, including a phone number associated with the caller; determining whether the phone number is a private phone number based on the signaling information; when the phone number is a private phone number, causing a display message to be presented to the user, the display message notifying the user of the call, wherein the display message does not include the private phone number; storing the private phone number in computer readable memory, wherein the user is prevented from viewing the phone number in an unencrypted form; and enabling the user to return the call to the private phone number without revealing the private phone number using a call bridging operation performed by the call management system, to thereby prevent the caller's private phone number from appearing on a telephone bill of the user as a result of the return call.
 2. The method as defined in claim 1, wherein the call bridging operation comprises: first calling the user; then calling the caller; and bridging the calls to the user and the caller.
 3. The method as defined in claim 1, wherein the call bridging operation comprises: first calling the caller; then calling the user; and bridging the calls to the user and the caller.
 4. The method as defined in claim 1, further comprising, when the phone number is not private, causing a display message to be presented to the user, the display message notifying the user of the call and displaying the caller phone number.
 5. The method as defined in claim 1, wherein the call was forwarded to the call management system at least partly as a result of one of a Call Forward On Busy operation, a call forward on Ring-No-Answer operation, or a call forward on Do-Not-Disturb operation.
 6. The method as defined in claim 1, wherein the display message is transmitted by the call management system to a computer terminal associated with the user, wherein the computer terminal is one of a personal computer, an interactive television, or a networked-enabled personal digital assistant (PDA).
 7. The method as defined in claim 1, further comprising: storing the private phone number in a call management system database; and storing a pointer to the stored private phone number on a computer terminal associated with the user, wherein the computer terminal is configured to transmit the pointer to the call management system in order to call the stored private phone number without revealing the stored private phone number to the user.
 8. The method as defined in claim 1, further comprising enabling the user to return the call via a computer modem, wherein the computer modem dials the phone number and the user uses a POTs phone to converse with the caller.
 9. The method as defined in claim 1, further comprising: in response to the call management system receiving the call, enabling the caller to record a voice message; and transmitting the recorded voice message to a computer terminal associated with the user.
 10. The method as defined in claim 1, further comprising: in response to the call management system receiving the call, enabling the caller to provide a voice message; and streaming the voice message to a computer terminal associated with the user in substantially real time.
 11. The method as defined in claim 1, wherein the user is a call management system subscriber.
 12. The method as defined in claim 1, wherein the call is returned using a POTs system.
 13. The method as defined in claim 1, wherein the signaling information includes Advanced Intelligent Network (AIN) signaling information.
 14. The method as defined in claim 1, wherein the signaling information includes SS7 signaling information.
 15. The method as defined in claim 1, wherein the signaling information includes ISDN signaling information.
 16. The method as defined in claim 1, further comprising: receiving from the user a caller identifier for the caller; storing the caller identifier in association with the caller phone number without revealing the caller phone number to the user; receiving a second call from the caller; and providing the user with a notification of the second call without revealing the caller phone number to the user, the second call notification including the caller identifier.
 17. The method as defined in claim 1, further comprising: receiving a second call intended for a second user, the second call including signaling information providing the originating phone number associated with the second call; and causing the originating phone number associated with the second call to be transmitted to a VoIP system without revealing the originating phone number associated with the second call to the second user, to thereby connect the second user to originating phone number associated with the second call using VoIP.
 18. The method as defined in claim 17, further comprising utilizing H.323 protocol to provide VoIP communication.
 19. The method as defined in claim 17, further comprising utilizing Session Initiation Protocol (SIP) to provide VoIP communication.
 20. The method as defined in claim 17, wherein the second user is offered a choice of returning the call via a POTS telephone and a VoIP communications apparatus.
 21. A method of performing a return-call operation to a caller's private number so as not to reveal the private number to a called party, the method comprising: receiving from a caller a call intended for a user; receiving signaling information, including a private phone number associated with the caller; generating a message notifying the user of the call, wherein the message notification does not include the private phone number; enabling the user to return the call to the private phone number without revealing the private phone number to the user; and storing the private phone number in computer readable memory, wherein the user is prevented from viewing the stored private phone number in unencrypted form, and wherein the call is returned to the caller's private phone number using a call bridging operation to thereby inhibit the caller's private phone number from appearing on a telephone bill of the user as a result of the return call.
 22. The method as defined in claim 21, further comprising: receiving from the user an identifier for the caller; storing the identifier in association with the caller phone number; receiving a second call from the caller; and providing the user with a notification of the second call without revealing the caller phone number, the second call notification including the caller identifier.
 23. The method as defined in claim 21, further comprising causing a user-created identifier associated with the caller to be presented to the user via the notification without revealing the caller's private phone number.
 24. The method as defined in claim 21, further comprising returning the call using Voice over Internet Protocol (VoIP).
 25. The method as defined in claim 21, wherein the call was received by a call management system at least partly as a result of one of a Call Forward On Busy operation, a call forward on Ring-No-Answer operation, and a call forward on Do-Not-Disturb operation.
 26. The method as defined in claim 21, wherein the message is transmitted for display to a computer terminal associated with the user.
 27. The method as defined in claim 21, wherein the bridging is performed by calling the user, calling the caller, and bridging the calls to the user and the caller.
 28. The method as defined in claim 21, further comprising: storing the phone number in a central call manager system database; and storing a pointer to the stored phone number on a computer terminal associated with the user.
 29. The method as defined in claim 21, further comprising: receiving a pointer to the stored private phone number from a user terminal; and calling the stored private phone number without revealing the stored private phone number to the user.
 30. The method as defined in claim 21, further comprising enabling the user to return the call via a computer modem, wherein the computer modem dials the phone number and the user uses a POTs phone to converse with the caller.
 31. The method as defined in claim 21, further comprising: in response to receiving the call intended for the user, enabling the caller to record a voice message; and transmitting the recorded voice message to a computer terminal associated with the user.
 32. The method as defined in claim 21, further comprising: at least partly in response to receiving the call, enabling the caller to provide a voice message; and streaming the voice message to a computer terminal associated with the user in substantially real time.
 33. The method as defined in claim 21, wherein the call is returned using a POTs system.
 34. The method as defined in claim 21, wherein the signaling information includes Advanced Intelligent Network (AIN) signaling information.
 35. The method as defined in claim 21, wherein the signaling information includes ISDN signaling information.
 36. The method as defined in claim 21, wherein the signaling information includes SS7 signaling information.
 37. The method as defined in claim 21, further comprising: receiving a second call intended for a second user, the second call including signaling information providing the originating phone number associated with the second call; causing the originating phone number associated with the second call to be transmitted to a VoIP system without revealing the originating phone number associated with the second call to the second user; and causing the second user to be connected to a terminal associated with the second call's originating phone number using VoIP.
 38. The method as defined in claim 21, wherein the user is offered a choice of returning the call via one of a POTS telephone and a VoIP communications apparatus.
 39. A method of processing a call from a caller with a private number to a first user without revealing the private number to the first user, the method comprising: receiving at a call management system a first call from a caller and an associated private phone number, wherein the first call is intended for a first user; storing the private phone number in computer readable memory, wherein the user is prevented from viewing the phone number in an unencrypted form; initiating the transmission of a message over a computer network to a computer terminal used by the first user, the message configured to provide a notification related to the call without displaying the private phone number to the first user; and enabling the first user to return the call to the private phone number without revealing the private phone number to the first user and without the private phone number appearing on the first user's phone bill.
 40. The method as defined in claim 39, further comprising: receiving a second call intended for the first user from a second caller at the call management system; receiving a public phone number associated with the second caller; transmitting a second message over the computer network to the computer terminal, the second message configured to provide a notification related to the second call; and causing the display of the public phone number to the first user.
 41. The method as defined in claim 39, wherein enabling the first user to return the call to the caller without revealing the private phone number to the first user further comprises bridging calls between the caller and the first user.
 42. The method as defined in claim 41, wherein bridging is performed by calling the first user, calling the caller, and then bridging the calls to the first user and the caller.
 43. The method as defined in claim 39, further comprising: storing the private phone number in computer readable memory associated with the call management system; and storing a pointer to the stored private phone number on the first user's computer terminal, wherein the computer terminal is configured to cause a second call to be placed to the stored private number without revealing the stored private number to the first user by transmitting the pointer over the computer network to the call management system, wherein the call management system places the second call.
 44. The method as defined in claim 39, wherein the private number is received by the call management system via Advanced Intelligent Network (AIN) signaling.
 45. The method as defined in claim 39, wherein the private number is received by the call management system via ISDN signaling.
 46. The method as defined in claim 39, wherein the private number is received by the call management system via SS7 signaling.
 47. The method as defined in claim 39, wherein the first call was forwarded to the call management system via a toll-free number.
 48. The method as defined in claim 39, further comprising: enabling the caller to record a voice message in response to the call management system receiving the first call; and transmitting the recorded voice message to the computer terminal associated with the first user.
 49. The method as defined in claim 39, wherein the caller has activated caller-ID blocking.
 50. The method as defined in claim 39, further comprising: providing the first user an identifier associated with the caller without revealing the caller's phone number at least partly in response to determining that the caller's phone number is private, wherein the identifier was previously defined by the first user.
 51. The method as defined in claim 39, wherein the computer terminal is one of a personal computer, an interactive television, and a networked-enabled personal digital assistant (PDA).
 52. The method as defined in claim 39, further comprising: at least partly in response to receiving the first call, enabling the caller to provide a voice message; and streaming the voice message to the computer terminal in substantially real time.
 53. The method as defined in claim 39, wherein the first call is returned using a POTs system.
 54. The method as defined in claim 39, further comprising: receiving a first user specified identifier for the caller; storing the identifier in association with the caller phone number; receiving a second call from the caller; and providing the first user with a notification of the second call without revealing the caller phone number, the second call notification including the caller identifier.
 55. The method as defined in claim 39, further comprising: receiving a second call intended for a second user, the second call including signaling information providing the originating phone number associated with the second call; asking the second user if the second user wants to return the second call without revealing to the second user the originating phone number associated with the second call; and causing the originating phone number associated with the second call to be transmitted to a VoIP system without revealing the originating phone number associated with the second call to the second user, to thereby connect the second user to originating phone number associated with the second call using VoIP.
 56. The method as defined in claim 55, further comprising utilizing H.323 protocol to provide VoIP communication.
 57. The method as defined in claim 55, further comprising utilizing Session Initiation Protocol (SIP) to provide VoIP communication.
 58. The method as defined in claim 39, wherein the first user is offered a choice of returning the first call via a POTS telephone and a VoIP communications apparatus.
 59. A method of returning a call to a private number so as not to reveal the private number to a called party, comprising: receiving a call intended for a first user, the call including signaling information providing the originating phone number; determining if the originating phone number is private; when the originating phone number is private; storing the private phone number in computer readable memory, wherein the user is prevented from viewing the phone number in an unencrypted form; enabling the first user to return a call, without revealing the private originating phone number to the first user; and causing the private originating phone number to be transmitted to a VoIP system without revealing the private originating phone number to the first user, to thereby connect the first user to the private originating phone number using VoIP.
 60. The method as defined in claim 59, wherein the first user is offered a choice of returning the call via a POTS telephone and a VoIP communications apparatus.
 61. The method as defined in claim 59, further comprising utilizing H.323 protocol to provide VoIP communication.
 62. The method as defined in claim 59, further comprising utilizing Session Initiation Protocol (SIP) to provide VoIP communication.
 63. The method as defined in claim 59, wherein the first user communicates with the caller using a computer terminal handset.
 64. The method as defined in claim 59, further comprising: determining if the first user is online via a computer terminal; and at least partly in response to determining that the first user is online, automatically connecting the first user to the private originating phone number using VoIP.
 65. The method as defined in claim 59, wherein the bridging operation performed by the call management system to enable the user to return the call received at the call management system further comprises: the call management system placing an outcall to the caller; and bridging the outcall to the caller with a call between the user and the call management system.
 66. The method as defined in claim 59, wherein the call management system interfaces with the PSTN as a Class 5 switch.
 67. The method as defined in claim 59, the method further comprising enabling the user to create a contact record for the caller without visually providing the private caller phone number to the user, wherein the user can place calls to the caller via the contact record.
 68. A method of performing a call operation for a call associated with a caller private phone number, the method comprising: receiving from a caller a call intended for a user; receiving signaling information, including a private phone number associated with the caller; storing the private phone number in computer readable memory, wherein the user is prevented from viewing the phone number in an unencrypted form; notifying the user of the call, wherein the notification does not include the private phone number; enabling the user to call the private phone number without revealing the private phone number to the user; and storing the private phone number in computer readable memory without providing the private phone number to the user, wherein the call to the caller's private phone number is performed using a call bridging operation, and the caller's private phone number does not appear on a telephone bill of the user as a result of the call to the caller's private phone number.
 69. The method as defined in claim 68, the method further comprising receiving a caller identifier for the caller provided by the user; storing the caller identifier in association with the private caller phone number without revealing the private caller phone number to the user; receiving a second call from the caller; and providing the user with a notification of the second call without revealing the private caller phone number to the user, the second call notification including the user provided caller identifier.
 70. The method as defined in claim 69, wherein the user provided call identifier is stored in a database remote from the user.
 71. The method as defined in claim 69, wherein the user provided call identifier is stored on a terminal associated with the user.
 72. The method as defined in claim 68, the method further comprising enabling the user to assign an identifier to the caller which is stored in computer readable memory, wherein the user can call the caller via the identifier, without the private caller phone number being revealed to the user.
 73. The method as defined in claim 68, wherein the bridging operation further comprises: placing an outcall to the caller via a call processing system; and bridging the outcall to the caller with a call between the user and the call processing system.
 74. The method as defined in claim 68, further comprising: enabling the caller to record a voice message via the call; and providing the user with access to the voice message via a computer terminal.
 75. The method as defined in claim 68, further comprising: enabling the caller to record a voice message via the call; and providing the user with access to the voice message via an interactive television.
 76. The method as defined in claim 68, wherein the user is offered a plurality of communication method choices for calling the caller.
 77. The method as defined in claim 68, the method further comprising enabling the user to select from a plurality of terminals that is to be used to call the caller, the plurality of terminals including a POTS telephone or a VoIP communications device.
 78. The method as defined in claim 68, the method further comprising enabling the creation of a contact record for the caller without providing the private caller phone number to the user, wherein the contact record can be used to call the caller.
 79. A method of performing a call operation with respect to a private phone number, the method comprising: receiving from a caller a call intended for a user; receiving signaling information, including a private phone number associated with the caller; recording a voice message from the caller; notifying the user of the call, wherein the notification does not include the private phone number; enabling the user to place a call to the private phone number without revealing the private phone number to the user; and storing the private phone number in the call processing system, wherein the user is prevented from viewing the private phone number in an unencrypted form, wherein the call is placed to the caller's private phone number using a call bridging operation and the caller's private phone number does not appear on a telephone bill of the user as a result of the call to the private phone number.
 80. The method as defined in claim 79, wherein the call bridging operation comprises: first calling the user; then calling the caller; and bridging the calls to the user and the caller.
 81. The method as defined in claim 79, wherein the call bridging operation comprises: first calling the caller; then calling the user; and bridging the calls to the user and the caller.
 82. The method as defined in claim 79, wherein the call bridging operation comprises: placing an outcall to the caller via a call processing system; and bridging the outcall to the caller with a call between the user and the call processing system.
 83. The method as defined in claim 79, wherein the notification is transmitted to a personal computer or personal digital assistant associated with the user.
 84. The method as defined in claim 79, wherein the notification is transmitted to an interactive television.
 85. The method as defined in claim 79, wherein the notification is emailed to the user. 