System and method for managing communications

ABSTRACT

A communications network-based system and service is disclosed. The service permits subscribers to control and manage incoming telephone calls. Subscribers can establish preferences for how calls will be handled by a communications network if the calls are received by while the subscriber in connected to an information network. The service also notifies a subscriber of a calling party&#39;s call based on whether preselected or predesignated preferences of the called party correspond to identifier(s) of the calling party.

RELATED APPLICATIONS

[0001] This application is a continuation-in-part of U.S. Pat. No.______, now U.S. patent application Ser. No. 10/108,706, filed Mar. 29,2002, and U.S. Pat. No. ______, now U.S. patent application Ser. No.10/108,347, filed Mar. 29, 2002, which are herein incorporated byreference in their entirety.

BACKGROUND

[0002] 1. Field of the Invention

[0003] The present invention relates to a system and method for managingcommunications.

[0004] 2. Background of the Invention

[0005] Many telephone customers do not wish to be disturbed by unwantedtelephone calls. Most customers especially dislike being disturbed atcertain times of the day, such as dinner time or after midnight. In aneffort to prevent disturbing telephone calls, many customers turn theirhome telephone off—some by unplugging it, some by turning it off, andsome by turning its ringer off. Others forward their calls to voicemail.In some cases, customers use CLASS Call Forwarding Variable Service.

[0006] Turning off their telephone or forwarding their calls can causethem to miss calls that they may want to take. If they forget to turntheir telephone back on or stop forwarding their calls, they will missevery call. And, unless they have voicemail, even if they remember toturn their telephone back on, they will miss calls that came in whiletheir telephone was off, some of which they would want to receive.

[0007] Also, even if they forwarded their calls to voicemail, they willnot know who called until they call their voicemail to check, which maydelay them from talking with someone they want to talk to right away.Further, only callers who left a voicemail message will be logged in thecaller's voicemail box.

[0008] In addition, people's practice of turning off their hometelephone is costly to the telephone services providers, such as BellSouth. It is costly because the telephone service providers have tospend their resources to connect telephone calls to a person's telephoneeven when their telephone is off. Because the person does not hear thetelephone, the telephone may ring for as long as the calling party wantsto wait, further draining the service provider's resources because theservice provider keeps the call connected until the calling party hangsup.

[0009] In an effort to prevent disruptive telephone calls, manycustomers subscribe to services provided by service providers thatrestrict calls from being connected to the subscriber. Some of theseservices prevent all calls from being connected to the subscriber, suchas call-forwarding. One of the problems with these services is that theyprevent calls from being connected that the subscriber may want to take.

[0010] Other services prevent all calls from being connected unless thesubscriber takes the effort, after the call has been made, to agreeaccept the call. In order to receive calls, the subscriber may berequired to answer a call from the service provider, listen to a messagefrom the calling party to determine who is calling, and tell the serviceprovider that the call can be connected. Not only can this beirritating, it may also inform the calling party that the subscriber ishome and does not wish to speak to the calling party. It can also beembarrassing when the called party knows the calling party but refusesto take to call. Generally, this arrangement wastes time because itrequires excessive participation of the subscriber.

[0011] Further, even without subscribing to such a service, manytelephone customers miss important calls and are not connected tocalling parties that they wish to be connected to for various reasons.One such example is when the customer is already on the line. Typicallyin such a case, the feature the service provider provides is to play abusy signal to the calling party and to not connect the calling party.Another typical feature, sometimes called “call waiting,” informs thecustomer that he or she has received another call. One problem with thisfeature, however, is that the customer first has to talk with thecalling party without knowing whether or not the customer wishes to takethe call.

[0012] Also, many telephone customers do not wish to miss all telephonecalls when they are connected to an information network. To receivenotification of calls, many customers subscribe to services provided byservice providers that notify the subscriber of all calls that come in,usually by interjecting into the subscriber's computer screen anotification that a call has come in. One problem with these services isthat they do not allow the subscriber to selectively determinebeforehand whether or not the subscriber wants to be notified. Anotherproblem with these services is that, in some cases, they do not allow asubscriber to determine, after being notified, how a call shall behandled other than to choose to be connected to the calling party. Stillanother problem with these services is that they do not allow asubscriber to give a calling party the power to disconnect thesubscriber from an information session without the subscriber'spost-call approval.

[0013] When a telephone customer establishes a dial-up connection to adata network, such as the Internet, the customer's telephone lineassumes a busy status. If a caller places a call to the customer, thecaller ordinarily receives a “busy” signal. If, however, the customersubscribes to an Internet Call-Waiting service, the customer willreceive a notification of the incoming call. This notification,typically referred to as a “Internet Call-Waiting Message,” is displayedon the customer's computer video display and alerts the computer-usingcustomer of the incoming call.

[0014] The notification often identifies the calling telephone numberand, perhaps, the listed name of the telephone number. The customer thenhas the option of terminating the dial-up Internet connection andaccepting the incoming call or sending the caller to another number,placing the caller on hold for a pre-determined amount of time, orforwarding caller to voice mail. In addition, the subscriber can sendthe caller an announcement via Text to Speech technology as disclosed inU.S. Pat. No. ______, now U.S. patent application Ser. No. 10/113,698,assigned to the same assignee as the present invention and which isincorporated by reference herein in its entirety.

SUMMARY OF THE INVENTION

[0015] The present invention is directed to acommunications-network-based call reception limiter that prevents callsfrom ringing to a telephone. The network does so by directing calls madefrom a calling party to a third party, rather than directing the call tothe party to which the calling party intended to be connected (thecalled party).

[0016] In an embodiment, the period during which the network directscalls away from the called party may be set in advance, such that theperiod expires automatically.

[0017] In another embodiment, the period during which the networkdirects calls away from the called party may be set for certain hours ofeach day of the week, such that the period begins and expiresautomatically one or more times each day.

[0018] In another embodiment, the network communicates the identityand/or calling time of the calling party to the called party during theperiod that the network directs calls away from the called party.

[0019] In another embodiment, the network directs calls to voicemail.

[0020] In another embodiment, the network directs calls to a servicenode.

[0021] In another embodiment, the network is configured to allow thecalled party to set the periods during which the network will directcalls away from the called party via a telephone-based system.

[0022] In another embodiment, the network is configured to allow thecalled party to set the periods during which the network will directcalls away from the called party via a web interface.

[0023] In another embodiment, the network includes an intelligentnetwork that includes three network elements and a database.

[0024] The present invention is directed to managing communications byconnecting calls to a telephone that otherwise would not automaticallyaccept connection of a call. The communications network does so byconnecting calls made from a calling party to a called party if thecalling party's number is on an encumbered-line bypass list.

[0025] In another embodiment, the communications network includes anintelligent communications network that includes three communicationsnetwork elements and a database.

[0026] In another embodiment, the communications network allows asubscriber of the encumbered-line bypass feature to provision his or herpreferences through an interface system and method.

[0027] In still another embodiment, the communications network allows asubscriber of the encumbered-line bypass feature to provision his or herpreferences through an interactive voice response system and method.

[0028] The present invention is also directed to managing communicationsby selectively notifying a called party of a call when the called partyis connected to an information network. A communications networkdetermines whether or not to notify the called party of a callingparty's call by comparing identifiers of the calling party withinformation communicated by the called party prior to the communicationsnetwork receiving the call.

[0029] In another embodiment, the communications network determines inwhat manner to notify a called party of a calling party's call bycomparing identifiers of the calling party with information communicatedby the called party prior to the communications network receiving thecall.

[0030] In another embodiment, the communications network determineswhether or not to connect a calling party to a called party by comparingidentifiers of the calling party with information communicated by thecalled party prior to the communications network receiving the call.

[0031] In another embodiment, the communications network determines towhat other telephone line or network element to connect a calling partyby comparing identifiers of the calling party with informationcommunicated by the called party prior to the communications networkreceiving the call.

[0032] In still another embodiment, the communications networkdetermines whether or not to connect a calling party to a called partyor another telephone line or network element by receiving a command fromthe called party.

[0033] In still another embodiment, the communications network allows acalled party to provision his or her preferences through an interactivevoice response and/or interface system and method for calls receivedwhile the called party is connected to an information network.

[0034] Additional features and advantages of the invention will be setforth in the description that follows, and in part will be apparent fromthe description, or may be learned by practice of the invention. Theobjectives and advantages of the invention will be realized and attainedby the structure and steps particularly pointed out in the writtendescription, the claims and the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0035]FIG. 1 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention.

[0036]FIG. 2 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention.

[0037]FIG. 3 is a flow diagram of a preferred embodiment of a determinecall reception status step in accordance with the present invention.

[0038]FIG. 4 is a schematic diagram of preferred embodiments of threesteps in accordance with the present invention.

[0039]FIG. 5 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention.

[0040]FIG. 6 is a schematic diagram of a preferred embodiment of asystem usable with a service in accordance with the present invention.

[0041]FIG. 7 is a schematic diagram of an exemplary embodiment of asystem usable with a service in accordance with the present invention.

[0042]FIG. 8 is a schematic diagram of a preferred embodiment of aninterface system in accordance with the present invention.

[0043]FIG. 9 is a schematic diagram of a preferred embodiment of aninterface system in accordance with the present invention.

[0044]FIG. 10 is a flow diagram of a preferred embodiment of aninterface system and method in accordance with the present invention.

[0045]FIG. 11 is a flow diagram of a preferred embodiment of anIVR-based method in accordance with the present invention.

[0046]FIG. 12 is a flow diagram of a preferred embodiment of an entertransfer number method in accordance with the present invention.

[0047]FIG. 13 is a flow diagram of a preferred embodiment of anIVR-based method in accordance with the present invention.

[0048]FIG. 14 is a flow diagram of a preferred embodiment of an enterschedule method for an IVR-based method in accordance with the presentinvention.

[0049]FIG. 15 is a flow diagram of a preferred embodiment of anencumbered-line bypass list method for an IVR-based method in accordancewith the present invention.

[0050]FIG. 16 is a flow diagram of a preferred embodiment of an enternumber method for an IVR-based method in accordance with the presentinvention.

[0051]FIG. 17 is a schematic diagram of a preferred embodiment of asystem usable with a service in accordance with the present invention.

[0052]FIG. 18 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention.

[0053]FIG. 19 is a flow diagram of a preferred embodiment of aconnection options method in accordance with the present invention.

[0054]FIG. 20 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention.

[0055]FIG. 21 is a schematic diagram of a preferred embodiment of asystem and an information network bypass list in accordance with thepresent invention.

[0056]FIG. 22 is a schematic diagram of a preferred embodiment of threepop-up windows in accordance with the present invention.

[0057]FIG. 23 is a schematic diagram of a preferred embodiment of aninformation network bypass list for a particular telephone number inaccordance with the present invention.

DETAILED DESCRIPTION OF THE INVENTION

[0058] For clarity and to facilitate an understanding of the preferredmethods shown in connection with FIG. 5, this description includes anoverview of a preferred embodiment of a method as set forth in FIG. 1.

[0059]FIG. 1 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention. Generally, this preferred methodprovides the method by which a system communicates with a subscriber ofone or more services to receive and implement the subscriber'spreferences for the services. Many different systems and platforms couldbe used to implement this method and the methods described below. Forclarity, however, the below description uses a communications network asan example of one of the many possible systems or platforms.

[0060] In step 12, the communications network interacts with thesubscriber of the services. These services may include a restrictedstatus service and other services. In an exemplary embodiment, any ofthese services may also include an encumbered-line bypass list. Theseservices and the encumbered-line bypass list are discussed in detailbelow.

[0061] Also as discussed below, the communications network preferablyinteracts with the subscriber by receiving a call into an interactivevoice response (IVR) system. In an exemplary embodiment, thecommunications network interacts with the subscriber through aninterface system. In another exemplary embodiment, the interface systemmay include a web interface. Through these or other interactions, thecommunications network proceeds according to step 14 to receivepreferences from the subscriber. These preferences may include manydifferent choices, features, and options, many of which are discussedbelow.

[0062] In step 16, the communications network implements thesubscriber's preferences. By so doing, the communications network mayserve the subscriber according to the subscriber's preferences. For therestricted status service, for example, the subscriber could set his orher preferences to a default restricted call reception status lastingfrom 5 p.m. to 7 p.m. weekdays. An exemplary embodiment of thispreference is shown in FIG. 9, time period 1406, for a particularweekday. If the subscriber set this for a 5 p.m. to 7 p.m. time periodas the subscriber's preference, the communications network generallywill prevent calls from ringing to the subscriber's landline, hometelephone Monday through Friday from 5 p.m. to 7 p.m.

[0063] As an additional example, the subscriber could set his or herpreferences to a restricted call reception status lasting from 5 p.m. to7 p.m. weekdays and from 10:30 p.m. to 7 a.m. all days. An exemplaryembodiment of these preferences is shown in FIG. 9, time periods 1406and 1402, for a particular weekday. Also, the subscriber could, forexample, include two telephone numbers (e.g., the subscriber's motherand daughter) on an encumbered-line bypass list; one number (e.g., thesubscriber's daughter) allowed to bypass a restricted call receptionstatus from 8 a.m. to 10 p.m. and one telephone number (e.g., thesubscriber's mother) for all times. By so doing, the communicationsnetwork would prevent all calls from ringing to the subscriber'slandline, home telephone from Monday through Friday from 5 p.m. to 7p.m. except calls from the subscriber's mother and sister.

[0064] Also by so doing, the communications network would prevent allcalls from ringing to the subscriber's landline, home telephone everyday from 10:30 p.m. to 7 a.m. except calls from the subscriber's mother.

[0065] In the exemplary embodiment shown in FIG. 9 for time periods 1404and 1408, the communications network would not prevent calls fromringing to the subscriber's landline, home telephone during time periods1404 and 1408.

[0066] In a another example, the subscriber could set his or herpreferences to an on setting, thereby overriding the restricted statustime periods in graph 624 and thereby setting a restricted callreception status lasting 24 hours a day, every day of the week. Drawingfrom a previous example and the encumbered-line bypass list shown inFIG. 9, the subscriber's mom would bypass 24 hours a day, and thesubscriber's daughter would bypass from 8 a.m. to 10 p.m. Callingparties using pass-code 44444 would bypass 24 hours a day. Callingparties using pass-code 22222 would bypass from 8 a.m. to 6 p.m.

[0067] In a another example, the subscriber could set his or herpreferences to an off setting, thereby overriding the restricted statustime periods in graph 624 and thereby setting a non-restricted callreception status lasting 24 hours a day, every day of the week. Withthis setting, the subscriber's landline, home telephone would not haveany time periods with a restricted status.

[0068] These examples above are set forth simply to further explain theoverview given above. These two possible scenarios for a subscriber'spreferences are for one service, the restricted status service, andshould not be deemed in any way limiting of the restricted statusservice or any other service. Many other preferences are possible, manyof which are set forth below.

[0069]FIG. 2 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention. This preferred embodiment setsforth, in part, a method showing how the communications network mayproceed to prevent calls from ringing to the home, land-line telephoneof a called party that is a subscriber of a restricted status service.For clarity, the below description often uses a called party 448 shownin FIG. 6 as an example.

[0070] In step 102 of FIG. 2, the communications network receives a callfrom a calling party. For clarity, the below description often uses acalling party 442 shown in FIG. 6 as an example. The communicationsnetwork is preferably an intelligent communications network and, in anexemplary embodiment, an advanced intelligent communications network. Inone embodiment, the communications network is an intelligentcommunications network shown in FIG. 7, comprising three communicationsnetwork elements, 504, 506, and 508, and a database 502. Many differentsystems and platforms could be used to implement this method and themethods described below. For clarity, however, the below descriptionoften uses a communications network 450 in FIG. 6 as an example of oneof the many possible systems or platforms.

[0071] The call received by communications network 450 from callingparty 442 may be received by communications network 450 through atelephone landline, a cellular system, voice-over-internet, or othertypes of communication.

[0072] Typically, when calling party 442 makes the call, calling party442 desires to be connected to called party 448. A non-limiting exampleof this common practice is: someone dials another person's telephonenumber. If Jane, for instance, wants to call Bill, she picks up hertelephone (cell phone, landline telephone, hand-held text-based device,or what-have-you) and dials Bill's number. Jane is trying to beconnected to Bill's telephone.

[0073] Called party 448 may be a subscriber of the restricted statusservice, however, which may or may not be set to prohibit calls at thetime calling party 442 calls. The restricted status service, when itprohibits calls, is encumbering called party 448's telephone line. Forthe restricted status service and other encumbrances, calling party442's call may be treated by communications network 450 as a request bycalling party 442 to be connected to called party 448.

[0074] Communications network 450 to which calling party 442 isconnected may determine not to connect calling party 442 to called party448. Communications network 450 may instead connect the call to someoneor something, such as a third party, other than called party 448. Forclarity, the below description often uses a third party 446 shown inFIG. 6 as an example.

[0075] Preferably, before communications network 450 determines whetheror not to connect calling party 442 to called party 448, communicationsnetwork 450 communicates with calling party 442 and called party 448according to step 104. Communications network 450 also preferablycommunicates with called party 448 using out-of-band signaling.

[0076] In one embodiment of the invention, step 104 is performed asshown, in part, through FIG. 4. FIG. 4 sets forth, in part, a flowdiagram of this embodiment of step 104. In this embodiment, as part ofthis communication step 104, communications network 450 communicateswith calling party 442 according to step 302. This communication maytake the form of playing an audible ring announcement, or some otherannouncement or message set forth herein, such as: a busy signal; anannouncement informing calling party 442 that called party 448 is notaccepting calls; an announcement informing calling party 442 to callback at some other time; an announcement customized by called party 448,which may include called party 448's voice; a standard audioannouncement; or another announcement.

[0077] The audible ring announcement informs calling party 442 thatcommunications network 450 is working on the call. This audible ringannouncement may also lead calling party 442 to believe thatcommunications network 450 has connected calling party 442 to calledparty 448. By playing this audible ring announcement, calling party 442may believe that he or she is connected to called party 448 and thus iswaiting for called party 448 to pick up. In other embodiments, theannouncement may not be an audible ring announcement, but rather anothertone, no tone at all, or an announcement or message set forth above.

[0078] In another embodiment, also shown in FIG. 4, as part of thiscommunication step 104, communications network 450 communicates withcalled party 448 according to step 304. In this embodiment,communications network 450 preferably communicates one or moreidentifiers related to calling party 442 to called party 448. Theseidentifiers may include calling party 442's telephone number, callingparty 442's name, the time calling party 442 called, and/or whateveridentifiers or other information is available to communications network450. Communications network 450 can communicate one, several, or all ofthe identifiers to called party 448.

[0079] In another embodiment, communications network 450 communicates tocalled party 448, step 104, inaudibly.

[0080] In still another embodiment, communications network 450communicates to called party 448, step 104, using a text-based display,such as a liquid crystal display.

[0081] In still another embodiment of this communication step 104, shownin step 304, communications network 450 communicates data about callingparty 442 that was input by calling party 442. This data could include avoice entry, such as calling party 442 saying their name, or a pass-code(input by voice, key pad, or otherwise), or other data. The pass-codeand input data can be identifiers associated with calling party 442 andwill be discussed further below.

[0082] As set forth in FIG. 2, after or simultaneously withcommunicating with called party 448 and calling party 442 according tostep 104, or simply after step 102 if step 104 is not performed,communications network 450 determines the call reception status, step108, of called party 448. In doing so, communications network 450 isworking to protect called party 448 from unwanted calls and/or otheraudible disturbances.

[0083] In one embodiment of the invention, step 108 is performed asshown in part through FIG. 3. FIG. 3 is a flow diagram of thisembodiment of step 108. In this embodiment, communications network 450begins by initiating communication, step 202, between communicationsnetwork elements within communications network 450. This communicationpreferably is made through out-of-band signaling. In an exemplaryembodiment, a signaling system with a dedicated 64 kilobit data circuit(SS7) is used.

[0084] These communications network elements are preferably firstcommunications network element 504 and second communications networkelement 506, as set forth in FIG. 7. Also preferably, firstcommunications network element 504 is a Service Control Point (SCP) andsecond communications network element 506 is a Service Switching Point(SSP).

[0085] With communications network elements, communications network 450determines whether or not to connect the call to called party 448 orthird party 446. This flow process shown in FIG. 3 is set out forclarity in explaining one particular embodiment in which to determine towhich party communications network 450 should connect the call fromcalling party 442, but should not be construed as limiting the presentinvention.

[0086] In this preferred embodiment of the invention, one communicationsnetwork element communicates a query for status, step 204. Preferablythis communication is in the form of a TAT trigger and a TCAP message.This query for status, step 204, prompts another communications networkelement to access a database containing a call reception status, step206. In an exemplary embodiment, the database is database 502. Forclarity, however, the below description often uses a database 444 shownin FIG. 6 as an example. Once the other communications network elementdetermines called party 448's call reception status by accessingdatabase 444, step 206, it sends the call reception status tocommunications network 450's element that sent the query, step 208.

[0087] In another embodiment, however, the other communications networkelement sends a command to communications network 450's element thatsent the query, step 208. This command may include an instruction toconnect or not to connect the call to called party 448, as well as othercommands.

[0088] As generally set forth in FIG. 2, the call reception status ofcalled party 448 is determined according to step 108. Based on the callreception status, communications network 450 connects the call to calledparty 448 or to third party 446 according to step 110.

[0089] In one embodiment, if the call reception status of called party448 is a restricted call reception status, communications network 450will connect the call to third party 446 according to step 106. Also inthis embodiment, if the call reception status of called party 448 is notset, or is set to a non-restricted call reception status, communicationsnetwork 450 connects the call to called party 448 according to step 112.

[0090] In one embodiment of the invention, step 106 is performed asshown, in part, through FIG. 4. FIG. 4 shows, in part, a flow diagram ofthis embodiment of step 106. In this embodiment, communications network450 determines whether or not called party 448 has set a forwardingnumber, step 306. If called party 448 has set a forwarding number, orone is otherwise set, communications network 450 connects the call tothe call forwarding number, step 308. (Called party 448 may also, inanother embodiment, set the forwarding number after the call has beenplaced. This gives called party 448 the power to selectively forwardcalls to particular forwarding numbers.) The forwarding number may be avoicemail receiver, another telephone number of called party 448, orotherwise.

[0091] Third party 446, in this case the call forwarding number, may, insome embodiments, be a voicemail number. If called party 448 has not setthe forwarding number, or one is otherwise not set, communicationsnetwork 450 connects the call to a communications network element, step310. This communications network element may, in some cases, be thirdparty 514 shown in FIG. 7, which preferably is a service node. Thiscommunications network element may also be a personal computer, a voicemark-up language web-server, an interactive voice response system, anintelligent peripheral, or other system capable of communicating withcalling party 442. The call forwarding number may, in anotherembodiment, be set by called party 448 after calling party 442's call isreceived by communications network 450.

[0092] In cases where communications network 450 connects the call fromcalling party 442 to third party 446, step 106, communications network450 may, in certain embodiments, communicate further with calling party442, step 114.

[0093] In one embodiment of the invention, communications network 450communicates with calling party 442 according to steps 312 and 314 ofFIG. 4. FIG. 4 shows, in part, a flow diagram of one embodiment of step114. In this embodiment, communications network 450 plays anannouncement to calling party 442, step 312. The announcement may be ofmany different types. The types may include, for example, an audiblering announcement, where calling party 442 hears a telephone ring;sounds indicating that the call is connected to a party other thancalled party 448; or a busy signal. Preferably the announcement will bethe audible ring announcement of a set number of rings, such as ninerings, before playing a message according to step 314. Communicationsnetwork 450 does not need to play a message, and instead may continuingplaying the announcement indefinitely, or may disconnect called party448 after some period of time.

[0094] In another embodiment, communications network 450 plays a messageto calling party 442, step 314, after, instead of, or as part of playingthe announcement according to step 312. This message may inform callingparty 442 that called party 448 is not available, called party 448 isbusy, called party 448 has his or her preferences set to “restrictedcall reception status,” or otherwise. Preferably the message announcesthat calling party 442 is not available after a certain number of ringsbut does not indicate that called party 448 is not accepting calls.Preferably communications network 450 plays messages through the servicenode.

[0095] In an exemplary embodiment, communications network 450 plays amessage received from called party 448 prior to receiving the call fromcalling party 442. In this embodiment, called party 448 may pre-recordone or more messages. These messages may be for different purposes, someplayed for only particular calling parties, some played only atparticular times of the day or week, some played depending on whether orto whom called party 448 is connected, or a combination of these. Forexample, a message received by communications network 450 and recordedby called party 448 may announce that called party 448 is not receivingcalls because it is dinner time and to call back after 7 p.m. In thisexample, called party 448 could choose, preferably prior tocommunications network 450 receiving the call from calling party 442,for that particular message to be played only to calling parties not onthe encumbered-line bypass list and only from 5 to 7 p.m.

[0096]FIG. 5 is a flow diagram of another preferred embodiment of amethod in accordance with the present invention. Similar to theembodiments set forth in FIGS. 2, 3 and 4, this preferred embodimentincludes steps of receiving a call 402 and, usually, communicating witha calling and called party 404.

[0097] This preferred embodiment may be used in conjunction withdetermining a call reception status 408 and restricted call receptionstatus 410. If used in conjunction with steps 408 and 410, the steps ofcompare identifier 420 and identifier corresponds 422 may follow,precede, or be simultaneous with steps 408 and 410. This preferredembodiment may also be used not in conjunction with determining a callreception status 408 and restricted call reception status 410.

[0098] In one embodiment, steps 402, 404, 408, and 410 are performedbefore the steps of compare identifier 420 and identifier corresponds422. Timing of steps 420 and 422 could be performed in various orders;for clarity one order of steps are set forth in the flow diagram of FIG.5.

[0099] In this embodiment, shown in part in FIG. 5, after determiningthat the call reception status is set to a restricted call receptionstatus, step 408 and 410, communications network 450 compares one ormore identifiers, step 420, of calling party 442. The identifiers mayinclude any data related to calling party 442 or the telephone numberfrom which calling party 442 called. These identifiers may include: thetelephone number from which calling party 442 called; a pass-codeentered by calling party 442 or attached to calling party 442 or thenumber from which calling party 442 called; voice-recognition dataentered by calling party 442; data within the string of data received bycommunications network 450 when calling party 442 made the call; datarelated to calling party 442 or calling party 442's telephone numberknown by or found out by communications network 450 by various means; orother data that identifies calling party 442.

[0100] Communications network 450 preferably performs compare identifierstep 420 by comparing the identifier(s) with information within adatabase to determine if any identifier corresponds to the information.In one embodiment, this database is database 502. In another embodiment,this database is database 444 shown in FIG. 6. Preferably, the databaseused includes a CNAM (Caller ID with NAMe) database or can connect to aCNAM database in or accessible by communications network 450.

[0101] The information within database 444 may be any information bywhich communications network 450 may determine if the call from callingparty 442 is desired by called party 448 to be connected to called party448. In one embodiment the information is an encumbered-line bypass listand one of the identifier(s) is the telephone number from which callingparty 442 called. In another embodiment the information is anencumbered-line bypass list and one of the identifier(s) is a pass-codeentered by calling party 442.

[0102] In this embodiment where one of the identifier(s) is a pass-codeand the information is an encumbered-line bypass list, a calling party,even if his or her telephone number is not on the encumbered-line bypasslist, may enter a pass-code after making a call to called party 448. Ifthe pass-code entered by calling party 442 matches a pass-code withinthe encumbered-line bypass list, communications network 450 may connectthe call to called party 448 if called party 448 has not otherwiserestricted the entered pass-code, such as by not allowing the call tobypass a restricted status or an encumbrance based on the time of day orweek that communications network 450 received calling party 442's call.

[0103] While communications network 450 preferably performs thiscomparison by comparing the identifier(s) with information withindatabase 444, communications network 450 may do so in other ways so longas these ways allow for communications network 450 to determine if oneof the identifier(s) is recognized as one allowing for the call to beconnected to called party 448. Communications network 450 alsopreferably performs this comparison using one or more communicationsnetwork elements. In one embodiment, communications network 450 usesfirst communications network element 504. Preferably, firstcommunications network element 504 is an SCP.

[0104] In another embodiment, second communications network element 506communicates with first communications network element 504. Thesecommunications may take the form of a TAT trigger and a TCAP message.This communication between second communications network element 506 andfirst communications network element 504 may include communicating oneof the identifier(s). These and all communications betweencommunications network elements are preferably via out-of-bandsignaling. Communications between communications network elements arefurther preferred to follow SS7 protocol.

[0105] If communications network 450 compares one of the identifier(s),step 420, and it corresponds, step 422, communications network 450connects the call to called party 448, step 412. If communicationsnetwork 450 compares the identifier(s), step 420, and none correspond,step 422, communications network 450 connects the call to third party446, step 406. As stated previously, third party 446 may include aforwarding number, a service node, or others.

[0106] In an exemplary embodiment, communications network 450communicates with and waits to receive an assent from called party 448to connect the call to called party 448 after performing step 422 anddetermining that the identifier(s) do not correspond. If communicationsnetwork 450 communicates with called party 448 and does not receive theassent within a short time-period, communications network 450 proceedsto step 406. If communications network 450 communicates with calledparty 448 and does receive the assent within the short time-period,communications network 450 proceeds to step 412.

[0107] In another exemplary embodiment, communications network 450communicates with and waits to receive an assent from called party 448to connect the call to called party 448 or other instructions afterperforming step 422 and determining that the identifier does notcorrespond. These other instructions may include instructions to connectthe call to a particular third party, step 406, or communicate aparticular communication to calling party 442, step 414. Ifcommunications network 450 receives these other instructions,communications network 450 follows these other instructions as part ofstep 406 and/or step 414.

[0108] In some embodiments and usually in conjunction with connectingthe call to third party 446, communications network 450 communicateswith calling party 442, step 414. Communications network 450 maycommunicate with calling party 442, step 414, in those manners set forthabove for step 114, as well as others. Communications network 450preferably communicates with calling party 442, step 414, with a ringannouncement followed by a message stating that called party 448 is notavailable.

[0109] In one embodiment, communications network 450 directs the callthrough two communications network elements. These communicationsnetwork elements preferably are first communications network element 504and second communications network element 506. Communications network450, in this embodiment, may direct the call by the first communicationsnetwork element 504 commanding the second communications network element506 to connect the call to the called or third party. Firstcommunications network element 504 preferably is an SCP; secondcommunications network element 506 preferably is an SSP.

[0110]FIG. 6 is a schematic diagram, portions of which show a preferredembodiment of the present invention. FIG. 6 sets forth a calling party442, a database 444, a third party 446, a called party 448, and acommunications network 450. Calling party 442, database 444, third party446, and called party 448 are configured to communicate withcommunications network 450. Communications network 450 is configured tocommunicate with calling party 442, database 444, third party 446, andcalled party 448. Preferably communications network 450 is configured toreceive a call from calling party 442 and then to communicate withdatabase 444 to determine to where calling party 442 should beconnected. Communications network 450 preferably is configured toconnect calling party 442 to either called party 448 or third party 446or disconnect the call. Database 444 and third party 446 are set outfrom communications network 450 for clarity, but may, in someembodiments, be part of communications network 450.

[0111] For example, if communications network 450 receives a call fromcalling party 442, who is attempting to call called part 448,communications network 450 communicates with database 444. For therestricted status service, communications network 450 is configured tocommunicate with database 444 to determine if called party 448 has sethis or her preference to a restricted call reception status or anon-restricted call reception status.

[0112] Continuing the example, if database 444 does not show that calledparty 448 has set his or her call reception status set to a restrictedcall reception status, communications network 450 will connect callingparty 442 to called party 448. If database 444 shows that called party448 had set his or her call reception status to a restricted callreception status, communications network 450 will connect calling party442 to third party 446 unless communications network 450 receives one ormore identifiers related to calling party 442 that identifies callingparty 442 as one that communications network 450 should connect bybypassing the restricted call reception status. If so, communicationsnetwork 450 will connect calling party 442 to called party 448. Thisexample is set forth for clarity in showing one possible usage of oneembodiment of the invention. It should not be deemed limiting of this orany other embodiments.

[0113]FIG. 7 is a schematic diagram 500, portions of which show apreferred embodiment of the present invention. FIG. 7 sets forthmultiple communications network elements 504, 506, and 508. Thesecommunications network elements are set out in this manner as apreferred embodiment of the present invention, and also as a clear wayto explain the functioning of communications network 450 to which theymay be a part. In other embodiments these communications networkelements may be combined, or there may be fewer or additionalcommunications network elements.

[0114]FIG. 7 sets forth the preferred embodiment of the presentinvention in part by setting forth a third communications networkelement 508, which is configured to communicate with a calling party 512and a second communications network element 506. Preferably, thirdcommunications network element 508 is configured to communicate withcalling party 512 and second communications network element 506 suchthat third communications network element 508 receives information fromand sends information to calling party 512 and second communicationsnetwork element 506. Third communications network element 508 may alsobe configured to connect the call to second communications networkelement 506.

[0115] In one embodiment, third communications network element 508 isconfigured to receive a call from calling party 512, which thirdcommunications network element 508 may connect to second communicationsnetwork element 506. As part of the call, third communications networkelement 508 may create or receive identifiers of calling party 512,which are either intentionally input by calling party 512;unintentionally included, either in a string of data as part of the callor otherwise; as set forth above; or otherwise. Third communicationsnetwork element 508 is preferably configured to communicate with thecalling party, such as with an audible ring announcement, afterreceiving the call. Third communications network element 508, afterreceiving the call from calling party 512, preferably sends anannouncement to calling party 512. This announcement is preferably aring announcement.

[0116]FIG. 7 also sets forth the preferred embodiment of the presentinvention in part by setting forth a second communications networkelement 506, which is configured to communicate with thirdcommunications network element 508, a first communications networkelement 504, sometimes a third party 514, and called party 510. Secondcommunications network element 506 communicates with thirdcommunications network element 508 as mentioned above as well as setforth below.

[0117] In some embodiments third communications network element 508communicates identifiers of calling party 512 to second communicationsnetwork element 506. In embodiments where third communications networkelement 508 communicates identifiers of calling party 512 to secondcommunications network element 506, second communications networkelement 506 may, through communication with first communications networkelement 504 and indirectly with a database 502 (preferably including orconnecting to a CNAM database), be configured to use such identifiers todetermine whether to connect the call to called party 510 or third party514.

[0118] In another embodiment, second communications network element 506may, through communication with first communications network element 504and indirectly with a database 502, be configured to determine whetherto connect the call to called party 510 or third party 514. In thisembodiment, second communications network element 506 preferably relaysthe identity of called party 510 to first communications network element504. Second communications network element 506 preferably communicateswith third communications network element 508 to gain the identity ofcalled party 510, but may do so in any manner.

[0119] Second communications network element 506 also is configured tocommunicate in other manners with first communications network element504. Preferably, second communications network element 506 communicateswith first communications network element 504 through one or morequeries. These queries may request information. Preferably these queriesare communicated through a signaling function for communications networkdatabases such as a Transaction Capabilities Application Part (TCAP).These queries may also include data and other information, such as theidentity of called party 510, or various identifiers of calling party512.

[0120] In one embodiment, these queries preferably request firstcommunications network element 504 to determine, using the identity ofcalled party 510, a call reception status of called party 510. With thiscall reception status, second communications network element 506preferably may, either on its own or as a command from firstcommunications network element 504, connect the call to called party 510or third party 514.

[0121] In another embodiment, these queries preferably request firstcommunications network element 504 to determine whether one or more ofthe identifiers of calling party 512 correspond to an encumbered-linebypass list. With this correspondence or lack of correspondence, secondcommunications network element 506 preferably may, either on its own oras a command from first communications network element 504, connect thecall to called party 510 or third party 514.

[0122] In still another embodiment, these queries request firstcommunications network element 504 to determine, using the identity ofcalled party 510 and identifiers of calling party 512, a call receptionstatus of called party 510 and any correspondence between one or moreidentifiers of calling party 512 to an encumbered-line bypass list. Withthis call reception status and correspondence, second communicationsnetwork element 506 preferably may, either on its own or as a commandfrom first communications network element 504, connect the call tocalled party 510 or third party 514. First communications networkelement 504 may also be configured to connect the call to called party510 or third party 514.

[0123] Preferably, second communications network element 506 connectsthe call to the called party if called party 510's call reception statusis set to a non-restricted call reception status. Also preferably,second communications network element 506 connects the call to calledparty 510 if one or more of the identifiers of calling party 512corresponds to information within the encumbered-line bypass list.Second communications network element 506 preferably connects the callto third party 514 in cases above where second communications networkelement 506 does not connect the call to called party 510, shown by thedashed line in FIG. 7.

[0124] Second communications network element 506 also is configured tocommunicate with third party 514, as set forth above and additionallybelow. Second communications network element 506 also may communicatewith third party 514, providing information to third party 514, such ashow long calling party 512 remains on the line, the calling party'stelephone number and name, and the like. Such information may be storedat third party 514. Second communications network element 506 preferablycommunicates with third party 514 to connect the call from calling party512 to third party 514. Second communications network element 506 mayalso command third party 514 or third party 514 may be programmed toperform, in cases where third party 514 is a fourth communicationsnetwork element or the service node, to play particular announcements ormessages to calling party 512. Preferably, third party 514, when thefourth communications network element or the service node, plays a ringannouncement, followed by a message. Preferably the message informscalling party 512 that called party 510 is not available. Third party514 may, however, plays many types of messages, either chosen bycommunications network 450 or by called party 510.

[0125] Second communications network element 506 also is configured tocommunicate with called party 510, as set forth above and additionally.Second communications network element 506 preferably communicatesidentifiers of calling party 512 to called party 510. Secondcommunications network element 506 does so preferably inaudibly so asnot to disturb called party 510. In an exemplary embodiment, secondcommunications network element 506 communicates identifiers of callingparty 512 through a text-based display, such as a liquid crystaldisplay. In another exemplary embodiment, second communications networkelement 506 communicates identifiers of calling party 512 through atest-based display without any audible communication, such as calledparty 512's telephone ringing.

[0126]FIG. 7 also sets forth the preferred embodiment of the presentinvention in part by setting forth first communications network element504, which is configured to communicate with second communicationsnetwork element 506 and a database 502, and vice-versa. Firstcommunications network element 504 communicates with secondcommunications network element 506 as mentioned above. Firstcommunications network element 504 also communicates with database 502.In one embodiment, first communications network element 504 preferablycompares or has database 502 compare one or more identifiers of callingparty 512 with information in the encumbered-line bypass list, which iscontained with database 502. In another embodiment, first communicationsnetwork element 504 preferably compares or has database 502 compare theidentity of called party 510 to determine the call reception status ofcalled party 510. In some embodiments, first communications networkelement 504 performs both of the above comparisons.

[0127] In the embodiment previously discussed, communications network450 restricts calls from connecting to a called party that subscribes tothe restricted status service. Communications network 450 also providesfeatures where certain calls bypass the restricted status service, aswell as other services and/or features that encumber a telephone line,by connecting calls to the called party even though the called party'sline is encumbered.

[0128] In other embodiments, first communications element 504 mayinclude a personal computer, a voice mark-up language web-server, aninteractive voice response system, or other system capable of performingthe functions set forth for first communications element 504.

[0129] An encumbered line or line encumbrance is a line or a connectionthat is in a condition or state that is less than optimally available.Optimally available is a condition or state where access to the line isabsolutely uninhibited. Some examples of encumbered lines include thefollowing: a busy line, a line that is currently in use, a line that hasbeen configured to prevent access by calling parties, a line where aservice provider is controlling access to the line by preventing ormodifying at least one calling party's ability to access, use, orconnect with the encumbered line.

[0130]FIG. 8 and other figures described below set forth ways in which asubscriber of the encumbered-line bypass feature can provision his orher preferences for this feature. In an exemplary embodiment below, thefigures and description describe how the subscriber can provisionaspects of the encumbered-line bypass feature such as which callingparty's calls are connected and during what times of the day or week.With these preferences provisioned, the communications network mayselectively connect calls to the subscriber even when the subscriber'sline is encumbered.

[0131]FIG. 8 is a schematic diagram, portions of which show a preferredembodiment of the present invention. FIG. 8 describes two systems bywhich a subscriber can provision his or her encumbered-line bypassfeature, as well as the restricted status service and othercommunications services. Other systems could be used to provision theseservices and feature, but for clarity, FIG. 8 includes an interactivevoice response (IVR) system 600 and an interface system 602.

[0132] Interface system 602 may be a computer system, one or more partsof a computer, one or more computers acting together, software on acomputer or any other system that can manage information. Interfacesystem 602 preferably is configured to allow a subscriber of restrictedstatus, encumbered-line bypass, and/or other communications networkservices to receive and/or input information into an information manager610. Preferably, interface system 602 includes a firewall. Interfacesystem 602 preferably is a secure advanced intelligent communicationsnetwork intranet. Interface system 602 may, however, be a secureintelligent communications network intranet, a secure communicationsnetwork intranet, a secure intranet, an intranet, or any device capableof communicating information between communications network 608 andinformation network 612.

[0133] Interface system 602 preferably communicates informationregarding status, settings and/or preferences and can also provide theinformation in a format appropriate for whatever device the subscriberis using. As an example, interface system 602 can display an existingencumbered-line bypass list of telephone numbers and pass-codes incolumns, allowing easy deletion from the list or adjustment to thedetails, bypass times, or other information related to each telephonenumber and pass-code on the encumbered-line bypass list.

[0134] The following example, disclosed in connection with thisembodiment, demonstrates features of the present invention. A callingparty 604 calls a called party 606. A communications network 608receives the call from calling party 604. After receiving the call,communications network 608 determines whether or not called party 606'sline is encumbered. Communications network 608 preferably determineswhether called party 606's line is encumbered. In some cases informationmanager 610 assists with this determination.

[0135] Information manager 610 may be a computer system, one or moreparts of a computer, one or more computers acting together, software ona computer, or any other system that can manage information and iscommunication with communications network 608. In some cases informationmanager 610 can form a portion of communications network 608.

[0136] If communications network 608 determines that called party 606'sline is encumbered, communications network 608 determines whether or notcalled party 606 subscribes to an encumbered-line bypass feature.Communications network 608 may determine whether called party 606subscribes to the encumbered-line bypass feature before, after, or atthe same time communications network 608 determines if called party606's line is encumbered.

[0137] In this embodiment, if called party 606's line is encumbered andcalled party 606 subscribes to the encumbered-line bypass feature,communications network 608 determines whether or not calling party 604may bypass the encumbrance and thus be connected to called party 606.

[0138] Communications network 608 preferably determines whether or notto connect calling party 604 based upon called party 606's preferencesfor the encumbered-line bypass feature.

[0139] Preferably before calling party 604 made the call to called party606, however, called party 606 established his or her preferences anddetermined which calling parties would bypass an encumbrance to calledparty 606's line. In an exemplary embodiment, called party 606 maychoose which parties would bypass and at what times of the day or weekbased on the telephone number from which they call or their entry of acertain pass-code.

[0140] In a preferred embodiment, as shown in FIG. 8, called party 606may provision his or her encumbered-line bypass feature through IVRsystem 600 and/or the interface system 602.

[0141] In one embodiment, called party 606 may contact IVR system 600through a telephone call to the system, and through IVR system 600 sethis or her preferences. These preferences may include telephone numbersof potential calling parties that may bypass an encumbrance as well aspass-codes whereby calling parties may bypass an encumbrance. Thesepreferences may also include times of the day that potential callingparties may bypass encumbrances and other times or days that certainpotential calling parties may not bypass encumbrances.

[0142] In this embodiment, IVR system 600 communicates with informationmanager 610. Information manager 610 preferably is part ofcommunications network 608. Information manager 610 may also be separatefrom communications network 608. Preferably communications network 608may communicate with information manager 610 to determine thepreferences of called party 606.

[0143] In another embodiment, called party 606 may contact interfacesystem 602. Preferably called party 606 communicates with interfacesystem 602 through an information network 612. Information network 612may be a global Internet, an extranet, and intranet, or any otherinformation network.

[0144] Called party 606 communicates with information network 612 withcommunication device 613. Communication device 613 may be a computer, awireless device, or any device allowing a person to communicate with aninformation network. Preferably these devices allow for the display of amonitor screen 614.

[0145] Called party 606's preferences may include telephone numbers ofcalling parties that may bypass an encumbrance as well as pass-codeswhereby calling parties may bypass an encumbrance. These preferences mayalso include times of the day that potential calling parties may bypassencumbrances and other times or days that certain potential callingparties may not bypass encumbrances, well as other options.

[0146] With called party 606's preferences accessible by communicationsnetwork 608, when calling party 604 calls and called party 606's line isencumbered, communications network 608 may, through communication withinformation manager 610, ascertain whether or not called party 606wishes calling party 604 to be connected to called party 606's telephoneline.

[0147] a schematic diagram, portions of which show a preferredembodiment of the present invention. FIG. 10 describes, by way ofexample, an exemplary embodiment of interface system 602.

[0148] Preferably before a first calling party 620 or a second callingparty 622 calls called party 606, called party 606 establishes his orher encumbered-line bypass features and options. Screen 614 shows anexample of information sent from interface system 602 to called party606's communication device 613.

[0149] In this embodiment, interface system 602 sends information tocalled party 606. Communication device 613 displays, through screen 614,called party 606's times of the day that called party 606's line is setto a restricted status or is otherwise encumbered. Screen 614 shows anexemplary embodiment, showing called party 606 a graph 624 of the hoursin a day, including those where called party 606's line is encumberedand unencumbered. Screen 614 also shows an “on setting” and an “offsetting,” either of which may be used to override the restricted andnon-restricted statuses shown in graph 624. Preferably interface system602 sends information such that communication device 613 displays thisgraph in varying colors, such that called party 606 may easily discernwhich times of the day called party 606's line is encumbered.

[0150] In the example show in graph 624, called party 606's line isencumbered from 10:30 p.m. to 7:00 a.m. and from 5:00 p.m. to 7:00 p.m.Neither the on setting or the off setting are chosen. Recall that oneexample of an encumbered line is a call blocking feature where incomingcalls are either sent to another number, or a signal is sent to thecalling party indicating the unavailability of the called party. Whilenot shown, interface system 602 may send information such that thecommunication device displays multiple graphs representing times foreach day of the week or month that called party 606's line isencumbered.

[0151] Preferably called party 606 also may communicate with interfacesystem 602 using screen 614 to select preferences for theencumbered-line bypass feature. A portion of screen 614 includes a list626 of telephone numbers. Another portion of screen 614 includespass-codes. In addition to the telephone numbers and pass-codes,additional fields of data may be presented. For example, a name or otherdetail associated with the telephone number or pass-code, as well asother information may also be included, as shown in the example in FIG.9, screen 614.

[0152] As shown in FIG. 9, called party 606 has established certainpreferences for his or her encumbered-line bypass list. Specifically,calls from telephone numbers 404-555-1111 and 404-555-3333 have beenselected as telephone numbers to bypass encumbrances on called party606's line during certain times of the day or week, shown under “BypassTimes”.

[0153] Given these preferences, if either a first calling party 620,having a telephone number of 404-555-1111, or a second calling party622, having a telephone number of 404-555-2222, calls called party 606at 1 p.m., both will be connected to called party 606 unless calledparty 606's line is encumbered is some way, for example, if the line isbusy. This is because, as shown in graph 624, the called party has notchosen to selectively restrict or otherwise encumber his or her line toprevent unwanted calls at 1 p.m. Because called party 606's line is notencumbered at 1 p.m., first calling party 620 and second calling party622 may be connected by communications network 608. This is true eventhough second calling party 622 is not on called party 606'sencumbered-line bypass list 626.

[0154] As another example, if either the first calling party 620 or thesecond calling party 622 calls called party 606 at 3 a.m., secondcalling party 622 will not be connected to called party 606 becausecalled party 606 has selected his or her line to be encumbered at 3a.m., as shown in graph 624, and because second calling party 622'stelephone number is not on called party 606's encumbered-line bypasslist 626. First calling party 620, however, may be connected becausecalling party 620's telephone number is on encumbered-line bypass list626, and called party 606 has designated first calling party 620 as aparty that should be connected despite encumbrances. Another callercalling from 404-555-3333, shown in list 626, may not be connected byvirtue of the telephone number from which she called if she calls at 3a.m., because her bypass times only allow bypass of an encumbrance from8 a.m. to 10 p.m.

[0155] As yet another example, if any calling party, regardless ofwhether the calling party is or is not on the encumbered-line bypasslist, calls called party 606 at 3 a.m. and enters pass-code 44444, theywill bypass the encumbrance. Calling parties entering pass-code 22222,however, will only bypass an encumbrance if the encumbrance existsbetween 8 a.m. and 6 p.m.

[0156] Each of these preferences, whether they be set to times of arestricted call reception status (an example of an encumbrance) and anon-restricted call reception status, an on setting or off setting,telephone numbers and pass-codes for an encumbered-line bypass list,names and/or details associated with the telephone numbers andpass-codes, and the bypass times for each telephone number andpass-code, may be modified by the subscriber as set forth in FIG. 10.

[0157]FIG. 10 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention. This method includes preferredsteps of an interface system 602 (see FIG. 9). This method of using aninterface system 602 allows a communications network to receiveinformation from a subscriber of restricted status service andencumbered-line bypass feature and/or other services. Thiscommunications network may be the communications network discussed aboveand shown in part in FIG. 6, 7, 8, or 9, or another type ofcommunications network or system. The interface system may be theinterface system discussed above and shown in part in FIG. 8, or may beanother type of interface system facilitating communication between acommunications network and a subscriber.

[0158] As part of this preferred embodiment, in step 652 the interfacesystem receives a subscriber's attempt to access a URL to communicatewith the communications network. Typically, subscribers attempt toaccess the URL to update a particular service, but may do so for otherreasons. Services may include a restricted status service, anotherservice capable of encumbering a telephone line, or another type ofservice.

[0159] Proceeding with the preferred embodiment of the method, in step654, the interface system prompts a probable subscriber for identifyingdata. The interface system then receives identifying data. Preferablythe home, landline telephone number and corresponding ID code orpassword from the subscriber are received in step 656. Once theinterface system has received the identifying data, the interface systemdetermines if the probable subscriber is a subscriber of the service towhich the probable subscriber is attempting to update. Preferably, theinterface system does so through a query to an intelligent peripheral incommunication with the communications network to validate whether or notthe identifying data corresponds with an identifying-data record, step658. If the probable subscriber is considered to be a valid subscriber,step 660, the preferred method proceeds to step 662.

[0160] If the subscriber is not validated to be a valid subscriber ofthe system, step 660, the interface system returns to step 654 to repeatsteps 654, 656, 658, and 660, or denies access to potential thesubscriber.

[0161] The interface system then sends information to the subscriberregarding that subscriber's current services and preferences. Theinterface system does so according to step 662 in order to allow thesubscriber to review, access, update, and otherwise communicateregarding the service information presented to the subscriber.

[0162] Proceeding to step 664, the interface system sendssubscriber-based service settings. These service settings can then bedisplayed, reviewed, and modified by the subscriber. Preferably, theseservice settings can include stored or default encumbered-line bypasslist data, forwarding numbers, pass-codes, and an on or off setting forthe entire service. The stored or default encumbered-line bypass listdata preferably includes telephone numbers and pass-codes stored in thestored encumbered-line bypass list data. In an exemplary embodiment, thestored or default encumbered-line bypass list data is presented to thesubscriber through the interface system in an easy-to-update table.These service settings also preferably include applicable categoriesand/or links. Further, these service settings and/or applicablecategories or links data are related to one or more services to whichthe subscriber subscribes. As part of step 664, the interface system mayalso send information related to services to which the subscriber doesnot yet subscribe.

[0163] In an exemplary embodiment, the interface system sends one ormore call markers relating to one or more telephone calls made from orreceived by the subscriber to the subscriber through the interfacesystem. Preferably, the call markers include the telephone number of oneor more parties that called or were called by the subscriber. Alsopreferably, the call markers include a caller identification of a partythat called or was called by the subscriber. The caller identificationmay include the calling party's name, location from which the callingparty called, a timestamp of the time a party called or was called bythe subscriber, or otherwise.

[0164] This information is provided by the interface system such thatthe subscriber may access this information through various devices andthrough a communications network. These various devices may include acomputer, a hand-held device, a wireless device or some other devicecapable of communicating with the interface system. Through makinginformation available to these devices, the interface system may allowthe subscriber to easily make changes to the services.

[0165] In step 666, the interface system receives desired changes fromthe subscriber, which may include new data on changes to thesubscriber's encumbered-line bypass list, other preferences shown onscreen 614, or other preferences and options discussed or impliedherein. Preferably, such changes may be completed with a minimum numberof keystrokes. In an exemplar embodiment, the subscriber may click oneach call marker listed in a table (step 664) to add that telephonenumber to his or her encumbered-line bypass list, along with associateddetails to an accompanying name/detail list. Also preferably, theinterface system allows the subscriber to add services and otherfeatures and details. The interface system then waits to receive suchchanges or an indication that the subscriber has completed his or hercommunication.

[0166] The interface system then, in step 668, checks for errors in theinputs received from the subscriber. After doing so, if there are errorsin information input from the subscriber, step 670, the interface systemprovides feedback, step 672, and performs steps 666, 668, and 670 toreceive corrected information. If there are no errors, step 670, theinterface system updates the communications network by storingpreferences, including the preferences associated with theencumbered-line bypass list, and other data into a database accessibleby the communications network, step 674. In an exemplary embodiment, theinterface system sends an update to a communications network element, anintelligent peripheral, or an SCP, which then updates the database.After doing so, the interface system logs the subscriber off theinterface system, step 676.

[0167]FIGS. 11 and 12 are flow diagrams showing one example of apreferred embodiment of a method in accordance with the presentinvention. This example includes operating steps of an interactive voiceresponse (IVR system) system or with human-to-human communication (HTH).Many other manners of using an IVR system with or without HTH may beused in accordance with the preferred embodiment of this method.

[0168] As part of this example, the steps shown in FIGS. 11 and 12 maybe completed by an agent of the service provider, such as a servicerepresentative, or through the IVR system. Preferably, those steps notspecifically referring to use of a service representative are completedthrough the IVR system. This method of using this IVR system and HTHallows a subscriber (or probable subscriber) of restricted status,encumbered-line bypass, and/or other communications network services toreceive from and/or input information into a communications network.This communications network may be the communications network discussedabove and shown in part in FIG. 6, 7, 8, or 9, or another type ofcommunications network or system.

[0169] In step 702, a service provider receives a call from a potentialsubscriber intending to order or modify service. The service providerthen receives information, in some cases, one or more numbers from thepotential subscriber 704. These numbers are preferably a landlinetelephone number and an authorization code from the potentialsubscriber. After receiving the numbers, the service representativeattempt to validate one or more of the potential subscriber's numbersagainst a subscriber record database, step 706. If the informationreceived is valid, step 708, an attempt is made to validate that theservice is available in the subscriber's area, step 710.

[0170] The service representative attempts to validate that the serviceis available in the subscriber's area by comparing the area against adeployment database, step 710. If the service is not available, step712, the system informs the subscriber that the service is notavailable, step 716. The service representative then terminates the callfrom the subscriber, step 718.

[0171] If, on the other hand, the service is available, step 712, theservice representative asks that the subscriber enter a transfer number,according to the method set forth after step 714 (see FIG. 12).

[0172] Continuing with the preferred embodiment from step 714, FIG. 12sets forth a preferred embodiment of a method to enter a transfernumber. Entering a transfer number may be performed in other ways aswell. In this embodiment, however, the service provider receives thetransfer number entered by the subscriber, according to the method setforth after step 714.

[0173] If the subscriber does subscribe to the service provider's voicemessaging service, step 804, the service provider stores the voicemessaging service (VMS) access number as a forwarding number. Preferablythe service provider performs step 802 via a computer query to adatabase. If the subscriber does not, step 804, the servicerepresentative asks the subscriber if the subscriber subscribes toanother service provider's voice messaging service, step 814.

[0174] If the subscriber subscribes to another provider's voicemail,step 816, the service provider asks the subscriber for the appropriatenumber, step 818. If the service provider receives the access numberfrom the subscriber, step 820, the service provider then proceedsaccording to step 806. In step 806, the service provider stores thevoice-messaging service access number as the forwarding number.

[0175] If, on the other hand, the service provider does not receive anaccess number from the subscriber, step 816, the service providerproceeds according to step 808.

[0176] In step 808, the service provider activates the transfer numberand activates the service for the subscriber's landline telephonenumber. The service provider preferably activates the transfer number ina communications network element, such as a service node. If the voicemail number or voice mail access number is not received, the serviceprovider activates the number of a service node. In an exemplaryembodiment, the forwarding number is a special number the serviceprovider uses to transfer calls to a service node.

[0177] Then the service provider, in step 810, provides basic serviceinstructions as to how the subscriber is to update the service. After soproviding basic instruction, the service provider terminates the callwith the subscriber, step 812.

[0178]FIGS. 13-16 are flow diagrams showing examples of preferredembodiments of a method in accordance with the present invention. Thesefigures and the description set forth below describe a method whereby anInteractive Voice Response (IVR) system interacts with a subscriber.

[0179] This method of using this IVR system allows a subscriber ofnetwork services, including, for example, restricted status orencumbered-line bypass, to interact with a service provider. Thiscommunications network may be the communications network discussed aboveand shown in part in FIG. 6, 7, 8, or 9, or another type ofcommunications network or system benefiting from input or output throughan IVR system.

[0180] In step 1002 the IVR system receives identifying data from thesubscriber. Preferably this data is based on the telephone number fromwhich the subscriber is calling, or a subscriber-code that thesubscriber enters. After receiving the identifying data from thesubscriber, the IVR system validates, in step 1004, the subscriber as asubscriber of a service by comparing the identifying data with anidentifying-data record. The identifying-data record is preferablystored in a database accessible by the communications network.

[0181] If the IVR system validates the subscriber, the IVR systemproceeds to main menu step 1008. In step 1008 the IVR system prompts thesubscriber and preferably provides the following choices: (1) turn theservice on or off; (2) set schedule for the service; (3) setencumbered-line bypass list; or (4) select a forwarding number.Preferably, these choices are associated with appropriate digits, digits1 through 4 are given as one possible example.

[0182] If the IVR system receives a one digit from the subscriberaccording to step 1010, the IVR system performs a query to determine theservice status step 1012. The IVR system, once it has determined theservice status, announces the status to the subscriber according to step1014. After announcing the status, the IVR system sends this new statusto the communications network, preferably to an intelligent peripheralof the communications network, and in an exemplary embodiment an SCP,according to step 1016. The IVR system then returns, in step 1018, tothe main menu 1008.

[0183] With the above steps proceeding from step 1008 described, thefollowing sets forth another set of steps potentially proceeding fromstep 1008. If the IVR system receives a two-digit 1020, the IVR systemproceeds to step 1022. The IVR system queries the communicationsnetwork, preferably an intelligent peripheral of the communicationsnetwork, and in an exemplary embodiment an SCP of the communicationsnetwork, to retrieve the appropriate schedule. The IVR system thenproceeds to step 1024. If the schedule exists, the IVR system proceedsto step 1026. If it does not then the IVR system proceeds to step 1036in order for the IVR system to receive numbers entered by thesubscriber.

[0184] If the schedule exists, according to step 1024, the IVR systemplays the schedule, step 1026, to the subscriber. The IVR system thenprompts the subscriber to either keep or change the schedule that hasjust been played back to the subscriber, step 1028.

[0185] The IVR system waits to receive and then receives and collects adigit from the subscriber, either one or two in this case, step 1030. Ifthe IVR system receives or collects a one-digit, step 1032, the IVRsystem returns to the main menu, step 1018. If the IVR system collects atwo-digit according to step 1034 it proceeds to step 1036.

[0186] With the above steps proceeding from step 1008 described, thefollowing sets forth another set of steps potentially proceeding fromstep 1008. If the IVR system receives a three-digit, step 1038, the IVRsystem queries the communications network for the encumbered-line bypasslist according to step 1040. Preferably the IVR system queries anintelligent peripheral of the communications network. In an exemplaryembodiment the IVR system queries an SCP of the communications networkto retrieve the appropriate encumbered-line bypass list. After step1040, the IVR system proceeds step 1042, described in FIG. 15.

[0187] With the above steps proceeding from step 1008 described, thefollowing sets forth another set of steps potentially proceeding fromstep 1008. If the IVR system receives a four-digit, the IVR systemqueries the communications network for a transfer number in step 1046.Preferably the IVR system queries an intelligent peripheral of thecommunications network. In an exemplary embodiment the IVR systemqueries an SCP of the communications network. After step 1046, if anumber does not exist in step 1048, the IVR system proceeds to step1062.

[0188] If the number does exist, the IVR system plays the number to thesubscriber, step 1050. After playing the number, the IVR system,according to step 1052, prompts the subscriber to keep or change thenumber. The IVR system then waits to receive, for example, either aone-digit or a two-digit from the subscriber, according to step 1054. Ifthe IVR system receives a one-digit from the subscriber, step 1056, theIVR system returns to the main menu according to step 1058. If the IVRsystems receives and/or collects a digit according to step 1054 and ifthe digit is two-digit, step 1060, the IVR system proceeds to step 1062,which leads to FIG. 14 discussed below.

[0189]FIG. 14 shows a flow diagram of an embodiment of a method inaccordance with the present invention. The method set forth in FIG. 14represents a preferred embodiment of a method whereby an interactivevoice response system asks for and receives a schedule. In step 1036,which is also shown in FIG. 13, the IVR system receives a scheduleentered by the subscriber. The IVR system, according to step 1104,communicates with the subscriber, receiving, waiting and/or promptingthe subscriber to enter start and stop times and days. With thisinformation, the IVR system plays back the stop and start times and daysand other information in step 1106. In step 1108, the IVR system promptsthe subscriber to keep or change or otherwise edit the start and stoptimes and days and other information played back according to step 1106.In step 1110 the IVR system collects digits, for example a one-digit forkeep and a two-digit for change.

[0190] If the IVR system receives a one-digit from the subscriber, step1112, the IVR system communicates the schedule received by the IVRsystem in step 1104 to the communications network, step 1114.Preferably, the IVR system communicates the schedule to one or morecommunications network elements, such as an intelligent peripheral. Inan exemplary embodiment, the IVR system communicates the schedule to anSCP. After performing this step, the IVR system returns the subscriberto the provisioning menu, step 1116 (back to step 1008).

[0191] If, in step 1110 the IVR system collects a two-digit 1118, theIVR system proceeds to enter schedule step 1036, and the process beginsagain.

[0192]FIG. 15 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention. The method shown in FIG. 15 is,in part, a process whereby an IVR system interacts with a subscriber anda communications network. Preferably this method can be used tofacilitate receipt, by the communications network from the subscriber,of information related to additions, deletions, or adjustments on thatsubscriber's encumbered-line bypass list.

[0193] After performing step 1042 of FIG. 13, the IVR system proceedswith step 1202 of FIG. 15. In step 1204 the IVR system determineswhether or not an encumbered-line bypass list exists. If theencumbered-line bypass list does not exist, the IVR system proceedsaccording to step 1226, prompting the subscriber to enter a new numberor a star-digit if the subscriber is finished. If the encumbered-linebypass list does exist, step 1204, the IVR system proceeds to step 1206where the system prompts the subscriber to choose by input of a digit,to hear and edit numbers currently contained within the subscriber'sencumbered-line bypass list, to add numbers to the subscriber'sencumbered-line bypass list, or to go back.

[0194] In step 1206, if the IVR system receives, for example, aone-digit, the IVR system collects that digit according to step 1208,proceeds to step 1210, and then to step 1212 where it plays back thetelephone numbers in the encumbered-line bypass list. As part of step1212, the IVR system preferably guides the subscriber by presenting eachof the telephone numbers or pass-codes within the encumbered-line bypasslist to the subscriber in order. The IVR system can also includeparticular details. These particular details could, for example, includeinformation such as the name of the person associated with the telephonenumber. The name of the person could be associated with the number bypublic record, by receipt from the person having such number, by receiptfrom the subscriber, by having been previously received from thesubscriber and stored in information manager 610 or database 502, or bysome other means.

[0195] In step 1214 the IVR system prompts the subscriber to keep orchange a particular telephone number or pass-code in the encumbered-linebypass list. Preferably the IVR system also prompts the subscriber toedit the telephone numbers and pass-codes and associated details thatare on the subscriber's encumbered-line bypass list.

[0196] If the IVR system receives, for example, a one-digit from thesubscriber according to step 1216, the IVR system proceeds to step 1218.If there are more entries received from the subscriber, step 1218, theIVR system returns to step 1212, playing back telephone numbers andpass-codes in the encumbered-line bypass list and again proceedingthrough steps 1212, 1214 and so on. If there are no more entriesreceived from the subscriber, step 1218, the IVR system returns to step1206.

[0197] If, after prompting the subscriber according to step 1214, theIVR system receives a two-digit from the subscriber according to step1220, the IVR system proceeds to step 1226. Step 1226 will be discussedbelow.

[0198] With the above steps proceeding from step 1206 described, thefollowing sets forth another set of steps potentially proceeding fromstep 1206. As set forth above, the IVR system prompts the subscriberaccording to step 1206. If the IVR system receives a two-digit, forexample, rather than a one-digit as set forth above, the IVR systemcollects that digit according to step 1208 and proceeds to step 1224 andthen to step 1226. In step 1226 the IVR system prompts the subscriber toenter new telephone numbers and pass-codes to add to the subscriber'sencumbered-line bypass list, and preferably associated details for thosenumbers, or to enter a star-digit if the subscriber is finished.

[0199] From step 1226, the IVR system collects digits from thesubscriber according to step 1228. If the IVR system collects atelephone number or pass-code, the IVR system plays such number back tothe subscriber, step 1230. After playing back the number according tostep 1230 the IVR system prompts the subscriber to either keep or changethe telephone number or pass-code that the subscriber just entered, step1232.

[0200] In step 1234 the IVR system collects, for example, either aone-digit or a two-digit from the subscriber. In cases where the IVRsystem collects the one-digit, step 1236, it then saves the telephonenumber or pass-code that the subscriber previously entered, step 1222.Preferably it saves the telephone number or pass-code by storing it withthe encumbered-line bypass list in a database accessible by acommunications network. Also preferably, the IVR system updates theencumbered-line bypass list when it receives changes to the telephonenumbers and pass-codes. In cases where the IVR system collects thetwo-digit, step 1238, the IVR system proceeds to step 1226.

[0201] Preferably, the IVR system then allows the subscriber to continueto input numbers until the telephone numbers and pass-codes are correctand continue to be able to keep correcting them or allowing thesubscriber to continue entering additional telephone numbers andpass-codes into the encumbered-line bypass list until the subscriber issatisfied, either by the process described in FIG. 15 or some othersimilar process.

[0202] If, after prompting the subscriber according to step 1226, theIVR system receives an asterisk from the subscriber, step 1228, the IVRsystem proceeds to step 1240, then proceeds to step 1244. In step 1244,the IVR system sends updates to the telephone numbers and pass-codes,associated details, or other information to the information manager.Preferably the IVR system also sends the update to an intelligentperipheral of the communications network. In an exemplary embodiment,the IVR system sends an update list to an SCP of the communicationsnetwork. After so doing, the IVR system returns to the main menu, step1246.

[0203] In step 1228 the IVR system collects whatever digits have beenentered by the subscriber. If the subscriber has entered an asterisk,step 1240, the IVR system proceeds to step 1244. If the IVR system hasproceeded to step 1244 it sends an update list to the informationmanager. After setting an update according to step 1244, the IVR systemthen returns the subscriber to the main menu in step 1246.

[0204] Returning to step 1206. In cases where the IVR system has beenrequested to play back the telephone numbers and pass-codes on thesubscriber encumbered-line bypass list and every number in thesubscriber encumbered-line bypass list has been played back to thesubscriber, the IVR system proceeds to step 1242.

[0205] In step 1242 the IVR system, if it does not reach the maximumnumber of telephone numbers and pass-codes in an encumbered-line bypasslist, returns to step 1226. In cases where the maximum number oftelephone numbers and pass-codes that is allowed in the encumbered-linebypass list has been reached, the IVR system, according to step 1242proceeds to step 1244. The system then updates the communicationsnetwork according to step 1244 and returns the subscriber to the mainmenu, step 1246.

[0206] With the above steps proceeding from step 1206 described, thereis another set of steps potentially proceeding from step 1206. As setforth above, the IVR system prompts the subscriber according to step1206. If the IVR system receives an asterisk, step 1208, the IVR systemproceeds along the dash-line from after step 1208 to step 1240. The IVRsystem then proceeds according to step 1244 as described above.

[0207]FIG. 16 shows a flow diagram of a preferred embodiment of a methodin accordance with the present invention. The method set forth in FIG.16 is a preferred embodiment of a method whereby an interactive voiceresponse system receives a new or modified forwarding number. In step1302 the IVR system prompts the subscriber to enter a new or modifiedforwarding number. In step 1304 the IVR system receives one or morenumbers input from the subscriber. Once this IVR system has receivedthese numbers the IVR systems collects the numbers, preferablydigit-by-digit, according to step 1306. The IVR system then plays backthe numbers entered by the subscriber according to step 1308 to confirmcorrect entry.

[0208] In step 1310 the IVR system prompts the subscriber to keep (inthis example a one-digit) or change (in this example a two-digit) theinformation that was communicated back to the subscriber in step 1308.In step 1312 the IVR system collects a one-digit or a two-digit, perthis example. If the IVR system receives a one-digit, step 1314, the IVRsystem communicates the number to the information manager, step 1316.Preferably, the IVR system communicates the number to an intelligentperipheral of the communications network. In an exemplary embodiment,the IVR system communicates the number to an SCP of the communicationsnetwork. After sending the number to the information manager the IVRsystem returns the subscriber to the main menu in step 1318.

[0209] If the IVR system receives a two-digit from the subscriber,however, step 1320, the IVR system proceeds to step 1302, and returnsthe subscriber to the beginning.

[0210]FIG. 17 is a schematic diagram, portions of which show a preferredembodiment of the present invention. FIG. 17 sets forth a calling party1702, a database 1704, a communications network 1706, an informationnetwork 1708, and a called party 1710. Communications network 1706 isconfigured to communicate with calling party 1702, database 1704,information network 1708, and called party 1710. Database 1704 is shown“inside” communications network 1706, but may, in some embodiments, be“outside” of communications network 1706. If “inside” communicationsnetwork 1706, database 1704 may form a portion of communications network1706. If “outside” communications network 1706, database 1704 may beanother component in communication with communications network 1706.FIG. 17 sets forth these elements as a preferred embodiment of thepresent invention, and also as an aid to explain the functions ofcommunications network 1706.

[0211]FIG. 18 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention. This preferred embodiment setsforth, in part, a method showing how a communications network mayselectively notify and/or connect a calling party to a called party thatis connected to an information network, based upon the called party'spreferences. For clarity, the below description of the preferredembodiment refers to elements set forth in FIGS. 17 and 21-23, keepingin mind that many other different types and/or forms of elements canalso be used to practice the disclosed methods.

[0212] In step 1802, communications network 1706 receives a call fromcalling party 1702. Communications network 1706 may do so as set forthin the embodiments described above.

[0213] In step 1804, communications network 1706 determines whethercalled party 1710 is or is not connected to information network 1708.Information network 1708 may be a global Internet, an extranet, andintranet, or any other information network. Communications network 1706preferably determines whether or not called party 1710 is connected toinformation network 1708 by comparing the telephone number that calledparty 1710 is connected to with a list of telephone numbers stored indatabase 1704 that are used by information network 1708. In an exemplaryembodiment, communications network 1706 makes this determination bycomparing the telephone number that called party 1710 is connected towith a list of one or more telephone numbers stored in database 1704. Insome cases, called party 1710 previously communicated these telephonenumbers to communications network 1706. In other exemplary cases,communications network 1706 makes this determination throughcommunicating with information network 1708 or a service provider ofinformation network 1708.

[0214] If communications network 1706 determines that called party 1710is not connected to information network 1708, according to step 1806,communications network 1706 does not proceed to step 1808.

[0215] If communications network 1706 determines that called party 1710is connected to information network 1708, according to step 1806,communications network 1706 proceeds to step 1808.

[0216] In step 1808, communications network 1706 compares calling party1702's identifiers with information in database 1704. Communicationsnetwork 1706 may do so as set forth in the embodiments described abovewith reference to FIGS. 6, 7, 8, and 9.

[0217] If communications network 1706 determines that no identifiers ofcalling party 1702 correspond to information in database 1704, accordingto step 1810, communications network 1706 does not proceed to step 1812.

[0218] If communications network 1706 determines that one or moreidentifiers of calling party 1702 correspond to information in database1704, according to step 1810, communications network 1706 proceeds tostep 1812.

[0219] In step 1812, communications network 1706 notifies called party1710. Preferably, communications network 1706 notifies called party 1710that calling party 1702 has called called party 1710.

[0220] In an exemplary embodiment, a communications network 2106 (setforth in FIG. 21) notifies a called party 2110 of a first calling party2102's call through a pop-up window 2126. Pop-up window 2126 pops up ona screen 2124 of a called party's computer 2120. Communications network2106 preferably generates pop-up window 2126 by communicating with theservice provider of called party 2110's information network, such as aninformation network 2108.

[0221] After step 1812, communications network 1706 preferably proceedsto one of three connection options, set forth in FIG. 19.

[0222]FIG. 19 is a flow diagram of three preferred embodiments of amethod in accordance with the present invention. These preferredembodiments set forth, in part, methods showing how the communicationsnetwork may selectively connect a calling party to a third party or acalled party that is connected to an information network or disconnectthe call of the calling party, each based upon the called party'spreferences. For clarity, the description below of the preferredembodiments refer to elements set forth in FIGS. 17 and 21-23.

[0223] In step 1910, communications network 1706 disconnects calledparty 1710 from information network 1708 and connects calling party 1702to called party 1710. Communications network 1706 does so if certainidentifier(s) of calling party 1702 correspond to certain information indatabase 1704.

[0224] Communications network 1706 is configured to receive one or moreidentifiers from calling party 1702 or incident to calling party 1702'scall. Preferably, communications network 1706 picks up one or moreidentifiers as part of the transmission of calling party 1702's call.Communications network 1706 compares one of the one or more identifierswith information in database 1704. If one or more of the identifiescorresponds to the information in database 1704, communications network1706 may connect calling party 1702 to called party 1710 or connectcalling party 1702 to a third party or intelligent peripheral, dependingon which identifier corresponded to information in database 1708 and howsuch identifier corresponded. Communications network 1706 may, forexample, be configured to connect a calling party 1702 with a certainphone-number identifier to called party 1710 and another calling party1702 with another certain phone-number identifier to a transfer number,such as a voice mail line of called party 1710's choosing.

[0225] In an exemplary embodiment of step 1910, a communications network2106 (set forth in FIG. 21) disconnects a called party 2110 (which is ona called party's computer 2110) from an information network 2108 ifcertain identifier(s) of first calling party 2102 correspond to certaininformation in a database 2104. In this exemplary embodiment,communications network 2106 receives two identifiers as part of thetransmission of first calling party 2102's call. The first identifier ofcalling party 2102 is calling party 2102's telephone number,404-555-4444. The second identifier of calling party 2102 is the timethat communications network 2106 received calling party 2102's call, inthis example 8:13 p.m.

[0226] In this exemplary embodiment, with these two identifiers,communications network 2106 disconnects called party 2110 frominformation network 2108 and connect calling party 2102 to called party2110. Communications network 2106 does so because, as is shown in aninformation network bypass list 2122 (Bypass List 2122), which is storedas information in a database 2104, calling party 2102's identifier of404-555-4444 corresponds to a telephone number in Bypass List 2122 thathas disconnect times, and also because calling party 2102's identifierof a call time of 8:13 p.m. corresponds to the disconnect times by beingbetween 6 p.m. and 6 a.m.

[0227] Preferably, the communications network is capable of allowing acalled party to set his or her preferences such that calls that will bedisconnected may be done so either automatically or at the option of thecalled party.

[0228] Preferably, communications network 1706 can notify called party1710, as part of step 1812 or step 1910, that communications network1706 will disconnect called party 1710 from information network 1708.Communications network 1706 may notify called party 1710 through sound,such as from a computer being used by called party 1710 or called party1710's telephone, cell phone, or pager. Communications network 1706 mayalso notify called party 1710 through visual means, such as through acomputer being used by called party 1710, a lighted telephone or othercommunication device. These visual and audio means can be configured tocommunicate with called party 1710 as well as communicate informationfrom called party 1710 to communications network 1706.

[0229] The following exemplary embodiment shows how communicationsnetwork 1706 can notify called party 1710, as part of step 1812 or step1910, that communications network 1706 will disconnect called party 1710from information network 1708. In this exemplary embodiment,communications network 1706 notifies called party 1710 through a pop-upscreen 2208 (set forth in FIG. 22). As set forth in FIG. 22, pop-upscreen 2208 pops up from screen 2202 of called party's computer 2210. Inthe example shown in pop-up screen 2208, which is intended to be purelyexemplary of the invention, pop-up screen 2208 notifies called party1710 of the name of calling party 1702 (“Mom's cell phone”), thatcalling party 1702 will be connected to called party 1710's telephone(“Mom's cell phone will be connected”), and how long before the callwill be connected (“in 15 seconds”).

[0230] In step 1902, communications network 1706 disconnects calledparty 1710 from information network 1708 and connects calling party 1702to called party 1710 unless communications network 1706 receives acommand from called party 1710 to not connect calling party 1702.

[0231] If communications network 1706 does not receive a command fromcalled party 1710, according to step 1912, communications network 1706proceeds to step 1908. In step 1908, communications network 1706connects calling party 1702 to called party 1710 after disconnectingcalled party 1710 from information network 1708 (if necessary).

[0232] If communications network 1706 receives a command from calledparty 1710, communications network 1706 proceeds to step 1914.Communications network 1706 then follows steps 1914, 1916, and step 1918or 1920 as set forth below.

[0233] The following exemplary embodiment shows how communicationsnetwork 1706 can notify called party 1710, either as part of step 1812,step 1902, or otherwise, that communications network 1706 will connectcalling party 1702 to called party 1710 (and, if necessary, disconnectcalled party 1710 from information network 1708), through a pop-upscreen 2204 (set forth in FIG. 22) unless communications network 1706receives a command from called party 1710 to not connect calling party1710. As set forth in FIG. 22, pop-up screen 2204 pops up from screen2202 of called party's computer 2210.

[0234] In the embodiment shown in pop-up screen 2204, which is intendedto be purely exemplary of the invention, pop-up screen 2204 notifiescalled party 1710 of the name of calling party 1702 (“Dad at office”),that calling party 1702 will be connected to called party 1710'stelephone (“will connect”), and how long before the call will beconnected (“in 30 seconds”) if called party 1710 does not enter thecommand to not connect (by clicking on the “Don't Connect” button).

[0235] In step 1904, communications network 1706 asks (by notification)called party 1710 whether or not to connect calling party 1702 to calledparty 1710.

[0236] In an exemplary embodiment, communications network 1706 notifies,as part of step 1812 or step 1904, called party 1710 that communicationsnetwork 1706 is waiting for a reply from called party 1710, through apop-up screen 2206 (set forth in FIG. 22). As set forth in FIG. 22,pop-up screen 2206 pops up from screen 2202 of called party's computer2210.

[0237] In the embodiment shown in pop-up screen 2206, which is intendedto be purely exemplary of the invention, pop-up screen 2206 notifiescalled party 1710 of the name of calling party 1702 (“Mom's cellphone”), asks for a command to connect calling party 1702 (“Do you wantto connect?”) through two buttons (“Yes” and “No”).

[0238] In step 1906, communications network 1706 waits for some periodof time for a command from called party 1710. If communications network1706 does not receive a command, communications network 1706 proceeds tostep 1918. In step 1918, communications network 1706 handles the callfrom calling party 1702 according to a default disposition for the call.Called party 1710 may set such default for calls from particular callingparties, and/or for all calls according to the embodiments set forthherein.

[0239] In an exemplary embodiment, a communications network allows acalled party to set his or her preferences, which can be defaultpreferences, through an interface system as set forth in FIG. 23. Withthis embodiment of an interface system, the called party can entermultiple identifiers for a particular calling party. In Bypass List2302, the called party is allowed to set the telephone number of apotential calling party, the name for the calling party, the times atwhich the called party will be notified of a call from the callingparty, and days and time periods during which a call from the callingparty will be handled in different manners, including terminating,connecting, and notifying of the call.

[0240] In step 1912, if communications network 1706 receives a commandof “No,” communications network 1706 proceeds to step 1914. In step1914, communications network 1706 asks for another command from calledparty 1710 for a particular disposition for the call. In an exemplaryembodiment, communications network 1706 may ask called party 1710 toenter a disposition for the call in conjunction with step 1902 or 1812.

[0241] In step 1916, if communications network 1706 receives aparticular command, communications network 1706 proceeds to step 1920.Otherwise, communications network 1706 proceeds to step 1918.Communications network 1706 follows step 1918 as set forth above.

[0242] In step 1920, communications network 1706 follows the dispositionfor the call as commanded by called party 1710. Preferably,communications network 1706 asks for commands through pop-up windows,but may ask for input in many other manners familiar to those skilled inthe art.

[0243] In step 1906, if communications network 1706 receives a commandfrom called party 1710 to connect calling party 1702, communicationsnetwork 1706 disconnects called party 1710 from information network 1708(if necessary) and connects calling party 1702 to called party 1710according to step 1908.

[0244] In the example shown in pop-up screen 2206 (an example of step1904 or step 1812), which is intended to be purely exemplary of theinvention, pop-up screen 2206 notifies called party 1710 of the name ofcalling party 1702 (“Mom's cell phone”), that calling party 1702 will beconnected or not connected to called party 1710's telephone (“do youwant to connect”), if called party 1710 enters the command to connect ornot connect (by clicking on the “Yes” or “No” button). If called party1710 does not enter a command within a certain period of time, “Mom'scell phone” will be dealt with by communications network 1706 based uponcalled party 1710's preferences given to communications network 1706prior to receiving the call. Preferably these preferences areinformation stored in database 1704. In an exemplary embodiment, thesepreferences are Bypass List 2122 or information network bypass list 2302(Bypass List 2302).

[0245] Communications network 1706 preferably generates pop-up windows2204, 2206, and 2208 by communicating with the service provider ofcalled party 1710's information network, such as an information network1708.

[0246]FIG. 20 is a flow diagram of a preferred embodiment of a method inaccordance with the present invention. This preferred embodiment setsforth, in part, a method showing how the communications network mayselectively notify of and/or dispose of a calling party's call to acalled party that is connected to an information network, based upon thecalled party's preferences. For clarity, the below description of thepreferred embodiment refers to elements set forth in FIGS. 17 and 21-23.

[0247] In step 2002, communications network 1706 receives informationfrom a called party 1710. Communications network 1706 may receiveinformation as set forth in the embodiments above. Communicationsnetwork 1706 may receive, by way of example only, information comprisingBypass List 2122 and Bypass List 2302, as set forth in FIG. 23.

[0248] In step 2004, communications network 1706 stores informationreceived from called party 1710. Communications network 1706 may storeinformation as set forth in the embodiments above. Communicationsnetwork 1706 preferably stores the information into database 1704.

[0249] In step 2006, communications network 1706 receives a call fromcalling party 1702. Communications network 1706 may do so as set forthin the embodiments above.

[0250] In step 2008, communications network 1706 receives identifier(s)as part of a call of calling party 1702. Communications network 1706 maydo so as set forth in the embodiments above.

[0251] In step 2010, communications network 1706 determines whether ornot called party 1710 is connected to information network 1708.Communications network may do so as set for in the embodiments above. Ifcommunications network 1706 determines that called party 1710 is notconnected to information network 1708, communications network 1706 doesnot proceed to step 2012. If communications network 1706 determines thatcalled party 1710 is connected to information network 1708,communications network 1706 proceeds to step 2012.

[0252] In step 2012, communications network 1706 determines thedisposition preference for the call from calling party 1702.Communications network 1706 determines the disposition preference forcalling party 1702's call by comparing identifier(s) of calling party1702 to information in database 1704. Communications network 1706 maycompare identifier(s) of calling party 1702 to information in database1704 according to the embodiments set forth above.

[0253] Preferably, communications network 1706 accesses from database1704 detailed preferences of called party 1710, such as set forth inBypass List 2122. In an exemplary embodiment, communications network1706 accesses from database 1704 information on called party 1710'spreferences for a particular calling party as set forth for thatparticular calling party (“Mom's cell phone”) in Bypass List 2302.

[0254] In step 2014, communications network 1706 disposes of callingparty 1702's call according to called party 1710's dispositionpreference. Preferably, communications network 1706 disposes of callingparty 1702's call in a specific manner determined by certain identifiersof calling party 1702, such as the telephone number from which callingparty 1702 called, the time calling party 1702 called, and/or pass-codesreceived by communications network 1706 from calling party 1702.

[0255] In an exemplary embodiment of step 2014, “Grandma” calls. As hertelephone number (a second calling party 2112, telephone number“404-555-6666”) is not in the information in database 1704, as set forthin Bypass List 2122, communications network 1706 will not notify calledparty 1710 or connect “Grandma” to called party 1710. If, however,“Grandma” enters her pass-code (“77777”) after calling, communicationsnetwork 1706 will, according to called party 1710's preferences shown inBypass List 2122, notify called party 1710 regardless of when “Grandma”called. If “Grandma” enters her pass-code and is calling between 6 p.m.and 6 a.m., communications network 1706 will disconnect called party1710 from information network 1708 (if necessary) and connect “Grandma”to called party 1710.

[0256] Communications network 2106 preferably connects calling party2102 to a called party's telephone 2118. In some embodiments,communications network 2106 may connect calling party 2102 to a calledparty 2110 via called party's computer 2120. Preferably, communicationsnetwork 1706 connects calling party 2102 to called party's computer 2120if called party 2110 prefers to communicate with calling party 2102 overan information network 2108.

[0257] Communications network 1706 also allows called party 1710 to sethis or her preferences for handling a particular call from a particularcalling party in many ways as set forth in various embodiments above.

[0258] In an exemplary embodiment, shown in FIG. 23, called party 1710may set his or her preference so that a particular caller (“Mom's cellphone” in Bypass List 2302) will connect to a line other than the lineon which called party 1710 is currently connected to information network1708. For instance, communications network 1706 may allow called party1710 to set his or her preferences such that if “Mom's cell phone” callsat 6:04 a.m. (again for Bypass List 2302) on a particular day(“Weekday,” “Weekend,” or “Special”) the call connects to a transfernumber, such as a cell phone 2116, a second line 2114, an office number,a voicemail number, or certain custom numbers. Communications network1706 may also allow called party 1710 to set his or her preferences sothat “Mom's cell phone” is transferred to an intelligent peripheral,which can then terminate the call, preferably after an announcementmessage is played to “Mom's cell phone.”

[0259] Also as part of step 2014, communications network 1706 may, incertain embodiments, notify called party 1710 as set forth above.

[0260]FIG. 21 is a schematic diagram, portions of which show a preferredembodiment of the present invention. FIG. 21 describes a system by whicha communications network can handle calls from particular parties atparticular times according to a called party's preferences when thecalled party is connected to an information network.

[0261] Communications network 2106 is configured to communicate with adatabase 2104, a first calling party 2102, a second calling party 2112,a second telephone line 2114, a cell phone 2116, a called party'stelephone 2118, a called party 2110, an information network 2108, andcalled party's computer 2120. Communications network 2106 is alsoconfigured to communicate with called party 2110 via called party'scomputer 2120 visually or audibly. Communications network 2106preferably is configured to communicate with called party 2110 throughcalled party's computer screen 2124 with a pop-up window, 2126. BypassList 2122 sets forth an example of some of the information that can bein database 2104.

[0262]FIG. 22 describes a system by which a communications network cannotify and otherwise communicate with a called party via a screen on acalled party's computer. FIG. 22 sets forth three examples of pop-upscreens by which a communications network can communicate a called partyvia a called party's computer 2210 on its screen 2202. Three examples ofpop-up windows include a pop-up window 2204, a pop-up window 2206, and apop-up window 2208.

[0263]FIG. 23 is a schematic diagram, portions of which show a preferredembodiment of the present invention. FIG. 23 describes an example of oneway the present invention allows a called party to select his or herdisposition preference for a particular calling party. In this example,Bypass List 2302 sets forth a particular calling party, “Mom's cellphone”; when a communications network will notify the called party thatthe calling party is calling, “ALL”; the telephone number associatedwith the calling party, “505-555-7777”; and various days, “Weekdays,”“Weekends,” and “Special” that the time period (in this case, hourly)preferences for the calling party refer. Also, Bypass List 2302 setsforth an exemplary embodiment showing hourly preferences that determinehow the communications network handles a call from the calling partybased upon the time of day that the communications network receives thecall.

[0264] In this exemplary embodiment, if the called party had clicked thebox marked “Weekend,” and the box marked “Cell,” corresponding to a timeperiod of 6 a.m. to 5 p.m., the communications network would, onSaturday or Sunday from 6 a.m. to 5 p.m., connect “Mom's cell phone” toa telephone number set by the called party corresponding to “Cell.”Thus, once these preferences were set, a call from “Mom's cell phone”during these days and time period would be connected by thecommunications network to the called party's cell phone.

[0265] Also in this exemplary embodiment, if the called party clickedthe box marked “Special,” and the box marked “Custom Message #1,”corresponding to a time period of 7 p.m. to 12 a.m., the communicationsnetwork would, on days set by the called party (not shown), from 7 p.m.to 12 a.m., terminate “Mom's cell phone” after playing a custom messagechosen by the called party (not shown).

[0266] Many other preferences can be chosen through the screen of theinterface system shown in the exemplary embodiment in FIG. 23. Manycombinations also can be chosen as is known in the art for settingpreferences through an interface system. The examples set forth aboveare meant to be exemplary and not limiting.

[0267] The foregoing disclosure of the preferred embodiments of thepresent invention has been presented for purposes of illustration anddescription. It is not intended to be exhaustive or to limit theinvention to the precise forms disclosed. Many variations andmodifications of the embodiments described herein will be obvious to oneof ordinary skill in the art in light of the above disclosure. The scopeof the invention is to be defined only by the claims appended hereto,and by their equivalents.

[0268] Further, in describing representative embodiments of the presentinvention, the specification may have presented the method and/orprocess of the present invention as a particular sequence of steps.However, to the extent that the method or process does not rely on theparticular order of steps set forth herein, the method or process shouldnot be limited to the particular sequence of steps described. As one ofordinary skill in the art would appreciate, other sequences of steps maybe possible. Therefore, the particular order of the steps set forth inthe specification should not be construed as limitations on the claims.In addition, the claims directed to the method and/or process of thepresent invention should not be limited to the performance of theirsteps in the order written, and one skilled in the art can readilyappreciate that the sequences may be varied and still remain within thespirit and scope of the present invention.

What is claimed is:
 1. A method of notifying a called party of a callfrom a calling party comprising the steps of: receiving the call from acalling party; determining that a called party is connected to aninformation network; comparing one or more identifiers of the callingparty with information in a database; and notifying the called party ofthe calling party's call if one of the identifier(s) corresponds to theinformation in the database.
 2. The method of claim 1 further comprisingthe step of: disconnecting the called party from the information networkand connecting the calling party to the called party unless acommunications network receives, before a connection time-periodelapses, a command from the called party not to connect the call.
 3. Themethod of claim 1, wherein the step of notifying the called party of thecalling party's call includes questioning the called party to determineif the called party wishes to receive the call from the calling party.4. The method of claim 3 further comprising the steps of: receiving,from the called party, an assent for a communications network to connectthe calling party to the called party; disconnecting the called partyfrom the information network; and connecting the call of the callingparty to the called party.
 5. The method of claim 1, further comprisingthe step of disconnecting the called party from the information networkand connecting the calling party to the called party if one of theidentifier(s) of the calling party matches information in the database.6. The method of claim 1, wherein the information in the database isreceived by a communications network from the called party prior to thecommunications network receiving the call from the calling party.
 7. Themethod of claim 6, wherein the called party is permitted to change theinformation in the database by calling a number and communicating withthe communications network by communicating with an interactive voiceresponse system to modify the information in the database.
 8. The methodof claim 6, wherein the called party is permitted to change informationin the database by communicating with the communications network bycommunicating with an interface system to modify the information in thedatabase.
 9. The method of claim 1, wherein the information in thedatabase includes one or more telephone numbers associated with thecalled party.
 10. The method of claim 9, wherein one of theidentifier(s) of the calling party matches one of the telephonenumber(s) included in the information in the database.
 11. The method ofclaim 10 further comprising the step of: disconnecting the called partyfrom the information network and connecting the calling party to thecalled party if one of the identifier(s) of the calling party includes ahigh-priority pass-code included in the information in the database. 12.The method of claim 11, wherein the information in the database includesone or more pass-codes associated with the called party.
 13. The methodof claim 12, wherein one of the identifier(s) of the calling partymatches one of the pass-code(s) included in the information in thedatabase.
 14. The method of claim 13 further comprises the step of:disconnecting the called party from the information network andconnecting the calling party to the called party if one of theidentifier(s) of the calling party includes a high-priority pass-codeincluded in the information in the database.
 15. The method of claim 1,wherein the step of notifying the called party of the calling party'scall is performed by a communications network through the informationnetwork.
 16. The method of claim 15, wherein the step of notifying thecalled party of the calling party's call includes a pop-up window. 17.The method of claim 1, wherein the information in the database includesan information network bypass list.
 18. The method of claim 17, whereinthe information network bypass list includes one or more telephonenumbers, time periods, and pass-codes.
 19. The method of claim 18,wherein one of the identifier(s) of the calling party includes atelephone number, a pass-code, or a time in which the calling partycalled.
 20. The method of claim 1 further comprising the step of:receiving one of the identifier(s) of the calling party as part of thetransmission of the calling party's call.
 21. A method by which acommunications network manages a call from a calling party to a calledparty comprising the steps of: receiving information from a called partyprior to receiving a call from a calling party; storing the informationin a database; receiving the call from the calling party; receiving oneor more identifiers of the calling party as part of the calling party'scall; determining that the called party is connected to an informationnetwork; determining a disposition preference for the call by comparingone or more of the identifier(s) of the calling party with informationin the database; and disposing of the call according to the dispositionpreference.
 22. The method of claim 21, wherein the dispositionpreference includes transferring the call from the calling party to atransfer number.
 23. The method of claim 22, wherein the transfer numberis a voice mail number.
 24. The method of claim 22, wherein the transfernumber is a cell phone number.
 25. The method of claim 21, wherein thedisposition preference includes transferring the call from the callingparty to an intelligent peripheral.
 26. The method of claim 25 furthercomprising the step of: playing an announcement to the calling party.27. The method of claim 26 further comprising the step of disconnectingthe calling party from a communication network.
 28. The method of claim21, wherein the disposition preference includes disconnecting the calledparty from the information network and connecting the calling party tothe called party.
 29. The method of claim 28 further comprising the stepof disconnecting the called party from the information network andconnecting the calling party to the called party.
 30. The method ofclaim 29, wherein the disposition preference is dependent on the timethat a communications network received the call from the calling party.31. The method of claim 21, wherein the information in the databaseincludes one or more telephone numbers associated with the callingparty.
 32. The method of claim 31, wherein one of the identifier(s) ofthe calling party matches one of the telephone number(s) included in theinformation in the database.
 33. The method of claim 21, wherein theinformation in the database includes one or more pass-codes associatedwith the called party.
 34. The method of claim 33, wherein one of theidentifier(s) of the calling party matches one of the pass-code(s)included in the information in the database.
 35. The method of claim 21,wherein the called party is permitted to change the information in thedatabase by calling a number and communicating with a communicationsnetwork using an interactive voice response system to modify theinformation in the database.
 36. The method of claim 21, wherein thecalled party is permitted to change the information in the database bycommunicating with a communications network using an interface system tomodify the information in the database.
 37. The method of claim 21further comprising the step of: notifying the called party of thecalling party's call and the disposition preference by a communicationsnetwork through the information network.
 38. The method of claim 37,wherein the step of notifying the called party includes a pop-up window.39. The method of claim 21, wherein the information in the databaseincludes an information network bypass list and one of the identifier(s)includes a telephone number from which the calling party is calling. 40.The method of claim 21, wherein the information in the database includesan information network bypass list and one of the identifier(s) includesone or more pass-codes.
 41. The method of claim 21, wherein theidentifier(s) of the calling party are received as part of thetransmission of the calling party's call.
 42. The method of claim 21,wherein the information in the database includes one or more timeperiods associated with the calling party.
 43. The method of claim 42,wherein one of the identifier(s) of the calling party corresponds to oneof the time period(s) included in the information in the database.