Method for improving connection success and developing media assets in connection with arranging video chat among candidate conversants

ABSTRACT

A system registers participant information and inter-participant relationship information, and then, at variable times, selects two or more participants with a pre-existing relationship and attempts to establish a communication link between them. At least one of the participants is notified that the communication link will be attempted, shortly before the attempt is made. The identities of the selected participants are withheld from at least one of the participants (and potentially from all of the participants), so the call is a partial surprise (i.e., the participant may know the set of possible people from whom the call could be, but does not know exactly which person or people are calling until he answers the call). A number of applications are described and claimed.

CONTINUITY AND CLAIM OF PRIORITY

This is a U.S. continuation-in-part patent application that claimspriority to co-pending application Ser. No. 13/954,872 filed 30 Jul.2013 and Ser. No. 14/532,968 filed 4 Nov. 2014.

FIELD

The invention relates to special services in telephonic communication.More specifically, the invention relates to improvements to a multimediatelephonic communication system where semi-anonymous calls areautomatically established for business, networking, recreational oramusement purposes.

BACKGROUND

Ubiquitous and increasingly-connected mobile computing devices combinewith social media services such as Google, Facebook, Twitter andPinterest to produce an environment that gives social scientists pause.Some researchers worry that the latest advances in the digital realmmake real-time conversation unnecessary, and as a result, people areless connected than ever. Since people can (and do) exchange informationthrough Short Message Service (“SMS”) text messages (“texting”),Facebook status updates, “tweets,” and similar methods, traditionalface-to-face interactions (as well as intermediate-engagement means liketelephone conversations) are less common. Instead of truly catching upwith a friend or relative, we simply write “Happy Birthday” on theirFacebook wall. Technology allows us to communicate with little or noengagement, and as a result we are both more connected and more alone.

Author, scientist and professor Sherry Turkle captured this phenomenonsuccinctly in the title of her book, Alone Together. She argues thatinformation exchange via text or tweet is not an adequate substitute forreal-time conversation and engagement. Research by psychology professorBarbara Fredrickson suggests that people's social skills atrophy throughdisuse, in a manner at least conceptually similar to the loss ofphysical strength that accompanies a sedentary lifestyle.

Services and technological methods that facilitate engagement byencouraging real-time, face-to-face conversations may help stave off“social atrophy” by deepening relationships. Social media technologies,smart phones and video-chat functions can be leveraged to providevaluable support for neglected aspects of public and private life.

SUMMARY

Embodiments of the invention offer telephone, videophone or similarconnections at predetermined times between two or more parties having apre-existing social relationship, without disclosing the identity of theother party (or parties) to at least one of the offerees. If two or moreof the offerees accept the proposed connection, a voice, voice-and-videoor similar telecommunication connection is established so that theaccepting offerees can communicate. The improvements described andclaimed herein can significantly increase the success rate fortelecommunication connection establishment. Some embodiments recordportions of the call for analysis, troubleshooting, training and/oradvertising purposes.

BRIEF DESCRIPTION OF DRAWINGS

Embodiments of the invention are illustrated by way of example and notby way of limitation in the figures of the accompanying drawings inwhich like references indicate similar elements. It should be noted thatreferences to “an” or “one” embodiment in this disclosure are notnecessarily to the same embodiment, and such references mean “at leastone.”

FIGS. 1A and 1B are a flow chart outlining operations of an embodimentof the invention.

FIG. 2 is a flow chart outlining a registration and configurationprocess.

FIG. 3 is a flow chart outlining operations of another embodiment of theinvention.

FIG. 4 is a flow chart outlining another set of operations according toan embodiment.

DETAILED DESCRIPTION

A system implementing an embodiment of the invention will mine contactsfrom various social-media technologies and algorithmically pair themtogether for a voice or video call at a predetermined time during theday. Each user will have control over which of her friends arecandidates for pairing, and she can decide to either ignore or acceptthe call. Users will not know with whom they are being connected untilthey decide to accept the conversation. As a result, no one will know ifyou decide to ignore a call. Software implementing the functionality canoperate exclusively on mobile computing devices such as cell phones, orportions of the functionality can be distributed between end-userdevices and a central networked server.

FIG. 1 outlines actions and events that occur during the operation of anembodiment of the invention. First, participants are registered (100).Embodiments only need a few pieces of information from each participant(chiefly, one or more telecommunication-capable addresses such as phonenumbers, and relationship information to allow groups of participants tobe identified as being friends, acquaintances, members of a commonsocial group such as a church or club, etc.) An embodiment may conductopen or rolling registrations, accepting new participants at any time. Alarge or numerous membership is preferred as it allows greaterflexibility in subsequent operations.

At predetermined times, the system selects several users having apreexisting relationship (110). At least two users must be selected, butmore may be selected. The selection process takes into account groupmembership (e.g., friends or co-workers), the users' “available” times(i.e., to avoid attempting calls to a person who is likely to be busy orasleep), and the previous experiences reported by people who have spokenwith the user (e.g., a new user may be matched with an experienced userwhose friends have reported having enjoyable “surprise” conversations).

For at least one of the selected users, the system transmits a pre-callnotification to the user (112). For example, an automated voice call ora text message may be sent, alerting the user that the system willshortly attempt to initiate an anonymous call. This pre-callnotification gives the user time to wrap up current tasks or to preparefor a short break. If the user will be unable to accept the call (e.g.the timing or environment is inconvenient), she may respond to thepre-call notification with a request to postpone for a short time (114)or to skip the call entirely (116). If such a response is received, thesystem may adjust (e.g., postpone) the scheduled call, or remove thenotified person from the group of users (118).

For each remaining selected user, the system initiates atelecommunication connection (e.g., a phone call) to the user (120). Thecall may be identifiable as coming from the system operator, but itshould withhold the identity of at least one of the other selectedusers, from at least one of the called parties. In a preferredembodiment, none of the called parties should be able to determine theidentity of any of the other parties. Some embodiments may (silently)establish a data connection to a selected user's mobile device todetermine whether the user is currently busy with a phone call. Selectedusers who are already engaged in a call may be dropped from the selectedgroup before the telecommunication connection is initiated.

Although all the calls may be initiated at about the same time, it islikely that the callees will not all answer simultaneously. Thus, whenthe first callee answers (130), the system may play an interstitialmessage for him (140) while waiting for the other (or for another)callee to answer. An embodiment may be configured to proceed when oneother selected callee answers, or only when two or more additionalcallees have answered. In the latter case, similar interstitial messagesmay be played for other callees who have answered, before the thresholdnumber of users is reached. In some embodiments, all answering calleeswill receive an interstitial message before being placed in conferencewith the other user(s). The interstitial message(s) may be, for example,advertisements (including sound and/or video, interactive games, and soon).

Eventually, a final callee answers (150), and the system sets up acommunication channel among all the answering callees (160). Forexample, a teleconference bridge (or videoconference bridge) may beestablished. At this point, the participants in the call all learn theidentities of the other participants and can speak with each other. Ifother call attempts are still in progress, they may be abandoned at thispoint, or the remaining callees may be joined to the conference bridgeif they answer while the call is in progress.

The communication channel may be maintained for a predetermined time(e.g., for three minutes after establishment), or for so long as theparticipants care to continue speaking with each other. An embodimentmay provide a count-down warning preceding the disconnection of theconference bridge, or may simply monitor the bridge to detect when nomore than one participant remains connected. After the call isterminated (170) (or as each participant disconnects), the systemcollects information about that participant's involvement (180): thetime between call initiation and that participant's acceptance of thecall, any interstitial messages played for the participant, the durationof the participant's involvement, whether the participant left the callearly, and so on. A participant may also be asked to rate the call oncriteria such as his enjoyment of the conversation with the otherparticipants, his satisfaction with the frequency of calls to thatperson (or to those people), or with the frequency of calls to people inthat group of acquaintances. This information may be stored (190) toimprove the system's selection of users for subsequent calls.

The user-registration process may proceed as outlined in FIG. 2. First,software to perform portions of the overall method is installed on thenew user's mobile device (i.e., cell phone or tablet computer) (210). Itis appreciated that embodiments of the invention operate in a broaderdistributed-computing environment, and many portions of the methods canbe accomplished by software running at different locations. However, itis preferable that at least some operations be performed by softwareexecuting on a computing device that is in the user's possession—such anarrangement makes available data, such as Global Positioning System(“GPS”) location data, that is useful to other portions of the system.

The new user creates a system account by, for example, selecting a newusername and setting a password (220). An embodiment of the inventionmay be integrated with an existing social media service, in which casethe user's username and password for the service may be re-used here.The user provides a communication contact address (which may beautomatically extracted from the mobile device) (230).

Next, the new user's contacts are imported (240). For example, names andphone numbers from the user's telephone database may be copied into thesystem's records. Other social-media services may be linked (250), andthe user's contacts on those services may also be copied.

The user may wish to exclude certain pre-populated contacts fromsubsequent operations (260), or add additional contacts who are not inthe user's telephone directory or social-media “friend” lists (270).Finally, the user may set “Call Windows:” days and/or times during whichhe is willing to accept calls from the system (280). If no such days ortimes are set, the system may limit contact attempts to “reasonable”values such as 9:00 a.m. to 10:00 p.m. on weekdays. Call (or “Contact”)windows allow users to prevent the system from attempting to initiate asurprise anonymous call at a time that would be inconvenient for theuser. The pre-call notification discussed above is another way thesystem can avoid inconveniencing the user, and has been found tosignificantly increase the number of successful (connected)surprise/anonymous calls. Contact lists, active times and other settingsmay be changed at any time, either through the mobile-device softwareinterface or through an associated website.

Although a principal application of an embodiment is to arrangeunexpected phone calls among groups of friends, acquaintances,co-workers, church members, or others with pre-existing socialrelationships, these systems can also set up “surprise” calls from acelebrity, musician or sports figure to a fan of that person. Forexample, in connection with the release of a new motion picture, anactor may participate in a promotion wherein the actor uses the “random,anonymous call” features of the system to contact registered users whohave expressed interest in receiving such a call. Preferably, the calleduser would be unable to distinguish such a call from an ordinaryautomatically-arranged call from a member of his social network, untilhe answers the call and learns the identity of the other party. This isa special case of the “distinguished caller” embodiment, whoseoperations are outlined in FIG. 3.

The distinguished caller identifies himself to the system by logging inwith a username and password, or by some similar procedure (310). Thisindicates that the distinguished user is available to participate inautomatically-connected, semi-anonymous “surprise” calls to other systemusers who have previously expressed interest in receiving such calls.The system selects one or more such users at random (320) and initiatestelecommunication connections to him/them (330). As in otherembodiments, the identity of the other party to the call (in this case,the distinguished caller) is withheld from the called party until thecallee accepts the call.

If the callee answers (340), he has the opportunity to participate in adirect phone or video call with the distinguished caller (350). Afterthe call (360) (or if the callee does not answer (370)), the system maymove on to the next randomly-selected callee (380). As in otherembodiments, the system may record information about the call durationor the callee's impression of the call after it is completed.

Most embodiments do not provide any information about the identities ofthe parties to a call before the call is accepted or after an unansweredcall attempt, but a “distinguished caller” embodiment may display a“Missed Call from [Distinguished Caller's Name]” message on the selectedcallee's phone (390) if the callee declines the call or does not answer.

A “distinguished caller” embodiment is outwardly similar to otherembodiments, especially from the perspective of the callee who isoffered an opportunity to speak with the distinguished caller. However,operations of these embodiments may be tuned to make better use of thedistinguished caller's time—after all, the distinguished caller is notin the position of having a serendipitous chance encounter with afriend; instead, he is intentionally connecting with someone (or severalpeople) who wish to speak with him, and is using the facilities of anembodiment in part to avoid the appearance of discrimination orfavoritism in selecting the people from a larger population who wouldappreciate such an opportunity.

For example, consider a politician who wishes to meet and discuss issuesone-on-one with her constituents. The traditional “town hall” style ofmeeting may be unacceptable because of travel or scheduling constraints,and in any case, topics covered at a town hall meeting are oftenprincipally those of interest to the most aggressive or outspokenattendees. This politician may use an embodiment of the invention thatoperates roughly as FIG. 4 outlines:

First, the politician (i.e., distinguished caller) logs into the system(405). Login can be accomplished through a website, via a telephonesystem, or otherwise. (In one embodiment, the caller's interface to thesystem is through the same telephone or videophone that she will use tocommunicate with the callees.)

The system selects a first registered user from among all users who haveexpressed interest in speaking with the politician, and whose acceptablecall windows encompass the current date and/or time (410). A pre-callnotification may be sent to this user (412), as this has been found toincrease the successful connection ratio, and the politician isinterested in making such connections successfully. The system places ananonymous call to the selected user (415) (the callee's name or otheridentifying information may be provided to the distinguished caller(420)). If the callee answers, 425, then the distinguished caller'sidentity may be provided to the callee (430), and/or an introductorymessage, survey question, or other preliminary, automatic interactionmay occur (435). Next, the answering callee is placed into conferencewith the distinguished caller (440). In this embodiment, the callduration is time-limited, so a “remaining time” countdown is displayedto both the distinguished caller and the answering callee (445).

Simultaneously (i.e., while one call is still connected), the systemselects another user (455), optionally sends a pre-call notification(457), and then places an anonymous call to him (460). If this calleeanswers (465), then the distinguished caller is identified (430) and/ora similar preliminary, automatic interaction is started (435). Thisinteraction overlaps in time with the prior, ongoing conversation, sothat when the prior conversation ends (450), the distinguished callercan be informed of the next callee's identity and the next call canproceed immediately. If the “overlapped” call is not answered, then thedistinguished caller may experience a short delay between calls, as thenext answering callee participates in the preliminary interaction.

The foregoing operations may be repeated indefinitely, until all of thepossible callees have been contacted or the distinguished callerdisconnects from the system.

Embodiments of the invention share many features, such as the automaticcall initiation at times acceptable to the recipients and the callanonymity (i.e., some or all call recipients do not learn the identitiesof the other party or parties unless/until they accept the call).However, embodiments differ in the way that callees are selected forinclusion on a call. In addition, some embodiments may offerparticipants the ability to fine-tune the selection process. Thus, forexample, although the exact time of a system's call and the identity ofthe person with whom a participant will be placed in conference may beunknown, a participant may be able to set target call frequencies forcertain people or groups (e.g., “I'd like to talk to my grandmothertwice a week,” or “Only call my college friends in the two months beforethe Homecoming celebration.”) Some embodiments may integrate with auser's appointment calendar so that the user will not be selected for acall if another event is scheduled (or a specific time may be set asideon the calendar for random calls—this may merely increase the chancethat the system will select the user during the time period, or may betreated like a distinguished-caller scenario—the system may even makeseveral attempts to connect the user with one of his friends oracquaintances during the scheduled time).

Embodiments may also adjust participant selection in response toinformation collected from previous calls, or based on the lack ofinformation about one of the participants (i.e., the information thatthe user is new to the system or hasn't participated in many previouscalls). A useful goal for tuning participant-selection algorithms isincreased enjoyment ratings of the participant at the conclusion of thecall. In other words, the system's goal may be to ensure that thecallees have a good time speaking with their friends, that they lookforward to the surprise calls, and that they accept the calls quicklyand often.

In embodiments where the call duration is fixed, the system may offerone or all participants an opportunity to continue the call beyond itsnormal duration.

The interstitial message (preliminary interaction, etc.) may be chosenby the system on the basis of information available to it at the time ofthe call (i.e., it may be context-sensitive). For example, ifgeolocation information about the callees is available and they are neareach other, then the interstitial message may provide information abouta meeting place such as a café or restaurant—the callees may decideduring the call that they'd like to get together in person.

In any of the foregoing embodiments, some or all of the call contentsmay be recorded by the system operator. For example, if a teleconferenceor videoconference bridge is established between the callees, anadditional port on the bridge may be used to record all participants'voices (and, if available, video or other media). The recorded callcontent may be useful for post-mortem analysis, for troubleshooting, forcustomer-service training, or for advertising purposes. In adistinguished-caller embodiment, for example, a studio or producer mayuse the recorded interactions between an actor and a fan in a marketingcampaign for a movie. Or a politician may use material from aquestion-and-answer interaction with a constituent in his campaignadvertising, or to support legislative efforts. Recording calls may alsobe provided as an add-on service to ordinary (non-distinguished-caller)participants. Recordings may be made as a matter of course, but onlyprovided to participants (or others) upon payment of a service fee.

An embodiment of the invention may be a machine-readable medium(including without limitation a non-transitory machine-readable medium)having stored thereon data and instructions to cause a programmableprocessor to perform operations as described above. In otherembodiments, the operations might be performed by specific hardwarecomponents that contain hardwired logic. Those operations mightalternatively be performed by any combination of programmed computercomponents and custom hardware components.

Instructions for a programmable processor may be stored in a form thatis directly executable by the processor (“object” or “executable” form),or the instructions may be stored in a human-readable text form called“source code” that can be automatically processed by a development toolcommonly known as a “compiler” to produce executable code. Instructionsmay also be specified as a difference or “delta” from a predeterminedversion of a basic source code. The delta (also called a “patch”) can beused to prepare instructions to implement an embodiment of theinvention, starting with a commonly-available source code package thatdoes not contain an embodiment.

In some embodiments, the instructions for a programmable processor maybe treated as data and used to modulate a carrier signal, which cansubsequently be sent to a remote receiver, where the signal isdemodulated to recover the instructions, and the instructions areexecuted to implement the methods of an embodiment at the remotereceiver. In the vernacular, such modulation and transmission are knownas “serving” the instructions, while receiving and demodulating areoften called “downloading.” In other words, one embodiment “serves”(i.e., encodes and sends) the instructions of an embodiment to a client,often over a distributed data network like the Internet. Theinstructions thus transmitted can be saved on a hard disk or other datastorage device at the receiver to create another embodiment of theinvention, meeting the description of a machine-readable medium storingdata and instructions to perform some of the operations discussed above.Compiling (if necessary) and executing such an embodiment at thereceiver may result in the receiver performing operations according to athird embodiment.

In the preceding description, numerous details were set forth. It willbe apparent, however, to one skilled in the art, that the presentinvention may be practiced without some of these specific details. Insome instances, well-known structures and devices are shown in blockdiagram form, rather than in detail, in order to avoid obscuring thepresent invention.

Some portions of the detailed descriptions may have been presented interms of algorithms and symbolic representations of operations on databits within a computer memory. These algorithmic descriptions andrepresentations are the means used by those skilled in the dataprocessing arts to most effectively convey the substance of their workto others skilled in the art. An algorithm is here, and generally,conceived to be a self-consistent sequence of steps leading to a desiredresult. The steps are those requiring physical manipulations of physicalquantities. Usually, though not necessarily, these quantities take theform of electrical or magnetic signals capable of being stored,transferred, combined, compared, and otherwise manipulated. It hasproven convenient at times, principally for reasons of common usage, torefer to these signals as bits, values, elements, symbols, characters,terms, numbers, or the like.

It should be borne in mind, however, that all of these and similar termsare to be associated with the appropriate physical quantities and aremerely convenient labels applied to these quantities. Unlessspecifically stated otherwise as apparent from the preceding discussion,it is appreciated that throughout the description, discussions utilizingterms such as “processing” or “computing” or “calculating” or“determining” or “displaying” or the like, refer to the action andprocesses of a computer system or similar electronic computing device,that manipulates and transforms data represented as physical(electronic) quantities within the computer system's registers andmemories into other data similarly represented as physical quantitieswithin the computer system memories or registers or other suchinformation storage, transmission or display devices.

The present invention also relates to apparatus for performing theoperations herein. This apparatus may be specially constructed for therequired purposes, or it may comprise a general purpose computerselectively activated or reconfigured by a computer program stored inthe computer. Such a computer program may be stored in a computerreadable storage medium, including without limitation any type of diskincluding floppy disks, optical disks, compact disc read-only memory(“CD-ROM”), and magnetic-optical disks, read-only memories (ROMs),random access memories (RAMs), eraseable, programmable read-onlymemories (“EPROMs”), electrically-eraseable read-only memories(“EEPROMs”), magnetic or optical cards, or any type of media suitablefor storing computer instructions.

The algorithms and displays presented herein are not inherently relatedto any particular computer or other apparatus. Various general purposesystems may be used with programs in accordance with the teachingsherein, or it may prove convenient to construct more specializedapparatus to perform the required method steps. The required structurefor a variety of these systems will be recited in the claims below. Inaddition, the present invention is not described with reference to anyparticular programming language. It will be appreciated that a varietyof programming languages may be used to implement the teachings of theinvention as described herein.

The applications of the present invention have been described largely byreference to specific examples and in terms of particular allocations offunctionality to certain hardware and/or software components. However,those of skill in the art will recognize that semi-random,semi-anonymous telecommunication calls can also be arranged andfacilitated by software and hardware that distribute the functions ofembodiments of this invention differently than herein described. Suchvariations and implementations are understood to be captured accordingto the following claims.

We claim:
 1. A method performed by a central networked server,comprising: receiving participant information from a plurality ofindividuals, said participant information comprising a communicationcontact address and an acceptable contact window and recording theparticipant information at the central networked server; selecting atleast two individuals from the plurality of individuals, said selectionbased upon a pre-existing relationship between the at least twoindividuals and an overlap between the acceptable contact window of eachof the at least two individuals; and at a time within the overlapbetween the acceptable contact windows and shortly after the pre-callnotification, initiating a call from the central networked server toeach of the at least two individuals, said initiating to withhold anidentity of at least one of the at least two individuals from at leastanother of the at least two individuals until a predetermined time afterinitiating the call.
 2. The method of claim 1 wherein initiating a callto each of the at least two individuals comprises: dialing telephonenumbers for each of the at least two individuals; and connecting each ofthe at least two individuals to a telephone bridge among the at leasttwo individuals.
 3. The method of claim 1 wherein initiating a call toeach of the at least two individuals comprises: attempting Voice OverInternet Protocol (“VOIP”) connections to each of the at least twoindividuals; and connecting each successful VOIP connection to aconference bridge among the at least two individuals.
 4. The method ofclaim 1 wherein initiating a call to each of the at least twoindividuals comprises: attempting video-conference connections to eachof the at least two individuals; and forwarding voice and video datafrom each successful video-conference connection to each othersuccessful video-conference connection.
 5. The method of claim 1 whereinthe participant information comprises social-media identificationinformation.
 6. The method of claim 1 wherein an identity of each of theat least two individuals is withheld from all of the other individuals.7. The method of claim 1 wherein the predetermined time is when at leastone of the at least two individuals accepts the call.
 8. The method ofclaim 1 wherein the predetermined time is when at least two of the atleast two individuals accept the call.
 9. The method of claim 1, furthercomprising: recording conversation among the at least two individualsonto a non-transient, tangible medium.
 10. A method for producing arecorded conversation among a plurality of users having a pre-existingrelationship, said recorded conversation occurring under particularcircumstances, the method comprising: receiving registration informationfrom a plurality of users and recording said registration at a centralnetworked server, said registration information including at least atelecommunications contact address for each user of the plurality ofusers; receiving indications from a subset of the plurality of usersthat the users in the subset would be interested in communicating with adistinguished caller; beginning a communication session between thecentral networked server and the distinguished caller; selecting a firstinterested user from the subset of the plurality of users; initiating atelecommunications connection from the central networked server to thefirst interested user, said initiating to withhold an identity of thedistinguished caller from the first interested user until after thefirst interested user accepts the telecommunications connection;recording audio during the telecommunications connection between thefirst interested user and the distinguished caller; completing thetelecommunications connection between the first interested user and thedistinguished caller if the first interested user accepts thetelecommunications connection; and terminating the telecommunicationsconnection between the first interested user and the distinguishedcaller after a predetermined time period elapses.
 11. The method ofclaim 10, further comprising: transmitting an interstitial message tothe first interested user after the first interested user accepts thetelecommunications connection and before completing thetelecommunications connection between the first interested user and thedistinguished caller.
 12. The method of claim 10, further comprising:selecting a second interested user from the subset of the plurality ofusers; and initiating a second telecommunications connection to thesecond interested user, said initiating to withhold the identity of thedistinguished caller from the second interested user until after thesecond interested user accepts the telecommunications connection, saidsecond initiating operation performed after the first interested useraccepts the telecommunications connection and before the terminatingoperation.
 13. The method of claim 12, further comprising: repeating theselecting and initiating operations to establish a succession oftelecommunication connections between the distinguished caller and usersfrom the subset of the plurality of users.
 14. A non-transitorycomputer-readable medium containing instructions and data to cause aprogrammable processor at a central networked server to performoperations comprising: selecting a plurality of individuals from adatabase containing contact and relationship information for a largerplurality of individuals; sending a pre-connection message to at leastone of the selected plurality of individuals; initiatingtelecommunication connections from the central networked server to eachof the selected plurality of individuals; playing an interstitialmessage for a first answering individual of the selected plurality ofindividuals between a time the first answering individual accepts afirst telecommunications connection and a time a second answeringindividual accepts a corresponding second telecommunications connection;after the second answering individual accepts the corresponding secondtelecommunications connection, establishing a connected communicationchannel between the first and second answering individuals; after aclosing of the connected communication channel, recording informationabout a duration of the connected communication channel at the centralnetworked server.
 15. The computer-readable medium of claim 14,containing additional data and instructions to cause the programmableprocessor to perform operations comprising: after a closing of theconnected communication channel, obtaining a participant rating of acompleted communication between the first and second answeringindividuals from one of the first or second answering individuals; andrecording the participant rating of the completed communication.
 16. Thecomputer-readable medium of claim 14 wherein the initiating operationwithholds identities of other of the selected plurality of individualsfrom one of the selected plurality of individuals.
 17. Thecomputer-readable medium of claim 14 wherein the selecting operationchooses individuals having a preexisting social relationship.
 18. Thecomputer-readable medium of claim 14, containing additional data andinstructions to cause the programmable processor to perform operationscomprising: recording audio content in the connected communicationchannel between the first and second answering individuals; and storingthe recorded audio content on a non-transitory medium at the centralnetworked server.
 19. The method of claim 1, further comprising: sendinga pre-call notification to at least one of the at least two individualsbefore initiating the call from the central networked server to each ofthe at least two individuals.
 20. The method of claim 10, furthercomprising: sending a pre-call message from the central networked serverto the first interested user before initiating a telecommunicationsconnection from the central networked server to the first interesteduser.