Method for public access to private phone numbers and other telephonic peripherals using a caller access code

ABSTRACT

A caller places a telephone call and enters an access code when calling a subscriber. The caller&#39;s access code signal is generated by the caller when the caller inputs his or her access code. The call is transmitted over the Public Switched Telephone Network to a subscriber&#39;s telephone number. A Call Router Server capable of receiving the caller&#39;s telephone call and the caller&#39;s access code signal is provided. The Call Router Server detects the caller&#39;s access code signal and then directing the caller&#39;s telephone call to the subscriber to be completed in a particular manner based upon the caller&#39;s access code. An Access Code Server which is Web server is provided that allows a subscriber to input the manner in which incoming telephone calls will be received and completed based upon the access code signal that is received by the Call Router Server. This information is stored on a Database Server, which instructs the Call Router Server on the proper routing pattern of the incoming telephone call.

BACKGROUND OF INVENTION

“POTS” is an industry-recognized acronym for “plain, old telephone service.” A POTS line is a telephone line, with a telephone number, like the standard ones subscribed to by residences and many small businesses. POTS lines are switched services. Telephone calls made from a POTS line are placed on the Public Switched Telephone Network (PSTN), which is the public telephone service (i.e., the telephone system). When a call is made, the call is coupled through one or more telephone lines and one or more switches to its desired terminus. When a caller places a telephone call, the call is connected to a switch at the central office in the caller's area. The central office is the location, usually a building, that houses telecommunications switching equipment or trafficking systems. At the central office, the call is placed over a central-office trunk, which in turn terminates at another central office in the receiver's area. The central-office trunk is the communications path between the two central offices. After the call is received by the central office in the receiver's area, the call is routed to the recipient.

Modern switching has far surpassed the day when human local operators connected calls to local residences and businesses at the central office. Today's switching involves the use of powerful computers and complex electrical circuits and electronics. The modern central office not only performs traditional switching of analog voice signals, but supports digital voice, text, image and data communications via ISDN (short for “integrated services digital network” which is the digital end to end telecommunications network).

Modern central office switches offers subscribers a wealth of basic and advanced features including: abbreviated dialing, alarm call, call rerouting-busy, call waiting, call rerouting-no answer, call charge indicator, toll-free calling, conference calling, direct dialing to extensions, emergency call area, hot lines, call tracing, incoming call block, individual call record, outgoing traffic limitations, override block, subscriber with special services, subscriber priority, and three-way calling. Advanced features are provided to subscribers whose systems are equipped with ISDN Basic Rate (2B+D) or Primary (23B+D) Interfaces. Advanced features include automatic call-back, call forwarding, call hold, call pickup, call rerouting when busy, call waiting, charge handling, data transmission, dedicated connection, display information, incoming call block, multiline hunt groups, user groups and closed groups. Since the World Wide Web can be accessed via the telephone lines, future services available to telephone subscribers at the central office switch are imponderable.

While all these technological solutions provide valuable options to the subscriber, they have also provided new problems-coordination and administration of these services. A telephone subscriber may want one individual caller to be treated in one manner, and another individual caller to be treated in another manner. For instance, a subscriber may want to allow some individuals but not all callers to ring the subscriber's line. The subscriber may want to allow unfettered access to the subscriber's line for his or her parents, but not a telemarketer. The subscriber may want to be protected against automatic dialers but make sure his or her friends have the ability to place a telephone call to the subscriber undisturbed.

For instance, a subscriber may want to allow a salesperson to call him or her at home, but prevent the salesperson from making follow-up calls, once it is determined that the service or commodity is not desired. Alternatively, a subscriber may want to give someone temporary access with the option of later determining whether they would like to receive that individuals telephone calls. For instance, a subscriber may want to give out a phone number at the beginning of a personal relationship, but deny access to the private line after the relationship is over. Another option is directly routing callers to a voice mailbox should the phone be busy, so that subscriber is undisturbed while other callers that the subscriber may deem of higher priority are put through to call-waiting and are allowed to disrupt the phone call. It is possible the subscriber would like to have some of his or her phone calls forwarded to the residence of friends to be visited that evening, but not others. The telephonic system is programmable so that the subscriber is provided the option of having some of the phone calls forwarded to a cellular phone, or a voice over the Internet connection.

The subscriber may want some callers to receive certain personal announcements, but not others. For instance, the subscriber may want to give directions to the subscriber's residence to people who will be visiting the subscriber's residence tomorrow, leave a reminder to the subscriber's spouse to pick up milk on the way home from work, and leave yet another message to a co-worker that a particular project has been completed. Or, if the subscriber's time is valuable, he may want to charge particular callers fees to speak to the subscriber or access certain -services or information. In the business setting, a subscriber may want to have the ability to alter whether a particular person receives a pager, voice mail, e-mail with a voice attachment, or is put through on a voice line. U.S. Pat. No. 5,276,731 entitled “Method and Apparatus for Handling Incoming Telephone Calls” discloses the use of Personal Identification Numbers as applied to the general field of telephony, but does not disclose using the Internet.

The permutations are seemingly endless, and are limited only by the number of potential callers and services provided. Traditionally, the subscriber calls the phone company and selects what service they want. They may be interviewed by a live person at the telephone company, or alternatively, may be put through a voice mail box which will activate certain services by traditional voice or touch-pad recognition. Not only is this process cumbersome and laborious, but the data needs to be saved on a computer, adding additional hardware cost to the central office. These computers may not only be expensive, but may be of a proprietary nature in which the telecommunication company would like to limit access. What is needed is a way to coordinate and arrange all these options offered by the telephone company so that they may be put at the subscriber's finger tips.

SUMMARY OF INVENTION

Our invention relates to a method to give a subscriber control over his or her telephone at the subscriber's fingertips through the use of access codes that are distributed to callers. The incoming telephone call may be one made over the “regular” telephone network (the Public Switched Telephone Network) or the Internet. Our invention uses two networks, the public-switched telephone network and the Internet. These two networks are interlinked using an Internet gateway. The marriage of the two networks provides for an unprecedented ability to put control into the hands of the subscriber. Our invention allows the subscriber to dictate how a call is to be routed to the subscriber based on the access code input by the subscriber. This information is input using the Internet, empowering the subscriber with greater control and ease of use.

This invention is directed toward a telephonic system comprised of three major servers: an Access Coder Server (ACS), a Database Server (DBS), and a Call Router Server (CRS). All three servers are computers that have a Central Processing Unit, memory, an operating system and application software. The Access Code Server is an input device for receiving instructions on how telephone call and executes routing instructions. The Access Code Server is on the Internet. The Database Server is a storage device for data used by those routing instructions. The Database Server and the Call Router Server may be either be on the Internet or the Public Switched Telephone Network.

This invention allows a subscriber to program how incoming telephone calls will be treated using the Internet. Using a computer at home, the subscriber inputs data regarding call treatment using a web site which is hosted by an Access Code Server. These data are sent from the Access Code Server to the Database Server where they are stored until needed (i.e., when an incoming telephone call is received).

The Call Router Server receives incoming telephone calls and routes them as outgoing telephone calls. The incoming telephone calls may either be a PSTN telephone call or a VoIP incoming telephone call. The outgoing telephone calls may either be to PSTN telephonic peripherals or to IP telephonic peripherals. The Call Router Server intercepts the incoming telephone call and seeks data from the Data Base Server 94 for routing calls. The Call Router Server forwards the call to the correct telephonic peripheral in accordance with the instructions.

The access code could be a DTMF signal, more commonly known as a Touch-Tone Signal®, entered on the phone key pads. DTWF stands for “Dual-Tone Multiple Frequency” and is widely known in the industry. The keypads on the phone are assigned a unique combination of sounds of two different frequencies. The access code could also be stated verbally by the caller. The access code could even be the mere recognition of the caller's voice, without the articulation of particular words to be spoken.

By “telephonic peripheral” is meant any device that is interconnected to a telephone and is capable of being used in conjunction with the pubic telephone system or the Internet to provide additional service. PSTN telephonic peripherals include, but are not limited to, one or more one-way pagers, one or more two-way pager, emergency operator fallback, one or more wireless phones, one or more private lines, call waiting, call query, one or more voice mail boxes, one or more personalized messages, and video conferencing. Internet telephonic peripherals include, but are not limited to, one or more Internet one way pagers, one or more Internet two way pagers, emergency operator fallback, e-mail with voice attachment, Internet Call Waiting, one or more VoIP private lines, Call Query, any number of Personalized messages, Internet call limits and Internet Video Conferencing.

Internet Video Conferencing.

Using one's computer at home, a modem and a web browser, the subscriber accesses the Access Code Server over the Internet and inputs access code information. Interfacing with a web page, the subscriber enters access code numbers followed by entries indicating the manner of call treatment for each access code. Using the web page, the subscriber selects the services (i.e., the telephonic peripherals to be made available to the caller) that the subscriber wants and determines how each access caller is treated and inputs this data on the Access Code Server. The telephonic system is also capable of allowing the subscriber to select how callers without access codes are treated. The telephonic system is programmable to allow routing either generally without regard to the location that the call is being placed, or based upon the CLID of an incoming PSTN telephone call or the IP address of the incoming VoIP telephone call.

The telephonic system is capable of being programmed by the subscriber so that person A is sent to a pager when he enters his access code; person B is put through to a voice line when she enters her access code; person C receives a message personally addressed to C when he enters his access code; person D has her calls forwarded to a particular residence when she enters her access code; person E is able to create e-mail with a voice attachment when he enters his access code; person F is queried as to nature of his call when she enters her access code; person G has the ability when he enters his access code to be on call-waiting and interrupt a phone call with beeping if the subscriber is on the phone; person H is not be allowed when he enters his access code to be on call-waiting and interrupt a phone call with beeping should the subscriber be on the phone; person I is sent to a particular extension when she enters her access code, person J is sent to a particular mailbox of the subscriber when he enters his access code, person K is sent to another mail box when she enters her access code, person L has to pay to speak to the subscriber when he enters his access code; and all people without access codes are able to get through the private line between the hours of 7 P.M. to 8 P.M. by pressing a number on their DTMF phone. The telephonic system is programmable so that other callers may be given the option of calling a number of the telephonic peripherals.

The telephonic system is capable of being programmed so that person M is given the option of being sent to the private line, forwarded to a neighbor's residence where a particular family member is visiting that evening, or paging yet another family member. These options are created by giving person M multiple access codes individually keyed to various telephonic peripherals, or by having one access code trigger a computer-generated voice menu. The subscriber inputs his or her selection into the Access Code Server. The subscriber then distributes access codes to future callers. Routing calls as just described based on the type of access coded may be thought of as “Access Code Routing.” The subscriber may decide to keep matters simple and distribute only two or three access codes, whereby one access code is given to one group that is to be treated in one manner, and the second group receives the second access code and is treated in another manner.

Once the subscriber has determined how the incoming telephone call should be treated if certain access codes are entered, this information is sent from the Access Code Server to the Database Server by way of an Access Code Preferences Signal. This information is then stored in a memory of the Database Server. The Call Router Server has a Subscriber's Rules Program which contains the instructions on how to route the incoming telephone call based on the access code entered by the caller.

The caller makes a telephone caller over the Public Switched Telephone Network (PSTN) or the Internet. The telephone call is intercepted by the Call Router Server and the caller is asked for an access code. The Call Router Server transmits the access code to the Data Base Server and requests data for routing the call.

The aforementioned method of routing calls is predicated on the access code of the caller (and is therefore called “access code routing”) and is not routed based on the location of the origin of the call. This can be overridden. Callers can be routed based on their telephone number or CLID (acronym for “calling line identification number”). This type of routing may be referred to as “CLID Routing.” Under this aspect of our invention, the subscriber could dictate that calls from a particular telephone number (maybe the subscriber's mother's telephone line) is put through to the private line without using an access code. Such a call processing may be thought of as “CLID Routing overriding Access Code Routing” because the system is indifferent as to whether callers from certain CLIDs knew or did not know certain access codes. Our invention contemplates the use of a hybrid of Access Code Routing and CLID Routing.

There is also an option that all callers from a particular CLID will be routed in a particular manner unless they have a particular access code. Suppose a subscriber wanted all calls from a subscriber's spouse's employer to be sent to a voice mailbox so that they are not disturbed during eating hours, but wanted the subscriber's spouse to be able to call home and use the private line. Under such a scenario, the subscriber could program the Access Code Server so that all calls from the spouse's employer's CLID will be answered by a voice mailbox, whereas if the spouse enters his or her access code, the spouse is put directly through to the private line. This process may be thought of as “Access Code Routing overriding CLID Routing” because a person with a particular access code could override the normal setting of call treatment for a particular CLID.

This invention exploits the creative potential of the Internet and employs it in the telephonic environment. Today's Web browsers provide a user friendly environment to use the Internet. The Internet puts the development of information into the hands of subscribers themselves. The Internet represents a unique opportunity to allow the telephone subscriber to control his or her telephone with great ease. The ACS is a Web server which sends a control signal over an Internet to the PSTN call-router. The ACS is a gateway that bridges the public telephonic network with Internet. The subscriber conveniently inputs how the subscriber's telephone is to be used, by using a computer that may be at the subscriber's home or office. The subscriber accesses the Internet using a modem and a Web browser, and enters the URL (Uniform Resource Locator, more colloquially known as the “web address”) of the web site located on a Web server that is functioning as the Access Code Server. After accessing the web site, the subscriber can easily alter how each call is handled based on access code to facilitate Access Code Routing. CLID Routing could also be implemented, as could Access Code Routing overriding CLID Routing.

This invention is specifically implemented to provide public access (access from the public telephone network) to a private phone line. The subscriber decides who has access to his phone by distributing access codes. The subscriber could time-stamp the access codes to the private phone line (or for that matter, any of the other telephonic peripherals) so that the private phone line would only be valid for certain time periods. At subscriber's wish, certain callers would have access only during certain times of the day, or a certain period of days, etc. The subscriber may change the access codes that enable a particular caller to access the private phone line. This has the effect of having an unlisted telephone number that constantly can be changed with respect to any one or group of particular callers.

Our invention facilitates Virtual Number Portability. “Virtual Number Portability” is the ability to move outside of a subscriber's immediate switch area but keep the same local telephone number. Virtual Number Portability may (but not must) include the ability to use the same telephone number in other parts of the country, or even other parts of the world. Virtual Number Portability is a step toward “one number for life.” People may receive telephone numbers like social security numbers-their individual telephone number would simply follow them wherever they go. To obtain Virtual Number Portability, the subscriber need only use the call forwarding feature and forward telephone calls to the subscriber's new line. It could function as call forwarding on a more permanent basis. As the subscriber moves from one location to another, the subscriber could simply have his or her calls forwarded to the new lines. All this could be easily done by using the Access Code Server. The subscriber would simply find out the phone number of the line he is moving to, and forward all the calls to that number. The subscriber would have the same ability to route telephone calls in particular manners based on available options at the new local. The entire telephonic system is portable. The telephonic peripherals would simply be at the new location. To avoid long-distance trunk charges, the call could be placed using the voice over Internet protocol.

Our invention transcends Virtual Number Portability in that the calls could be divided up as members of a household (or business) move. Thus, there is Individual Virtual Number Portability. Suppose that four people-father, mother, son and daughter-live in Seattle. Further suppose father and mother move to Florida to retire, and son goes to college in New York City and daughter goes to college in Boston. The Access Code Server could easily be programmed so that callers who have the parents' access code are forwarded to their home in Florida; the callers who have the son's code are forwarded to New York; and the callers that who have the daughter's code are directed to the daughter's phone in Boston. Particular callers could also be given multiple access codes and told which access codes will reach what parties. Thus, someone could easily be enabled to call the mother and father, the son and the daughter by simply knowing the original telephone number and the access codes. No matter how many times the children change dorm rooms, or the parents move around the world to sightsee, these numbers would remain valid. This would obviate the necessity of the four to contact all their friends, relatives and business acquittances and tell them of their new phone number.

Currently, phone numbers reveal the general location of a person via the area code and the following three digit exchange. Thus, in order to have a person reach them at their residence this information must be revealed. With our invention, if someone wanted to move without revealing information as to where they are moving, they could since there is no new phone number.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of the invention.

FIG. 2 is a block diagram of Programming for the Access Code Server FIG. 3 is the home page of the web site located on the access server.

FIG. 4 is the second web page located at the access code server.

FIG. 5 is a third web page located on the access code server.

FIG. 6 is a fourth web page located on the access code server.

FIG. 7 is a fifth web page located on the access code server.

FIG. 8 is a sixth web page located on the access code server.

FIG. 9 is a seventh web page located on the access code server.

FIG. 10 is an eighth web page located on the access code server.

FIG. 11 is a ninth web page located on the access code server.

FIG. 12.1 s a tenth web page located on the access code server.

FIG. 13 is a block diagram of the Advanced Intelligent Network.xxx

FIG. 14 is a block diagram of Local Number Portability.

FIG. 15 is a block diagram of the Call Router Server.

FIG. 16 is a block diagram showing the subsystem that indicates the subscriber is on-line.

FIG. 17 is a block diagram of the telephonic peripherals on the PSTN.

FIG. 18 is a block diagram of the telephonic peripherals on the Internet.

DETAILED DESCRIPTION OF THE DRAWINGS OF THE PREFERRED EMBODIMENT

Detailed embodiments of our invention are disclosed herein. However, the disclosed embodiments are merely exemplary of our invention, which may be embodied in various forms not characterized by the preferred embodiments. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and a representative basis for teaching one skilled in the art to variously employ our invention in any detailed structure. What follows is a preferred embodiment of the invention. Embodiments other than the preferred embodiment are contemplated in the claims.

Brief Overview of Operation

This invention is directed toward a telephonic system 8 comprised of three major servers: the Access Coder Server (ACS) 26, a Database Server (DBS) 94, and a Call Router Server (CRS) 28. All three servers are computers that have a Central Processing Unit, memory, an operating system and application software. The Access Code Server 26 is an input device for data on how to route telephone calls. The Database Server 94 is a storage device for those data. The Call Router Server 28 is a device that actually routes the incoming telephone call in accordance with the stored routing data. The telephonic system 8 may be seen in FIG. 1. The Access Code Server 26 is on the Internet 32. The Database Server 94 and the Call Router Server 28 may be either be on the Internet 32 or the Public Switched Telephone Network 14.

This invention allows a subscriber to use the Internet 32 to program how incoming telephone calls 10(a) and 10(b). At a computer 70 at home the subscriber inputs data regarding call treatment using a web site 76 which is hosted by an Access Code Server 26. Data is sent from the Access Code Server 26 to the Database Server 94 where it is stored until needed (i.e., when an incoming telephone call is received).

The Call Router Server 28 receives incoming telephone calls 10(a) and 10(b) and routes them as outgoing telephone calls 114(a) and 114(b). The incoming telephone calls may either be a PSTN telephone calls 10(a) or VoIP incoming telephone calls 10(b). The outgoing telephone calls may either be to PSTN telephonic peripherals 40(a), or to IP telephonic peripherals 40(b). When the incoming telephone call 10(a) or 10(b) is received by the Call Router Server 28, the Call Router Server 28 seeks routing data regarding call treatment. It sends a signal requesting routing data to the Data Base Server 94 where the routing data are stored. In response, the Data Base Server 94 sends call routing data to the Call Router Server 28. When the Call Router Server 28 is provided with the call routing data, the Call Router Server 28 forwards the call to the correct telephonic peripheral 40(a) or 40(b) in accordance with the instructions.

Each of the servers is further described followed by a section that indicates how the system operates as a whole. The discussion begins with the telephonic peripherals to which the telephone call will be directed. The discussion continues with the servers need to program and route the incoming telephone calls to those telephonic peripherals.

Telephonic Peripherals

The telephonic system 8 takes incoming telephone calls 10(a) and 10(b), and sends them to telephonic peripherals 40(a) and 40(b). The telephonic system 8 is designed to allow the subscriber to easily vary the telephonic peripheral available to the caller making the telephone call based on the caller's access code, the location of where the caller is calling, or a combination of both. By a “telephonic peripheral” it is meant a device capable of receiving an outgoing telephone call in a manner so that it is practically useful to the subscriber. More simply, they are end user devices that ultimately receive the phone call. Those telephonic peripherals located on the Public Switched Telephone Network 14 are numbered 40(a). Those telephonic peripherals located on the Internet 32 are number 40(b).

FIG. 17 shows telephonic peripherals 40(a) located on the PSTN. Some of these peripherals are associated with the POTs(Plain Old Telephone) phone of the caller 90 as shown in FIG. 17. These telephonic peripherals could just as easily be associated with other wireless phones. Of those associated with a POTs phone 90, the first telephonic peripheral is the private line 46(a). The telephone number for the private lines 40(a) are hidden from the public. The private lines 46(a) can only be reached by the subscriber programming the system so that the caller is allowed to reach it. There can be one or more private lines 46(a). A “private telephone line” is a telephone line whereby the number to the telephone line is known only to the telecommunications provider or is in some other matter kept secure. A “public telephone number” is a telephone number made available to the public either by traditional printed methods—or listing in the phone book—or by the subscriber's giving it away. The callers call the subscriber using the public number. By entering the correct access code, or calling from the right CLID, they are put through to the private line with the telephone number not known to the public.

The private line 46(a) telephonic peripheral is very useful. By simply permanently forwarding telephone calls to a new private line located outside the subscriber's area, the subscriber can create an alternate permanent telephone line. An “alternative permanent telephone line” is a telephone line that is moved to the subscriber's new home, business, or other place of use but that would still use the subscriber's old local telephone number. This creates “Virtual Number Portability.” With Virtual Number Portability, the subscriber can move all over the country, if not the world, without having to use a new telephone number. keep the same local telephone line. To accomplish this, the telephonic system is programmable to forward the telephone calls to a plurality of alternative permanent telephone numbers based on access codes. Callers who want to reach more than one member of the group, are issued an access code for each member that the caller would like to telephone. This creates “Individual Virtual Number Portability.” By “Individual Virtual Number Portability” it is meant that a group of individuals that use a particular telephone line and the associated telephone number would have the ability to move outside of a subscriber's immediate switch area, different members of the group going to individual locales, with all individuals keeping the same local telephone line.

The second telephonic peripheral 40(a) on the POTs phone 90 is call waiting 58(a). The general public is familiar with call-waiting and additional explanation is not necessary. The system 8 is programmable so that only some of the callers may interrupt a telephone call with a call-waiting signal. Others are put through to other telephonic peripherals such a voice mail boxes.

Voice mail boxes 52(a) form a third telephonic peripheral 40(a) associated with a POTS phone 90. The system 8 features any number of voice mailboxes 52(a) to which telephone calls may be directed. A subscriber can program the system 8 so that all calls from person X are sent to one mailbox, all calls for person Y are sent to another, etc. . . .

The system also feature “call query” 54(a) as one of the telephonic peripheral 40(a). The query can regard just about anything desired by the subscriber. The caller is queried and the response to the query forwarded to the subscriber, who would then determine whether to take the call. Under one feature of this option, the subscriber is inquired as to the nature or purpose of the telephone call. Under another option, the call billing 165(a) telephonic peripheral, the callers with (or without) particular access codes could be asked whether or not they would be willing to be billed to have a call completed in a particular manner, such as speaking to the subscriber or access information. The telephone company would then bill the caller using well-known technology.

The public is familiar with personalized messages 92(a). The system is programmable so that the personalized message may be particularly tailored to a caller or a group of callers. Another telephonic peripheral 40(a) associated with the POTs phone is “call limits” 90(a). As the name suggests, this prevents the caller from calling more than a certain number of allotted times.

Turning to the PSTN telephonic peripherals 40(a) not associated with the POTS phone, the system provides any number of one way pagers 41(a). A “one-way pager” is a wireless,

Turning to the PSTN telephonic peripherals 40(a) not associated with the POTS phone, the system provides any number of one way pagers 41(a). A “one-way pager” is a wireless, portable device that receives simplex (communications in one direction) messages from a caller over the Public Switched Telephone Network, that is small enough to be kept on the subscriber's person, and that is incapable of a real-time voice conversation. The messages may be numeric, alphanumeric, or some other visual, audio, or tactile indication mechanism such as blinking lights (visual), beeping (audio) or vibration (tactile). Similarly, another telephonic peripheral 40(a) is the two-way pager 41(b). A “two-way pager” differs from a “one-way pager” in that messages may be sent in both directions.

Emergency operator fallback 86(b) is a telephonic peripheral 40(a) that allows the caller to reach an human operator in the case of emergency. It is a “fall back” device in that it can be used when the subscriber is not available, but the caller must be treated immediately by a human operator. Other telephonic peripherals 40(a) include wireless phones 48(b). By “wireless phone” it is meant any wireless phone including an analog cellular phone, a digital phone, or a PCS phone.

The telephonic peripherals 40(b) associated with the Internet are shown in FIG. 18. Instead of the POTs phone, many IP telephonic peripherals 40(b) are located on the subscriber's home computer 70 and the VoIP phone associated with that computer 70. There are any number of VoIP private lines 46(b), which are similar in nature to their PSTN counterparts except that they are on the Internet and use the Internet Protocol. Many of the telephonic peripheral functions found on the PSTN, are simply duplicated on the Internet, including: Internet one-way pager 41(a), Internet two-way pager 42(b), Internet Emergency Operator Fallback 86(b), IP Wireless Phone 48(b), Call Billing 165(b), and Call Limits 90(a). E-mail with a voice attachment 52 is also available.

Another telephonic peripheral available to the caller would be Internet call waiting 82. With Internet call waiting 82, when the call is placed on the public switched telephone network 14 and the subscriber is on the Internet, the subscriber will receive a prompt informing him that someone is calling. After the prompt, the caller may elect to take the telephone call, which will be translated into packets and sent via VoIP to the subscribers computer terminal 70. The subscriber can then listen to the telephone call without interrupting his Internet web session. This obviates the need for two separate telephone lines if one is to be able to accept a phone call while on the Internet. Converting an analog voice signal into VoIP utilizes well-known technology.

The Access Code Server

Having provided an overview of the telephonic peripherals that are available to callers, the mechanism for programming which telephonic peripherals will be made available to the caller will now be treated. The Access Code Server 26 is a server that is used by the subscriber to program the telephonic system 8. The Access Code Server 26 has a Central Processing Unit, memory, an operating system, and application software. The Access Code Server 26 is located on the Internet and hosts a web page 76 which is used by the subscriber to input call routing data. The purpose of the Access Code. Server is to provide a mechanism so that the subscriber can input his preferences over the Internet for routing calls. This call treatment may based on access code, CLID (if it a PSTN phone call) of the caller, or the IP address of the caller (if it is a VoIP telephone call), or a combination thereof.

The Access Code Server 26, which is a Web server, generates a web page 76 using a markup language, preferably the hypertext markup language (HTML). A “mark-up language” is a notation for defining the structure and formatting of a document by using ordinary characters embedded in the text. Mark-up languages allow text to be read by a computer. There are many types of markup languages, the most common being HTML hypertext markup language that is used in most web sites today. HTML allows the client computer the computer at the home or office know how to format text in a web page so that it may be read. “Markup” refers to the sequence of characters or other symbols that you insert at certain places in a text or word processing file to indicate how the file should look when it is printed or displayed or to describe the document's logical structure. The markup indicators are often called “tags.” For example, a particular paragraph is preceded by a: <p> or paragraph tag so that when the data is sent over the Internet, the end user will see the text read as new paragraph. Markup can be inserted by the document creator directly by typing the symbols in or by using prepackaged software. The creation of a web page using a Web server and its access using a computer, modem and web browser is well-known.

FIGS. 3 through 12 show web pages located on the Access Code Server 26 to be used with the particular invention. For purposes of simplifying the diagrams, only control of the PSTN telephonic peripherals 40(a) is shown (save for Internet Call Waiting). From this, it will become readily apparent how to create web pages to control the use of Internet telephonic peripherals 40(b). FIG. 3 is a figure of the home page. The subscriber enters the URL of web page 76 on the Access Code Server 26. Here the URL is “http//www.setyourphone.com”. FIG. 3 shows the home page which gives general instructions as how to set up the access codes. There are links to get additional instructions, or if the user/subscriber already knows how to use the system, the user may start inputting new information for access codes. These figures are of course exemplary only, and any number of telephonic peripheral may be added.

FIG. 4 is a second web page of the Access Code Server 26 which provides additional information about the telephonic options 40 available to the subscriber.

FIG. 5 shows page 3 of the web page located on the Access Code Server 26. The subscriber simply inputs the access code numbers that he plans to give out. If the numbers spell a name on a Touch-Tone® key pad, the subscriber has an opportunity to record the name as punched on the Touch Tone® key pad of the telephone. As seen in FIG. 5, when the subscriber is done putting in the access codes, the words formed by the access codes and the name of the people who will be given the access codes he may hit “submit” and immediately this information is stored. Immediately, the subscriber is connected to web page 4, which is seen in FIG. 6.

In FIG. 6, at web page 4 of the Access Code Server 26, the subscriber selects the telephonic peripherals. In web page 4 the user has a choice between private lines one and two, voice mail, E-mail with voice attachment, call forwarding, call waiting, personalized message 1, personalized message 2, personalized message 3, call query, pager and call-waiting if the subscriber is on the Internet. Then for the access code under consideration, he may choose the telephonic peripherals of his desire. When the subscriber is done, he may click on a hyperlink and submit his information which will display the options that he has chosen for that given access code (web page not shown). The user may also, next to each option, select time-stamping. If he hits the time-stamping option, he is sent via a hyperlink to web page 5 as shown in FIG. 7. There the user can determine the calendar days which the particular option under question will be available or the days of the week and time of day that they will be available.

Assume a subscriber gives an access code to a friend named Susan. He would like her to have access to the private phone line between the hours of 8 p.m. and 11 p.m., Sunday through Friday. Further assume that during those hours he would like her to be able to interrupt phone calls with call waiting, so he selects call waiting. The subscriber would then go to the home page as seen in FIG. 3, where he would reach the instructions. He would then click on the link that sends him to web page 3 (as seen in FIG. 5) which is an access code entry form. There he enters the access code 783. The access code 783 spells out “Sue” on a Touch Tone® key pad. At the query whether the access code forms a word, he will puts in the word “Sue”.

When the subscriber submits the information, he will be automatically sent to web page 4 (FIG. 6) whereupon he will pick the telephonic peripherals that Sue will have. He will click on private line 1. He will then click the time-stamp option next to private line. The time-stamp option will hyperlink to web page 5 as seen in FIG. 7. The subscriber will then pick Option 2-Day of Week, Time of Day Scheduling. Next to Sunday, Monday, Tuesday, Wednesday, Thursday and Friday, he will enter the times 8 p.m. to 11 p.m. He will leave Saturday blank, as he does not want her to have availability to the private line on Saturday. He will then click on “Call Waiting” so Sue can interrupt his calls with call waiting. When he is done, he hits the submit key and is sent back to web page 4 (FIG. 6) to pick additional telephonic peripherals.

When he is done picking telephonic peripherals he hits the submit key and web page 4 (FIG. 6) of the Access Code Server 26 sends him to another web page which shows the access code 783, the name Susan and indicates that the private line may be accessed by “Susan”, between the hours of 8 p.m. and 11 p.m. Sunday through Friday. It also shows that she has call waiting privileges. Thus, when she has access to the private line, she may interrupt another telephone call of the subscriber by call waiting beeps. (This screen is not shown). If the subscriber determines that he made an error, he may return to web page 4 via a hyperlink and correct his errors.

When he is finally done, the subscriber returns to the home page, Web page 1 of the Access Code Server 26, shown in FIG. 3, to start again. From the home page, the subscriber may also turn to Web page 4 of the Access Code Server 26, as shown in FIG. 8, which allows him to input more access codes.

Web page 6 (FIG. 8) of the Access Code Server 26 shows the list of names and access codes given. Names can be deleted if the access codes are ultimately not used. Web page 6 (FIG. 8) may be accessed by Web page 3 (FIG. 5).

From the home page of the Access Code Server as seen in FIG. 3, the subscriber may also want to change the phone numbers of the telephonic peripherals. For instance the telephone number to the private line, the pager, or the cellular phone may change. The E-mail address to the E-mail with voice attachment may need to be changed. From the home page as seen in FIG. 3, the subscriber goes to the web page 6 as seen in FIG. 8, and enters the new telephone number of the private line, the pager, or the cellular phone, or enters a new E-mail address for the E-mail with voice attachment.

From the home page (FIG. 3) of the web site 76 of the Access Code Server 26, the subscriber may click on a hyperlink and set up CLID routing overriding Access Code Routing and is sent to Web page 8 (FIG. 10). Again, telephonic peripherals are offered for calls coming from particular phone numbers (CLID's) as seen in FIG. 11, Web page 9. Web page 9 of the Access Code Server 26 is accessed automatically after filling out Web page 8 (FIG. 10). The telephonic peripherals for CLID routing may be time-stamped as seen in Web page 10, FIG. 12. At Web page 8, FIG. 10, the subscriber may hyperlink to a web page (not shown) that allows caller with subscriber selected access codes to use additional telephonic peripherals not generally available for callers from that CLID.

Once the subscriber has input his preferences into the Access Coder Server 26, the Access Code Server 26 sends an Access Code Preferences Signal 16 to a Database Server 94 which stores the preferences of available telephonic peripherals 14(a) or 14(b) for callers with given access codes 12(a) or 12(b). The Access Code Server 26 may, or may not, be a part of the same physical computer as the Database Server 94.

The Database Server

The Database Server 94 has a Central Processing Unit, memory, an operating system, and application software. While the Access Code Server 26 serves as the input device, the Data Base Server 94 functions as the storage device, waiting for the Call Router Server 28 to ask for routing data regarding an incoming telephone call 10(a) or 10(b). Data Base Server 94 stores the data regarding call routing once it is input by the subscriber using the Access Code Server 26. The Data Base Server 94 then waits for an inquiry from CRS 28 about data to route a call intercepted by CRS 28. This inquiry will be sent when the Call Router Server 28 receives an incoming telephone call 10(a) or 10(b). The Data Base Server 94 has two primary sub-components which can be seen in FIG. 1. An On-Line Register 96 is a register where the subscriber can enter two principle pieces of data: (a) whether the subscriber is on-line or has access to a VoIP phone and (b) if yes to part a, the IP address of the VoIP phone. The data base server storage device 99 stores the data regarding call routing. The storage device 99 functions as the memory of the Data Base Server 94. It matches the stored call routing data in memory on the storage device 99, with access code information sent by the Call Routing Server 28 including CLID information and IP address information, and process it to produce call routing data for the Call Router Server.

The Call Router Server

The Call Router Server 28 has a Central Processing Unit, memory, an operating system, and application software. It also includes a Subscriber Rules Program 98 that controls the handling of calls in accordance with the access code. The Call Router Server 28 routes the incoming telephone call 10(a) or 10(b). It takes calls in and routes them to one or more telephonic peripherals 40(a) and 40(b) in accordance with routing data from the Data Base Server 94. The Call Router Server 28 receives the caller's PSTN telephone call 10(a) or VoIP telephone call 10(b) and the caller's access code signal. Access code signal 12(a) is sent over the PSTN 14 when the telephone call is a PSTN telephone call 10(a). Access code signal 12(b) is sent over the Internet 32 when the telephone call is a VoIP telephone call 10(b). FIG. 1 shows the Call Router Server 28 as part of the entire telephonic system 8. FIG. 15 shows the Call Router Server 28 in isolation with its various sub-components. Upon receipt of a phone call, the Call Router Server 28 then issues an audio prompt (not shown) to the phone upon which the call was made seeking an access code. The caller then inputs an access code. The access code signal labeled 12(a) is made over the PSTN 14 when the caller is using a PSTN phone 126. The access code signal labeled 12(b) is made over the Internet 32 when the caller is using a VoIP telephone 120.

As seen in FIG. 15, The Call Router Server 28 has a CLID Recognizing Subsystem 101 and an IP Address of Sender Recognizing Subsystem 100 which, as the names suggests, respectively recognize the CLID 120 of the caller if the call is a PSTN phone call 10(a), or the IP address 150 of the caller if the call is a VoIP phone call 10(b). This subsystem 100 that is called the “CLID and IP Address of Sender Recognizing Subsystem” is simply called the “CLID Recognizing Subsystem” in applications where the communication system is employed to direct incoming VoIP telephone calls. Once the Call Router Server 28 obtains the CLID 120 of the caller in the case of a PSTN phone call 10(a), or the IP Address 150 of the caller in the case of a VoIP phone call 10(b), and once the Call Router Server 28 has determined the caller entered an Access code, the aforementioned information is sent then to the Database Server 94 by means of an Inquiry Signal 114. This signal ask the Database Server for outgoing routing data for a caller with a particular access code and location (as determined by the CLID or IP Address). The Database Server responds to the inquiry and provides data to the Call Router Server for routing the call.

Once the Call Router Server 28 has the data to route the telephone call 10(a) or 10(b), the call is directed to the appropriate telephonic peripherals—the PSTN telephonic peripherals 40(a) or the VoIP telephonic peripherals 40(b). The Call Router Server 28 is capable of receiving calls over the PSTN 14 and sending them to telephonic peripherals 40(b) that are on located on the Internet 32. To accomplish this, a PSTN Phone to VoIP Phone Converting Mechanism 108 is employed that is a part of the Call Router Server 28. The PSTN Phone to VoIP Phone Converting Mechanism 108 may either be part of the Call Router Server 28 or connected to it. The PSTN Phone to VoIP Phone Converting Mechanism 108 converts an incoming PSTN phone call 10(a) (that may be in analog form or the more usual digital transmission using Pulse Code Modulation), to an Outgoing Internet Call 114(b) which is grouped into packets so that it may be sent by packet-switching over the Internet 14. The Call Router Server 28 “knows” the IP Address 150 to send the telephone call from the data sent from the On-Line Register 96 of the Data Server 94, where the subscriber registered that lie (or she) was on-line using the On-Line Signal Program 155 on his (or her) computer 70. The Outgoing Internet Call 114(b) is then routed to the IP Router 104 which, in turn, directs the Outgoing Internet Call 114(b) over the Internet 32 to an Internet Telephonic Peripheral 10(B).

Conversely, the Call Router Server 28 is capable of receiving calls over the Internet 14 and sending them to telephonic peripherals 40(a) that are on located on the Public Switched Telephone Network 14. To accomplish this, a VoIP Phone to PSTN Phone Converting Mechanism 106 is employed that is also a part of the Call Router Server 28. This VoIP Phone to PSTN Phone Converting Mechanism 106 converts an incoming VoIP Call 10(b) that is in the form of switched packets (in accordance to the Internet Protocol) into a PSTN Outgoing Phone Call 114(a). The PSTN outgoing phone call 114(a) may be in analog form or the more usual digital transmission using Pulse Code Modulation. This VoIP Phone to PSTN Phone Converting Mechanism 106 has a computer program whereby the VoIP caller is queried as what is the PSTN telephone destination number (i.e., the phone number of the called party). The end destination PSTN telephone number may be typed in by the caller, or input by well-known audio recognition means. In such a manner, the Call Router Server knows to what PSTN Telephonic Peripheral 40(a) to send the Outgoing PSTN Telephone Call 114(a). Outgoing PSTN Telephone Calls 114(a) are directed back by the Call Router Server 28 to the Switch 134 after having been processed. The Switch 134 directs the Outgoing PSTN Telephone Call 114(a) to the PSTN telephone number to the appropriate PSTN telephonic peripheral 40(a).

The Subscriber's Rules Program

The Subscriber's Rules Program 98 determines how the call is routed by the Call Router Server 28. It generates a Call Routing and Control Information Signal 112 to instruct the Call Router Server 28 how to route the incoming telephone call 10(a) or 10(b). So instructed, the Call Router Server 28 now knows how to route the incoming PSTN telephone call 10(a) or the incoming VoIP phone call 10(b).

The Subscriber's Rules Program 98 contains instructions on how to route the telephone call 10(a) or 10(b) based on the individual CLID 130 of the PSTN phone call 10(a), the individual IP address 150 of VoIP Phone Call 10(b), or the entered access code. Alternatively, the Subscriber's Rules Program 98 may dictate that the PSTN phone call 10(a) should be routed based on a combination of the CLID 130 of the PSTN Phone Call and the access code. Or, the Subscriber's Rules Program 98 may dictate that the VoIP phone call 10(b) should be routed based on a combination of the IP Address 150 of the VoIP phone call 10(b) and the access code. If the VoIP phone 120 of the caller changes frequently because of the Internet Service Provider (as is often the case), the Subscriber's Rules Program 98 may dictate that simply the access code, sans the IP address 150 of the VoIP phone 120, may be used to designate call treatment for the VoIP phone call 120.

FIG. 2 shows a block flow diagram of one of the sub-programs of the Subscriber' Rules Program 98. It is a sub-program of other programs that provide instructions for routing incoming PSTN telephone calls. A similar program (not show) is used for incoming VoIP phone calls 40(b) with the simple substitution of IP Addresses 150 for CLIDS 130. As noted, our telephonic system 8 is access code driven. Examining FIG. 2, it can be seen the first query of the subprogram is “if the telephone call is coming from a CLID designated for special treatment” at step 100. Usually the answer to this is “NO” and regular access code routing begins to take place at step 120. The telephonic system 8 may be programmed to allow the subscriber to route certain callers to preselected options without the caller using an access code. For instance, the caller may allow calls to a private line 46 between certain hours, with or without an access code 8. As seen in box 132, the computer program queries “whether the caller has an access code designated for particular treatment?” If the answer is “NO” then the call is treated as one for people without access codes, as seen in Box 128. For instance, the subscriber may decided to politely terminate the telephone call, or have the call sent to a general voice mail box if the caller has no access code.

The telephonic system 8 allows the subscriber to route certain callers to preselected options based upon the Calling Line Identification Number (CLID) of the caller, without the caller using a particular access code. As seen in block 100, when a caller places a telephone call from particular CLIDs (defined above in Summary Section and below in the definition section), the answer to the query of step 100 “Is the caller calling from a particular CLID designated for particular treatment” would be “YES.” As mentioned, this feature we call “CLID Routing overriding Access Code Routing” because callers are being routed based on the CLID they are calling from, regardless of whether or not they possess certain access codes. CLID Routing overriding Access Code Routing is demarcated by the number 102.

Even when the telephonic system 8 is programmed to have CLID Routing overriding Access Code Routing 102 for particular telephone lines, this too can be modified. Suppose CLID Routing overriding Access Code Routing is arranged so that calls from a particular telephone line (123-456-7890) will be treated in a particular manner (let's say they are sent to a private line). The Access Code Server 26 could still be programmed to allow the subscriber to override this programing such that the caller could be routed based on the programmed options for his or her access code. Thus, the subscriber may program the Access Code Server 26 to have all calls from 123-456-7890 sent to the private line, unless the caller knows the access code QRS. If the call enters QRS, the call 10 is to be forwarded to the subscriber's cellular telephone.

As mentioned, we call this “Access Code Routing Overriding CLID Routing” because certain callers with particular access codes can override the preselected option for call treatment based on calls emanating from a particular CLID. Access Code Routing Overriding CLID Routing is demarcated by 104. This feature allows certain callers to be treated uniformly, even if they are calling from particular CLIDs that have been selected for particularized treatment. After it is determined that the caller is calling from a CLID designated for special treatment in step 100 so that there is CLID Routing Overriding Access Code Routing 102, the program queries whether “Are callers with particular access codes to be treated differently from other callers from the CLID that do not posses those particular access codes?” as in box 134. If the answer is “YES” the call is treated based on the access code, or combination of access code and CLID, so that there is Access Code Routing Overrides CLID routing as seen in step 110.

Usually, callers from particular CLIDs will not be treated differently even if they have special access codes. This is plain CLID routing. If the answer to the query “Are callers with particular access codes to be treated differently from other callers from the CLID that do not posses those particular access codes?” as in box 134 is “NO”, the call is treated as CLID routing overriding Access Code Riding, and the call will be treated based on the programming for that particular CLID as seen in Box 112.

Additional information that may be used by the Subscriber's Rules Program 98 is whether the subscriber is currently using his (or her) computer 70 (or otherwise has access to the VoIP Phone 120) so that an outgoing VoIP phone call 114 may be received by the subscriber. As seen in FIG. 16, this is accomplished by the subscriber sending an Internet Access Signal 106 from his (or her) computer 70 to an On-Line Register 96 located on the Database Server 96. This is accomplished using an On-Line Signal Program 155 that is located on the computer 70 that the subscriber is using (as shown). Such an Internet Access Signal 106 generated by the On-Line Signal Program 155 has the capacity to provide the IP address 150 of the VoIP phone 120 the subscriber is currently using, if the subscriber is using a VoIP phone different from his normal settings. In such a manner, the Database Server 94 knows whether the subscriber has access to a VoIP Phone 120, and the IP address of the VoIP phone.

The PSTN Incoming Delivery System

When the incoming telephone call 10(a) is placed over the PSTN (14), the call begins at the caller's telephone phone 126 and is sent to Switch 134. The purpose of the PSTN delivery system is take the incoming PSTN phone call 10(a), and send it to Switch 134 of the telephonic system 8. There are a number of PSTN Incoming Delivery Systems 164. These PSTN delivery systems, include, but are not limited to Local Number Portability (LNP) 142, Advanced Intelligent Network (AIN) 148, and traditional call-forwarding 146. These three methods are discussed below:

Local Number Portability

Local Number Portability is shown in FIG. 14. Local Number Portability (LNP) 142 is mandated by the Federal Communications Commission to satisfy the requirements of the Telecom Act of 1996 and to permit competition in the local telephone market. LNP 142 is a circuit switched network capability that allows a subscriber on one switching exchange (i.e., end office) to keep the same public directory number (DN) when moving to a different switching exchange. Information needed to process calls in an LNP environment is maintained in an external database. A directory number that has been moved from switch to another is referred to as ported. Other users can connect to ported numbers without any changes to dialing procedures.

Historically, all directory numbers with the same six digits (i.e., the NPA-NXX, area code+plus local exchange) belonged to a single telephone switch. With the introduction of Local Number Portability 142, individual directory numbers in one NPA-NXX may be ported to different telephone switches. This has tremendous implications for call routing, as the first six digits of a directory number no longer uniquely identifies the switch that host the directory number. In so doing, LNP 142 allows a party to change telephone service providers without changing telephone numbers.

LNP 142 is amply described in U.S. application Ser. No. 09/114,068 filed Jul. 13, 1998 by Robert W. Petrunka entitled “Call Forwarding Using Local Line Portability” which is hereby incorporated by reference. With LNP 142, when a call is made to a telephone number in a zone of portability, which is determined by the first six digits of the called number (known as the area code and office code [or exchange], or simply NPA-NXX, a local switch 202 queries an LNP Service Control Point (SCP) 208 by sending a query signal 214 to obtain portability information about the number. The LNP SCP 208 accesses internal databases. If the LNP SCP 208 determines that the number has been ported to a new service provider it returns a Local Routing Number (LRN) 212 and the originally dialed telephone number to the local switch. Each switch 202 which hosts ported numbers has a ten digit Location Routing Number (LRN) to it. As the name suggest, the Location Routing Number routes the telephone call to the location of the switch 206 where the telephone number has been ported. The local switch 202 routes the call 10(a) to a terminating switch of the new service provider 206 using the LRN. The terminating switch 206 uses the originally dialed telephone number to route the call to the intended party. In the present invention, the terminating switch 206 then sends the call to the Switch 124.

The Advanced Intelligent Network

Another way the telephone call may be directed to the Call Router Server 28 is by use of the Advanced Intelligent Network (AIN) 148 and the use of a Terminating Attempt Trigger (TAT), which is defined for the Advanced Intelligent Network. The Advanced Intelligent Network is shown in FIG. 13. The AIN 148 is also described in U.S. application Ser. No. 09/114,068 filed Jul. 13, 1998 by Robert W. Petrunka entitled “Call Forwarding Using Local Line Portability” which is hereby incorporated by reference. With this technique, a caller dials a subscriber's standard telephone number, such as the telephone number for the subscriber's business telephone. When the call reaches the subscriber's terminating switch 202 located at the subscriber's central office 200, AIN 148 processing connects the AIN server 204 to the call 10(a) at the terminating switch 202. The AIN server 204 instructs the terminating switch 202 to extend the call 10(a) to a the telephone numbers of the Switch 124. Ultimately, the call 10(a) is forwarded to the Switch 134 by the AIN 148.

Call Forwarding

The PSTN call 10(a) could also be sent to the Switch 134 by traditional call forwarding 146. Call forwarding 146 is a well-known service offered by local phone companies to their subscribers that allows a user to make calls dialed to their phone ring to a different phone or phone number.

The Telephonic System in Operation

In operation, the subscriber, using his computer 70 equipped with a modem 72 and a web browser 74 enters access code numbers (or other types of access codes) 11 onto web pages 76 that are stored on Access Server 26. He also enters data indicating the manner of call treatment based on those access codes 11. Call treatment may also be based, in whole or in part, on the CLID or IP address of the caller. As such, the subscriber determines what incoming PSTN telephone calls 10(a) and incoming VoIP telephone calls 40(b) will be routed to what PSTN telephonic peripherals 40(a) and Internet telephonic peripherals 40(b).

The Access Code Server 26 sends a Access Code Preference Signal 16 to the Database Server 94 which indicates call treatment based on access codes, CLID or IP address, or any combination thereof. This information is stored on the Database Server 94. The Database Server 94 sends the stored data to the Subscriber's Rules Program 98 in CRS 28 that contains instructions on how to route incoming telephone calls based on access code, CLID) or IP Address. The system is then ready to take an incoming PSTN telephone call 10(a) or an incoming VoIP Telephone Call 10(b) and intelligently route it as an outgoing PSTN telephone call 114(a) or outgoing Internet Telephone Call 114(b).

The incoming telephone call may either be over the PSTN 14 or the Internet 32. The incoming telephone call numbered “10(a)” is an incoming telephone call over the Public Switched Telephone Network 14. The incoming PSTN phone call 10(a) may be made using a POTs phone, a cellular phone, or a digital phone or their equivalents. When such a PSTN call is made, the call 10(a) originates from a particular CLID 130 (i.e., the call is made from a particular telephone number). The incoming telephone call numbered “10(b)” is an incoming telephone call from a caller over the Internet 32, and is made with a VoIP phone 120 or its equivalent. The VoIP phone call 10(b) is placed using a computer equipped with a sound card and a microphone. The Internet phone software samples the incoming audio signal, compresses it, and transmits the package via TCP/IP over the Internet to remote locations. When such a VoIP call 10(b) is made, the call is generated from a particular IP address of the caller 132. Thus, the CLID 130 of the PSTN incoming phone call 10(a) and the IP address 132 of the VoIP incoming telephone call 10(b) both function to indicate the source of the phone call. (There are some systems today whereby the Internet Service Provider that provides the VoIP services frequently changes the IP address of the caller. With such a scenario, the call origin (or more accurately caller origin) is known by the access code entered by the caller.

Both telephone calls 10(a) and 10(b) have destination numbers to indicate where the call is going. With the PSTN phone call 10(a) that is being routed as an outgoing PSTN phone call 114(a), the destination number is simply the common telephone number as it is well-known today. For the VoIP phone call 10(b) that is routed as outgoing Internet call 114(b), the destination number is the IP address 150 of the VoIP phone of the subscriber (which is also the IP address of the subscriber's computer 70). However, unlike the use of the subscriber's regular telephone phone number used with the PSTN telephone call 10(a), to place a call with a VoIP phone, the caller must follow two steps: First, the caller must type at his or her keyboard (or otherwise somehow enter) the web address (URL) 136 of the Call Router Server 28. The VoIP phone call 10(b) will then be placed on the Internet 32 and be sent to an IP Router 104. The IP Router 104 will then route the VoIP phone call 10(b) to the Call Router Server 28. Once the VoIP phone call 10(b) is connected to the Call Router Server 28, the caller is prompted by the Call Router Server 28 to enter the telephone number of the subscriber, or the name of the subscriber, or some other indica to indicate that the call 10(b) is to be directed to the subscriber.

When in operation, an incoming PSTN telephone call 10(a) or 10(b) made by a caller is routed to the Switch 134 by the PSTN Delivery System 164. The PSTN Deliver System 164 is comprised on Local Number Portability 142, Advanced Intelligent Network 148 or Call Forwarding 146. Once the incoming PSTN call reaches the Switch 134, it is sent to the Call Router Server 28. After the PSTN telephone call 10(a) reaches The Switch 134, the Switch 134 then forwards the PSTN telephone call 10(a) to the Call Router Serer 28. When a PSTN telephone call 10(a) or VoIP telephone call 10(b) reaches the Call Router Server 28, the caller is prompted for an access code before the call is connected further. By entering an access code from the PSTN Phone 126, the caller generates a caller's access code signal 12(a) that is transmitted over the Public Switched Telephone Network 14 to the Switch 134 to the Call Router Server 28. By entering an access code from the VoIP Phone 120, the caller generates a caller's access code signal 12(b) that is transmitted over the Internet 32 to an IP Router 104 to the Call Router Server 28. Incoming VoIP calls 10(b) pass to the IP Router 104, where they are then, in turn, routed from IP Router 104 to the call Router Server 28.

When the call 10(a) is placed over the PSTN, the access code could be generated by a touch-pad-alpha-numeric device, such as the caller's touch pad phone. When the access code is a touch-tone-alpha-numeric access code, the access code signal 12 could be generated using DTMF technology, although it is conceivable that other technologies could be utilized. With dual-tone multifrequency, the key pads on a phone are assigned two signals of differing frequencies. The telephone system “knows” what key pad was hit by matching the two signals to the key pad assigned to it. When the telephone call 10(b) is made using a VoIP Phone 120, the access code may be manually entered at the keyboard. Whether by PSTN phone 126 or VoIP phone 120, the caller's access code could also be a verbal-alpha-numeric access code whereby the caller simply verbally states the access code and the telephonic system 8 recognizes it. Likewise, whether the phone is a PSTN phone 126 or a VoIP phone 120, the access code could even be the caller's voice itself. With such voice recognition technology, there is no need to speak with particular words. Rather, the telephonic system 8 could recognize the unique nature of the callers voice using well-known existing voice recognition technology. Under such a system, the caller would have to provide voice samples so that there is a model with which to compare.

The Inquiry Signal 114 signals the Database Server 94 for instructions regarding call treatment based on the CLID 130 (if it is a PSTN phone call) or the IP address 150 (if it is a VoIP phone call) and the access code.

Once the telephone call reaches the Call Router Server 28, the incoming call 10(a) or 10(b) is directed to the correct telephonic peripheral 40(a) or 40(b). The Call Router Server 28 can route incoming PSTN telephone calls 10(a) to either PSTN or VoIP telephonic peripherals. Likewise, the Call Router Server 28 can route incoming VoIP calls to either PSTN or VoIP telephonic peripherals, 40(a) and 40(b) respectively. The Call Router Server 28 has a PSTN to VoIP Phone Converting Mechanism 108, and a VoIP Phone to PSTN Phone Converting Mechanism 106. The Call Router Server also has a Remote CLID or IP Addressing Blocking Mechanism that allows the subscriber to block calls made from particular CLIDs or IP addresses.

Upon receipt of the incoming telephone call 10(a) or 10(b), the Call Router Server 28 sends the access code, CLID or IP Address of the Caller and simultaneously ask for data on call routing based on those parameters. The CRS 28 processes these parameters using the Subscriber's Rules Program that generates the Call Routing and Control Information Signal 112 which instructs the Call Router Server 28 how to route the incoming telephone call 10(a) or 10(b). The Call Router Server 28 then routes the incoming telephone call 10(a) or 10(b) to the correct telephonic peripheral 40(a) or 40(b), based on those instructions.

ALTERNATIVE EMBODIMENTS

It is contemplated that the Access Code Server 26 and the Database Server 94 may be a part of the same computer. It is also contemplated that the Database Server 94 may be a part of the same computer as the Call Router Server 28. It is further contemplated that the Access Code Server 26, the Database Server 94, and the Call Router Server 28 may be a part of the same computer. It is contemplated that any number of software codes may be implemented to program the three servers.

Definitions:

An “access code” is a code that is optimally alphanumeric but is not so limited, which a subscriber distributes to callers so that the calls may be routed in accordance with the subscriber's choice. An access code can be (but is not limited to) a DTMF signal, a verbally stated word or number, or the caller's own voice which may be recognized.

By “the access code being the caller's own voice” it is meant that the telephonic system recognizes the caller's voice without the use of a particular verbal alphanumeric access code, which is defined below. As an example, instead of the caller having to verbally state the word “apple” or “seven-two-one” he (or she) may simply have to speak long enough so that his (or her) voice is recognized.

A “caller” is any individual or device that sends telephonic messages on the public telephone network.

A “Calling Line Identification Number” or “CLID” is the phone number of the telephone line that the caller is using.

By “electrically coupled” it is meant related in some way so that electrical signals or data from one device is communicated to the other device. The electrical coupling can be done with or without wiring. The coupling may or may not be of a continues nature. The electrical coupling could be done via radio signals or light waves (low power laser beams). “Electrically coupled” includes a computer related to a computer network.

An “Internet gateway” is a gateway that connects the Internet to the public switched telephone network. See definition of “gateway.”

A “server” as used in the specification and the claims, is a computer that is programmed to send files or other information including telephonic information to another computer or a telephonic peripheral. A “computer” (as used in the definition of “server”) is any device having a Central Processing Unit, memory, an operating system, and application software that receives data or telephonic information, or both as an input, processes the same, and produces an output of data or telephonic information or both. In the specification and in the claims, the Access Code Server, the Database Server, and the Call

Router Server are all types of servers subject to the above definition. See definition of “telephonic peripheral” provided below.

A “subscriber” is any end user of telecommunications services, regardless whether a fee is paid, or whether the user is the ultimate end user, or whether the user is a person or other entity.

By “telephone call” it is meant converting sound waves into variations of electric current that can be sent over wires and reconverted into sound waves at a distant point in real time so as to make it possible to have a live conversation from two different locales. The term “telephone call” includes, but is not limited to, a POTs (Plain Old Telephone) telephone call, a Cellular Telephone Call, PCS (personal communications service) or a Voice Over the Internet telephone call and includes wireless transmissions of any sort that uses electrical or electromagnetic energy.

By “telephonic peripheral” is meant any end-user device that is interconnected to a telephone network and is capable of being used in conjunction with the pubic telephone system or the Internet to provide additional service.

“Telephony” is the transmission of speech or sound to a distant point by means of electrical signals.

By “time stamping the access code” it is meant allowing the access code to be valid for a predetermined period of time.

A “verbal alphanumeric access code” is an access code consisting of alphanumeric information that was generated by the caller's verbal statement of a letter, word, number, or combination of letters, words and numbers.

By “voice over the Internet” (VoIP) it is meant sending or receiving voice information as packets over the Internet, rather than along a dedicated circuit connection as a regular telephone call.

Voice over the Internet is sometimes referred to as “Internet telephony.” Voice over the Internet software allows users to communicate with one another over the Internet as they would over a regular telephone line. Typically, both users use computers. However, the call may be received using a VoIP phone but transmitted using a POTs phone. When used in the telephonic system of the invention, the caller could use a POTs telephone only, and pay for the call to telephone number of the subscriber. The subscribe could then have the call forwarded to any part of the world accessible by phone lines without additional long-distance charges using VoIP technology. VoIP technology is well-known in the field of telephony. “VoIP” is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet Protocol (IP). In general, this means sending voice information in digital form in discrete packets rather than in the traditional circuit-committed protocols of the public switched telephone network (PSTN). The term “VoIP” is now used somewhat generally. The term “VoIP” derives from the VoIP Forum, which is an effort by major equipment providers to promote the use of ITU-T H.323 (which is one standard for sending voice (audio) and video using IP on the public Internet and within intranets).

As used in the specification and in the claims, the term “VoIP” is any protocol designed to facilitate or enable a live telephone call to be transmitted in whole or in part by being in the form of switched packets sent over a public packet-switching network such as the Internet.

A “Web server” is a server located on a public packet-switching network such as the Internet. The Internet includes but is not limited to the World Wide Web. The “Web server” may be located on parts of the Internet other than the World Wide Web. 

1. A communications system for controlling the flow of a telephone call comprising: an Access Code Server for receiving call routing data, said Access Code Server located on a public packet-switching network such as the Internet; a Database Server selectively coupled to the Access Code Server for receiving and for storing said call routing data; and a Call Router Server for routing incoming telephone calls to based upon said call routing data received from said data server.
 2. The communication system of claim 1 wherein the Call Router Server further comprises means for routing an incoming PSTN phone call to a VoIP phone.
 3. The communication system of claim 1 wherein the Call Router Server further comprises means for routing an incoming VoIP phone call to a PSTN phone.
 4. The communication system of claim 1 wherein the Call Router Server further comprises means for routing an incoming PSTN phone call to a PSTN telephonic peripheral.
 5. The communication system of claim 1 wherein the Call Router Server further comprises means for routing an incoming PSTN phone call to an Internet telephonic peripheral.
 6. The communication system of claim 1 wherein the Call Router Server further comprises means for routing an incoming VoIP phone call to a PSTN telephonic peripheral.
 7. The communication system of claim 1 wherein the Call Router Server further comprises means for routing an incoming VoIP phone call to an Internet telephonic peripheral.
 8. The communications system of claim 1 wherein the Call Router Server further comprises: means for selecting at least one telephonic peripheral from the group consisting essentially of one-way pagers, two-way pagers, emergency operator fallback, wireless phones, private lines, call waiting, call query, voice mail boxes, personalized messages, and video conferencing.
 9. A method of routing telephone calls based on an access code comprising: receiving a signal sent by a subscriber containing data for routing an incoming telephone call based on access codes input by a caller over a public-packet switching network such as the Internet; storing the call routing data on how an incoming call should be routed based on access codes; receiving an incoming telephone call and an access code signal representing an access code input by a caller; and routing the incoming telephone call based upon the access code signal and the call routing data. 