System and method for providing interoperable and on-demand telecommunications service

ABSTRACT

The present invention relates in general to the field of voice and data communications, and in particular, to a novel system for providing interoperable on-demand communications and services across otherwise incompatible narrowband voice and broadband systems. The system is also based on sponsored or universal communications services supported by interactive communications between sponsors and service providers and their respective databases of business rules.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional of U.S. patent application Ser. No.10/934,092, filed Sep. 3, 2004, which is a continuation-in-part of U.S.patent application Ser. No. 10/234,840, filed Sep. 5, 2002, which is acontinuation-in-part of U.S. patent application Ser. No. 09/942,930,filed Aug. 31, 2001, the entire disclosures of which are incorporatedherein by reference in their entirety.

This application includes material which is subject to copyrightprotection. The copyright owner has no objection to the facsimilereproduction by anyone of the patent disclosure, as it appears in thePatent and Trademark Office files or records, but otherwise reserves allcopyright rights whatsoever.

FIELD OF THE INVENTION

The present invention relates in general to the field of voice and datacommunications, and in particular, to a novel system for providinginteroperable on-demand communications and services across otherwiseincompatible narrowband voice and broadband systems.

BACKGROUND OF THE INVENTION

Over the years, worldwide consideration has been given to two problems.The first is the universal service problem—the desirability of providingtelephone or other communication service to those who cannot afford topay and maintain telephone or other communications service. The secondproblem is that of immediate and interoperable public safetycommunications.

Networks are significantly more valuable as more users are able to usethe network. However, the lack of universal service is a barrier toeconomic participation by those lacking service. Societal benefits ofhaving even the poorest people on the public telecommunications networkare so significant that the U.S. Telecommunications Act of 1996 makesspecial provisions for universal service as part of the Act, includingmechanisms to implement subsidized activities. In addition to the Act,many states have life-line services which subsidize telecommunicationsservices for users who meet certain low income tests. Emergency 911services and prospective on-demand broadband 911 services desire freeparticipation of callers into networks that might otherwise requirefees.

In the case of public safety communications, emergency serviceauthorities continue to face the problem of interoperable voicecommunications as different radio communications spectrum is used tosupport different public safety voice systems. Different units ofgovernment and other public entities often have difficulty communicatingwith each other by voice within one local jurisdiction, e.g., a county,as well as with peers in adjoining counties, states, across a country,or beyond national boundaries.

At the time of this filing, many of these same public safety radios donot interoperably support data or video. The interoperability problemhas been continually addressed by organizations such as the NationalTask Force on Interoperability of the United States, an association withmembers that include: the International Association of Chiefs of Police,the International Association of Fire Chiefs, the InternationalCity/County Management Association, the National Associations ofCounties, the National Association of State Chief Information Officers,the National Association of State Telecommunications Directors, theNational Conference of State Legislatures, the National Criminal JusticeAssociation, the Emergency Management Association, the NationalGovernors Association, the National League of Cities, the NationalPublic Safety Telecommunications Council, the National Sheriffs'Association, the Council of State Governments, and the United StatesConference of Mayors.

There are two primary interoperability problems. The first problem iswhen users of various wireless narrowband radio systems need to speak toothers using another wireless narrowband radio of another frequency. Thesecond problem is when users of a wireless narrowband radio system needto communicate with a user that does not have access to that samesystem, but does have access to another form of communication such asbroadband, another incompatible narrowband system, or a traditionalphone system.

In many emergency services scenarios, a crisis may develop that was notanticipated. If communications are to be effective in resolving thecrises, they need to be timely and often immediate. Further, thecommunications must be interoperable between all of these parties, evenamong those who could not be anticipated as needing to be included inthe network. Typically, these unanticipated participants do not have thetime to procure and deploy additional equipment. Thus, a method toconnect users of disparate systems is desired.

Since many users may be added during the crisis, it may be difficult toarrange for payments of funds or the establishment of credit necessaryfor the users to participate in these emergency services and networks ina timely manner. In some cases, the users may not be able to pay at all,even though it may be in the best interest of the community. Failing toprovide for the immediate participation of unanticipated parties withoutthe timely ability to prove their means to pay for the services can havevery serious consequences.

Internationally, there are continued universal service problems asnations such as the Philippines, China, and the republics of the formerSoviet Union try to entice investment in their respectivetelecommunications infrastructures. In these emerging markets, thenumber of telecommunications lines per capita is much smaller. Becausemarket-based solutions to the universal service problem in these marketsare lacking, capital for network infrastructure is limited. Providingemergency services in these environments is even more difficult and allthe more necessary. Linking the economic and social benefits of sponsorsand users by these means can provide more than just incremental serviceto users. This linkage can provide substantial infrastructure as well asservices to users since it provides substantial services and benefits tosponsors who are then motivated to provide infrastructure and servicesfor users who can not afford to pay for those benefits. Serviceproviders, projecting the involvement of sponsors, can make it possiblefor new infrastructure and services to be deployed that would nototherwise be justified by user demand and user ability to pay.

History is replete with stories of radio systems that cannot communicatewith each other. What initially seem like simple solutions fail in thefield. For example, during Desert Storm in the early 1990s, the somecountries used radios that were incompatible with those of othermilitary services despite expectations of cooperation. Some Europeantroops were not only unable to communicate with others, they interferedwith US radio systems. Police, fire, and EMS personnel often havedifficulties communicating in the field.

Many efforts have been made to develop common standards forinteroperability of radio systems in recent decades. Unfortunately,these approaches provide limited utility, very limited capability forexternal system interconnection, and are generally not backwardcompatible with older analog radio systems. The interoperabilitystandards also do not address integration of radio systems with a widevariety of voice communication system not based on the use of radio.What is needed is an automated system that supports on-demandinterconnection between many forms of voice communication systemsregardless of their technology.

Many radio systems are now based on digital technology. Digitization hasgreatly aided the application of security features and improved systemimmunity to radio frequency interference. However, the integration ofunlike radio systems has become much more complex. Converting protocolsfrom one system's syntax to the other is not always possible. Multipleconversions from one protocol to another can degrade signal and voicequality. Furthermore, sharing security keys can present insurmountablemanagement problems. Another problem of integrating systems is thecurrent requirement for human intervention. To interconnect two systemsnormally requires someone to perform a “patch” whereby the signals oftwo systems are interconnected, assuming there are no other technicaldifficulties. This process places a burden on the operators of thosesystems that can be unacceptably disruptive. The manual process is alsolimited to a simple connection with conferencing capability limited tothe number of successfully manually patched base stations participatingat the same time.

SUMMARY OF THE INVENTION

Therefore, there is a need for an improved apparatus and operatingmethodology that provides a market-based solution to the need foron-demand interoperable, survivable, and immediate emergencycommunications and services and the related universal service problemincluding speech activated and speech managed services, often supportedby business rules reflecting new circumstance and the choices orbehaviors of users. In one embodiment, the system of the presentinvention provides a means to bridge communications between incompatiblenarrowband communication systems or one or more narrowband systems withbroadband systems or traditional phone systems.

One application provides financial incentives to sponsors so that theywould provide free communication services and free applications to theirsponsored users. Enabling these applications and services to be providedto users exempt from charges could make it possible to grow thecapabilities and reach of public and private networks. In many cases,sponsors may be willing to offer additional services if certainconditions are met or certain choices or behaviors of users areobserved. This requires interactive communication between the sponsorand service provider in real time either in person or as part of apredetermined set of circumstances outlined in business rules, whichstate when additional services are provided by the sponsor. Applicationsinclude, but are not limited to, emergency services and telemedicine.

In one embodiment, the invention provides a novel and substantialsolution to the problem of providing immediate and interoperablecommunications including those without proven means to pay and enablessponsors wishing to pay to provide them with interoperable voice, data,and multi-media services. The invention provides an apparatus and arelated method for controlling public network switching activity orprivate or virtual private networks in a manner which makes it possibleto provide on demand communications emergency services, of telephone,data, multimedia line or services, whether land, satellite, wirelessnarrow or broadband, mobile or phone card based interoperably to thosewhose systems may or may not be compatible with each other.

This system will allow narrowband communications users to communicatewith each other and those with broadband communications who normally donot have the narrowband communications systems.

The approach also allows for a method of speech recognition that assiststhe interoperable communications methodology so that incompatible analogor digital systems can be used to communicate with users of othersystems.

In one embodiment of the present invention, a method of operating atelecommunications system comprises the steps of detecting an incomingcall or data message from a calling party to a called party, and using acalled number or identifier to determine whether the called party is auser for whom service is provided at no charge or substantially nocharge. Remotely controlled interactive voice, data, and video servicesare provided at no charge or substantially no charge. Web portalsproviding interactive and automated means of sharing data are providedat no charge or substantially no charge. Business rules determinewhether a sponsor will pay for a communication, service, or product. Abehavior or choice of the calling party is evaluated to determinewhether it meets a business rule. The calling party is added on-demandto a new network path or infrastructure. For example, if a user of asponsored service, such as an educational or training service, passes agrade on a certain exam provided through a telecommunications medium,then that event may trigger the authorized release of additionaltraining material to the sponsored student, or an additional sponsoredtelecommunications link to additional sponsored telecom services orentertainment, such as a movie.

In another embodiment of the present invention, a method of operating atelecommunications device or network comprises the steps of identifyinga prospective user of communications devices, networks, or services, andadding the prospective user to a database of users for whom service isprovided at no charge or substantially no charge. A change of personalmedical status or environmental status of the user is detected andservice or connectivity is provided at no charge or substantially nocharge to the user. The service or connectivity is pre-authorized andtriggered by the change.

In an additional embodiment, a plurality of telecommunications outputsignals are aggregated from disparate communications networks into acommon audio or video mixer and converted to digital signals so that thesignals can be shared with others communicating over a digital network.Voice, data, or video signals are sent from the digital network to othercommunications networks not on the digital network. A data center isused within a network to offer managed services, wherein network usersdo not need to provide specialty software or hardware at the user'slocation. Speech activated commands link the user from one radiofrequency to a user of a different radio frequency.

This also makes it possible for the communications user to function as avirtual base station of communications to other communications users. Inthe embodiment using speech activated inter-connector servers (SAICs),codes are used for allowing the calling party access only to thosecalled parties specified by a sponsor and use of only those servicesprovided by the sponsor. Similarly, the system administrator providingcentrally managed services can limit the service access to those partiesand services authorized by the paying sponsor.

In yet another embodiment of the present invention, a method foroperating a telecommunications device comprises the steps of detectingan outgoing call or data message from a calling party to a called party,and using a called number or identifier to determine whether the calledparty is a user for whom service is provided at no charge orsubstantially no charge to the calling party. Remotely controlledinteractive voice, data, and video services are provided at no charge orsubstantially no charge to the calling party. Web portals providinginteractive and automated means of sharing data are provided at nocharge or substantially no charge to the calling party. At least onebusiness rule determines whether a sponsor will pay for a communication,service, or product based on circumstances which trigger an agreementfor the sponsor to pay. A behavior or choice of the user is evaluated todetermine whether it meets a business rule which determines whether acommunication, service or product will be paid by a sponsor.

In still yet another embodiment of the present invention, a method ofoperating a telecommunications device comprises the steps of detectingan incoming call or data message from a calling party to a called party,using a called number or identifier to determine whether said calledparty is a universal service user for whom service is provided at nocharge or substantially no charge, generating and sending a message tosaid calling party offering participation as a sponsor for the currentand subsequent calls of this type for the sponsored party; and using thecalling number or identifier to determine the quality level of sponsoredservice approved for that sponsored user.

In yet another embodiment of the present invention, a method ofoperating a telecommunications device comprises the steps of detectingan incoming call or data message from a calling party to a called party,using a called number or identifier to determine whether said calledparty is a universal service user for whom service is provided at nocharge or substantially no charge, generating and sending a message tosaid calling party or to a third party offering participation as asponsor for the current and subsequent calls of this type for thesponsored party, and using codes and speed dial numbers for allowingcalling parties access only to those called parties allowed by sponsorsto be contacted and only using those services provided to users by thesponsor or sponsors.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are included to provide a furtherunderstanding of the invention and are incorporated in and constitute apart of this specification, illustrate embodiments of the invention andtogether with the description serve to explain the principles of theinvention.

FIG. 1 is a flowchart showing a process for delivering Incoming Calls toa Universal Service User.

FIG. 2 is a flowchart showing an outbound calling process according tothe present invention.

FIG. 3 is an illustration of a simplified block diagram of the preferredembodiment of the switching system according to the present invention.

FIG. 4 is an illustration of a simplified block diagram of the preferredembodiment of the sponsored or universal service virtual real time wideband assessment routine.

FIG. 5 is a flowchart of the calling process as applied to a phone cardor virtual phone card process where sponsors can restrict and replenishaccounts for their sponsored users.

FIG. 6 is a flowchart of the calling process as applied to a combinationphone card or virtual phone card with a local phone servicesubscription.

FIG. 7 is a flowchart of the virtual phone card process as it may beapplied to monitored and recorded services such as a prison phoneservice.

FIG. 8 is a flowchart of the virtual phone card process as it may beapplied to non monitored and recorded services such as a college orbusiness campus or users while traveling.

FIG. 9 is flowchart of the process of monitoring a person or theirenvironment so that triggering events can initiate sponsoredcommunications.

FIG. 10 is an illustration of the layers or levels of universal servicethat can be provided by the invention.

FIG. 11 is an illustration of free security services that can beprovided by sponsors such as local governments and financialinstitutions so that public and private networks can be protected frommalicious acts.

FIG. 12 is an illustration of on-demand communications that providespeople, organizations, and or governments immediate on-demandparticipation in interoperable communications and services, such asthose used for emergency services.

FIG. 13 is an illustration of how a user of incompatible communicationssystems can become a virtual base station providing compatiblecommunications when combined with services over a network.

FIG. 14 is an illustration of connectivity to the SAIS.

FIG. 15 is an illustration of the functionality of the SAIS.

FIG. 16 is an illustration of the interactive nature of the systemsupported by business rules.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

Reference will now be made in detail to the preferred embodiments of thepresent invention, examples of which are illustrated in the accompanyingdrawings.

For the purposes of the present invention, the universal service user isalso defined as an “exempt” user or “sponsored” user, and the servicesare alternately referred to as “universal service,” “exempt service,” or“sponsored service.” “Call” is used either as a voice, data, ormultimedia contact.

The present invention provides software operating in routers, telephonecentral office switches and/or their intelligent peripherals or inprivate networks or virtual private networks. Such operating softwaremay also be installed in other network devices for wireline and wirelesslocal loop services and long distance services, in user and serviceprovider equipment including switches, PBX's, telephony systems,controlling local area networks, and wide area networks. The softwaremay also provide universal access to portable telephones, personaldigital assistants, notebook and laptop computers, communication tabs,pagers and other electronic communications devices, including those thatmay be considered nanotechnology. The software capabilities are managedfrom a central point, or decentralized points, or at the edge of thenetwork including the policy or security servers or remote mass storagesystems supporting the networks.

One solution to the problems of interoperability is to overlay currentemergency communications or telemedicine services with on-demandcommunications that provide complete voice, data, and videoinfrastructure and services, allowing for real-time on-demand inclusionof new participants based on sponsored services. This providesinteroperable voice, data, and video communications without eliminatingprior communications systems and investments by utilizing thosetechnologies and systems along side of the system provided by theinvention.

The on-demand interoperable communications not only allows forinteroperable communications in voice, data, and video between persons,computer programs, databases, and communications agents, but alsoprovides for more survivable infrastructure and the immediate inclusionof new network and service participants who do not have the means to payeither in the short-term or long term.

The system also provides totally interoperable voice, data, and videoservices necessary for the immediate provision of emergency servicesincluding parties that are not anticipated as being needed to be a partof a communications network.

However, one skilled in the art understands that the inventive conceptscan be similarly applied to billing and connection services for othercommunications networks and their accompanying applications, services orproducts such as telemedicine, education services or businesstransactions, and the like.

Telemedicine applications and other on-demand emergency communicationsmay be paid by a sponsor, such as an insurance company or community. Aseries of interactive communications authorize new and additionalsponsored services, which in turn could be more efficiently managed byuse of automated business rules. For example, an insurance company maybe willing to pay for a number of different communication services,e.g., health care services such as advice and consultation by medicalprofessionals, or other services and products depending on whether auser meets certain criteria. However, an insured party may only beauthorized for advanced telemedical observation and diagnosis routinesfor a previously diagnosed heart irregularity. An observed indicatortriggers a need for additional services, and established business rulesautomatically approve and facilitate the communication capabilities andmedical services needed. These business rules enhance the ability ofsponsors to provide services to users.

In another example, a sponsored patient is authorized to call his doctorfor an appointment and, based on that behavior, the patient will begiven additional privileges or services because of the approvedbehavior. The choice to call at the proper time may authorize certainadditional telephone, Internet, or cell phone privileges. A databaselinked to the business rules also logs additional benefits of servicesor products for which the user is authorized. A growing database ofinformation, including the business rules, interactions between sponsorsand users, and the behaviors of users, enhances the business rules orartificial intelligence rules and allows for more complex services to beapproved in an on demand environment.

The method for providing on-demand communications include the followingsteps. The first step is to establish universal service or third partypayer services. This provides the capability for sponsors to approveeither in advance or in real time, the payment for services of otherparties not able to pay or provide credit in a timely manner, asillustrated in FIGS. 1-3 and 5-11. FIG. 4 shows that databases ofservices and service level agreements can act as business rules to showwhich initial benefits sponsors will authorize and which subsequentbenefits can be used when new circumstances or behaviors trigger theauthorization of sponsored services. This allows for on-goinginteractive communications with the sponsor who can authorize additionalservices either by being part of the communications link in person, or,through business rules which they previously authorized that can adaptto changing circumstances.

The second step is to provide interactive video services throughcommonly available software used to manage multiple users. The softwareis deployed either through a data center or a distributed data center orcenters which would allow the capabilities of the interactive managementsoftware to be delivered to users without requiring the physicalinstallation of new software or hardware at the user site.

One such approach is commonly referred to as an Application ServiceProvider (“ASP”) model. The data center or combination of data centerscan provide the interactive communications capability to users over anetwork, whether a private data network, the internet, or an intranet.In time, some of these services may be deployable at the edge of thenetwork, closer to the user.

In these services, all the control software that allows for effectiveinteractive communications are provided through a switch (eitherphysical equipment or software or both) at a location other than at thenew user site. This makes it possible for the sponsor to add the newuser to the interactive video service or on-demand communicationsservice without having to add new hardware or software to the new usersince all the interactive video capabilities are provided throughservices at the switch, server or data center. Depending on the service,some software may be downloaded to the user from the site of the serviceprovider to enhance interactivity.

In an example, a prospective new user of the on-demand communicationssystem is invited to join the network. The prospective user joins byconnecting to the internet or intranet at the address provided by theinviting party. The user is provided with a way to log into the networkand use any means of identification and security that the networksponsor is prepared to provide.

Once the prospective user is at the correct website or its equivalent,the website provides information to the prospective user outlining thespecific steps that are required to enter the interactive communicationswebsite. If necessary, the interactive communications website offers todownload any required software to the prospective user to participate ina managed communications environment. Because the software required toparticipate is built into the data center or network center and can betransferred through the web connection, the user would not need anyspecial equipment or locally loaded software to participate. The soundand video capability of the user's computer is sufficient. Additionalsponsored services can also be offered to the user at the same time,such as free or sponsored phone services.

The third step is to provide capabilities for the new user or hisprograms or computer or telecommunications agents to share informationwith the emergency services network. This is accomplished through meanssuch as web portals or information request agents. Web portal softwaremodules or information request agents make it possible for sponsors orpaying participants of an emergency services network to provide data andservices from software programs or databases to users who do not havethose programs or databases installed in their own systems. New userscan receive information from the web portals or information requestagents or provide information to the web portals without having anyspecial software of their own since the portion of the data being sharedis posted to or taken from a web site that does not require the use ofthe underlying software program or database. Participation is a matterof being provided access and authorization by a sponsor and can be doneas quickly and immediately as the sponsor identifies and authorizes theuser. The programs or databases or services can be offered to sponsoredusers who do not have the ability to pay for the emergency services in atimely manner. However, the users can be added to an emergency servicesnetwork in real-time since additional software or hardware is not neededfor each new user and the user does not need to be able to pay beforebeing included into the network.

A fourth optional step makes it possible for the sponsors to allow,authorize, and provision participation of the new and unexpected user,so that the user is immediately included in the network infrastructurewithout requiring the user's ability to pay. For example, if the useralready has some wireline or wireless capability to access one network,the sponsor can authorize that new and unanticipated user to join a newor different wireline or wireless network that might provide additionalcapabilities or a different infrastructure for network reliability anddisaster recovery purposes. This may require an assessment of thenetwork, or the servers and mass storage that are supporting theapplication by the ASP in which the appropriate server capability isassessed, provided, and, as necessary, billed to the sponsoring party.Also, the sponsor may issue temporary “passes” to the network that aremaintained in the database and used to track the sponsored services.

FIG. 12 illustrates these four steps where a user has a computer,whether stationary or mobile, that can be added to the network withwhatever network connectivity the sponsor may wish to authorize(wireline, wireless, or satellite) and pay on behalf of the new user.Sponsors and users do not have to wait for new customer premiseequipment to be added or for the user to find the financial resources toparticipate.

Since some users may not anticipate a need to participate in theseemergency services networks, they may not know how to acquire andprovision or have the resources to buy special software, hardware, orservices that would allow them to participate in an emergency servicesnetwork. By organizing a combination of emergency service capabilitiesthat exist in an emergency services network and not in the user's owncommunications system, these users can be added immediately as long assponsors can authorize the use of the new users. Because the sponsorscan anticipate the need for new users, the sponsors can add the newusers at will and in real time, as shown in FIG. 11. Referring to FIG.9, new users can be added manually or automatically. New users can alsobe part of an identified group of users, such as an enhanced E-911database, but without current communications services.

In some cases, a person's medical or environmental status change ismonitored so that the change can trigger their addition to a sponsoreduser database or trigger authorization to use sponsored communicationsnetworks and/or services. This makes it possible to offer newtelemedicine services to a sponsored patient so that new problems thatarise would be understood through business rules as a triggering eventcreating a new service that the sponsor has agreed to pay. Similarly, achoice by the user of an approved piece of information or communicationtriggers the authorization of the sponsor for an additional service orpiece of information that becomes relevant to the sponsor and usersubsequent to the choice.

In another example, an intelligent transportation network systemmonitors road and visibility conditions. When the sensors or camerasshow a decrement in road conditions or visibility, communicationsresponse is triggered. A signal changes the lighted speed limit sign toa slower speed limit so that drivers can be prepared to react toreal-time road information, minimizing traffic accidents and fatalities.Alternatively, a community of users may receive enhanced broadbandservices that might not have been available to them prior to the weatheror road conditions change, such as the availability of weather maps orprepaid services to board up or otherwise protect their properties orobtain free sources of portable drinking water.

Any user in this on-demand communications network could become a virtualbase station in which the user takes otherwise incompatible systems andintegrates them into his own on-demand communications network, asillustrated in FIG. 13. This provides some level of interoperabilityeven to those users who do not have internet network access themselves,allowing them to enjoy many of the benefits of the network that can beused by the virtual base station user.

In one embodiment of this invention, the user, or service provider ofthe user, takes the audio output of each of the incompatiblecommunications systems, in any combination of radios or cell phones,either from a speaker to a microphone or from a speaker or headset jackinto an audio mixer. Multiple audio inputs from various radios or cellphones can be connected to a device through which a user can controlproperties such as volume, quality of sound, etc. These signals are thenconnected to an analog/digital converter which enables these signals tobe connected into the computer of the on-demand communications user.This provides additional management controls of those audio signals, andthe ability to forward those signals either in combination or separatelyas his own audio input into the larger interactive voice, data, andvideo communications system that comprises the on-demand communicationssystem. This allows for the similar aggregation of video inputs throughvideo mixers and analog/digital converters.

In an example, different police and fire departments in a region havedifferent frequencies over which their communication systems operate.FIG. 14 shows radio base stations 202 and 207 operating in differentfrequency bands. The on-demand communications user may have access tomultiple incompatible systems. The user can take the audio input fromall of these systems along with his own so that others in the on-demandcommunications network can hear what the on-demand communications useris communicating with those on otherwise incompatible radio systems, andso that another person using one radio system can hear both the virtualbase station manager and those with whom he is communicating through theon-demand communications network. This would allow users on differentsystems to, in fact, communicate with each other whether they are localor distant.

The virtual base station manager is able to communicate back to eachparticipant of the incompatible networks who are not on the on-demandcommunications network using any means allowed by the incompatiblenetwork device, either manual or automated, depending which user or basestation capabilities are available from that incompatible system. Thevirtual base station can be located either with a remote user or at thebase station. Since the base station operators of the incompatibleradios will also receive the audio signals sent to them by the on-demandcommunications system, they have those audio signals forwarded to theusers of the specific incompatible radio through the normal meansafforded to them by their base station manufacturer, as shown in FIG.13.

Optionally, individual radio users have a voice activated means torequest a connection to another radio frequency system so that the basestation operator does not need to intervene. The voice-activatedconnection to otherwise incompatible systems is described below andillustrated as the Speech Activated Inter-connector Server (“SAIS”) inFIG. 13. The SAIS can stand alone as an automated means to connectincompatible voice systems. FIG. 14 shows connection 203 from radio basestation 202 to SAIS 201. This connection 203 may be a two-wire landline.Another base station 207 is connected via connection 208, which may be afour-wire dedicated line that is incompatible with connection 203. TheInternet 206 is connected to the SAIS via connection 209, which may be ahigh speed digital connection, unlike connections 203 and 208. Theconnection to the public switched telephone network 204 may be via a T1carrier, again incompatible with connections to other types of systemsconnected to the SAIS.

The user interface with the SAIS can be tone-activated orspeech-activated and provides a means to support the portion of theon-demand communications participants that do not have access tointernet protocol based communications.

The SAIS is a full fanout switch that allows one to make discreetconnections to one or many simultaneous connections (e.g., conferencecalls) with others who may not have internet or intranet capabilities.The full fanout switch capability of the SAIS can act as multiple mixersusing a programmable switching matrix with low audio input impedance andhigh output impedance followed by an impedance converter. Voice signalscan also be converted to digital format prior to the matrix for ease ofdigital mixing. The SAIS switch can connect any input, or group ofinputs, to any combination of outputs (hence, full fanout).Additionally, an echo canceller is used on each input so that thespeaker does not hear himself.

The speech activated interconnector portion of the invention enablesinterconnection of multiple dissimilar voice communication systemswithout the need for human operator intervention. The end user simplyvoices a connection request over the audio connection to the SAIS. TheSAIS dialogs with the user using speech recognition, a table of userauthorities, and timeout features for disconnection. The process enablesrapid connections between systems, which can significantly enhanceoperations in an emergency.

Participating systems interface at the analog voice level, the “leastcommon denominator” of all human voice communication systems.Interfacing at this audio level eliminates many of the incompatibilityissues common to such system integration efforts.

The present invention provides for the integration of radio stations ina preprogrammed system that can be voice activated and controlled viaend user speech. The system eliminates operator intervention andbypasses the difficulties of integrating dissimilar systems byinterfacing at the audio point, the “least common denominator” of allvoice systems.

The operator intervention requirement is bypassed by programming acentral switch or similar interconnection point that responds to voiceinstructions from the end user. In this approach, speech recognition isused to monitor all audio connections to participating systems. Usingspoken security codes, the user accesses the switch and performsinterconnections for which that user is authorized. Speech analysis mayor may not be used to identify the actual speaker supported within theSAIS.

The digital system complexities, such as transmission packet protocolsused on digital voice systems, are bypassed by making all user systeminterconnections using audio in analog or digital format. Audio is the“least common denominator” that allows the most sophisticated digitalsystem to interface with the most antiquated analog system. Bydefinition, every voice system has an analog signal point in order for ahuman to hear the signal. The speech activated interconnector inventionis interfaced at the analog signal point.

In a speech activated interconnector invention application, multiplevoice communication systems are connected to the SAIS or speech managedserver. The SAIS interconnects multiple voice systems that may nototherwise be interoperable. The SAIS interfaces with various voicesystems at a basic level, and nominally, the analog voice level. In thisregard, all voice systems are analog at one point or another in orderfor humans to be able to listen. An analog point for most radio systemsexists at a base station where voice traffic is normally received ordistributed. The base station may use an external voice grade wirelineconnection to a remote location or have an operator position using ananalog microphone and speaker/headset. In either case, a sample of theanalog voice signal can be passed to the SAIS via landline or otherconvenient path. A return path from the SAIS is bridged onto the voicecircuit in the reverse direction at the same point.

For cost effectiveness, all voice signals can be converted to digitalformat, e.g., 64 kbps PCM, at the interface with the SAIS. This allowsall circuit connections and speech recognition related functions to bedone digitally under software control.

SAIS interfaces with other systems and supports passage of controlfunctions that simulate the normal operation of those systems asrequired. In some cases, this involves use of a simple pair of wiresused to activate a push-to-talk (“PTT”) function at a base station. Inthe return direction, the link can pass carrier detect signals of aradio system to the SAIS. Where a system requires more complex commandand control functions, the SAIS is programmed to simulate the requireddata signals.

Interfaces with systems may use a simple pair of wires or 2 wire loop.Others require 4-wire interfaces, 4-wire E&M, LAN, WAN, or radio linkconnections. The commonality of all the interfaces is voice plussignaling required to establish end-to-end voice connection between endusers.

The SAIS interconnects systems by cross connecting receive paths fromone source with the transmit lines of another and visa versa. Theuniqueness of SAIS is the way the process is executed. Cross connectionsare done in response to voice commands from end users. To perform therequired operations, the SAIS monitors the voice circuits from all thesystems connected to it.

SAIS is a “standby capability” that allows connected systems to operateindependently until a user desires service. That is, the SAIS simplymonitors the voice traffic for code words or other forms of command andcontrol signaling when not being used. When a user wishes to beconnected to another system, the user verbalizes a unique word. Thatword could even be a name of a person or location that is maintained ineither a permanent or ad hoc database of such words. When the SAISdetects this unique word, it begins an interaction with the user. Usinga series of passwords and prerecorded voice challenges, the SAISinteracts with the user to establish a desired connection. The systemadministration portion of the invention allows either a specified ordefault period of time to allow the connection to stay up or a voicecode to end the connection.

By using human speech as a single means of communicating commands andcontrols, the SAIS is compatible with the simplest analog systems aswell as more advanced technology based systems. This enablesinterconnection between otherwise incompatible voice systems. The SAIScan also be programmed to detect and process signaling such as DTMF,subaudible tones, and other types to electronic signaling commonly used.

The SAIS creates end-to-end circuits by cross connecting voice circuitsto/from different voice communication systems. To achieve suchconnectivity, the SAIS simulates the control procedures of each systemto establish the link and to terminate “calls.” The SAIS can also bridgemultiple voice connections to form a conference connection, ifparticular participants allow such connections. To ensure operationalacceptance by end users, the SAIS is programmable to allow and/orrestrict access to connections by other based on user permission levels.

The SAIS is designed to manage multiple voice connections that areestablished dynamically under user control. Connections are allowedaccording to multiple decision factors such as identify of the user,user's level of authority, and system access privileges. For example, afireman may have access to other firemen, police, and EMS personnel inthe field (personnel using handheld radios), but not have access to thepublic telephone system via connections to the SAIS. The fireman mayalso have access to voice lines to the fire station as well.

Participating organizations can establish a variety of procedurallimitations and access controls to protect their systems. Participantsalso have the ability to activate and abort connects to the SAIS asdesired.

Each user must be given access control codes or password(s) to beeligible to participate. The user registration process is initiated by aparticipating organization. The organization provides the SAISadministrator with names of users as well as levels of access allowedfor each user. The user's password can be generated by the organization.For security purposes, the initial password can be used as a temporarypassword, which is replaced by the user when first registering online.If multiple users use the same password, the SAIS can distinguish userswith its speaker recognition software or automatic location information.It should be noted that this system is intended for voice communicationsalthough other forms of signals may pass through connections formed viathe SAIS. The level of security required should be commensurate. Asimple voiced password should be sufficient.

Assuming a user has been registered on the SAIS, the user can access thesystem over any of the systems through which the user is authorized. Thefirst step is for the user to verbally announce a pre-registeredpassword. The SAIS recognizes the password using speech recognitionsoftware. This begins a series of transactions that establish theconnection desired by the user.

There are multiple call establishment processes that the SAIS can beprogrammed to follow depending on the type of system being interfaced.For example, SAIS first sends a short tone burst, voice message, orannouncement to the user. The tone may be used by the SAIS to turn on abase station transmitter or perform other activation processes that arespecific to the link to the user. The user hears the burst or voicemessages and is prompted to repeat the password within a preset amountof time. This burst-timed response procedure is used to filter out falsepassword detection by the SAIS.

When the second announcement of the password has been detected by theSAIS, the SAIS provides a list of options or tree of options in a mannersimilar to an automated PBX. The user can bypass the announcements byspeaking codes for access to connections desired. For example, if a userwishes to speak to EMS personnel at a particular location, the user maysay “EMS 5.” EMS 5 would be a standard connection option at the SAIS forthat authorized user. Alternatively, the user can say “5,” accessing aconnection preconfigured connection table specific to that user. Theuser can also say “Last” (or similar wording) which causes the SAIS toestablish the last connection that user had active. That connection mayhave been initiated by another user, but the SAIS keeps a record of altransactions and can re-establish the linkage.

The option tree available to the user is constructed in advance by theSAIS administrator as directed by the participating organization.Multiple levels in the tree are available for each user. Users soonbecome familiar with the tree contents and can exit the tree at willusing the appropriate verbal commands.

For security reasons on some systems, speaker verification may berequired. This can involve additional levels of password as well asvoice pattern recognition by the SAIS. Training of the SAIS for voicepattern recognition is conducted at the time of registration andinvolves use of the transmission device intended. For example, apoliceman speaks over his radio to the SAIS announcing a specific set ofwords selected to train the SAIS. The same words are used subsequentlyto authenticate the user over the radio. The same user re-registers overother instruments independently to access the system over those devices.In other words, if a user is also allowed to access the system over adifferent radio system or type of radio, speaker recognition trainingmay be required over that other radio or system. This reduces the numberof false positive recognitions by limiting the voice pattern matchingprocess to a smaller set of patterns. The integrity of the speakerrecognition process improves by also requiring the correct password(s)and restricting the word patterns used for matching to those associatedwith a specific system or radio link.

Once a valid connection request has been established via the SAIS, theSAIS bridges the calling party's voice circuit to the called party andsignals or otherwise activates the link to the called party. This mayinvolve ringing a phone, turning on a base station, or broadcasting analert function on some device. The details of the steps taken by theSAIS depend on the technical and operational requirements of connectedsystems.

Participating organizations can have the SAIS programmed to issue callerID information to the called party. This can be done using industrystandard tones, user system specific protocols, or programmed audioannouncements.

The connection made at the SAIS can be terminated in several ways. ASAIS timer can be used which can be based on a fixed period or a periodof silence. If two systems communicate through the SAIS, the system canbe programmed so the shorter timeout period prevails.

Users have the option of forcing a termination by announcing a uniquecodeword such as “Break SAIS.” Termination is confirmed audibly to theusers at both ends by the SAIS with words such as “Connection is nowterminated.”

A connection can also be terminated by the SAIS administrator or bysystem operators of the systems being interfaced at the SAIS. Somesystems will provide a termination signal such as a telephone going onhook. When connections involve PTT functions, the termination timer canbe based on periods of inactivity of the control leads involved.

FIG. 15 illustrates the architecture of the SAIS system according to anembodiment of the present invention. The SAIS will include a computer213 which houses standard hardware and the system's programming. A localterminal 214 is used for direct access to the SAIS computer forprogramming and maintenance. Similar access is provided via the Internet206 via connection 217 to a router 212 or the public telephone system204 using dial-up circuits. This allows end user organizations to secureaccess to the SAIS computer for managing access control parameters forusers. External communications systems 217 that require connection tothe SAIS will invariably require one form of conversion or another tointerface with the SAIS. Interface unit 214 provides the requiredelectrical and protocol conversions required to meet the minimumrequirements of interfacing with an SAIS port 215. These requirementsinclude a means to placing outgoing calls or call signaling, receivingincoming calls, carrying voice in both directions, and actual orsimulated control signals that may be required by the external system tooperate. Router 212 in FIG. 15 performs numerous industry standardfunctions including intrusion detection and firewall functions.

The security features of external systems, such as encryption of a radiopath, are no longer in effect when the voice signal is converted to aformat suitable to interface with the SAIS. End-to-end connections thatmust remain encrypted will require re-encryption on all links to whichthe user is connected.

The consequences of unauthorized access to the system will varydepending on the sensitivity of the participating organizations tounwanted traffic. System participants that allow conferencing are morelikely to experience intrusion whereby unauthorized detection of trafficis enabled. The primary result of unauthorized access may beinterference with operations. For example, a fireman climbing a ladderduring an emergency would not want a nuisance call on his radio. Toreduce inappropriate use of the system, each user, each system, and eachlink to/from the SAIS is configurable to restrict access to specificusers, systems, or links. Likewise, call durations can be restricted byuser, system connection, or link.

Participating organizations may optionally require that users attemptingto access their system via the SAIS be required to provide additionalpassword(s). The SAIS is programmed to manage such activity on behalf ofthe organization.

The SAIS maintains a record of the user name and encrypted copy of thepassword. Deletion of the user name from the system causes the SAIS todelete the password from the system.

The SAIS can be scheduled to expire user passwords periodically. Userswould be required to re-register as noted above or conduct an“over-the-air” password change process before a password expires.Announcements of pending expirations can be announces to users by theSAIS in advance when users are available.

FIG. 16 illustrates the interactive nature of the sponsor, user, andservice provider either by direct contact or through an approveddatabase of business rules or both. In this case, a patient or prisoneris being monitored for health or behavior through a sponsor approvedmonitoring routine (in step 1). However, as in typical insurance plans,a heart specialist may not be approved until a heart condition warrantsa specialist's review or intervention. Or, in the case of a prisoner,the change of health or prisoner location may trigger an alarm andactivate additional communications links with the prisoner who may havearea or tethered personal communications links on his person. As in thecase of step 2, a new heart condition arises. In step three, the newcondition service routine compares the new condition with the databaseof business rules and conditions to see whether a new service now beingrequested is already approved and in the database of approved services.Step 6 shows the decision tree showing if approved, the service isprovided and the database is updated (step 12) as required, but, if not,then step 7 suspends approval and begins the sponsor contact routine(step 8) through any of the approved methods, such as email, page, phonecall, video transmission, etc. Once the sponsor is reached, a decisionis requested in step 9. If the sponsor approves, then the service isprovided (step 6) and the database is appropriately updated (step 11).If the sponsor does not approve, then the new service is not authorized(step 10) and the database is appropriately updated (step 11).

The approval of the sponsor may be simple or complex as in a database ofbusiness rules or complex conditions. Also, the sponsor can be reachedto update the decision given new circumstances. This makes it possibleto maximize the value and efficiency of on demand communications formany applications from telemedicine to emergency services. In turn,these sponsor provided services provide sufficient economic incentivesfor the development of new communications infrastructure rather thanonly providing incentives to create incremental additional services.

While the invention has been described in detail and with reference tospecific embodiments thereof, it will be apparent to those skilled inthe art that various changes and modifications can be made thereinwithout departing from the spirit and scope thereof. Thus, it isintended that the present invention cover the modifications andvariations of this invention provided they come within the scope of theappended claims and their equivalents.

1. A method of operating a telecommunications system, the methodcomprising the steps of: detecting an incoming call or data message froma calling party to a called party; and using a called number oridentifier to determine whether the called party is a user for whomservice is provided at no charge or substantially no charge.
 2. Themethod of claim 1, further comprising the step of providing remotelycontrolled interactive voice, data, and video services at no charge orsubstantially no charge.
 3. The method of claim 1, further comprisingthe step of providing web portals providing interactive and automatedmeans of sharing data at no charge or substantially no charge.
 4. Themethod of claim 1, further comprising the step of using business rulesto determine whether a sponsor will pay for a communication, service, orproduct.
 5. The method of claim 1, further comprising the step ofevaluating whether a behavior or choice of the calling party meets abusiness rule.
 6. The method of claim 1, further comprising the step ofadding the calling party on-demand to a new network path orinfrastructure.
 7. A method of operating a telecommunications device ornetwork, the method comprising the steps of: identifying a prospectiveuser of communications devices, networks, or services; and adding theprospective user to a database of users for whom service is provided atno charge or substantially no charge.
 8. The method of claim 7, furthercomprising the steps of detecting a change of personal medical status orenvironmental status of the user and providing service or connectivityat no charge or substantially no charge to the user.
 9. The method ofclaim 8, wherein the service or connectivity is pre-authorized andtriggered by the change.
 10. The method of claim 7, further comprisingthe steps of: aggregating a plurality of telecommunications outputsignals from disparate communications networks into a common audio orvideo mixer; and converting the signals to digital signals so that thesignals can be shared with others communicating over a digital network.11. The method of claim 10, further comprising the step of sendingvoice, data, or video signals from the digital network to othercommunications networks not on the digital network.
 12. The method ofclaim 7, further comprising the step of using a data center within anetwork to offer managed services, wherein network users do not need toprovide specialty software or hardware at the user's location.
 13. Themethod of claim 7, further comprising the step of using speech activatedcommands to link the user from one radio frequency to a user of adifferent radio frequency.
 14. A method for operating atelecommunications device, the method comprising the steps of: detectingan outgoing call or data message from a calling party to a called party;and using a called number or identifier to determine whether the calledparty is a user for whom service is provided at no charge orsubstantially no charge to the calling party.
 15. The method of claim14, further comprising the step of providing remotely controlledinteractive voice, data, and video services at no charge orsubstantially no charge to the calling party.
 16. The method of claim14, further comprising the step of providing web portals providinginteractive and automated means of sharing data at no charge orsubstantially no charge to the calling party.
 17. The method of claim14, further comprising the step of using at least one business rule todetermine whether a sponsor will pay for a communication, service, orproduct based on circumstances which trigger an agreement for thesponsor to pay.
 18. The method of claim 14, further comprising the stepof evaluating whether a behavior or choice of the user meets a businessrule which determines whether a communication, service or product willbe paid by a sponsor.
 19. The method of claim 14, further comprising thesteps of providing a communications user as a virtual base station ofcommunications to other communications users.
 20. The method of claim14, further comprising the step of using codes for allowing the callingparty access only to those called parties specified by a sponsor and useof only those services provided by the sponsor.
 21. A method ofoperating a telecommunications device comprising the steps of: detectingan incoming call or data message from a calling party to a called party;using a called number or identifier to determine whether said calledparty is a user for whom service is provided at no charge orsubstantially no charge; if said called party is not a user for whomservice is provided at no charge or substantially no charge: generatingand sending a message to said calling party offering participation as asponsor for the current and subsequent calls of this type for saidcalled party; and using the calling number or identifier to determinethe quality level of sponsored service approved for said called party.22. A method of generating an additional interactive request foradditional funding of communications services and/or applicationssupported by a communications routine, comprising the steps of:monitoring a plurality communication parties for a signal indicatingthat an additional service and/or application is requested, checking adatabase to see if the service and/or application is provided by thesponsor; and determining if the service and/or application is funded andif the services and/or applications are not funded connecting to thesponsor to request additional funds and/or services.
 23. The method ofclaim 22 wherein the communications service and/or application may beprovided from either a public or private network.
 24. The method ofclaim 22 wherein the step of determining if the service and/orapplication is funded, further comprises the step of determining whethersufficient funds exist in a pre-paid account of the calling party, thecalled party or a third party to cover charges associated with the calland its applications.
 25. A method for provisioning data services tocustomers comprising the steps of: receiving a request from aninitiating party to conduct telecommunications with a receiving party ata specified time; and determining whether said receiving party is auniversal or sponsored service user for whom service is provided at nocharge or substantially no charge.
 26. A method in accordance with claim25, further comprising the step of calculating a cost for provisioning aquality of service necessary to support said requested datacommunications.
 27. A method in accordance with claim 25, furthercomprising the step of determining the cost of accompanying applicationsat said specified time.
 28. A method in accordance with claim 25,further comprising the steps of: generating and sending a message tosaid initiating party requesting authorization to charge a fee forconnecting said calling party to said called party; receiving user inputfrom said initiating party indicating said initiating party'sauthorization to charge said fee; and, provisioning data services tosupport said requested data communications at said specified time. 29.The method in accordance with claim 25, of calculating a cost forprovisioning a quality of service supporting the accompanyingapplications further comprising the step of assessing the networkelements and quality of service necessary to support said requested datacommunications.
 30. The method in accordance with claim 25, wherein saidstep of calculating a cost for provisioning a quality of service furthercomprises a step of assessing a market demand on said network elementsat said specified time.
 31. The method in accordance with claim 25,wherein said secure identifier comprises a PIN code, digital signature,pseudo-random number generator, biometric or video transmission.
 32. Themethod in accordance with claim 28, wherein the user input comprises aPIN code, digital signature, pseudo-random number generator, biometricor video transmission.
 33. In an information network, a method forpatient or environmental monitoring comprising: distributing securedcommunications agents throughout the network; enabling the securedcommunications agents to monitor the network for signals indicating atriggering event; enabling the secured communications agents tocommunicate with one another; and collecting information gathered fromthe secured communications agents.
 34. The method of claim 33, furthercomprising the step of enabling the secured communications agents tocommunicate with one another.
 35. The method in accordance with claim 33wherein the secured communication agents and associated applications areapproved and/or paid for by sponsors.
 36. The method in accordance withclaim 35, further comprising the steps of: connecting to a calledparty's number; providing options of services that can be chosen at afee; receiving input indicating selection of one or a plurality of theoptions; checking the input against a sponsored user's database todetermine if the service is approved; and delivering or denying each ofthe secured communications agents and associated applications dependingon approval.
 37. The method of claim 33, further comprising the steps ofmonitoring an environment or behavior and comparing a monitored changeto a database of business rules that trigger the authorization of anadditional service, product, telecommunications service, orinfrastructure.