WO1991007041A1 - Called person identification in telecommunication - Google Patents

Called person identification in telecommunication Download PDF

Info

Publication number
WO1991007041A1
WO1991007041A1 PCT/AU1990/000526 AU9000526W WO9107041A1 WO 1991007041 A1 WO1991007041 A1 WO 1991007041A1 AU 9000526 W AU9000526 W AU 9000526W WO 9107041 A1 WO9107041 A1 WO 9107041A1
Authority
WO
WIPO (PCT)
Prior art keywords
telephone
mailbox
call
called person
smith
Prior art date
Application number
PCT/AU1990/000526
Other languages
French (fr)
Inventor
John James Anderson
Original Assignee
John James Anderson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by John James Anderson filed Critical John James Anderson
Publication of WO1991007041A1 publication Critical patent/WO1991007041A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/04Selecting arrangements for multiplex systems for time-division multiplexing
    • H04Q11/0428Integrated services digital network, i.e. systems for transmission of different types of digitised signals, e.g. speech, data, telecentral, television signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/64Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
    • H04M1/65Recording arrangements for recording a message from the calling party
    • H04M1/6505Recording arrangements for recording a message from the calling party storing speech in digital form
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/71Substation extension arrangements
    • H04M1/715Substation extension arrangements using two or more extensions per line
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4413Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4446Hiding of documents or document information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4446Hiding of documents or document information
    • H04N1/446Enclosing, i.e. retaining in an enclosure, or locking up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04N7/147Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Definitions

  • each individual station or line terminal is located by the caller entering a specific number combination. Any additional selectivity at th s stage however such as the identity of a particular call recipient is not possible.
  • this invention discloses an improved telephone system whereby a particular telephone call recipient is identified by personal information being conveyed during the initial placing of the call by means of the entry of a recipient's personal code before, during or after the line number.
  • the telephone unit's or network microprocessor calculates the electrical representaion of the recipient's code and assigns a value to it.
  • the program compares the varying input expression against the constant expressions programmed into the memory. If an assigned value match occurs an instruction is given to initiate the appropriate part of the program which initiates the recipient's indentification signal.
  • the secondary code number issues an instruction to perform part or all of a specific program or accesses a machine location, as the case
  • SUBSTITUTESHEE requires to initiate a distinct preselected ringing sound on the receiver instrument.
  • the desired recipient of the call is identified in accordance with a specific and unique number entered for that terminal.
  • the caller dials the number of the called person and the switching centre in the public network performs all the functions connected with setting up of a call and signalling the called party.
  • the signalling sent to the called party normally consists of the ring signal which operates some form of a ringing (or acoustical) device located in the called party telephone apparatus.
  • the first solution takes form of an answering machine which when connected to the line reacts to the ring signal sent from the public switching centre, terminates the ringing, provides a prerecorded message to the caller and then accepts information destined for the called person. If the machine is arranged in such a way that the proceedings on the telephone line may be heard the called person may listen to the message and to the information being forwarded by the calling party and may thus decide whether to answer the call or not by being able to identify who the call has been directed to and who is calling.
  • SUBSTITUTE SHEET Trade Mark The most successful type of device of this group is the visual display device under the trade mark of "Caller ID” and the patent of the "Call System for a Digital Telephone Set". These devices can identify each and every calling telephone number in the digital network. Other devices can identify only a limited or “special" number of callers due to programming and distinctive ring limitations (amongst other limitations), therefore each have had varying amounts of success depending on each's application and operation.
  • the "Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone” involves complex electronic circuitry which connects to the called party's telephone line in parallel to the ordinary telephone apparatus and which is capable of recognising the calling party's PIN transmitted in the DTMF code. If the transmitted calling party's code coincides with the number prerecorded in the apparatus then identification is assumed positive, therefore the call is not terminated and the aforementioned apparatus annunciates a special ring signal so that the called party has the option to answer the call, knowing approximately who the caller might be.
  • the "Call System For Digital Telephone Set” is proposed by NTT and as shown is registered in Japan.
  • This solution refers to the ISDN network and a digital phone and it allows for the calling party's telephone number to be used in the called party digital telephone set for the purpose to identify who is calling and to produce suitable audio and visual signals to the call recipient. It does not, however, allow for identification of the called persons.
  • This patent application proposes the Identification of the Person Called (IPC) which may take either of two forms depending on analogue or digital telephone network use.
  • the modern ISDN network utilising the comprehensive signalling system known under the name CCS No.7 allows for the provision of a sophisticated method of called party identification before actually answering the incoming call.
  • This new method uses the unallocated codes in the HEADING of the User Information Field of the Telephone User Part (TUP) in the CCS No.7 D-channel signalling system.
  • TUP User Information Field of the Telephone User Part
  • the IdentiCall method proposed operates as follows: the caller dials the called party number and when this number is complete it is followed by a special additional number dialled by the caller. This additional number will be distinguished from the normal LDN by special delimiters, like e.g. * or #, or any combination of them.
  • special delimiters like e.g. * or #, or any combination of them.
  • SUBSTITUTE SHEET system upon receipt of this special, delimited, number will send it via D channel in the CCS No.7 signalling system to the called party location and eventually to the called party digital telephone set.
  • the called party digital telephone set upon receipt of the signal through the D-channel signalling will react by generating a distinctive audio signal and/or combined with a message on the visual display installed in the telephone set. If the latter is the case, anybody at the called party's premises will be able to read the message and identify the person to who the call is directed. The identification of the called person is carried before the call is answered, therefore, no call charge is applied to the calling party. This operation may be greatly enhanced if it is combined with the Caller ID feature offered in the modern ISDN system
  • This new method operates in the ISDN environment and will require only minor amendment, if any, to the operating software of the ISDN switching systems implemented by the telephone operating companies.
  • the alternative method of IdentiCall uses the analogue telephone network. This method requires the telephone operating company to assign more than one listed directory number (LDN) to the same telephone line. Each listed directory number is given a distinctive ring signal. Therefore depending on which telephone number the
  • Telephone IdentiCall addresses the basic household need to identify your own telephone calls from those directed to other residents. With Telephone IdentiCall one does not have to answer another resident's telephone calls again, provided the called resident is in the house. Telephone IdentiCall does not achieve, and did not set out to achieve, the identification of telephone callers. Firstly because devices such as "Priority Call” and the “Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" achieve this objective, and secondly, and most importantly because of the inherent disadvantages encompassing these devices. For instance:
  • callers personal identification numbers (PIN) or callers telephone numbers have to be pre-programmed into the telephone or a network control point (NCP) which constantly inconveniences the person wishing to use or change such services.
  • NCP network control point
  • SUBSTITUTE SHEET Telephone IdentiCall utilises a non defined sub-addressing field in the digital telephone network. By this means some additional call information is conveyed during the initial placing of the call.
  • Telephone IdentiCall using personal or secondary coded telephone numbers utilises a non defined addressing field in the analogue telephone network. By this means the personal call information is conveyed during the placing of the call.
  • Both IdentiCall methods mean the telephone call recipient is identified before the telephone call is answered and charged, unlike in the ordinary answering machine equipment.
  • the prior devices e.g. Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone implement some of the telephone answering machine functions, therefore, all calls are immediately charged.
  • a telephone with IdentiCall capabilities utilises micro-processor and software intelligence as opposed to hard wired logic circuitry (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone). Without micro-processor intelligence many of the enhanced telecommunication services (including Telephone IdentiCall) provided by the digital or analogue telephone network can not be carried out.
  • Analogue telephone terminal devices like in Apparatus for Converting a Standard Telephone to an Unlisted Number T_-ephone and Priority Call
  • Analogue telephone terminal devices are obsolete being non compatible with "end-to-end" digital transmissions, and of course, the digital telephones which are being used for the enhanced telecommunication services in the ISDN network.
  • Telephone IdentiCall using sub-addressing fields uses digital telephones whilst Telephone IdentiCall using addressing fields uses analogue telephones.
  • Telephone IdentiCall does not block or hang up telephone calls, again being a device for use from anywhere in the network.
  • Telephone IdentiCall identifies the person called, unlike the prior devices which identify a special caller (Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone and Priority Call). Nevertheless, with the prior devices even if a special or priority caller has called, one still does not know who the call is for.
  • the prior devices (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone and Priority Call) provide no opportunity for the callers to select or openly choose a distinctive ring tone. This is because caller PIN numbers or caller telephone numbers (as the case may be) are assigned not selected. On the other hand with Telephone IdentiCall the caller is free to select or choose any distinctive ring tone, depending on which telephone call recipient is dialled.
  • Caller ID The best and most popular method for identifying callers is "Caller ID" which allows the telephone number of each and every caller to be visually displayed without realising the inherent limits of the prior devices (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone and Priority Call) as per ( 1 ), (2) and (3) above. Telephone IdentiCall, as you have been shown, does not have the inherent problems of the prior devices and is seen as the ideal compliment for "Caller ID”.
  • Telephone IdentiCall With Telephone IdentiCall the caller dials the subscribers telephone number and an additional digit (sub-addressing field). With Telephone IdentiCall using personal or secondary coded telephone numbers the caller simply dials the personal or the secondary telephone number (addressing field). Therefore, "Telephone IdentiCall" or being able to identify the telephone call recipient (using distinctive rings) prior to the telephone becoming on-line (answered) is dependent upon the dialling of an addressing field or sub-addressing field using ISDN-D channel signalling. On the other hand Priority Call does not involve the dialling of an addressing field or a sub-addressing field, instead the calling telephone number is transmitted to the receiving terminal. As a result "IdentiCall" can only identify the person called and "Priority Call” can only identify (limited or special) telephone callers.
  • the existing network circuitry is capable of accepting and processing the personal number (addressing field) or digit (sub-addressing field). Therefore new circuitry does not require development unlike the prior devices.
  • the existing network software may generally be used (minor software modifications are required) to instruct the system regarding the IdentiCall procedure. Therefore outright or major software program development is not required unlike with the prior devices.
  • IdentiCall using addressing fields can use one channel signalling. Unlike Priority Call which requires the enhanced calling services system known as CCS No.7. Note, IdentiCall using sub-addressing fields requires CCS No.7.
  • a significant benefit of the IdentiCall Telephone utilising additional call information (non defined sub-addressing field) in the digital telephone network and the IdentiCall Telephone using personal or secondary coded telephone numbers (non defined addressing field) in the analogue telephone network is that call direction is possible. That is, provided there is a number of telephone jacks (extensions) for the same telephone line each called person ringing signal can be directed to any specific or any number of IdentiCall Telephones. Call Direction requires in pan new telephone set circuitry and software.
  • telephone calls can be directed to any specific or any number of IdentiCall Telephones sharing the same telephone line. This means that, each caller's telephone call can be directed to each called person's respective bedroom, thus suppressing the need to hear each other called person's personal ringing signal.
  • each called person can utilise the "Ring Turn On/Off capability, this allows each called person to turn off their personal ringing signal if they are unavailable to take calls and likewise turn on their personal ringing signal once they are available.
  • the Mailbox Answering Machine can be contacted for the "Ring Turn On/Off capability from each called person's respective bedroom. There is no need to hear each other called person's personal ringing signal, but
  • the attached drawing Fig. 1A shows the block diagram of the new digital telephone instrument, one embodiment of this invention.
  • Broken line divides the drawing in two pans: the lower one represents a basic layout of a typical digital telephone apparatus as used in the ISDN network and the upper pan represents some additional components, as an example, which may be used to provide some additional functions required in the process of identification of the called person.
  • Telephone line extended from the local switching centre is connected to terminals a and b of unit 1 which performs the functions basically of isolating line circuit from electronic circuitry contained in the digital telephone apparatus and at the same time it provides for 2 wire to 4 wire conversion required for transmission reasons.
  • Input signal from the public switching centre is typically a 144 Kb/s digital stream which in principle consists of three components: a 64 Kb/s stream carrying coded voice information, second 64 Kb/s stream designated to carry data transmission and one additional 16 Kb/s stream used for signalling between the switching centre and telephone apparatus. This combined 144 Kb/s signal is transfered to the line interface circuit 2 which
  • SUBSTITUTE SHEET has a principal function of extracting timing signals so that local clock oscillator may be synchronised properly.
  • the extracted clock timing signal is connected to unit 9 which is a local clock generator.
  • the 144 Kb/s stream is then applied to a special logic circuitry 3 whose only function is to split one 144 Kb/s stream into three separate bit streams: voice, data and signalling.
  • the 64 Kb/s stream carrying voice signal is applied to the codec circuit 4 which performs necessary coding and decoding functions required in the voice circuit. Ou ⁇ ut and input of the codec circuit 4 are connected to the handpiece device 6 containing microphone and a receiver used for voice communications.
  • the second 64 Kb/s stream is connected to data interface 5 which is equipped with the connection socket 7 where normally some form of data terminal equipment (DTE) will be connected, if required.
  • DTE data terminal equipment
  • the last part of the input signal, the 16 Kb/s steam is applied to the signalling interface logic circuit 10. This circuit performs the functions of decoding incoming signals from the switching centre and transfering the resultant signals to the signalling devices 11.
  • signalling devices 11 are shown as one block in reality they will consist of plurality of device, like e.g.
  • signals produced by signalling devices like e.g. pushing a button, are applied to the signalling interface logic 10 where it is properly coded, converted into binary form, and then applied to the logic circuitry 3 for inclusion in the signal transmitted back to the switching centre via line interface 2 and line termination unit 1.
  • Signals transmitted via the 16 Kb/s stream are referred to as channel D in the ISDN design.
  • SUBSTITUTE SHEET via signalling interface logic 10 to logic circuitry 3 where it is included in the overall transmission of 144 Kb/s to the switching centre.
  • this signal switching centre Upon receipt of this signal switching centre initiates transmission of the dial tone back to the subscriber. Subscriber operates then the numerical keypad, which is one the elements in the signalling devices group, these signals are converted and coded in the signalling interface logic 10 into the 16 Kb/s stream and transmitted back to the switching centre. Switching action follows in the network and eventually call will be established.
  • the IdentiCall feature user programs his telephone apparatus to accept certain additional signals which may be sent from the switching centre. This is done by simply pressing sequence of buttons on his telephone apparatus. The sequence of button pressing is such that it allows the signalling interface logic 10 to recognise that the signals produced are destined for the auxiliary microprocessor 12. Access to this microprocessor is gained via transfer interface 14 and common channel signalling bus 16.
  • Microprocessor 12 upon receipt of the special signals acts on them in accordance with software programme instructions stored in the memory 13 and saves the signals received in the memory 13 for future use.
  • the signal stored may consist e.g. of two digits. These digits will identify a certain called person at the premises where this special telephone apparatus is located.
  • microprocessor 12 When the caller wants to call a specific called person he/she dials normal directory number and follows it by the same two digits as stored in the memory 13 and which were disclosed to the caller beforehand by the called person. The public switching centre and the network will transmit these two additional digits via D-channel signalling to the telephone apparatus at called person premises. When this signal arrives to the telephone apparatus it is received by the signalling interface logic 10 as described before, it is recognised as a special signal and therefore it is applied via transfer interface 14 and common bus 16 to microprocessor 12. Upon receiving these additional digits microprocessor 12 compares the received digits with those stored in the memory, if a match is found the microprocessor generates suitable signal, transmits it via common bus 16 to device buffer 15 so that suitable announcement is activated. The announcement may take any form of audio and/or visual combination. It is prefened that one of these signals is an alphanumeric display providing clear identification of the called person. It will be obvious to a person skilled in the art that the microprocessor
  • SUBSTITUTE SHEET The switching centre receiving dialled digits from the calling person will have to distinguish between digits as pan of the listed directory number and additional digits for person identification. It is suggested that this may be achieved in a simple manner by using the delimiters, like e.g. * or # or both, before, or before and after the additional two digits serving the purpose of called person identification.
  • the two special, additional, digits identifying the called person will be included in the D-channel signalling stream and to achieve it some minor modifications will have to be introduced to the signalling pan of the switching centre software. Such modification is possible as it is intended that this new method of called person identification will utilise some of the unassigned addresses in the HEADING of the User Information Field of the Telephone User Part (TUP) in the CCS No. 7 D-channel signalling.
  • the software program operating microprocessor 12 will contain an additional routine which in case of an incoming call arriving from the switching centre containing the special called person identification digits and being unanswered will record details of such a call in the memory 13 for future use. Simultaneously, some distinctive indication will appear on the telephone apparatus alerting the user to the fact that there were some special, unanswered calls.
  • the telephone apparatus user has then an option, by operating special sequence of buttons, to read out from the memory details of calls recorded and take action as appropriate. After reading the stored information out these part of records may be erased.
  • SUBSTITUTE SHEET may be provided from the power supply unit 8 which is always provided in the digital telephone apparatus.
  • IdentiCall for the analogue telephone network involves special programming introduced in the network switching centres and assignment of special, additional directory numbers to the called persons concerned. If a caller dials the ordinary listed directory number (LDN) the switching centre activates the ordinary ringing signal and as a result the called party telephone apparatus rings in a normal manner. If the calling party dials a different LDN number assigned to a second person reached through the same telephone line, then the switching centre generates and sends down the telephone line a different ringing signal. The called party's premises telephone apparatus will emit a distinct, special ring signal which will indicate the second person wanted for the call.
  • LDN ordinary listed directory number
  • An embodiment of this invention for the analogue telephone network comprises an electronic unit that is connectable between a telephone subscribers line terminal and the telephone appliance.
  • the unit preferably consists of three relays and five electronic subsystems.
  • Figure 1 shows a system block diagram of the unit
  • Figure 2 is a schematic diagram of the ring detector and remote on-hook detector
  • Figure 3 is a schematic diagram of the dial pulse counter
  • Figure 4 is a schematic diagram of the acoustic signal generator (block 1)
  • Figure 5 is a schematic diagram of the acoustic signal generator (block 2)
  • Figure 6 is a schematic diagram of the local off-hook detector.
  • relay 1 connects the incoming line to the ring detector sub-system.
  • relay 1 connects the incoming line to the ring detector sub-system.
  • the incoming line is switched to relay
  • the ring signal is rectified by diode Dl .
  • the opto-coupler PH01 causes the input of the AND gate IC6 to go low.
  • the output of the IC6 also goes low since opto-coupler PH02, pan of the remote off-hook detection unit is unenergised due to the open circuit at relay 2.
  • the low/high transition at the input to the counter IC4 that occurs when a ring pulse ceases causes the count to increment.
  • the ou ⁇ ut Q7 will go high, energising relay 1 and causing the incoming telephone line to be switched to relay 2.
  • the signal RE which turns on the relay also resets the pulse counter so that it is ready to count the dialled pulses.
  • relay 2 In its unenergised state relay 2 is connected onto a 600 ohm telephone at the input of the pulse counter. This simulates the handset going off-hook and thus signals the exchange to make the audio connection between subscribers. When it is energised the telephone line is connected to the remote-off hook detector.
  • the received pulses are rectified by diode D2 and low pass filtered by R5 and C3 then amplified and finally are counted by IC2:A. Because there is one more pulse produced by the circuit than dialled due to the energy in the "end of dialling" spike a count of two pulses is made to signify "1 " has been dialled by activating the acoustical signal for " 1 ".
  • the binary representation of the count at the output of IC2:A is used to drive a multiplexer, IC3 switching high one of the outputs Cl to CIO. These outputs form the input to the acoustical signal generator.
  • a 555 counter generates a 10 kHz pulse stream which is input to counter IC1 :A.
  • the ou ⁇ uts of this counter will each represent a different acoustical signal.
  • One of these signals is coupled via a logic network to the speaker depending upon which output of IC3 is high.
  • relay 2 is energised, by combining the signals RL1 .... RL10 in ICl to IC5 so that whichever is high the ou ⁇ ut of IC5:A is high.
  • the opto-coupler PH02 When relay 2 is energised the acoustical signal is unaffected.
  • the opto-coupler PH02 is connected across the line. Because the called party has not yet lifted the handset the line is terminated by a 10K resistor in series with the photodiode. the dc voltage from the exchange turns on the output transistor of the opto-coupler, causing a low transition at the input to the counter. If the calling party abandons the call the opto-coupler output will go high causing a low-high transition at the counter input and the output at Q7 will go low,
  • relay 3 serves to connect the handset to the telephone line once it has been answered.
  • each IdentiCall Telephone would have a "Call Direction" switch setting, each switch corresponds to a distinctive ring tone. Therefore if a number of telephone apparatus' share the same telephone line then each telephone apparatus' switch settings can be configured so that one or more distinctive ring tones reach each telephone terminal. For example, if each resident has a telephone in their bedroom and assuming that the residents share the same telephone line, then each telephone can be "switched” or configured so that only chosen distinctive ring tones reach each bedroom in question, the ring tone(s) of the bedroom occupant(s).
  • a practical application of IdentiCall Call Direction using the above scenario, is if one bedroom occupant receives a 6.00 AM wake up call, then all the residents are not woken up.
  • a novel and unique answering system is proposed from here on entitled the "Mailbox Answering Machine” (MAM) in which it is possible for the answering machine user to receive a personalised print-out of the telephone callers who have telephoned in his absence together with the retrieval of the personal messages recorded. More than one answering machine user can use the said svstem.
  • MAM Mailbox Answering Machine
  • each telephone recipient's messages are indiscriminately deposited with the other telephone recipient's messages. As a result each recipient then has to listen to all the other telephone recipients personal messages or pan thereof to retrieve their own messages.
  • the object of this invention is to ameliorate the shortcomings of the prior answering machines by providing the telephone answering machine users with facilities only previously possible if each user had their own telephone line and telephone answering machine. It could be said that the Mailbox Answering Machine is equivalent to having a number of answering machines within the one answering machine.
  • each caller's telephone call message is addressed to and placed in the answering machine mailbox of the actual called person. Therefore the message deposited by the caller is separated from the other called persons' messages and becomes the sole property of the person it was addressed to. As a result, the caller can leave a message with the utmost discretion knowing that only the actual called person will retrieve it.
  • the main advantage of the Mailbox Answering Machine from the point of view of the people who share the facility of the answering machine is that as a result of each telephone call recipient having their very own answering machine mailbox, each called recipient does not have to listen to all the other residents messages to play their own messages.
  • the proposed invention does away with PABX's, centralised voice mail databases, and the multiplicity of telephone extensions and terminal equipment.
  • the proposed invention uses the concept of redialling not to access one's telephone terminal messages but instead one's personal messages.
  • the mailbox answering machine is believed to be the ideal solution to one's residential answering machine sharing problems and is surpassed only by the costly solution of "hooking up" a number of telephone lines and buying a number of answering machines, thus solving the problem caused by a number of people sharing the same answering machine facility.
  • SUBSTITUTE SHEET There are three versions of the Mailbox Answering Machine each version responds to different methods of signalling within the telephone networks. An example of each mailbox answering machine version is provided on the indicated pages.
  • Version 1 is for analogue exchanges which do not provide DTMF signalling.
  • Version 2 is for analogue exchanges which provide DTMF signalling.
  • Version 3 is for the digital telephone network.
  • the Mailbox Answering Machine compliments IdentiCall. For instance if the Mailbox Answering Machine is used jointly with IdentiCall then the terminal equipment would be given features previously only possible if the telephone users each have their own telephone line, telephone and answering machine.
  • the caller can give his message in confidence
  • the Mailbox Answering Machine requires the caller to address the answering machine message to the desired call recipient, addressing distinguishes the desired recipient from the other telephone call recipient's who share the same answering machine terminal. Therefore any message recorded by the caller, by virtue of the addressing system, becomes the sole property of the person to whom the message was directed. As a result the caller's message is private thus can be given by the caller in absolute confidence.
  • the prior answering machine devices suc as the Call Barring Arrangement ((Great Britain Patent No.: 2,062,410) (this patent suggested or made a provision for a conventional answering machine addition)) if the answering machine is shared by users, then no message can be given in confidence.
  • Each telephone call recipient sharing the answering machine facility is given their very own answering machine mailbox. And in the event that a message is recorded it is directed to the mailbox of the called person. As a result of this system the other people sharing the answering machine do not review your or anybody else's messages to retrieve their own. Likewise, you will only retrieve your own messages, nobody else's. With the prior answering machines the messages of the people sharing the answering machine are indiscriminately deposited together, so that no one person can retrieve their own messages without listening to all or part thereof of the other persons' recorded messages.
  • the Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus: and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
  • the only messages that a given user listens to are the messages intended for that user.
  • the time it takes a given user to retrieve his messages equals the time taken to review all the messages or part thereof in the machine, incidentally many or all these messages may not be for the said retrieving user.
  • the Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
  • the Mailbox Answering Machine proposes the use of an indicator light (such as a red light) for each mailbox.
  • the purpose of each indicator light is to inform each mailbox holder whether their is any messages in their given mailbox or not. With the prior devices message indicators could do nothing but simply inform the people sharing the answering machine whether any messages are or how many messages are recorded.
  • the Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
  • an IdentiCall Telephone forms pan of the Mailbox Answering Machine unit then, in conventional terms, the terminal equipment becomes a private telephone and answering machine for each call recipient, even though several people share these facilities. For example if the IdentiCall/Mailbox Answering Machine combination is implemented then half the family could let their personal calls ring whilst the other half have their answering machine on. This is not possible with the prior devices.
  • the Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
  • This advantage point anticipates no additional IdentiCall Telephones. Refer to advantage point six if more than one IdentiCall Telephone is anticipated for the same telephone line.
  • a telephone service subscriber could purchase a Mailbox Answering Machine and a number of IdentiCall Telephones to convert his domestic telephone system into a domestic PABX and Voice Mail System.
  • the domestic PABX and Voice Mail System type application utilises very little exchange intelligence to convert the household telephone system into a domestic PABX and Voice Mail system.
  • IdentiCall Telephone/Mailbox Answering Machine combination Prior to the IdentiCall Telephone/Mailbox Answering Machine combination "as above" a subscriber would have to purchase a PABX, a centralised voice mail system database and terminal equipment. Not to mention being liable for the expense associated with installation, maintenance and user costs.
  • each person sharing the IdentiCall Telephone/Mailbox Answering Machine has the option of turning their IdentiCall ring tone/pattern on (IdentiCall Turn On). Meaning if a caller rings a particular person, the called person's ring tone/pattern will sound and in the event the telephone call is not answered the telephone caller would be given the opportunity to record a confidential message for this called person.
  • Each person sharing the IdentiCall Telephone/Mailbox Answering Machine also has the option of turning their respective IdentiCall ring tone/pattern off (IdentiCall Turn Off).
  • Mailbox Over-Ride is a function which facilitates the Mailbox Answering Machine "IdentiCall Turn On/Off capability as described in advantage eight.
  • the "Mailbox Over- Ride" function allows special callers knowing of the called person's priority code to annunciate the called person's ring tone/pattern, even though the called person has commanded the Mailbox Answering Machine to turn off the ring tone/pattem and provide the caller with the opportunity of recording a confidential message.
  • the Mailbox Answering Machines' outgoing message(s) could instruct the caller to dial such a priority code if the call is of the utmost importance.
  • the "Mailbox Over-Ride” function takes affect on every IdentiCall Telephone sharing the same telephone line as the Mailbox Answering Machine.
  • the "Mailbox Over-Ride” capability is not possible with the prior devices, further, through any combination thereof.
  • the Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
  • the Busy/No- Answer Call Completion Equipment is an apparatus which enhances switching systems such as PBX's by assisting calling parties in completing their telephone
  • the MultiChannel Interactive Telephone Answering Apparatus is a telephone and answering system which provides PBX type facilities. This apparatus relies upon the caller dialling the system's telephone number to reach the main prerecorded message channel.
  • the main prerecorded message channel provides the caller with the option of dialling a pulse or tone response to select an auxiliary channel which in turn can be connected to further auxiliary channels.
  • the advantages provided by this decision tree format are: call direction, screening and forwarding and caller message storage for user playback.
  • Call direction which appears to be the main advantage, allows a caller to telephone the system and listen to and respond to a series of prerecorded instructions, thus a call can be directed to a telephone or answering machine terminal without receptionist type interrogation. For example if an eight track tape system was employed, eight relays could enable selective connection to up to eight extensions without receptionist type interference.
  • the Voice Mail System on Magnetic Tape is intended for connection to a private branch exchange (PBX).
  • PBX private branch exchange
  • the facilities it offers once connected to a PBX besides the expected voice mail system operations such as caller message recordings and caller message reviews are: improved tone decoder performance: minimise outgoing message interference of caller tone signalling; prevention of tone signals being re-executed if played back with the recording; to inform each recipient's telephone station of any voice mail system messages waiting and to indicate to each recipient at their telephone station whether the voice mail system is in use.
  • PBX private branch exchange
  • the Mailbox Answering Machine is simply a stand alone answering machine which does not support a PABX nor does it provide voice mail type PBX support facilities.
  • the Busy/No-Answer Call Completion Equipment supports switching systems and possesses many voice mail system features such as leaving a spoken message for later retrieval by the person occupying the called terminal.
  • SUBSTITUTE SHEET The MultiChannel Interactive Telephone Answering Apparatus like the immediately above device, can provide the caller (depending upon the type of configuration) with the opportunity to leave a spoken message for later retrieval by the person occupying the called terminal. Further, a specified caller or a special group of callers may be given "select forward" or "call block” type access to this voice mail system channel.
  • the Voice Mail System On Magnetic Tape supports a PBX and is capable of: in the event the called person is out of the office, allowing the company receptionist to transmit a DTMF tone so that the voice mail system will activate and record the caller's message; or in the event the called person is not answering the telephone, automatically activating the voice mail system thus setting up the intercept of the incoming call.
  • the Mailbox Answering Machine is a stand alone device providing no voice mail system type PBX support facilities and has no notable features other than called person mailboxes and those capabilities described, being ancillary to the answering machine mailbox capacity.
  • the Busy/No Answer Call Completion Equipment as one would expect from a voice mail type PBX support system relies upon a PBX network therefore requires not only a centralised switching unit interconnected to this voice mail type equipment but a substantial infrastructure, namely, the relays between each terminal and the centralised switching unit.
  • the MultiChannel Interactive Telephone Answering Apparatus system in a simple sense, involves a MultiChannel Interactive Telephone Answering Unit and a multiplicity of relays interconnected to a multiplicity of terminal extensions. This system requires the installation of a substantial PABX type infrastructure.
  • the Voice Mail System On Magnetic Tape interfaces a PBX therefore requires: a centralised switching unit; a voice mail system unit; and relays interconnecting the PBX and the voice mail system with each terminal station; and telephone equipment itself.
  • the Mailbox Answering Machine needs nothing more than a single phone jack (extension).
  • the Busy/No Answer Call Completion Equipment depends upon the interconnection of a comprehensive infrastructure, namely: a centralised switching unit: the voice mail type equipment: the relays from the centralised switching unit to the extensions;
  • the MultiChannel Interactive Telephone Answering Apparatus similar to the immediately above device, requires a sophisticated infrastructure: the MultiChannel Interactive Answering Unit; a series of relays; and terminal extensions and equipment. A reasonably high level of breakdown could be expected from this PABX/voice mail system type and the associated circuitry, especially if compared to a basic answering machine.
  • the Voice Mail System On Magnetic Tape in the context of the Mailbox Answering Machine is an intricate system requiring: a PBX; a voice mail system; and a multiplicity of relays interconnecting each of the terminal station's equipment to the integrated PBX and voice mail system.
  • the Mailbox Answering Machine is obviously not exposed to PABX type maintenance costs.
  • the Busy/No Answer Call Completion Equipment as can be expected from a voice mail type PBX support system, involves installation and configuration to tailor the system for both PABX compatibility and the given corporation's use requirements.
  • the MultiChannel Interactive Telephone Answering Apparatus as with any specialised multi-terminal business system requires the spending of characteristic installation and configuration time. In addition, seeing that it is a highly configurative system, due to the amount of decision tree structure options available, requires an extra period of configuration than most business systems.
  • the Voice Mail System on Magnetic Tape requires to be set up then requires adaptation to fit in with the existing PBX hardware infrastructure.
  • the configurative aspects of the system would include: software compliance with the companies PBX; programming of the outgoing message structure of the audio circuitry and the voice synthesised specific outgoing messages.
  • the Mailbox Answering Machine device requires nothing more than a single phone jack (extension) to provide a number of answering machines (for a number of called persons) within the one answering machine.
  • Each Telecommunications Authority charges the subscribers to PBX systems (Busy/No- Answer Call Completion Equipment, MultiChannel Interactive Telephone Answering Apparatus, Voice Mail System on Magnetic Tape) a set or variable fee for the privilege of PBX use.
  • PBX systems Bussy/No- Answer Call Completion Equipment, MultiChannel Interactive Telephone Answering Apparatus, Voice Mail System on Magnetic Tape
  • Such charges usually are advalorem, thus are dependent upon the cost or capacity of the PBX system.
  • the Mailbox Answering Machine being a single answering machine yields no such costs.
  • the Busy/No Answer Call Completion Equipment by being a voice mail type PBX support system requires receptionists.
  • This patent document provides for a message service which instructs the calling party to dial the switchboard attendant number or the caller can automatically be connected thereto.
  • the MultiChannel Interactive Telephone Answering Apparatus through the possession of certain PABX/Voice mail system elements, could and does in certain configurations provide a call direction opportunity to an automatic message attendant type service.
  • the Voice Mail System on Magnetic Tape directly supports a PBX; thus is adjunct to the switching system and the receptionist type functions.
  • this system states that, depending upon the configuration, the company receptionist could facilitate the required call direction to the voice mail system.
  • the Mailbox Answering Machine is merely an answering machine therefore does not require the assistance of switchboard operators.
  • the Mulitichannel Interactive Telephone Answering Apparatus allows the telephone calls of a user designated caller or group of callers to be directed to a specific auxiliary channel, whilst the other callers do not have access to this channel, so that these special callers can leave responsive messages. Therefore this enhancement amounts to a select forward and call block type function, meaning the caller's call becomes on-line (the caller pays for the call) then the caller responds to the interactive tape recording selection steps without any guarantee of reaching the desired terminal or channel.
  • This prior device is unlike the Mailbox Answering Machine whereby each caller will reach the terminal mailbox of the called person.
  • the Mailbox Answering Machine does not operate using a selection tree format.
  • the Multichannel Interactive Telephone Answering Apparatus involves a series of selection steps of which the caller's response to the series of selection steps determines which auxiliary channel is eventually chosen. Therefore this prior device answers the call, provides an initial tape response anticipating caller interaction then the analogue circuitry routes the caller to a further series of interactive tape responses and finally to the desired channel.
  • This system is totally different to the stand alone Mailbox Answering Machine which can: route the call to the called person's mailbox in response to a typical outgoing answering machine message (Mailbox Answering Machine Version 1 ); or route the call to the called person's mailbox prior to the answering machine becoming on-line (Mailbox Answering Machine Version 2 & 3).
  • the caller dials the personal number - mailbox address of the called person.
  • This mailbox address is then recorded by the machines message storage medium being either solid state memory or hard disk random access memory, so that the given message will be deposited in the correct mailbox.
  • the Multichannel Interactive Telephone Answering Apparatus uses an analogue circuitry and magnetic tape combination so that the call is routed to a series of interactive tape responses and finally to the desired channel.
  • MultiChannel Interactive Telephone Answering Apparatus is a slow recorded message retrieval system due to the incorporated tape playback system.
  • SUBSTITUTE SHEET affecting the tree structure instructions, user messages, and any caller messages response times.
  • the Multichannel Interactive Telephone Answering Apparatus' uses a decision tree structure which could be or is the method of choice for certain corporate voice mail type applications but is clearly an obsolete recording and retrieval method in the context of answering machine mailbox type facilities provided by the Mailbox Answering Machine.
  • the Voice Mail System On Magnetic Tape is another tape driven system. This system involves the accessing of a system greeting message so that the caller has the option of selecting a number of other outgoing messages such as a system directory of mailbox numbers before the caller actually tone signals to deposit a message for a particular system user.
  • the recording system is as follows: the system greeting message is at the centre of the tape system; whilst the other outgoing messages are adjacent to this root outgoing message; the first messages are then closest to the centre of the tape. As intended, such a system does reduce tape retrieval and recording times.
  • the recording and retrieval system is as follows: the caller through the use of a tone signalling device selects a user or mailbox number, the caller message is then recorded in an available cell. Each cell consists of a track and segment number. As a result of this method each user's message is retrieved by the cell number (track and segment number) and the user or mailbox number which is recorded within the tape's cell.
  • a caller calls a specific person and the specific person's answering machine mailbox is in "Ring rn off.
  • the specific person's IdentiCall Telephones could be program ⁇ ._d so that if a IdentiCall Telephone does not become on-hook and if the call is answered by the Mailbox Answering Machine immediately after the designated time for answering the specific person's telephone calls then each IdentiCall Telephone's indicator light programmed for this specific person will come on.
  • each called person would become aware of their messages from say their bedroom even though the Mailbox Answering Machine is in the lounge room.
  • Each called person could phone the Mailbox Answering Machine from their bedroom IdentiCall Telephone to retrieve their messages or at least would be aware of their Mailbox Answering Machine messages.
  • the caller can give his audio visual transmission in confidence
  • the Video Telephone Mailbox Answering Machine requires the caller of the calling Video Telephone to address the audio visual transmission to the desired call recipient. Addressing distinguishes the desired recipient from the other audio visual transmission recipient's who share the same Video Telephone Mailbox Answering Machine. Therefore any audio visual messages recorded by the caller, by virtue of the addressing system, becomes the sole property of the person to whom the message was directed. As a result the caller's audio visual message is private thus can be given by the caller in absolute confidence. With the assumed prior devices if the video telephone answering machine is shared by users, then no audio visual message can be given in confidence.
  • Each video telephone call recipient sharing the Video Telephone Mailbox Answering Machine facility is given their very own message mailbox. And in the event that a audio visual message is recorded, it is directed to the message mailbox of the called person.
  • the other people sharing the Mailbox Video Telephone Answering Machine do not review your audio visual messages nor anybody else's audio visual messages to retrieve and display their own. Likewise, you will only retrieve and display your own visual messages on the monitor, nobody else's.
  • the audio visual messages of the people sharing the Video Telephone Mailbox Answering Machine are indiscriminately deposited together. So that no one person can retrieve their own audio visual messages without displaying and listening to all or part thereof of the other persons' recorded messages.
  • SUBSTITUTE SHEET Users of the Video Telephone Mailbox Answering Machine can access their audio visual messages in a time comparable to not sharing the Video Telephone Mailbox Answering Machine at all.
  • Each called person's given Video Telephone Mailbox Answering Machine padlock command will transmit the image to the display monitor and transmit the speech representation to the audio circuitry to synthesis the caller's voice. Therefore the only audio visual messages that a given user reviews are the messages intended for this user.
  • the time it takes a given user to retrieve his " audio visual messages equals the time taken to review _J1 the audio visual messages or part thereof, incidentally many or all these audio visual messages may not be for the said retrieving user.
  • the Mailbox Video Telephone Answering Machine proposes the use of an indicator light (such as a red light) for each mailbox.
  • the purpose of each indicator light is to inform each audio visual message mailbox holder whether their is any messages in their given mailbox or not. With the prior assumed devices message indicators could do nothing but simply inform the people sharing the video telephone answering machine whether any audio visual messages are or how many messages are recorded.
  • the terminal equipment becomes a private Video Telephone and Video Telephone Mailbox Answering Machine for each call recipient, even though several people share these facilities. For example if a Video IdentiCall Telephone Mailbox Answering Machine is implemented then half the family could let their personal calls ring whilst the other half have their Video Telephone Mailbox Answering Machine on. This is not possible with the prior devices.
  • This advantage point anticipates no additional Video IdentiCall Telephones, Image IdentiCall Telephones or IdentiCall Telephones. Refer to advantage point six if more than one Video IdentiCall Telephone, Image IdentiCall Telephone or IdentiCall Telephone is anticipated for the same telephone line.
  • Video IdentiCall Telephone Mailbox Answering Machine If a person calls their Video IdentiCall Telephone Mailbox Answering Machine mailbox from an outside video telephone terminal and enters their padlock command then the Video IdentiCall Telephone Mailbox Answering Machine will transmit their own audio visual messages from their personal mailbox to the calling Video Telephone.
  • the caller of a video telephone terminal dials the Video IdentiCall Mailbox Answering Machine: telephone line number; call direction number; terminal type number: his padlock command and the monitor lock command then the personal mailbox's visual transmission will be locked or prevented from being displayed on the Video IdentiCall Telephone Mailbox Answering Machine monitor whilst the synthesised speech is transmitted across the line.
  • each person sharing this unit has the option of turning their IdentiCall ring tone on (IdentiCall Turn On). Meaning if a video telephone caller rings a particular person, the called person's ring tone will sound and in the event the telephone call is not answered the telephone caller would be given the opportunity to record a confidential audio visual message for this called person.
  • Each person sharing the Video IdentiCall Telephone Mailbox Answering Machine also has the option of turning their respective IdentiCall ring tone off (IdentiCall Turn Off).
  • IdentiCall Turn On and Off takes affect on every Video IdentiCall Telephone, Image IdentiCall Telephone and IdentiCall Telephone sharing the same telephone line as the IdentiCall Telephone Mailbox Answering Machine. Further, IdentiCall Turn On/Off can be applied from inside or outside the household.
  • "Mailbox Over-Ride” is a function which facilitates the Video IdentiCall Telephone Mailbox Answering Machine "IdentiCall Turn On/Off capability as described in advantage nine.
  • the "Mailbox Over-Ride” function allows special callers knowing of the called person's priority code to annunciate the called person's ring tone, even though the called person has commanded the Video IdentiCall Telephone Mailbox Answering Machine to turn off the ring tone and provide the caller with the opportunity of recording a confidential audio visual message.
  • the Video IdentiCall Telephone Mailbox Answering Machines' audio visual outgoing message(s) could instruct the caller to dial such a priority code if the call is of the utmost importance.
  • SUBSTITUTE SHEET function takes affect on every Video IdentiCall Telephone and IdentiCall Telephone sharing the same telephone line as the Video IdentiCall Telephone Mailbox Answering Machine.
  • a caller calls a specific person and the specific person's answering machine mailbox is in "Ring Turn off".
  • the specific person's Video and Image IdentiCall Telephones could be programmed so that if any type of IdentiCall Telephone does not become on-hook and if the call is answered by the Mailbox Answering Machine immediately after the designated time for answering the specific person's telephone calls then each Video and Image IdentiCall Telephone's indicator light programmed for this specific person will come on.
  • each called person would become aware of their audio visual or visual messages from say their bedroom even though the Video IdentiCall Telephone Mailbox Answering Machine is in the lounge room.
  • Each called person could phone the Video IdentiCall Mailbox Answering Machine from any type of IdentiCall Telephone in their bedroom to retrieve their audio or audio visual messages or at least would be aware of their Video IdentiCall Telephone Mailbox Answering Machine messages.
  • This capability is in this section as the Video IdentiCall Telephone Mailbox Answering Machine records the called person's message and because a Video IdentiCall Telephone Mailbox Answering Machine is required for this capability.
  • a caller is calling from a digital telephone then the called person's outgoing audio message will be retrieved. If the caller is calling from a video telephone then the called person's outgoing audio visual message will be retrieved. A command could be entered to facilitate the called person's outgoing message retrieved.
  • This application makes a specific provision for a Physical Mailbox Facsimile Machine.
  • the Physical Mailbox Facsimile Machine utilises the same call direction system as the Mailbox Answering Machine and enables physical mailbox contained correspondence.
  • the physical mailbox capacity is simply created by the caller directing the facsimile transmitted correspondence to the actual called person's print container. Depending on the length of the called person addressing
  • SUBSTITUTE SHEET (directing) code which must be dialled by the person intending on transmitting the image, junk mail can be prevented from reaching each called person's facsimile print-out mailbox.
  • Each called person's container can be unlocked by dialling a personal code (padlock command) and/or by using a conventional key.
  • the Physical Mailbox Facsimile Machine is the quickest way for people sharing the facsimile machine to retrieve their confidential material
  • the Physical Mailbox Facsimile Machine does not depend upon hard disk RAM storing the transmission
  • the Physical Mailbox Facsimile Machine envisages a sixth physical mailbox. This mailbox would supplement the other five physical mailboxes. Hypothetically, if a mailbox contains five hundred sheets of paper, then the future printed matter for this mailbox will be switched to the supplementary mailbox. The called person's padlock command will allow access to the person's physical mailbox and in this case the supplementary physical mailbox.
  • Such capabilities include:
  • the caller command sequence in the case of ISDN, would be: facsimile number, called person's physical mailbox: facsimile terminal type; and multi-location command. This command sequence would send the facsimile transmission to the called person's desired
  • each terminal could be used to store the subscriber's other terminal(s) data, text, image or voice transmission if such terminal(s) are busy or if the other terminal(s) mass storage for storing transmissions is used up.
  • a facsimile machine can store another facsimile machine's transmission if the latter facsimile machine is busy or if the mass storage for storing transmissions is used up. The latter terminal is redialled periodically for the re-transmission of data.
  • the Physical Mailbox Facsimile Machine proposes the use of an indicator light (such as a red light) for each print mailbox.
  • the purpose of each indicator light is to inform each mailbox holder whether their is any printed facsimile material in their given mailbox or not.
  • Each print mailbox could also inform the mailbox holder of the amount of paper sheets deposited in the container.
  • the sheet of paper figure would start at sheet 501 and the mailbox holder's full physical mailbox would show the same paper sheet reading for accessing purposes. If the caller enters a general called person number the printed facsimile could be deposited in a general mailbox for indiscriminant review by the users.
  • Indicator lights and paper sheet readings facilitate immediate "hands on” of each mailbox holder's printed matter. Prior devices can do nothing to support immediate "hands on” of the printed matter.
  • a telecommunications service subscriber could purchase a number of Call Direction Personal Computers to convert his domestic telecommunications system into an Exchange Area Network (XAN).
  • XAN Exchange Area Network
  • SUBSTITUTE SHEET Let's assume that there are four telephone jacks (extensions) within the Smith household. One telephone jack is in the: lounge room; Mr and Mrs Smith's bedroom; Junior Smith's bedroom; and Junior Junior Smith's bedroom. Let's also assume that there is a Call Direction Personal Computer in each bedroom.
  • Mr and Mrs Smith's Personal Computer, Junior Smith's Personal Computer, Junior Junior Smith's Personal Computer or any other computer for that matter can transmit data directly to and from each other by using the XAN. This allows data to be transmitted to/from a specific terminal or the number of terminals sharing the same telecommunications line(s), from within or outside the household.
  • Mr and Mrs Smith's Personal Computer transmit data to and from Junior Smith's Personal Computer without such data reaching Junior Junior Smith's Personal Computer, even though they share the same telecommunications line(s).
  • this permits outside computers to transmit data to and from a specific computer terminal, such as, Mr and Mrs Smith's, or every computer terminal in the household, even though the Smith's share the same telecommunications line(s).
  • a data caller from an outside computer terminal has the option of transmitting data: to and from a specific Call Direction Personal Computer sharing the same telecommunications line as other Call Direction Personal Computers: and to and from a number of Call Direction Personal Computers sharing the same telecommunication line as all the Call Direction Personal Computers (the latter is more applicable to ISDN).
  • the latter requires the telecommunications number, a general person code and the device type code. Such as, telecommunications number * 7 (all persons) * 3 (computer terminals).
  • Each version is based on the different methods of mailbox answering machine signalling within the different networks.
  • the Mailbox Answering Machine works in the following manner:
  • the answering system's micro-processor calculates (decodes) the electrical representation of the dialled digit and a value is assigned to the "called person dialled digit" variable. For example if 1 is dialled the "called person dialled digit" variable value will equal 1.
  • the answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 6.
  • step 5 If the caller does not dial a padlock command within a designated time. The program goes to step 5.
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for a "called person dialled digit" value match.
  • the program goes to step 8. For example the program searches for a program value of 1 to match the "called person dialled digit" variable value 1.
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command ' s value match.
  • step 3C If a value match occurs for the "first called person padlock command” value then the program goes to step 3C; if a value match occurs for the "second called person padlock command” value then the program goes to step 3C; if a value match occurs for the "third called person padlock command” value then the program goes to step
  • the "message counter 1" is incremented by 1: so that the next dialled digit variable value occupies the "recording queue” variable conesponding to the second memory location.
  • the answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 4.
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command's value match. If a value match occurs the program goes to step 3. If a value match does not occur the program goes to the message retrieval pre-start position.
  • the personal or secondary coded telephone number of the subscriber is dialled.
  • the answering machines micro-processor calculates (decodes) the electrical representation of the ringing signal and a value is assigned. For example if the main telephone number is dialled then the dialled value will equal 1.
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
  • step 16 If a value match occurs for the dialled digit variable then the program goes to step 16 (that is, if the Mailbox Answering Machine does not encompass an IdentiCall Telephone and if there are no other IdentiCall Telephones sharing the same telephone line).
  • step 5 that is, if the Mailbox Answering Machine encompasses an IdentiCall Telephone and or if there are other IdentiCall Telephones sharing the same telephone line).
  • the called person's ring pattern annunciates for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring pattern. Therefore the program goes to step 9. (Note: the called person's ring pattern annunciates on the other IdentiCall Telephones which have been designated (programmed) to annunciate the called person ' s ring pattern.)
  • the called person's ring pattern annunciates for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring pattern. Therefore the program goes to step 9. (Note: the called person's ring pattern is allowed to annunciate on the other IdentiCall .Telephones which have been designated (programmed) to annunciate the called person's ring pattern.)
  • step 10 If the "called person dialled digit" variable value equals 1 then the program goes to step 10; If the "called person dialled digit” variable value equals 2 then the program goes to step 1 1; If the "called person dialled digit” variable value equals 3 then the program goes to step 12.
  • the called person's ring pattern annunciates on the IdentiCall Telephone/Mailbox Answering Machine unit for a designated time: and if during this time this IdentiCall Telephone or another IdentiCall Telephone to which the call has been directed becomes off-hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit” variable value equals 3 then the "called person's unit” variable value is given the value 2 and the program goes to the pre-start position; and if this IdentiCall Telephone and the other IdentiCall Telephone(s) to which the call has been directed remain on-hook then if the "called person's unit” variable value equals 3 then the "called person's unit” variable is given the value 2 and the program goes to step 15.
  • the called person's ring pattern is not allowed to annunciate for a designated time on this IdentiCall Telephone/Mailbox Answering Machine unit.
  • the called person's ring pattern is annunciated on the IdentiCall Telephone(s) to which the call has been directed for a designated time: and if during this time such a telephone becomes off- hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit” variable value equals 3 then the "called person's unit” variable value is given the value 2 and the program goes to the pre-start position; and if such telephones remain on-hook then if the "called person's unit” variable value equals 3 then the "called person's unit” variable is given the value 2 and the program goes to step 15.
  • SUBSTITUTE SHEET called person's dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person 2's recorded outgoing message is read.
  • the program goes to step 5.
  • Such a "recorded announcement message” would be: "You have called Mrs Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you”. The program goes to step 7.
  • the answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 12.
  • SUBSTITUTE SHEET 1 If the caller does not dial a padlock command or an ancillary command within a designated time. The program goes to step 21.
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command's value match.
  • step 15 if a value match occurs for the "first called person padlock command” value then the program goes to step 15; if a value match occurs for the "second called person padlock command” value then the program goes to step 16; if a value match occurs for the "third called person padlock command” value then the program goes to step
  • step IOC if a value match occurs for the "first called person padlock command” value then the program goes to step IOC; if a value match occurs for the "second called person padlock command” value then the program goes to step IOC; if a value match occurs for the "third called person padlock command” value then the program goes to step IOC.
  • the memory location corresponding to or identified by (and containing) the first person's telephone number is accessed by the recording/reading head, therefore, the tone signals of the first called person's telephone number is read.
  • the program goes to step 24.
  • the memory location corresponding to or identified by (and containing) the second person's telephone number is accessed by the recording/reading head, therefore, the tone signals of the second called person's telephone number is read.
  • the program goes to step 24.
  • the memory location conesponding to or identified by (and containing) the third person's telephone number is accessed by the recording/reading head, therefore, the tone signals of the third called person's telephone number is read.
  • the program goes to step 24.
  • the program is instructed to proceed to the "recording queue" variable array. If the caller is recording the first message then the first variable - which corresponds to the first memory location - is given the called person dialled digit variable value, and so on, until the array is complete.
  • the memory location conesponding to or identified by the first "recording queue” variable is accessed (gone to) by the recording/reading head, therefore, the electrical pulse pattern of the voice message is recorded.
  • the "message counter 1" is incremented by 1 : so that the next "called person dialled digit” variable value occupies the "recording queue” variable conesponding to the
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the "called person's padlock command" value match.
  • step 7 if a value match occurs for the "first called person padlock command” value then the program goes to step 7; if a value match occurs for the "second called person padlock command” value then the program goes to step 8; if a value match occurs for the "third called person padlock command” value then the program goes to step 9.
  • the "first called person's unit” variable value is given: the value 1 if the "Ancillary Command” variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command” variable value equals 66 then the program goes to step 14.
  • the "second called person's unit” variable value is given: the value 1 if the "Ancillary Command” variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command” variable value equals 66 then the program goes to step 14.
  • the "third called person's unit” variable value is given: the value 1 if the "Ancillary Command” variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command” variable value equals 66 then the program goes to step 14.
  • the "message counter 2" is incremented by 1: so that the program will proceed to the next variable in the "retrieval queue” array.
  • the subscriber's line number is dialled, a delimiter is then entered for example * or #, followed by the called person's one or two digit number.
  • the answering machines micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned. For example if 1 is dialled the dialled value will equal 1 .
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match.
  • SUBSTITUTE SHEET For example the program searches for a program value of 1 to match the dialled value of 1.
  • step 31 that is, if the Mailbox Answering Machine does not encompass an IdentiCall Telephone and if there are no other IdentiCall Telephones sharing the same telephone line).
  • step 6 that is, if the Mailbox Answering Machine encompasses an IdentiCall Telephone and/or if there are other IdentiCall Telephones sharing the same telephone line).
  • the answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 11.
  • SUBSTITUTE SHEET 1 The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the "called person padlock command's" value match.
  • step 14 if a value match occurs for the "first called person padlock command” value then the program goes to step 14; if a value match occurs for the "second called person padlock command” value then the program goes to step 15; if a value match occurs for the "third called person padlock command” value then the program goes to step 16.
  • step 10C if a value match occurs for the "first called person padlock command” value then the program goes to step 10C; if a value match occurs for the "second called person padlock command” value then the program goes to step 10C; if a value match occurs for the "third called person padlock command” value then the program goes to step IOC.
  • step 15 If the "called person dialled digit" variable value equals 2 then the "second called person's unit” variable value is given: the value 1 if the "Ancillary Command” variable equals 33 then the program goes to step 10B: the value 2 if the "Ancillary Command” variable value equals 66 then the program goes to step 10B: the value 3 if the "Ancillary Command” variable value equals 77 then the program goes to step 20.
  • the called person's ring tone will annunciate for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring tone. Therefore the program goes to step 21. (Note: the called person's ring tone will annunciate on the other IdentiCall Telephones which have been designated (programmed) to annunciate the called person's ring tone.)
  • the called person's ring tone will annunciate for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring tone. Therefore the program goes to step 21. (Note: the called person's ring tone will annunciate on the other IdentiCall Telephones which have been designated (programmed) to annunciate the called person's ring tone.)
  • step 21 If the "called person dialled digit" variable value equals 1 then the program goes to step 22; If the "called person dialled digit” variable value equals 2 then the program goes to step 23; If the "called person dialled digit” variable value equals 3 then the program goes to step 24.
  • step 26 If the "Second Call Direction" variable value equals 1 then the program goes to step 26; if the "Second Call Direction” variable value equals 0 then the program goes to step 29.
  • step 27 If the "Third Call Direction" variable value equals 1 then the program goes to step 27; if the "Third Call Direction” variable value equals 0 then the program goes to step 29.
  • SUBSTITUTE SHEET signals of the first called person's telephone number is read. The program goes to step 28.
  • the memory location conesponding to or identified by (and containing) the second person's ring tone is accessed by the recording/reading head, therefore, the tone signals of the second called person's telephone number is read.
  • the program goes to step 28.
  • the called person's ring tone is allowed to annunciate on the IdentiCall Telephone/Mailbox Answering Machine unit for a designated time: and if during this time this IdentiCall Telephone or another IdentiCall Telephone to which the call has been directed becomes off-hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit” variable value equals 3 then the "called person's unit” variable value is given the value 2 and the program goes to the pre- start position; and if this IdentiCall Telephone and the other IdentiCall Telephone(s) to which the call has been directed remain on-hook then if the "called person's unit” variable value equals 3 then the "called person's unit” variable is given the value 2 and the program goes to step 30.
  • the called person's ring tone is not allowed to annunciate for a designated time on this IdentiCall Telephone/Mailbox Answering Machine unit.
  • the called person's ring tone is annunciated on the IdentiCall Telephone(s) to which the call has been directed for a designated time: and if during this time such a telephone becomes off-hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit” variable value equals 3 then the "called person's unit” variable value is given the value 2 and the program goes to the pre-start position; and if such telephones remain on-hook then if the "called person's unit” variable value equals 3 then the "called person's unit” variable is given the value 2 and the program goes to step 30.
  • SUBSTITUTE SHEET l's announcement message memory location conesponding to or identified by the called person dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person l's recorded outgoing message is read.
  • the program goes to step 4.
  • Such a "recorded announcement message” would be: "You have called Mrs Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you”. The program goes to step 7.
  • the program is instructed to proceed to the "recording queue” variable array. If the caller is recording the first message then the first variable - which conesponds to the first memory location - is given the "called person dialled digit" variable value, and so on, until the anay is complete.
  • the called person dialled digit variable value is reset to 0.
  • the answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 4.
  • the answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the "called person padlock command's" value match.
  • step 7 if a value match occurs for the "first called person padlock command” value then the program goes to step 7; if a value match occurs for the "second called person padlock command” value then the program goes to step 8; if a value match occurs for the "third called person padlock command” value then the program goes to step 9.
  • the first "called person's unit” variable value is given: the value 1 if the "Ancillary Command” variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command” variable value equals 66 then the program goes to step 14.
  • the third "called person's unit" variable value is given: the value 1 if the "Ancillary Command” variable equals 33 then the program goes to step 14: the value 2 if the "Ancillary Command” variable value equals 66 then the program goes to step 14.
  • the "programming command" is dialled.
  • the Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the command and a value is assigned.
  • the Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
  • the micro-processor calculates (decodes) the electrical representation of the Call Direction command and a value is assigned. For example if 1 is dialled the dialled value will equal 1.
  • the program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
  • step 7 If the "Call Direction dialled digit" variable value equals 1 then the program goes to step 7: if the "Call Direction dialled digit” variable value equals 2 then the program goes to 8; if the "Call Direction dialled digit” variable value equals 3 then the program goes to step 9. If the "Call Direction dialled digit” equals another value the program goes to the pre-start position.
  • the "programming command" is dialled.
  • the IdentiCall Telephone's micro ⁇ processor calculates (decodes) the electrical representation of the command and a value is assigned.
  • the IdentiCall Telephone ' s program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
  • the IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the "Call Direction Deletion" command and a value is assigned. For example if 99 is dialled the dialled value will equal 99.
  • the IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 99 to match the dialled value of 99.
  • the personal or secondary coded telephone number of the subscriber is dialled.
  • the IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the ringing signal and a value is assigned.
  • the program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
  • step 4 If the "called person dialled digit" variable value equals 1 then the program goes to step 4; If the "called person dialled digit” variable value equals 1 then the program goes to step 5; If the "called person dialled digit” variable value equals 1 then the program goes to step 6..
  • the called person's ring pattern is allowed to annunciate for a designated time.
  • the program goes to the pre-start position.
  • the called person's ring pattern is not allowed to annunciate for a designated time.
  • the program goes to the pre-start position.
  • the programming command is dialled.
  • the Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the command and a value is assigned.
  • the Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
  • a delimiter is entered, for example, * or #, followed by the called person's one or two digit number.
  • the micro-processor calculates (decodes) the electrical representation of the "Call Direction" command and a value is assigned. For example if 1 is dialled the dialled value witi-equaLl
  • SUBSTITUTE SHEET 5 The program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
  • the "programming command" is dialled.
  • the IdentiCall Telephone's micro ⁇ processor calculates (decodes) the electrical representation of the command and a value is assigned.
  • the IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
  • a delimiter is entered, for example, * or #, followed by the one or two digit number.
  • the micro-processor calculates (decodes) the electrical representation of the "Call Direction Deletion" command and a value is assigned. For example if 99 is dialled the dialled value will equal 99.
  • SUBSTITUTE SHEET 5 The IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 99 to match the dialled value of 99.
  • the subscriber's telephone line number is dialled, a delimiter is then entered, for example, * or #, followed by the called person's one or two digit number.
  • the IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned.
  • the program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
  • step 4 If the "called person dialled digit" variable value equals 1 then the program goes to step 4; If the "called person dialled digit” variable value equals 2 then the program goes to step 5; If the "called person dialled digit” variable value equals 3 then the program goes to step 6.
  • the called person's ring tone is not allowed to annunciate for a designated time.
  • the program goes to the pre-start position.
  • the Physical Mailbox Facsimile Machine works in the following manner:
  • the subscriber's facsimile number is dialled and if the called facsimile machine is not busy, the facsimile machine places the call on-line.
  • the facsimile machine's micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned to the "called person dialled digit(s)"
  • the subscriber's line number is dialled, a delimiter is then entered for example, * or #, followed by the called person's facsimile machine mailbox code.
  • the facsimile machine's micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned to the "called person dialled digit(s)" variable. For example if 1 is dialled the "called person dialled digit" variable value will equal 1.
  • the program goes to step 3.
  • the facsimile machine's program compares the varying input expression against the constant expressions programmed into memory searching for a "called person dialled digit(s)" value match. For example the program searches for a program value of 1 to match the "called person dialled digit" variable value 1.
  • the facsimile machine's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned.
  • SUBSTITUTE SHEET 2 The facsimile machine's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command's value match. If a value match occurs the program goes to step 3. If a value match does not occur the program goes to the facsimile conespondence retrieval pre-start position.
  • step 3 If a value match occurs for the "first called person padlock command” then the program goes to step 4. If a value match occurs for the "second called person padlock command” then the program goes to step 5. If a value match occurs for the "third called person padlock command” then the program goes to step 6.
  • step 8 If the "second called person's facsimile mailbox lock" variable value equals 1 then the "second called person's facsimile mailbox lock” variable value is assigned the value 0. If the "second called person's facsimile mailbox lock” variable value equals 0 then the "second called person's facsimile mailbox lock” variable value is assigned the value 1. The program goes to step 8.
  • step 7 If the "first called person's facsimile mailbox lock" variable value equals 1 then the program goes to step 10. If the "first called person's facsimile mailbox lock” variable value equals 0 then the program goes to step 11.
  • step 8 If the "second called person's facsimile mailbox lock" variable value equals 1 then the program goes to step 10. If the "second called person's facsimile mailbox lock” variable value equals 0 then the program goes to step 11.
  • padlock command entries Hard disk, solid state or a print-out of wrong padlock command entries.
  • the padlock command entries could be time/dated.
  • An outgoing message warning capability such as, "Your telephone number has been recorded in an attempt to access a padlock". In addition, this number could be prevented from attempting to access a padlock again.
  • the present invention relates to a specialised telephone answering systems or the like.
  • TAM Telephone Answering Machines
  • SUBSTITUTE SHEET provides pre-recorded announcement to the calling pany and then allows a message to be recorded for later retrieval by the called subscriber.
  • the present design of the TAM equipment can operate only in the analogue telephone environment, i.e. it can not be used in conjunction with a fully digital telephone set, connected to a digital telephone line, serviced by a fully digital electronic exchange, and in particular in the ISDN environment.
  • Some of these equipments are specifically designed to inter-work with the PABX systems in which case they can provide certain degree of "personalised" service by directing or re-directing calls and/or messages to a designated extension, thus to the pre-determined persons. None of the above mentioned designs is capable of operating while connected to a digital line and a digital phone.
  • the present invention relates to a telephone answering mailbox apparatus and in particular to such an apparatus which is capable of being used by individual subscribers in an economical manner, providing not only pre-recorded answering messages but also providing caller selectable mailboxes where messages for specific person may be deposited and allowing these messages to be retrieved by person concerned.
  • the concept is adapted for use on both analogue and digital telephone lines.
  • the ringing function of an individual phone may be switched ON or OFF by the respective users at their discretion.
  • the following description relates to the analogue operating environment of the telephone Mailbox Answering Machine, i.e. to such parts of the telephone network and thus telephone exchanges which transmit analogue speech signals along the subscriber connecting line (subscriber loop) and which transmit ringing bunent to the called subscriber (approximately 80V ⁇ s °f AC current).
  • the telephone line while in an idle state, has +/- 50V DC connected to the loop wires with the positive end of the supply battery grounded at the telephone exchange, 80V rm s is transmitted along the line to the called subscriber's telephone set to operate the bell during ringing period, the telephone line must be loped at the called subscriber telephone set in order to terminate the ring and while in the conversation condition a DC cunent must continue to flow through the subscriber telephone line in order that the telephone exchange will recognize this state as a continued connection and to energize the telephone instrument installed at subscribers' premises. Neither wire in the subscriber's loop may be grounded at the called subscriber's telephone set at any time.
  • FIG. 7 shows the block diagram of the Mailbox Answering Machine in the prefened embodiment of the present invention designed for an analogue environment.
  • the operation of the system follows the sequence of actions as described below.
  • telephone lines 14A, 14B and 14C are not connected to the line directly but through the switch 13 and Line Condition Detector 14.
  • For the Mailbox Answering Machine to operate conectly either ordinary ring patter or a special ring pattern will be sent from the telephone exchange.
  • Ringing Pattern Detector 1 l The actual pattern of ringing signal is recognized by special circuit, Ringing Pattern Detector 1 l,a and upon recognition what pattern of ringing is being received suitable signal is sent from Ringing Pattern Detector 11 to the Logic circuit 20.
  • Logic 20 Upon receipt of this signal Logic 20 communicates with the microprocessor 30 to produce suitable commands to operate switch 13 in such a way that effectively a suitable telephone set out of, say, three sets connected to the system will be connected directly the line to receive ringing signal.
  • Microprocessor 30 will generate a command, will transmit it to the Logic circuit 20 which in turn will convert the command into electrical signal suitable to operate switch 13 and to connect telephone set 14A directly to the line. Just prior to issuing the command the
  • SUBSTITUTE SHEET condition of the termination of recording When disconnection of the calling subscriber is detected or when allowed time has lapsed Micro-processor 30 will issue commands which will stop recording process, will remove loop condition applied previously to the telephone line and will restore the switch 13 to the idle condition. Idle condition for switch 13 may be default connection to any nominated telephone set as a "Master". Simultaneously two other activities will take place: first - signal previously displayed on he LCD display will be removed leaving only the LED indicator in the ON condition to signal users that there was a message recorded, and second - suitable entry concerning recorded message will be written into the RAM memory 32. Such entry may contain information like: sequential number of the message, time message arrived and duration of the message. In this state the Mailbox Answering Machine is ready to receive another call.
  • the person concerned When any of the telephone station users wishes to retrieve his/her messages the person concerned lifts the handset of the telephone sets assigned to this person and presses one of the special buttons provided on each DTMF equipped phones, like e.g. * or #.
  • This signal even if received by the telephone exchange, will cause no action other than the removal of the Dial Tone (DT) from the telephone line.
  • the telephone line will be returned back to normal operation to and from public network when telephone exchange will recognize that the handset in use has b en replaced and thus loop condition has been removed from the line.
  • the DTMF receiver 12 provided the Mailbox Answering Machine upon receipt of one of these digits will recognize it as a special features access code.
  • the user concerned will following the * or # signal by one or two digits of feature access code (like e.g. 1, 2 or 3) to indicate which messages are to be retrieved.
  • the DTMF detector 12 Upon receipt of the signalling digit the DTMF detector 12 passes suitable information via
  • Microprocessor 30 will initiate action in the result of which units such as Mass Storage 26,
  • Rad/Write Logic 35, Codec 22, I/P Switch 21, Switch 13 and Line Condition Detector 14 will all return back to normal state and be ready to receive either the next call or new instructions from the users.
  • the Mailbox Answering machine allows the user to record the pre-recorded message to be used as an announcement for incoming calls which have not been answered in the prescribed time. To record the message for use as an announcement the user will lift the
  • SUBSTITUTE SHEET handset from his/her telephone set and upon receipt of the Dial Tone from the telephone exchange will press special features access digital like e.g. * or #. Upon receipt of one of these digits telephone exchange will remove the Dial Tone while the DTMF detector 12 will pass suitable information to the Microprocessor 30. Microprocessor 30 will then issue commands to the I/P Switch 21, CODEC device 22, Read/Write Logical 35 and to the mass Storage Device 26 to set all the units into the recording mode of operation. When recording will be completed and handset replaced microprocessor 30 will recognize it and will cause all units involved in recording of the message tor return to their normal states.
  • An additional function of the Mailbox Answering Machine is selective disconnection of ringing from users' telephone sets, which except of Master Station which must provide ringing at all times.
  • the telephone user say e.g. user of the telephone set B ( 14B) lifts the handset and dials first the signalling digit * or # followed by a code digit the meaning of which is to cancel ringing on incoming calls.
  • the DTMF detector upon receipt of the first signalling digit * or # passes the signal to microprocessor 30 via Logic circuit 20. At the same time telephone exchange removes Dial Tone from the line.
  • Microprocessor 30 waits for the code digit which is to follow.
  • the microprocessor If the code digit sent by the subscriber B indicates that the wishes to cancel ringing signal on incoming calls to his phone the microprocessor then records this information in the RAM memory 32 and when the next incoming call to subscriber B will be received the line will n to be extended to the telephone set 14B but it will be only monitored by the microprocessor 30 and Ringing Pattern Detector 1 1 and the Master station phone will ring. If ringing from the telephone exchange continues it will be timed out by the microprocessor action, ringing will be tripped by microprocessor 30 acting together with the ring termination element being part of the I/P Switch 13 and the pre-recorded message will be transmitted to the calling subscribe in the manner previously described. This may be followed by recording of incoming message, disconnection etc.
  • PSU Power Supply Unit
  • Clock 40 is basically a pulse
  • SUBSTITUTE SHEET generator providing continuous train of pulses of specific frequency, required by many functional units in the system, like e.g. microprocessor 30, etc.
  • the Mailbox Answering Machine system includes also a message waiting indicator which may be installed in the individual telephone sets comprising e.g. a single light emitting diode LED installed in the housing of the telephone et. Operation of these indicators will be controlled by the microprocessor via the Line Condition Detector unit 14. Each indicator will require two wires installed between the telephone set and the Line Condition Detector 14 to operate, electrical signals applied to those wires being controlled by the Microprocessor 30.
  • a message waiting indicator which may be installed in the individual telephone sets comprising e.g. a single light emitting diode LED installed in the housing of the telephone et. Operation of these indicators will be controlled by the microprocessor via the Line Condition Detector unit 14. Each indicator will require two wires installed between the telephone set and the Line Condition Detector 14 to operate, electrical signals applied to those wires being controlled by the Microprocessor 30.
  • Microprocessor 30 is programmed to send a visual indication to the individual subscriber when there is any message waiting to be retrieved.
  • the visual indication is provided by the single LED indicator mounted in the user telephone set. This indicator may be in the OFF state when Mailbox Answering Machine is in the stand-by condition, it may be blinking slowly to indicate that there is a message waiting and that the mailbox Answering Machine is available, and it may be blinking at a fast rate to indicate that there is a message waiting but the mailbox Answering Machine is busy. The same light while continuously ON may indicate that there are no messages waiting but the mailbox Answering machine is cunently busy, being occupied by another user.
  • Additional feature which may be programmed into the Mailbox Answering machine is provision of the individual "personal identification numbers" (PIN) entering of which will allow the mailbox user to retrieve his/her messages. It may be noted that entering such PIN number may be possible while the user is at his own premises but equally well it may be performed when the user is out of this house and is calling in into the Mailbox Answering Machine from the telephone network. Similarly the pre-recorded messages which are transmitted back to the calling subscriber may be made individual to each mailbox Answering Machine user.
  • the whole operation of the Mailbox Answering Machine is controlled by the software instructions stored in EPROM memory 31 and in RAM memory 32 and, therefore, any additional features may be programmed into the system and made available to the users.
  • the mass storage device 36 may be any type of large capacity storage device c nently available on the market, in particular the hard disks (Winchester disks) of large capacity or even electronic storage devices of sufficiently large capacity may be used. It will also be apparent to persons skilled in the art that the system may be programmed in a number of different ways to provide additional features without departing from the spirit and principles described herewith.
  • the Mailbox Answering Machine which when connected to one analogue telephone line allows more than one telephone set to be connected in such a way, that incoming calls from the telephone exchange may be connected to individual telephone sets in accordance with special signal sent by the calling subscriber and which said signal indicates in an agreed manner to which particular telephone set the call should be connected, and when such all is connected only one telephone set will ring, the ringing function of which may be individually controlled by the specific telephone user, and the Mailbox Answering Machine which upon receipt of an incoming call which is not answered in the predetermined time will provide recorded announcement specific to the person called and if the called person still does not answer the income call, the Mailbox Answering Machine will provide means for recording of an incoming message, such recording being done in a manner which will group together all messages directed to one user and which messages designated to a specific user may be retrieved by a person concerned without a need to listen to all other messages that may be recorded for other users and the mailbox Answering Machine in which retrieval of recorded messages for a specific, individual user may be performed either locally
  • SUBSTITUTE SHEET 2 The Mailbox Answering machine in which Mass Storage devices may be external to the machine and thus they may be of any desired capacity.
  • the mailbox Answering Machine in which individual telephone sets are provided with suitable visual indicators to signal to the user that there are some messages recorded and what is the status of the Mailbox Answering Machine.
  • the Mailbox Answering Machine in which pre-recorded messages are individual to each user of the machine.
  • the Mailbox Answering machine which is equipped with small rechargeable batteries of the Power Supply Unit to allow system operation even in the case of temporary loss of power supply from the AC mains.
  • This pan of the invention relates to the method by means of which it is possible not only to identify the person to who the incoming call is directed before the call is answered but also to provide individual answering and recording service for incoming calls. More than one person may be identified and served by using the method described.
  • the proposed method does not require multiplicity of listed directory numbers to be assigned to persons included in the call identification process, thus preserving numbering capacity of the public switching centre.
  • SUBSTITUTE SHEET with setting up a call and signalling the called pany.
  • the signalling sent to the called party normally consists of the ring signal which operates some form of a ringing (or acoustical) device located in the called party telephone apparatus.
  • a ringing or acoustical
  • the first solution takes form of an answering machine which when connected to the line reacts to the ring signal sent from the public switching centre, terminates the ringing, provides prerecorded message to the caller and then accepts information destined for the called person. If the machine is arranged in such a way that the proceeding on the telephone line may be heard the called person may listen to the message and to the information being forwarded by the calling party and may thus decide whether to answer the call or not and to who the call is directed.
  • the second solution which was registered in the USA Patent Office under the name "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone” involves complex electronic circuitry which connects to be called party's telephone line in parallel to the ordinary telephone apparatus and which is capable of recognising numbers transmitted in the DTMF code by the calling party. If the number transmitted coincides with the number prerecorded in the apparatus identification is assumed positive, called party telephone apparatus received additional special ring signal and the called party has an option to answer the call, knowing who is called and approximately who the caller might be. This device does not provide detailed identification of the caller telephone number, and before it can perform any function the call must be answered first and ring terminated.
  • SUBSTITUTE SHEET be reached through the same telephone line, then the switching centre generates and sends down the telephone line different ringing signal.
  • AT the called party's premises telephone apparatus will emit distinct, special ring signal which will indicate the second person wanted for the call.
  • person(s) present at the premises of the ringing telephone apparatus have a change to recognise who is being called and have an option of either answering the call or not.
  • the recognition of the called party is provided before the call is answered and, therefore, before it is charged.
  • This feature offered under the name "Identa*Ring" requires special programming to be done by the telephone operating company and it occupies listed directory numbers in the area numbering scheme. The latter may create problems in large telephone networks which use variable length listed telephone numbers.
  • User has not influence on the specific ring signal being assigned to a specific called person.
  • this method does not provide any features which could offer answering machine service.
  • the modern ISDN network utilising comprehensive signalling system known under the name CCS No. 7, allows to provide better, more sophisticated method of the called party identification before actually answering the incoming call. It may be further extended by providing simultaneous identification of the calling party's telephone number and the called person, both before a call is answered and to provide a Mailbox Answering Machine service at the same time.
  • This new method is subject of the present patent application, and is using the unallocated codes in the HEADING of the User Information Field of the Telephone User Part (TUP) in CCS No.7 D-channel signalling system.
  • the method proposed in this part of the patent would operate as follows: the caller dials called party number and when this number is complete it is followed by a special additional digit(s) dialled by the caller. This additional digit(s) will be distinguished from the normal LDN by special delimiters, like e.g. * or #, or any combination of them.
  • the ISDN switching system upon receipt of this special, delimited, number will send it via D channel in the CCS No. 7 signalling system to the called party location and eventually to the called party digital telephone set.
  • SUBSTITUTE SHEET The called party digital telephone set upon receipt of the signal through the D-channel signalling will react by generating suitable audio signal (may be in addition to a normal ring signal) combined with the message on the visual display unit installed in the telephone set. Anybody at the called party's premises will be able to read the message and identify the person to who the call is directed. The person called may or may not answer the call depending upon the decision reached after calling party has been identified. The identification of the called person is carried before the call is answered, therefore, no call charge is applied to the calling party until the call is actually answered. This operation may be greatly enhanced if it is combined with the Called ID feature offered in the modern ISDN system whereby the calling party's telephone number is sent to the called party telephone apparatus and displayed before the call is answered. This will provide ability not only to identify the called party exactly but also who is calling.
  • This new method will operate in the ISDN environment and will require some amendment to the operating software of the ISDN switching systems which will have to be implemented by telephone operating companies.
  • Digital Mailbox Answering Machine service addresses the basic household need to identify your own telephone calls from those directed to other residents and being able to provide telephone answering service to individual users of the telephone line. With the digital Mailbox Answering Machine one does not have to answer another resident's telephone calls again, provided the called resident is in the house. The digital mailbox Answering Machine does not need any special codes to be dialled for calling party identification as is the case with other designs like e.g. "Priority Call" and the 'Apparatus for converting a
  • callers personal identification numbers (PIN) or callers telephone numbers have to be pre-programmed into the telephone or a network control point (NCP) which constantly inconveniences the person wishing to use or change such services.
  • PIN personal identification numbers
  • NCP network control point
  • PIN personal identification numbers
  • NCP network control point
  • the digital mailbox Answering Machine utilises a non defined sub-addressing field in the ISDN digital telephone network. By this means some additional call information is conveyed during the initial placing of the call and as a result the telephone call recipient is identified before the telephone call is answered and charged, unlike in the ordinary answering machine equipment.
  • the prior devices e.g. Apparatus for converting a Standard Telephone to an Unlisted Number Telephone
  • the digital Mailbox Answering Machine capability utilise micro-processor and software intelligence as opposed to a ' hard wired logical circuitry (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone). Without micro-processor
  • Analogue telephone terminal devices (like in Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone) are obsolete being non compatible with "end-to-end" digital transmissions, and with the digital telephones which are being used for the enhanced telecommunication services in ISDN network.
  • the digital Mailbox Answering Machine does not block or hang up telephone calls, again being a device for use from anywhere in the network.
  • the digital Mailbox Answering Machine identifies the person called, unlike the prior devices which identify a special caller (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone). Nevertheless, with the prior devices even if a special or priority caller has called, one still does not know who the call is for.
  • Telephone Mailbox Answering Machine complements caller ID.
  • Caller ID The best and most popular method for identifying callers is "Caller ID" which allows the telephone number of each and every caller to be visually displayed without realising the inherent limits of the prior devices (Apparatus for Converting a Standard telephone to an Unlisted Number Telephone and Priority Call) as per ( 1 ), (2) and (3) above.
  • the mailbox Answering Machine as was shown, does not have the inherent problems of the prior devices and is seen as the ideal compliment for "Caller ID".
  • the telephone call recipient can identify his/her calls and can also identify which of the callers have telephoned.
  • Caller ID alone is a less attractive telephone anangement if used without digital "Mailbox Answering Machine". This is because the telephone call recipient will not be able to identify who has been called and in effect only the actual called recipient will be able to recognise the displayed caller's telephone number. In case of calling from a public telephone even this recognition will be impossible. Thus if a wrong recipient (not the person called) answers the telephone he can not recognise the displayed number - and is not ' benefite by Caller ID. Needless to say, if the conect recipient (the person called) answers the telephone he can identify his displayed caller number and is thus benefited by Caller ID.
  • the existing network circuitry is capable of accepting and processing the personal number (addressing field) or digit (sub-addressing field). Therefore, unlike the prior devices, new circuitry does not require development effort.
  • the attached drawing Fig. 6A shows the block diagram of the new digital telephone instrument, one embodiment of this invention.
  • Broken line divides the drawing in two parts: the lower one represents a basic layout of a typical digital telephone apparatus as used in the ISDN network and the upper part represents some additional components, as an example, which may be used to provide some additional functions required in the process of identification of the called person and of providing the Mailbox Answering Machine service.
  • Telephone line extended from the local switching centre is connected to terminals a and b of unit 1 which performs the functions basically of isolating line circuit from electronic circuitry contained in the digital telephone apparatus
  • Input signal from e public switching centre is typically a 144 kb/s digital stream which in principle consists of three components: a 64 Kb/s stream canying coded voice information, second 64 Kb/s streams designated to carry data transmission or voice and one additional 16Kb/stream used for signalling between the switching centre and telephone apparatus.
  • This combined 144 Kb/s signal is transfened to the line interface circuit 2 which has a principal function of extracting timing signals so that local clock oscillator may be synchronised properly.
  • the extracted clock timing signal is connected to unit 9 which is a local clock generator.
  • the 144 Kb/s stream is then applied to a special logic circuitry 3 whose only function is to split one 144 Kb/s stream into three separate bit streams: voice, data and signalling.
  • the 64 Kb/s stram canying voice signal is applied to the coded circuit 4 which performs necessary coding and decoding functions required in the voice circuit.
  • Output and input of the codec circuit 4 are connected to the handpiece device 6 containing microphone and a receiver used for voice communications.
  • the second 64 Kb/s stream may be connected to data interface 5 which is equipped with the connection socket 7 where normally some form of data terminal equipment (DTE) will be connected, if required.
  • DTE data terminal equipment
  • the last pan of the input signal, the 16 Kb/s stream is applied to the signalling interface logic circuit 10. This circuit performs the functions of decoding incoming signals from the switching centre and transfening the resultant signals to the signalling devices 11.
  • signaling devices 11 are shown as one block in reality they will consist of plurality of device, like e.g. numerical keypad, function buttons, alphanumeric display, buzzers, etc.
  • signals produced by signalling devices like e.g. pushing a button, are applied to the signalling interface logic 10 where it is properly coded, convened into binary form, and then applied to the logic circuitry 3 for inclusion in the signal transmitted back to the switching centre via line interface 2 and line termination unit 1.
  • Signals transmitted via the 16Kb/s stream are refened to as channel D in the ISDN design.
  • a suitable signal When there is an incoming call a suitable signal is transmitted via the 16 Kb/s signalling bit stream, it is decoded in the signalling interface logical 10 as meaning 'to ring', and appropriate ringing signal is generated by the signalling interface logic 10 and applied to an acoustic transducer in the signalling devices group 11. Ringing signal to alert the called subscriber is. therefore, locally generated in the telephone apparatus and not in the switching centre.
  • the call is answered in the normal manner lifting of the handpiece causes closure of suitable contacts in the hookswitch (which is part of the signaling devices group 1 1) and this signal is applied back to the signalling interface logic 10. After coding, this signal is transmitted back to the switching centre via logical circuitry 3 and line
  • the digital Mailbox Answering Machine feature user programs his telephone apparatus to accept certain additional signals which may be sent from the switching centre. This is done by simply pressing sequence of buttons on his telephone apparatus. The sequence of button pressing is such that it allows the signalling interface logic 10 to recognise that the signals produced are destined for the auxiliary microprocessor 12. Access to this microprocessor 12 is gained via transfer interface 14 and common signalling bus 16.
  • Microprocessor 12 upon receipt of the special signals acts on them in accordance with software programme instructions stored in the memory 13 and saves the signals received in the memory 13 for future use.
  • the signal stored may consist e.g. of two digits. These digits will identify certain called person at the premises where this special telephone apparatus is located.
  • SUBSTITUTE SHEET Page 82 with those stored in the memory, if a match is found the microprocessor generates suitable signal, transmits it via common bus 16 to device buffer 15 so that suitable announcement is activated.
  • the announcement may take any form of audio and/or visual combination. It is prefened that one of these signals is an alphanumeric display providing clear identification of the called person. It will be obvious to a person skilled in the art that the microprocessor 12 will perform all functions according to software instructions sorted in the memory 13 or in a special, dedicated ROM memory not shown on the diagram.
  • the switching centre receiving dialled digits from the calling person will have to distinguish between digits as part of the listed directory number and additional digits for person identification. It is suggested that this may be achieved in a simple manner by using special delimiters, like e.g. * or # or both, before, or before and after the additional two digits serving the purpose of called person identification.
  • the two special, additional, digits identifying the called person will be included in the D-channel signalling stream and to achieve it some minor modifications will have to be introduced to the signalling part of the switching centre software. Such modification is possible as it is intended that this new method of called person identification will utilise some of the unassigned addresses in the HEADING of the User Information Field of the Telephone User part (TUP) in the CCS No. 7 D Channel signalling.
  • the software program operating microprocessor 12 will contain an additional routine which in case of an incoming call arriving from the switching centre containing the special called person identification digits and being unanswered will record details of such a call in the memory 13 for future use.
  • a pre-recorded message specific to the called person will be read from mass storage device 17 and will be transmitted via message interface 16 to the logic circuit 3 where it will be include din the 64Kb stream voice channel transmitted back to the caller.
  • the microprocessor 12 will issue command to record the incoming message from the caller.
  • the content of the message will be extracted from the incoming 64Kb stream and passing via message interface 16 will be stored in the mass storage device 17. Simultaneously, some distinctive indication will appear on the telephone apparatus alerting the ⁇ sex rn rhe
  • the telephone apparatus user has then an option, by operating special sequence of buttons, to read out from the memory details of calls recorded and to listen to recorded messages, as appropriate. After reading out the stored information these part of records may be erased.
  • any additional electronic components serving the purpose of identifying the called person will have to obtain power supply. This may be provided from the power supply unit 8 which is always provided in the digital telephone apparatus.
  • FIG. 7A - 9A Operation of the digital mailbox Answering Machine may be better understood if reference is made to the flow diagrams shown on Fig. 7A - 9A which are part of this description.
  • the flow diagrams illustrate sequence of events in the digital mailbox Answering machine when it operates in various modes.
  • IdentiCall Telephone/Mailbox Answering Machine Unit Provided there are a number of telephone jacks (extensions) within the household a telephone service subscriber could purchase a: IdentiCall Telephone/Mailbox Answering Machine Unit:
  • XAN analogue Exchange Area Network
  • the subscriber would avoid the cost of: a PABX and a Voice Mail System.
  • the subscriber would be provided with capabilities suitable for the sub-addressing
  • Mr Smith, Mrs Smith and Junior Smith could have their personal telephone calls directed to their respective bedrooms.
  • each person could access their lounge room Mailbox Answering Machine messages from their respective bedrooms or from outside the household itself.
  • Mr Smith, Mrs Smith and Junior Smith's personal ring tone can be controlled: meaning each personal ring tone can be annunciated at convenient times for each called person, otherwise the Mailbox Answering Machine will immediately deposit the caller's message in the called person's answering machine mailbox.
  • the latter capability is known as "MAM Ring Turn On/Off and the command is even operational by using the IdentiCall Telephone within the called person's respective bedroom or from outside the household itself.
  • the Exchange Area Network could be used to sub-address data between computers, printers and plotters: and the sub-addressing of facsimile transmissions to physical facsimile mailbox storage containers.
  • Mr and Mrs Smith's Personal Computer, Junior Smith's Personal Computer or any other Call Direction Computer for that matter can transmit data to and from each other by using the XAN.
  • the Mailbox Printer Machine could be located in, say, the lounge room so that the Personal Computer terminals within
  • the Mailbox Facsimile Machine creates the impression of artificial envelope conespondence through the transmission of the caller's facsimile conespondence to the f* called person's physical facsimile mailbox container.
  • a mailbox capacity is also proposed for the following terminal types: Mailbox Multi-Function Terminals: and the like.
  • XAN Exchange Area Network
  • Mr Smith's personal telephone number is - 3440614;
  • Mrs Smith's personal telephone number is - 3440615;
  • Junior Smith's personal telephone number is - 3440616;
  • the facsimile number is - 3440617;
  • Mr Smith's personal facsimile number is 1;
  • Mrs Smith's personal facsimile number is 2;
  • Junior Smith's personal facsimile number is 3.
  • the data line number is - 3440618
  • Mr Smith's personal data number is 1 ;
  • Mrs Smith's personal data number is 2;
  • Junior Smith's personal data number is 3.
  • IdentiCall Telephone(s)/MAM terminal is - ;
  • Physical Mailbox Facsimile Machine terminal is * 2;
  • Mr Smith's ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
  • Mrs Smith ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
  • Junior Smith's ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
  • the personal facsimile number could annunciate a personal ring tone on the Physical Mailbox Facsimile Machine for a short designated time just to inform the called person of the caller's transmission of facsimile conespondence.
  • John Smith's facsimile correspondence can be retrieved from his physical mailbox container.
  • Mrs Smith's facsimile correspondence can be retrieved from her physical mailbox container.
  • Junior Smith's facsimile correspondence can be retrieved from his physical mailbox container.
  • SUBSTITUTE SHEET The personal printer number could annunciate a personal ring tone on the Physical Mailbox Printer Machine for a short designated time just to inform the called person of his/her print ⁇ out.
  • John Smith's print-out can be retrieved from John Smith's physical mailbox container.
  • Mrs Smith's print-out can be retrieved from Mrs Smith's physical mailbox container.
  • Junior Smith's print-out can be retrieved from Junior Smith's physical mailbox container.
  • Mr Smith's ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt:
  • Mrs Smith ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt:
  • the personal data number could annunciate a personal ring tone on the personal computer for a short designated time to inform Mr and Mrs Smith of their print-out to their respective physical printer mailbox or the transmission of data to/from this Personal Computer.
  • John Smith's data transmission is printed and deposited in his physical mailbox container.
  • Mrs Smith's data transmission is printed and deposited in her physical mailbox container.
  • Mr Smith dials 3440614 and 66 (IdentiCall turn off) and his padlock command.
  • Mrs Smith dials 3440614 and 66 (IdentiCall turn off) and her padlock command.
  • Mr Smith's telephone ring tone would sound - regardless of whether Mr Smith's ring tone is in IdentiCall turn off mode.
  • Mrs Smith's telephone ring tone would sound - regardless of whether Mrs Smith's ring tone is in IdentiCall turn off mode.
  • the personal data number could annunciate a personal ring tone on the personal-computer for a short designated time to inform Junior Smith of the print-out to his printer mailbox or the transmission of data to/from this Personal Computer.
  • Junior Smith's data transmission is printed and deposited in his physical mailbox container.
  • Junior Smith dials 3440616 and 66 (IdentiCall turn off) and his padlock command.
  • Junior Smith's telephone ring tone would sound - regardless of whether Junior Smith's ring tone is in IdentiCall turn off mode.
  • John Smith can deposit facsimile correspondence in his physical mailbox container.
  • Mrs Smith can deposit facsimile correspondence in her physical mailbox container.
  • Junior Smith can deposit facsimile correspondence in his physical mailbox container.
  • Junior Smith enters 3440618 3 * 3: the data is transmitted to/from Junior Smith's bedroom PC terminal.
  • John Smith's data transmission is printed and deposited in his physical mailbox container.
  • Mrs Smith's data transmission is printed and deposited in her physical mailbox container.
  • Junior Smith's data transmission is printed and deposited in his physical mailbox container.
  • the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
  • John Smith's data transmission is printed and deposited in his physical mailbox container.
  • the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
  • the data is transmitted to Junior Smith's bedroom PC terminal.
  • Junior Smith's data transmission is printed and deposited in his physical mailbox container.
  • mailbox number three will record Junior Smith's messages.
  • each personal number known as the Call Direction number(s).
  • the terminal type number is pre-programmed.
  • a subscriber has to program each personal number known as the Call Direction number(s).
  • the terminal type number is pre-programmed.
  • the telecommunications line number programming is not a new requirement.
  • a subscriber has to program each personal number known as the Call Direction number(s).
  • the terminal type number is pre-programmed.
  • the telecommunications line number programming is not a new requirement.
  • a subscriber has to program each personal number known as the Call Direction number(s).
  • the terminal type number is pre-programmed.
  • the telecommunications line number programming is not a new requirement.
  • SUBSTITUTE SHEET Physical Mailbox Facsimile Machine.
  • Mr Smith's personal telephone number is - 3440614;
  • Mrs Smith's personal telephone number is - 3440615;
  • Junior Smith's personal telephone number is - 3440616;
  • Mr Smith's personal facsimile number is 3440617;
  • Mrs Smith's personal facsimile number is 3440618;
  • Junior Smith's personal facsimile number is 3440619;
  • Mr Smith's personal data number is 3440620;
  • Mrs Smith's personal data number is 3440621;
  • Junior Smith's personal data number is 3440621;
  • 9 telecommunications numbers are used for the 6 lines or 3 numbers for every two lines.
  • the 9 telecommunications numbers represent: 3 numbers for telephony; 3 numbers for facsimile: 3 numbers for data.
  • each of the nine unique ring cadences could be be identified by the following ring cadence classification system.
  • the inclusion of the ring cadence classification system into the documentation is for the purpose of explaining the services which could be offered by a Telecommunications Authority if a number of distinguishable ring cadences are used. Let's assume that six different cadences are used for voice:
  • Cadence 1 will identify Mr Smith (called person) & the telephone/MAM (device type).
  • Cadence two will identify Mrs Smith (called person) & the telephone/MAM (device type).
  • Cadence 3 will identify Junior Smith (called person) & the telephone/MAM (device type).
  • Cadence 4 will identify a special feature (such as a Mailbox Answering Machine call connection only), Mr Smith (called person) & the telephone/MAM (device type).
  • Cadence 5 will identify a special feature (such as a Mailbox Answering Machine call connection only), Mrs Smith (called person) & the telephone/MAM (device type).
  • SUBSTITUTE SHEET Cadence 6 will identify a special feature (such as a Mailbox Answering Machine call connection only), Junior Smith (called person) & Telephone/MAM (device type).
  • Mr Smith Representing the called person
  • telephony Representing the called device
  • the special feature is known as the primary cadence.
  • the called person is known as the secondary cadence.
  • the called device is known as the te ⁇ iary cadence.
  • the primary cadences rely on Caller ID use and are used only for special purposes such as call connecting a particular device.
  • the primary cadences are telephony; facsimile; and data.
  • the exchange could identify that Mr Smith's IdentiCall Telephone is attempting to call the Smith Mailbox Answering Machine for: message retrieval; Mr Smith Ring Turn On; or Mr Smith Ring Turn Off purposes.
  • a telephony Mr Smith telephony cadence will be sent down the telecommunications line and the Smith Mailbox Answering Machine will only respond to this cadence version. This will prevent other voice devices from answering the Call Direction call.
  • each IdentiCall Telephone's Call Direction program will not respond to a primary cadence. Firstly, because the IdentiCall Telephones are not a transmission storage device. Secondly, because the IdentiCall Telephones could interfere with Mailbox Answering Machine calling from within the household.
  • the vacant 2 wires of the two wire pair cable are used in order to take advantage of the Mailbox Answering Machine and IdentiCall Telephones capabilities, being Ring Turn On/Off and Mailbox accessing from the Smith's respective bedrooms and using the IdentiCall Telephones as an intercom system.
  • the other one line capabilities are Mailbox Answering Machine voice retrieval and the IdentiCall Telephone distinctive rings.
  • Mr Smith decided to have a second line connected by the Telecommunications Authority to "call direct" a second IdentiCall Telephone call.
  • Mr Smith purchased a Physical Mailbox Facsimile Machine. So Mr Smith decided to get a third and fourth line connected.
  • the third and fourth line used both two wire pair of a cable.
  • the third and fourth line were connected to all the household IdentiCall Telephones and the Multi-call Mailbox Answering Machine as well as the Physical Mailbox Facsimile Machine.
  • Each of the Smith's devices is equipped with Call Direction so the CENTREX's XAN or the exchange switching capabilities could be used so that one of the four lines could be used to connect an incoming voice or facsimile call.
  • Example 1 Mrs Smith and Junior Smith could be using their respective bedroom telephones, whilst the MAM was recording a message for Mr Smith and the Physical Mailbox Facsimile Machine was p ⁇ "ting and depositing image into Mr Smith's physical mailbox.
  • Example 2 Mr and Mr:-, nith could be receiving two Mailbox Answering Machine messages each for their respective mailboxes.
  • Example 3 the Mailbox Answering Machine could be receiving four voice transmissions for Mr Smith's mailbox.
  • SUBSTITUTE SHEET If the Local Exchange Area is using Common Channel Signalling 7. Caller ID could be used so that the Mailbox Answering Machine called person could access: a specific message; the messages of a particular calling party: or all his/her messages. If Caller ID is used the Mailbox Answering Machine called person has the option of deleting: a specific message; the messages of a particular calling party; or all his/her messages.
  • the Smith household decided to get a fifth and sixth line connected.
  • the fifth and sixth line used both two wire pair of a cable.
  • the fifth and sixth line were connected to all the household IdentiCall Telephones, the Mailbox Answering Machine, the Physical Mailbox Facsimile Machine: the the two Call Direction Personal Computers that the Smith's recently purchased. Both Call Direction Personal Computer had an additional Mailbox Modem Chip inserted.
  • Mr Smith bought a Mobile IdentiCall Telephone seeing that he does much work from the car.
  • Each of the Smith's devices is equipped with Call Direction so the CENTREX's XAN or the exchange switching capabilities could be used so that one of the six lines could be used to connect an incoming voice, data or facsimile call.
  • Example 1 assuming that Mr Smith's ring tone is in Ring Turn On mode, a caller could telephone Mr Smith and the Local Exchange would direct the call firstly to Mr Smith's Mobile IdentiCall Telephone, if this telephone is not answered after a designated amount of rings then the telephone call is directed to Mr Smith's household IdentiCall Telephones. If the household IdentiCall Telephones are not answered within a designated time period the Mailbox Answering Machine becomes on-line and records the caller's message for Mr Smith's mailbox. After a designated Re-Call Direction time, the Mailbox Answering Machine could ring Mr Smith's Mobile IdentiCall Telephone before Mr Smith's household IdentiCall Telephones annunciate Mr Smith's ring pattern. Or Mr Smith could telephone the Mailbox Answering Machine to retrieve his messages from either his Mobile IdentiCall Telephone or from the household telephones by dialling his padlock command.
  • Mr Smith, Mrs Smith and Junior Smith are all using an IdentiCall Telephone and in the meantime each family member receives a second telephone call.
  • Mr Smith, Mrs Smith and Junior Smith could use the call waiting feature and Call Direction to make the less important telephone call caller deposit a message in the Mailbox Answering
  • the IdentiCall Telephones using the Call Direction program transmit a signal to CENTREX so that each less important telephone call caller (call waiting) is provided with a telephony called person telephony cadence for direct Mailbox Answering Machine access, as the Mailbox Answering Machine will only respond to this cadence version.
  • Example 3 as there are six lines, Mr Smith, Mrs Smith and Junior Smith could each be on an IdentiCall Telephone; the Mailbox Answering Machine could be receiving a voice call and as there are now two available lines, two incoming data calls could be "call directed" to either or both the Call Direction Personal Computers. As a result of all six lines being connected to each device any of the seven Call Direction devices can share the available six telecommunications lines.
  • the Call Dir ction program of each device could be instructed which lines will be dedicated if any.
  • the Smith's could instruct each of their devices that the first two lines are dedicated for voice.
  • the remaining lines could be used for voice, data, text or image CENTREX would also have to be instructed that the first two lines are to be dedicated for voice, otherwise a data, text or image call could be sent down the first two lines.
  • the use of dedicated voice lines in this example will prevent four lines being used for data and one line being used for facsimile, meaning only one incoming or outgoing voice call is possible. Without this capability a Smith or an outside caller could have to wait for a vacant telephone line.
  • Mr Smith bought a Call Direction Laptop Computer or a Call Direction Notepad Computer then a caller could dial Mr Smith's data number and the Local Exchange would direct the call to Mr Smith's Call Direction Laptop Computer or Call Direction Notepad Computer before directing the call to Mr Smith's household Call Direction Personal Computer.
  • Mr Smith's Call Direction Personal Computer will establish the data connection. If a caller dials Mr Smith's data number and if Mr Smith's Call Direction portable computer is "off then Mr Smith's household Personal Computer will establish a data connection (assuming that there is an available line).
  • the above telecommunications system can be built up to respond with each families changing telecommunications needs.
  • the system can start with as little as one IdentiCall telephone for a two wire pair cable line. Note: a two wire pair cable does not have to be used to service two lines, a separate two wire pair cable could be installed with each line connection.
  • Re-call Direction In the analogue network Re-call Direction is only used for like devices, if applicable, facsimile machine to facsimile machine, Personal Computer to Personal Computer, Mailbox Answering Machine to Mailbox Answering Machine. Please refer to page eleven for the Call Direction/Re-call Direction program - type instructions.
  • the 3440614 MAM mailbox is recording a message for Mr Smith.
  • the 3440615 MAM mailbox is recording a message for Mrs Smith.

Abstract

A telecommunications arrangement for identifying a specific person to receive a call on a communications device which is shared by a number of persons. Each person sharing the device is identified by a distinctive audio signal and/or a message displayed on the device. In use, a caller dials the telephone number of a telephone line connected to the device, and an additional number to identify a particular person to whom the call is directed. The device, on detecting said additional number, generates said distinctive audio signal and/or displays said message to identify that the call is for this particular person. The additional number is incorporated in unassigned codes in the heading of the user information field of the telephone user part (TUP) in the CCS No. 7 D-channel signalling in ISDN network.

Description

Page 1A
CATim PERSON aas πE-mαr IN TE-J- M-_JNICATION
THE IDENTICAL CAPABILITY
With existing telephone systems as is well known each individual station or line terminal is located by the caller entering a specific number combination. Any additional selectivity at th s stage however such as the identity of a particular call recipient is not possible.
It is therefore an object of this invention to ameliorate the aforementioned disadvantage and accordingly this invention discloses an improved telephone system whereby a particular telephone call recipient is identified by personal information being conveyed during the initial placing of the call by means of the entry of a recipient's personal code before, during or after the line number. As a result the telephone unit's or network microprocessor calculates the electrical representaion of the recipient's code and assigns a value to it. The program then compares the varying input expression against the constant expressions programmed into the memory. If an assigned value match occurs an instruction is given to initiate the appropriate part of the program which initiates the recipient's indentification signal.
The preferred methods of achieving the above objective are:
Entry of the line number as with conventional systems would locate the desired terminal then a secondary code number is entered. The secondary code number issues an instruction to perform part or all of a specific program or accesses a machine location, as the case
SUBSTITUTESHEE requires to initiate a distinct preselected ringing sound on the receiver instrument. Thus the desired recipient of the call is identified in accordance with a specific and unique number entered for that terminal. You would be aware that a secondary code is entered after the telephone line number, but this need not be the case. It is possible for secondary codes to be repealed by additional telephone numbers or multi-numbers. Therefore each person sharing the telephone can identify their telephone calls provided the caller enters their personal telephone number.
BACKGROUND OF THE INVENTION
In the normal telephone connection the caller dials the number of the called person and the switching centre in the public network performs all the functions connected with setting up of a call and signalling the called party. The signalling sent to the called party normally consists of the ring signal which operates some form of a ringing (or acoustical) device located in the called party telephone apparatus. When the called party telephone rings the only response to it could be either not to respond to the call at all, or one has to lift the handset and commence conversation without any prior knowledge of who the call is for and who the caller may be.
There were some attempts made to overcome this problem and to allow the called party to make decisions whether to answer the call or not, based on being able to identify who the call is for and who the caller may be. The first solution takes form of an answering machine which when connected to the line reacts to the ring signal sent from the public switching centre, terminates the ringing, provides a prerecorded message to the caller and then accepts information destined for the called person. If the machine is arranged in such a way that the proceedings on the telephone line may be heard the called person may listen to the message and to the information being forwarded by the calling party and may thus decide whether to answer the call or not by being able to identify who the call has been directed to and who is calling. There are two main disadvantages of this method: first, before anything else happens the incoming call is answered, the ring is terminated, and therefore the calling party is charged for the call, and secondly there is considerable delay from the time connection is established and ringing commences to the time the calling person and the one to who the call is addressed to are identified.
Then came the inception of devices with the intent of providing called party identification (CPI). In this category you will find devices such as the "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" (United States Patent No. 4,639,552); "Priority Call" (United States Trade Mark), "Call System for a Digital Telephone Set" (Japanese Application No. 60-128294), and "Caller ID" (United States
SUBSTITUTE SHEET Trade Mark). The most successful type of device of this group is the visual display device under the trade mark of "Caller ID" and the patent of the "Call System for a Digital Telephone Set". These devices can identify each and every calling telephone number in the digital network. Other devices can identify only a limited or "special" number of callers due to programming and distinctive ring limitations (amongst other limitations), therefore each have had varying amounts of success depending on each's application and operation.
The "Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone" involves complex electronic circuitry which connects to the called party's telephone line in parallel to the ordinary telephone apparatus and which is capable of recognising the calling party's PIN transmitted in the DTMF code. If the transmitted calling party's code coincides with the number prerecorded in the apparatus then identification is assumed positive, therefore the call is not terminated and the aforementioned apparatus annunciates a special ring signal so that the called party has the option to answer the call, knowing approximately who the caller might be.
The "Call System For Digital Telephone Set" is proposed by NTT and as shown is registered in Japan. This solution refers to the ISDN network and a digital phone and it allows for the calling party's telephone number to be used in the called party digital telephone set for the purpose to identify who is calling and to produce suitable audio and visual signals to the call recipient. It does not, however, allow for identification of the called persons.
SUMMARY OF THE INVENTION
This patent application proposes the Identification of the Person Called (IPC) which may take either of two forms depending on analogue or digital telephone network use.
IdentiCall for the digital telephone network.
The modern ISDN network utilising the comprehensive signalling system known under the name CCS No.7, allows for the provision of a sophisticated method of called party identification before actually answering the incoming call. This new method uses the unallocated codes in the HEADING of the User Information Field of the Telephone User Part (TUP) in the CCS No.7 D-channel signalling system.
The IdentiCall method proposed operates as follows: the caller dials the called party number and when this number is complete it is followed by a special additional number dialled by the caller. This additional number will be distinguished from the normal LDN by special delimiters, like e.g. * or #, or any combination of them. The ISDN switching
SUBSTITUTE SHEET system upon receipt of this special, delimited, number will send it via D channel in the CCS No.7 signalling system to the called party location and eventually to the called party digital telephone set.
The called party digital telephone set upon receipt of the signal through the D-channel signalling will react by generating a distinctive audio signal and/or combined with a message on the visual display installed in the telephone set. If the latter is the case, anybody at the called party's premises will be able to read the message and identify the person to who the call is directed. The identification of the called person is carried before the call is answered, therefore, no call charge is applied to the calling party. This operation may be greatly enhanced if it is combined with the Caller ID feature offered in the modern ISDN system
whereby the calling party's telephone number is sent to the called party telephone apparatus and displayed before the call is answered, this will provide the ability not only to identify the called party exactly but also who is calling.
One of the important features of IdentiCall using the digital network is that the allocation of the called party's identification numbers, changing of these numbers, etc. is entirely controlled by the telephone line user rather than by telephone service company. In addition this new proposed method does not occupy any listed directory numbers in the numbering area thus preserving telephone operating company resources.
This new method operates in the ISDN environment and will require only minor amendment, if any, to the operating software of the ISDN switching systems implemented by the telephone operating companies.
IdentiCall for the analogue telephone network
The alternative method of IdentiCall uses the analogue telephone network. This method requires the telephone operating company to assign more than one listed directory number (LDN) to the same telephone line. Each listed directory number is given a distinctive ring signal. Therefore depending on which telephone number the
caller dials the public network switching centre will send down the telephone line the ring signal which corresponds to the dialled telephone number. Therefore one or more persons sharing the telephone apparatus can be identified in accordance with their personal signalling of the telephone.
SUBSTITUTE SHEET THE ADVANTAGES OF "IDENTICALL" TELEPHONE SERVICE OVER THE PRIOR DEVICES.
An International Search has been conducted for IdentiCall type telephone services and devices and the advantages that it is has over what is already known are:
Telephone IdentiCall addresses the basic household need to identify your own telephone calls from those directed to other residents. With Telephone IdentiCall one does not have to answer another resident's telephone calls again, provided the called resident is in the house. Telephone IdentiCall does not achieve, and did not set out to achieve, the identification of telephone callers. Firstly because devices such as "Priority Call" and the "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" achieve this objective, and secondly, and most importantly because of the inherent disadvantages encompassing these devices. For instance:
(1) callers personal identification numbers (PIN) or callers telephone numbers have to be pre-programmed into the telephone or a network control point (NCP) which constantly inconveniences the person wishing to use or change such services.
(2) only a limited amount of callers personal identification numbers (PIN) or callers telephone numbers can be pre-programmed into the telephone or a network control point (NCP). This limits the amount of callers who could use such a device.
(3) only a limited amount of distinctly unique ring tone's are possible. Therefore, only a limited amount of callers can be given a distinctive ring. This again limits the amount of callers who could use the prior devices. But even if distinctly unique ring tone's were not limited one could not remember the ring tone of each caller.
Seeing that only a limited amount of callers can use these devices (due to the pre¬ programming and ring tone limitations above) the prior devices are only for limited use or your special callers, hence the name "Priority Call". This is in stark contrast to Telephone IdentiCall which'does not have such limitations and is capable of being used by each and every telephone user.
The other fundamental advantages Telephone IdentiCall has over the prior devices are as follows:
(4) Improvement on services of an answering machine.
SUBSTITUTE SHEET Telephone IdentiCall utilises a non defined sub-addressing field in the digital telephone network. By this means some additional call information is conveyed during the initial placing of the call. Telephone IdentiCall using personal or secondary coded telephone numbers utilises a non defined addressing field in the analogue telephone network. By this means the personal call information is conveyed during the placing of the call. Both IdentiCall methods mean the telephone call recipient is identified before the telephone call is answered and charged, unlike in the ordinary answering machine equipment. The prior devices (e.g. Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone) implement some of the telephone answering machine functions, therefore, all calls are immediately charged.
(5) Enhanced logic operation.
A telephone with IdentiCall capabilities utilises micro-processor and software intelligence as opposed to hard wired logic circuitry (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone). Without micro-processor intelligence many of the enhanced telecommunication services (including Telephone IdentiCall) provided by the digital or analogue telephone network can not be carried out.
(6) Analogue telephones are not used.
Analogue telephone terminal devices (like in Apparatus for Converting a Standard Telephone to an Unlisted Number T_-ephone and Priority Call) are obsolete being non compatible with "end-to-end" digital transmissions, and of course, the digital telephones which are being used for the enhanced telecommunication services in the ISDN network. Note, Telephone IdentiCall using sub-addressing fields uses digital telephones whilst Telephone IdentiCall using addressing fields uses analogue telephones.
(7) No Select Forward.
With the "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" the telephone calls are "passworded" or "screened" to enable calls by only a select few callers", i.e. callers must enter the telephone number and after the answering machine beep - their very own personal identification code (PIN) consisting of two, three, five, six or more digits. Conversely, with Telephone IdentiCall all telephone calls are forwarded enabling use of this feature from anywhere in the public network.
SUBSTITUTE SHEET (8) No Call Block.
With the "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" there are a number of digit checking devices which terminate (hang up) the callers telephone call if:
a. no personal identification number is dialled;
b. die wrong personal identification number is dialled;
c. the wrong personal identification number sequence is dialled.
Telephone IdentiCall does not block or hang up telephone calls, again being a device for use from anywhere in the network.
(9) No Priority Call.
Telephone IdentiCall identifies the person called, unlike the prior devices which identify a special caller (Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone and Priority Call). Nevertheless, with the prior devices even if a special or priority caller has called, one still does not know who the call is for.
(10) Selection.
The prior devices (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone and Priority Call) provide no opportunity for the callers to select or openly choose a distinctive ring tone. This is because caller PIN numbers or caller telephone numbers (as the case may be) are assigned not selected. On the other hand with Telephone IdentiCall the caller is free to select or choose any distinctive ring tone, depending on which telephone call recipient is dialled.
(11) Telephone IdentiCall compliments Caller ID.
The best and most popular method for identifying callers is "Caller ID" which allows the telephone number of each and every caller to be visually displayed without realising the inherent limits of the prior devices (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone and Priority Call) as per ( 1 ), (2) and (3) above. Telephone IdentiCall, as you have been shown, does not have the inherent problems of the prior devices and is seen as the ideal compliment for "Caller ID".
SUBSTITUTE SHEET As a result of the "IdentiCall/Caller ID" combination the telephone recipient can identify their call and can also identify which of their callers have telephoned. "Caller ID" alone is a less attractive telephone device without "Telephone IdentiCall". This is because the people sharing the telephone will not be able to identify who has been called and in effect only the actual called recipient will be able to recognise the displayed caller's telephone number. So if a wrong recipient (not the person called) answers the telephone he can not recognise the displayed number - and is not benefited by Caller ID. Needless to say, if the correct recipient (the person called) answers the telephone he can identify his displayed caller number and is thus benefited by Caller ID.
(12) The selected numbers dialling.
With Telephone IdentiCall the caller dials the subscribers telephone number and an additional digit (sub-addressing field). With Telephone IdentiCall using personal or secondary coded telephone numbers the caller simply dials the personal or the secondary telephone number (addressing field). Therefore, "Telephone IdentiCall" or being able to identify the telephone call recipient (using distinctive rings) prior to the telephone becoming on-line (answered) is dependent upon the dialling of an addressing field or sub-addressing field using ISDN-D channel signalling. On the other hand Priority Call does not involve the dialling of an addressing field or a sub-addressing field, instead the calling telephone number is transmitted to the receiving terminal. As a result "IdentiCall" can only identify the person called and "Priority Call" can only identify (limited or special) telephone callers.
(13) Existing networks circuitry use.
As a result of the "Telephone IdentiCall" addressing field use or sub-addressing field use (as opposed to telephone numbers of callers) the existing network circuitry is capable of accepting and processing the personal number (addressing field) or digit (sub-addressing field). Therefore new circuitry does not require development unlike the prior devices.
(14) Existing network software use.
As a result of the Telephone IdentiCall addressing field use or sub-addressing field use (as opposed to telephone numbers of callers) the existing network software may generally be used (minor software modifications are required) to instruct the system regarding the IdentiCall procedure. Therefore outright or major software program development is not required unlike with the prior devices.
SUBSTITUTE SHEET (15) Telephone apparatus use.
Providing the network's addressing fields are used for Telephone IdentiCall then existing enhanced capability telephone terminals can carry out the IdentiCall service, subject to network software adjustments. If the network's sub-addressing fields are used for Telephone IdentiCall then, in part, new telephone set circuitry and software is required before enhanced capability telephone terminals can carry out the IdentiCall service. Unlike the prior devices which required complete or major circuitry and software development (such as the Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone).
( 16) One channel signalling use.
IdentiCall using addressing fields can use one channel signalling. Unlike Priority Call which requires the enhanced calling services system known as CCS No.7. Note, IdentiCall using sub-addressing fields requires CCS No.7.
(17) IdentiCall Call Direction.
A significant benefit of the IdentiCall Telephone utilising additional call information (non defined sub-addressing field) in the digital telephone network and the IdentiCall Telephone using personal or secondary coded telephone numbers (non defined addressing field) in the analogue telephone network is that call direction is possible. That is, provided there is a number of telephone jacks (extensions) for the same telephone line each called person ringing signal can be directed to any specific or any number of IdentiCall Telephones. Call Direction requires in pan new telephone set circuitry and software.
(18) There is no need to hear nor answer the telephone call for another called person.
By using the IdentiCall Telephone Call Direction capability telephone calls can be directed to any specific or any number of IdentiCall Telephones sharing the same telephone line. This means that, each caller's telephone call can be directed to each called person's respective bedroom, thus suppressing the need to hear each other called person's personal ringing signal. In addition, if a Mailbox Answering Machine is in operation each called person can utilise the "Ring Turn On/Off capability, this allows each called person to turn off their personal ringing signal if they are unavailable to take calls and likewise turn on their personal ringing signal once they are available. The Mailbox Answering Machine can be contacted for the "Ring Turn On/Off capability from each called person's respective bedroom. There is no need to hear each other called person's personal ringing signal, but
SUBSTITUTE SHEET as one would hope from such a system, there is no need to answer each other called person's telephone call. In addition to the IdentiCall Telephone "Call Direction" and Mailbox Answering Machine "Ring Turn On/Off capability the Mailbox Answering Machine will address each telephone caller's answering machine message to the called person's mailbox. This means that if a called person's personal ringing signal is not answered (possibly due to call direction) or if there personal ringing signal has been turned off, the caller can deposit a message in the called person's mailbox. Each called person can retrieve their mailbox answering machine messages from any telephone including their respective bedroom telephone. The above mentioned capabilities are not possible with the prior devices (Priority Call and the Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone).
DESCRIPTION OF THE PREFERRED EMBODIMENT.
It is a primary objective of this invention to provide a new method of identification of the called person before the incoming call is answered, and thus before the caller is charged. Before explaining in details the principles of the new method of the called person identification it is to be understood that the present invention is not limited in its application to details of the construction and arrangement of parts illustrated in the accompanying drawings. The invention is capable of other embodiments or being carried out in a variety of ways. The terminology employed herein is for the purpose of description and not of limitation.
The attached drawing Fig. 1A shows the block diagram of the new digital telephone instrument, one embodiment of this invention. Broken line divides the drawing in two pans: the lower one represents a basic layout of a typical digital telephone apparatus as used in the ISDN network and the upper pan represents some additional components, as an example, which may be used to provide some additional functions required in the process of identification of the called person.
The operation of the circuit is as follows. Telephone line extended from the local switching centre is connected to terminals a and b of unit 1 which performs the functions basically of isolating line circuit from electronic circuitry contained in the digital telephone apparatus and at the same time it provides for 2 wire to 4 wire conversion required for transmission reasons. Input signal from the public switching centre is typically a 144 Kb/s digital stream which in principle consists of three components: a 64 Kb/s stream carrying coded voice information, second 64 Kb/s stream designated to carry data transmission and one additional 16 Kb/s stream used for signalling between the switching centre and telephone apparatus. This combined 144 Kb/s signal is transfered to the line interface circuit 2 which
SUBSTITUTE SHEET has a principal function of extracting timing signals so that local clock oscillator may be synchronised properly. The extracted clock timing signal is connected to unit 9 which is a local clock generator. The 144 Kb/s stream is then applied to a special logic circuitry 3 whose only function is to split one 144 Kb/s stream into three separate bit streams: voice, data and signalling.
The 64 Kb/s stream carrying voice signal is applied to the codec circuit 4 which performs necessary coding and decoding functions required in the voice circuit. Ouφut and input of the codec circuit 4 are connected to the handpiece device 6 containing microphone and a receiver used for voice communications. The second 64 Kb/s stream is connected to data interface 5 which is equipped with the connection socket 7 where normally some form of data terminal equipment (DTE) will be connected, if required. The last part of the input signal, the 16 Kb/s steam is applied to the signalling interface logic circuit 10. This circuit performs the functions of decoding incoming signals from the switching centre and transfering the resultant signals to the signalling devices 11. Although signalling devices 11 are shown as one block in reality they will consist of plurality of device, like e.g. numerical keypad, function buttons, alphanumeric display, buzzers, etc. In the reverse direction signals produced by signalling devices, like e.g. pushing a button, are applied to the signalling interface logic 10 where it is properly coded, converted into binary form, and then applied to the logic circuitry 3 for inclusion in the signal transmitted back to the switching centre via line interface 2 and line termination unit 1. Signals transmitted via the 16 Kb/s stream are referred to as channel D in the ISDN design.
When there is an incoming call a suitable signal is transmitted via the 16 Kb/s signalling bit stream, it is decoded in the signalling interface logic 10 as meaning "to ring", and appropriate ringing signal is generated by the signalling interface logic 10 and applied to an acoustic device in the signalling devices group 1 1. Ringing signal to alert the called subscriber is, therefore, locally generated in the telephone apparatus and not in the switching centre. When the call is answered in the normal manner lifting of the handpiece causes closure of suitable contacts in the hookswitch (which is part of the signalling devices group 1 1) and this signal is applied back to the signalling interface logic 11. After coding, this signal is transmitted back to the switching centre via logic circuitry 3 and line interface 2 and line termination unit 1. Switching centre upon receipt of the hookswitch signal cancels the ringing signal and applies the 64 Kb/s bit stream carrying voice signal to the line. At this stage conversation may commence.
When subscriber wishes to use the telephone apparatus to make an outgoing call he lifts the handset, operation of the hookswitch is transmitted form the signalling devices group 11,
SUBSTITUTE SHEET via signalling interface logic 10 to logic circuitry 3 where it is included in the overall transmission of 144 Kb/s to the switching centre. Upon receipt of this signal switching centre initiates transmission of the dial tone back to the subscriber. Subscriber operates then the numerical keypad, which is one the elements in the signalling devices group, these signals are converted and coded in the signalling interface logic 10 into the 16 Kb/s stream and transmitted back to the switching centre. Switching action follows in the network and eventually call will be established.
When the subject of the present patent application is implemented in the digital telephone apparatus its operation is modified in such a way that it allows to perform additional specific functions, but not limited to, of the called person identification. This function may operate as follows: the IdentiCall feature user, at certain point in time of his choice, programs his telephone apparatus to accept certain additional signals which may be sent from the switching centre. This is done by simply pressing sequence of buttons on his telephone apparatus. The sequence of button pressing is such that it allows the signalling interface logic 10 to recognise that the signals produced are destined for the auxiliary microprocessor 12. Access to this microprocessor is gained via transfer interface 14 and common channel signalling bus 16. Microprocessor 12 upon receipt of the special signals acts on them in accordance with software programme instructions stored in the memory 13 and saves the signals received in the memory 13 for future use. The signal stored may consist e.g. of two digits. These digits will identify a certain called person at the premises where this special telephone apparatus is located.
When the caller wants to call a specific called person he/she dials normal directory number and follows it by the same two digits as stored in the memory 13 and which were disclosed to the caller beforehand by the called person. The public switching centre and the network will transmit these two additional digits via D-channel signalling to the telephone apparatus at called person premises. When this signal arrives to the telephone apparatus it is received by the signalling interface logic 10 as described before, it is recognised as a special signal and therefore it is applied via transfer interface 14 and common bus 16 to microprocessor 12. Upon receiving these additional digits microprocessor 12 compares the received digits with those stored in the memory, if a match is found the microprocessor generates suitable signal, transmits it via common bus 16 to device buffer 15 so that suitable announcement is activated. The announcement may take any form of audio and/or visual combination. It is prefened that one of these signals is an alphanumeric display providing clear identification of the called person. It will be obvious to a person skilled in the art that the microprocessor
12 will perform all function according to some software instructions stored in the memory
13 or in a special, dedicated ROM memory not shown on the diagram.
SUBSTITUTE SHEET The switching centre receiving dialled digits from the calling person will have to distinguish between digits as pan of the listed directory number and additional digits for person identification. It is suggested that this may be achieved in a simple manner by using the delimiters, like e.g. * or # or both, before, or before and after the additional two digits serving the purpose of called person identification. The two special, additional, digits identifying the called person will be included in the D-channel signalling stream and to achieve it some minor modifications will have to be introduced to the signalling pan of the switching centre software. Such modification is possible as it is intended that this new method of called person identification will utilise some of the unassigned addresses in the HEADING of the User Information Field of the Telephone User Part (TUP) in the CCS No. 7 D-channel signalling.
It is obvious that with assumed two digits identification code for a called person more than one combination of digits may be assigned, thus allowing identification of more than one called person.
After an incoming call has been answered, or after sufficient delay in case when the call is not answered, the special announcement signals appearing at the telephone apparatus will be cleared.
The software program operating microprocessor 12 will contain an additional routine which in case of an incoming call arriving from the switching centre containing the special called person identification digits and being unanswered will record details of such a call in the memory 13 for future use. Simultaneously, some distinctive indication will appear on the telephone apparatus alerting the user to the fact that there were some special, unanswered calls. The telephone apparatus user has then an option, by operating special sequence of buttons, to read out from the memory details of calls recorded and take action as appropriate. After reading the stored information out these part of records may be erased.
As indicated before this new method will enhance another feature - Caller ID, which is already available in the ISDN networks. Display of information about the calling person's number combined with full identification of the called person, all before the call has been answered, provides full information to the telephone apparatus user without the need to answer the phone first and thus cause the call to be charged.
It will be obvious to a person skilled in the an that any additional electronic components serving the purpose of identifying the called person will have to obtain power supply. This
SUBSTITUTE SHEET may be provided from the power supply unit 8 which is always provided in the digital telephone apparatus.
The preferred embodiment of IdentiCall for the analogue telephone network involves special programming introduced in the network switching centres and assignment of special, additional directory numbers to the called persons concerned. If a caller dials the ordinary listed directory number (LDN) the switching centre activates the ordinary ringing signal and as a result the called party telephone apparatus rings in a normal manner. If the calling party dials a different LDN number assigned to a second person reached through the same telephone line, then the switching centre generates and sends down the telephone line a different ringing signal. The called party's premises telephone apparatus will emit a distinct, special ring signal which will indicate the second person wanted for the call. As a result person(s) present at the premises of the ringing telephone apparatus have a chance to recognise who is being called and have an option of either answering the call or not. The recognition of the called party is provided before the call is answered and, therefore, before it is charged. At present this feature will require special programming to be carried out by the telephone operating company and it occupies listed directory numbers in the area numbering scheme. The latter may create problems in large telephone networks which use variable length listed telephone numbers.
An embodiment of this invention for the analogue telephone network, as an alternative to the above, comprises an electronic unit that is connectable between a telephone subscribers line terminal and the telephone appliance. The unit preferably consists of three relays and five electronic subsystems. These are illustrated in the accompanying figures as follows:
Figure 1 shows a system block diagram of the unit,
Figure 2 is a schematic diagram of the ring detector and remote on-hook detector,
Figure 3 is a schematic diagram of the dial pulse counter,
Figure 4 is a schematic diagram of the acoustic signal generator (block 1),
Figure 5 is a schematic diagram of the acoustic signal generator (block 2),
Figure 6 is a schematic diagram of the local off-hook detector.
The operation of the unit is as follows:
SUBSTITUTE SHEET In its unenergised state relay 1 connects the incoming line to the ring detector sub-system. When energised by an output from the ring detector the incoming line is switched to relay
2.
The ring signal is rectified by diode Dl . The opto-coupler PH01 causes the input of the AND gate IC6 to go low. The output of the IC6 also goes low since opto-coupler PH02, pan of the remote off-hook detection unit is unenergised due to the open circuit at relay 2. The low/high transition at the input to the counter IC4 that occurs when a ring pulse ceases causes the count to increment. After sufficient rings the ouφut Q7 will go high, energising relay 1 and causing the incoming telephone line to be switched to relay 2. The signal RE which turns on the relay also resets the pulse counter so that it is ready to count the dialled pulses.
In its unenergised state relay 2 is connected onto a 600 ohm telephone at the input of the pulse counter. This simulates the handset going off-hook and thus signals the exchange to make the audio connection between subscribers. When it is energised the telephone line is connected to the remote-off hook detector.
If the calling party now dials a digit the received pulses are rectified by diode D2 and low pass filtered by R5 and C3 then amplified and finally are counted by IC2:A. Because there is one more pulse produced by the circuit than dialled due to the energy in the "end of dialling" spike a count of two pulses is made to signify "1 " has been dialled by activating the acoustical signal for " 1 ". The binary representation of the count at the output of IC2:A is used to drive a multiplexer, IC3 switching high one of the outputs Cl to CIO. These outputs form the input to the acoustical signal generator.
A 555 counter generates a 10 kHz pulse stream which is input to counter IC1 :A. The ouφuts of this counter will each represent a different acoustical signal. One of these signals is coupled via a logic network to the speaker depending upon which output of IC3 is high. Whichever acoustical signal is generated, relay 2 is energised, by combining the signals RL1 .... RL10 in ICl to IC5 so that whichever is high the ouφut of IC5:A is high.
When relay 2 is energised the acoustical signal is unaffected. The opto-coupler PH02 is connected across the line. Because the called party has not yet lifted the handset the line is terminated by a 10K resistor in series with the photodiode. the dc voltage from the exchange turns on the output transistor of the opto-coupler, causing a low transition at the input to the counter. If the calling party abandons the call the opto-coupler output will go high causing a low-high transition at the counter input and the output at Q7 will go low,
SUBSTITUTE SHEET causing relay 1 to be de-energised and restoring the telephone line to the ring detect unit ready for the next call. At the same time the pulse detector is reset to a count of zero inhibiting the acoustical signal.
When the handset is lifted a low impedance path is presented to the circuit through opto- coupler PH03. This turns on relay 3 which connects the handset across the telephone line allowing voice communication with the called party. At the same time SP-SW goes low inhibiting the acoustic ring signal.
When the called party hangs up relay 3 will return to its initial state once the line from the exchange goes open circuit in response to its on-hook detection.
As explained above, relay 3 serves to connect the handset to the telephone line once it has been answered.
As an improvement to IdentiCall it is envisaged that each IdentiCall Telephone would have a "Call Direction" switch setting, each switch corresponds to a distinctive ring tone. Therefore if a number of telephone apparatus' share the same telephone line then each telephone apparatus' switch settings can be configured so that one or more distinctive ring tones reach each telephone terminal. For example, if each resident has a telephone in their bedroom and assuming that the residents share the same telephone line, then each telephone can be "switched" or configured so that only chosen distinctive ring tones reach each bedroom in question, the ring tone(s) of the bedroom occupant(s). A practical application of IdentiCall Call Direction, using the above scenario, is if one bedroom occupant receives a 6.00 AM wake up call, then all the residents are not woken up.
The IdentiCall Telephone realises capabilities only previously possible if the household had a PABX or a small business system.
THE MAILBOX CAPABILITY
MAILBOX ANSWERING MACHINE
ABSTRACT
As a further aspect of the invention a novel and unique answering system is proposed from here on entitled the "Mailbox Answering Machine" (MAM) in which it is possible for the answering machine user to receive a personalised print-out of the telephone callers who have telephoned in his absence together with the retrieval of the personal messages recorded. More than one answering machine user can use the said svstem.
SUBSTITUTE SHEET BACKGROUND OF THE INVENTION
Often telephone users will engage a telephone answering machine to record callers messages in their absence. Therefore each telephone recipient's messages are indiscriminately deposited with the other telephone recipient's messages. As a result each recipient then has to listen to all the other telephone recipients personal messages or pan thereof to retrieve their own messages.
Therefore the object of this invention is to ameliorate the shortcomings of the prior answering machines by providing the telephone answering machine users with facilities only previously possible if each user had their own telephone line and telephone answering machine. It could be said that the Mailbox Answering Machine is equivalent to having a number of answering machines within the one answering machine.
With the Mailbox Answering Machine each caller's telephone call message is addressed to and placed in the answering machine mailbox of the actual called person. Therefore the message deposited by the caller is separated from the other called persons' messages and becomes the sole property of the person it was addressed to. As a result, the caller can leave a message with the utmost discretion knowing that only the actual called person will retrieve it.
The main advantage of the Mailbox Answering Machine from the point of view of the people who share the facility of the answering machine is that as a result of each telephone call recipient having their very own answering machine mailbox, each called recipient does not have to listen to all the other residents messages to play their own messages.
Corporations are known to use voice mail systems but these require central intelligence, in the form of a PABX and the voice mail database itself, together with connectivity to an array of telephone extensions. The proposed invention does away with PABX's, centralised voice mail databases, and the multiplicity of telephone extensions and terminal equipment. The proposed invention uses the concept of redialling not to access one's telephone terminal messages but instead one's personal messages. The mailbox answering machine is believed to be the ideal solution to one's residential answering machine sharing problems and is surpassed only by the costly solution of "hooking up" a number of telephone lines and buying a number of answering machines, thus solving the problem caused by a number of people sharing the same answering machine facility.
SUBSTITUTE SHEET There are three versions of the Mailbox Answering Machine each version responds to different methods of signalling within the telephone networks. An example of each mailbox answering machine version is provided on the indicated pages.
Version 1 is for analogue exchanges which do not provide DTMF signalling.
Version 2 is for analogue exchanges which provide DTMF signalling.
Version 3 is for the digital telephone network.
The Mailbox Answering Machine compliments IdentiCall. For instance if the Mailbox Answering Machine is used jointly with IdentiCall then the terminal equipment would be given features previously only possible if the telephone users each have their own telephone line, telephone and answering machine.
THE ADVANTAGES THAT THE MAILBOX ANSWERING MACHINE HAS OVER THE PRIOR DEVICES
1. The caller can give his message in confidence
The Mailbox Answering Machine requires the caller to address the answering machine message to the desired call recipient, addressing distinguishes the desired recipient from the other telephone call recipient's who share the same answering machine terminal. Therefore any message recorded by the caller, by virtue of the addressing system, becomes the sole property of the person to whom the message was directed. As a result the caller's message is private thus can be given by the caller in absolute confidence. With the prior answering machine devices suc as the Call Barring Arrangement ((Great Britain Patent No.: 2,062,410) (this patent suggested or made a provision for a conventional answering machine addition)) if the answering machine is shared by users, then no message can be given in confidence. The patent documents which have been cited by the United States examiner for the co-pending application entitled the Personal Signalling Telephone (United States Serial No.: 07,436,563) namely: the Busy/No-Answer Call Completion Equipment (United States Patent No. 4,809,321); the Multichannel Interactive Telephone Answering Apparatus (United States Patent No. 4,591,664): and the Voice Mail System on Magnetic Tape (United States Patent No. 4,747,126) amount to voice mail systems therefore can not be considering under this advantage point, being relative to answering machines.
SUBSTITUTE SHEET 2. Other people sharing the answering machine do not have to listen to your messages to retrieve their own.
Each telephone call recipient sharing the answering machine facility is given their very own answering machine mailbox. And in the event that a message is recorded it is directed to the mailbox of the called person. As a result of this system the other people sharing the answering machine do not review your or anybody else's messages to retrieve their own. Likewise, you will only retrieve your own messages, nobody else's. With the prior answering machines the messages of the people sharing the answering machine are indiscriminately deposited together, so that no one person can retrieve their own messages without listening to all or part thereof of the other persons' recorded messages. The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus: and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
3. It is the most direct way for the people sharing the answering machine to retrieve their messages.
Users of the Mailbox Answering Machine can access their messages in a time comparable to not sharing the answering machine at all.
The only messages that a given user listens to are the messages intended for that user. With the prior answering machines the time it takes a given user to retrieve his messages equals the time taken to review all the messages or part thereof in the machine, incidentally many or all these messages may not be for the said retrieving user. The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
4. Mailbox indicators.
The Mailbox Answering Machine proposes the use of an indicator light (such as a red light) for each mailbox. The purpose of each indicator light is to inform each mailbox holder whether their is any messages in their given mailbox or not. With the prior devices message indicators could do nothing but simply inform the people sharing the answering machine whether any messages are or how many messages are recorded. The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
SUBSTITUTE SHEET 5. The Mailbox Answering Machine compliments IdentiCall.
If an IdentiCall Telephone forms pan of the Mailbox Answering Machine unit then, in conventional terms, the terminal equipment becomes a private telephone and answering machine for each call recipient, even though several people share these facilities. For example if the IdentiCall/Mailbox Answering Machine combination is implemented then half the family could let their personal calls ring whilst the other half have their answering machine on. This is not possible with the prior devices. The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
This advantage point anticipates no additional IdentiCall Telephones. Refer to advantage point six if more than one IdentiCall Telephone is anticipated for the same telephone line.
6. Domestic PABX and Voice Mail System type application.
Provided there are a number of telephone jacks (extensions) within the household a telephone service subscriber could purchase a Mailbox Answering Machine and a number of IdentiCall Telephones to convert his domestic telephone system into a domestic PABX and Voice Mail System.
Let's assume that there are three telephone jacks (extensions) within the Smith household. One telephone jack is in the: lounge room: Mr and Mrs Smith's bedroom; and Junior Smith's bedroom. Provided that there is at least an IdentiCall Telephone in each bedroom and a Mailbox Answering Machine in the lounge room then Mr Smith, Mrs Smith and Junior Smith could have their IdentiCall Telephone calls directed to their respective bedrooms. In addition, after a period of telephone call answering unavailability, each person could access their lounge room Mailbox Answering Machine messages from their respective bedrooms.
The domestic PABX and Voice Mail System type application utilises very little exchange intelligence to convert the household telephone system into a domestic PABX and Voice Mail system. Prior to the IdentiCall Telephone/Mailbox Answering Machine combination "as above" a subscriber would have to purchase a PABX, a centralised voice mail system database and terminal equipment. Not to mention being liable for the expense associated with installation, maintenance and user costs.
SUBSTITUTE SHEET The above mentioned capabilities are not possible with the prior devices, (such as: the Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone; the Call Barring Equipment; and Priority Call) further, through any combination thereof.
The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, would cause the subscriber to be liable for the PABX type expenses immediately above.
7. Dialling your mailbox answering machine mailbox from an outside telephone terminal.
With the prior answering machine devices (such as the Call Barring Equipment) if one attempted to retrieve their messages from outside the household they would have to dial a security code, which is partially in vain, because all the called person's messages are retrieved. With the Mailbox Answering Machine each such caller can retrieve their personal messages in confidence, meaning each sharing user calling the Mailbox Answering Machine from the outside shall only retrieve their personal messages. The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
8. The " IdentiCall Turn On/Turn Off' function use with the Mailbox Answering Machine.
If an IdentiCall Telephone is pan of the Mailbox Answering Machine unit then each person sharing the IdentiCall Telephone/Mailbox Answering Machine has the option of turning their IdentiCall ring tone/pattern on (IdentiCall Turn On). Meaning if a caller rings a particular person, the called person's ring tone/pattern will sound and in the event the telephone call is not answered the telephone caller would be given the opportunity to record a confidential message for this called person. Each person sharing the IdentiCall Telephone/Mailbox Answering Machine also has the option of turning their respective IdentiCall ring tone/pattern off (IdentiCall Turn Off). Meaning if a caller rings a particular person, the called person's ring tone/pattern would not sound, instead the telephone caller is immediately provided with the opportunity of recording a confidential message for this called person (refer to the below paragraph for the main advantages of IdentiCall Turn Off). The system is such that the ring tone/pattern effect of (IdentiCall Turn On and Off) takes affect on every IdentiCall Telephone sharing the same telephone line as the Mailbox
SUBSTITUTE SHEET Answering Machine. Further, IdentiCall Turn On/Off can be applied from inside or outside the household.
It is important to note the benefits achieved by the "IdentiCall Turn Off capability, which are as follows: the other residents vill not become frustrated that the person the calls are being directed to is not home, nevertheless the phone is ringing for them. Secondly, this will prevent callers from hanging up believing that the called person is not home and that no answering machine is running to record their message.
The above capabilities are not possible with the prior devices, (Such as the: Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone, the Call Barring Equipment; and Priority Call) further, through any combination thereof. The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus: and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
9. Mailbox Over-Ride.
"Mailbox Over-Ride" is a function which facilitates the Mailbox Answering Machine "IdentiCall Turn On/Off capability as described in advantage eight. The "Mailbox Over- Ride" function allows special callers knowing of the called person's priority code to annunciate the called person's ring tone/pattern, even though the called person has commanded the Mailbox Answering Machine to turn off the ring tone/pattem and provide the caller with the opportunity of recording a confidential message. Converse to the before mentioned, the Mailbox Answering Machines' outgoing message(s) could instruct the caller to dial such a priority code if the call is of the utmost importance. The "Mailbox Over-Ride" function takes affect on every IdentiCall Telephone sharing the same telephone line as the Mailbox Answering Machine. The "Mailbox Over-Ride" capability is not possible with the prior devices, further, through any combination thereof. The Busy/No Answer Call Completion Equipment; the MultiChannel Interactive Telephone Answering Apparatus; and the Voice Mail System on Magnetic Tape, being voice mail systems, can not be considered under this advantage point.
10. No switching systems - PBX.
The Busy/No- Answer Call Completion Equipment is an apparatus which enhances switching systems such as PBX's by assisting calling parties in completing their telephone
Figure imgf000024_0001
to leave a spoken message for later retrieval by a called party; or instructing the calling party to simply wait until the called party goes on-hook so that the call can be completed (camp-on).
The MultiChannel Interactive Telephone Answering Apparatus is a telephone and answering system which provides PBX type facilities. This apparatus relies upon the caller dialling the system's telephone number to reach the main prerecorded message channel. The main prerecorded message channel provides the caller with the option of dialling a pulse or tone response to select an auxiliary channel which in turn can be connected to further auxiliary channels. The advantages provided by this decision tree format are: call direction, screening and forwarding and caller message storage for user playback. Call direction, which appears to be the main advantage, allows a caller to telephone the system and listen to and respond to a series of prerecorded instructions, thus a call can be directed to a telephone or answering machine terminal without receptionist type interrogation. For example if an eight track tape system was employed, eight relays could enable selective connection to up to eight extensions without receptionist type interference.
The Voice Mail System on Magnetic Tape is intended for connection to a private branch exchange (PBX). The facilities it offers once connected to a PBX besides the expected voice mail system operations such as caller message recordings and caller message reviews are: improved tone decoder performance: minimise outgoing message interference of caller tone signalling; prevention of tone signals being re-executed if played back with the recording; to inform each recipient's telephone station of any voice mail system messages waiting and to indicate to each recipient at their telephone station whether the voice mail system is in use. As you can see this voice mail system is interconnected to and relies upon or supports a private branch exchange (PBX) and is not intended for or can't be used in isolation.
Opposed to the above, the Mailbox Answering Machine is simply a stand alone answering machine which does not support a PABX nor does it provide voice mail type PBX support facilities.
11. No voice mail system.
The Busy/No-Answer Call Completion Equipment "as mentioned above" supports switching systems and possesses many voice mail system features such as leaving a spoken message for later retrieval by the person occupying the called terminal.
SUBSTITUTE SHEET The MultiChannel Interactive Telephone Answering Apparatus like the immediately above device, can provide the caller (depending upon the type of configuration) with the opportunity to leave a spoken message for later retrieval by the person occupying the called terminal. Further, a specified caller or a special group of callers may be given "select forward" or "call block" type access to this voice mail system channel.
The Voice Mail System On Magnetic Tape as stated supports a PBX and is capable of: in the event the called person is out of the office, allowing the company receptionist to transmit a DTMF tone so that the voice mail system will activate and record the caller's message; or in the event the called person is not answering the telephone, automatically activating the voice mail system thus setting up the intercept of the incoming call.
Again, the Mailbox Answering Machine is a stand alone device providing no voice mail system type PBX support facilities and has no notable features other than called person mailboxes and those capabilities described, being ancillary to the answering machine mailbox capacity.
12. No PABX type infrastructure.
The Busy/No Answer Call Completion Equipment as one would expect from a voice mail type PBX support system relies upon a PBX network therefore requires not only a centralised switching unit interconnected to this voice mail type equipment but a substantial infrastructure, namely, the relays between each terminal and the centralised switching unit.
The MultiChannel Interactive Telephone Answering Apparatus system, in a simple sense, involves a MultiChannel Interactive Telephone Answering Unit and a multiplicity of relays interconnected to a multiplicity of terminal extensions. This system requires the installation of a substantial PABX type infrastructure.
The Voice Mail System On Magnetic Tape interfaces a PBX therefore requires: a centralised switching unit; a voice mail system unit; and relays interconnecting the PBX and the voice mail system with each terminal station; and telephone equipment itself.
The Mailbox Answering Machine needs nothing more than a single phone jack (extension).
13. No PABX maintenance costs.
The Busy/No Answer Call Completion Equipment, as shown above, depends upon the interconnection of a comprehensive infrastructure, namely: a centralised switching unit: the voice mail type equipment: the relays from the centralised switching unit to the extensions;
SUBSTITUTE SHEET and the terminal equipment. Such an intricate infrastructure has a high incidence of breakdowns therefore the subscribers are exposed to the ongoing costs of maintenance and the loss of revenue associated with such problems.
The MultiChannel Interactive Telephone Answering Apparatus similar to the immediately above device, requires a sophisticated infrastructure: the MultiChannel Interactive Answering Unit; a series of relays; and terminal extensions and equipment. A reasonably high level of breakdown could be expected from this PABX/voice mail system type and the associated circuitry, especially if compared to a basic answering machine.
The Voice Mail System On Magnetic Tape in the context of the Mailbox Answering Machine is an intricate system requiring: a PBX; a voice mail system; and a multiplicity of relays interconnecting each of the terminal station's equipment to the integrated PBX and voice mail system.
The Mailbox Answering Machine is obviously not exposed to PABX type maintenance costs.
14. No PABX type installation and configuration.
The Busy/No Answer Call Completion Equipment, as can be expected from a voice mail type PBX support system, involves installation and configuration to tailor the system for both PABX compatibility and the given corporation's use requirements.
The MultiChannel Interactive Telephone Answering Apparatus as with any specialised multi-terminal business system requires the spending of characteristic installation and configuration time. In addition, seeing that it is a highly configurative system, due to the amount of decision tree structure options available, requires an extra period of configuration than most business systems.
The Voice Mail System on Magnetic Tape, as per the above type of voice mail system's, requires to be set up then requires adaptation to fit in with the existing PBX hardware infrastructure. The configurative aspects of the system would include: software compliance with the companies PBX; programming of the outgoing message structure of the audio circuitry and the voice synthesised specific outgoing messages.
As mentioned above the Mailbox Answering Machine device requires nothing more than a single phone jack (extension) to provide a number of answering machines (for a number of called persons) within the one answering machine.
SUBSTITUTE SHEET 15. No PABX user/subscription costs.
Each Telecommunications Authority charges the subscribers to PBX systems (Busy/No- Answer Call Completion Equipment, MultiChannel Interactive Telephone Answering Apparatus, Voice Mail System on Magnetic Tape) a set or variable fee for the privilege of PBX use. Such charges usually are advalorem, thus are dependent upon the cost or capacity of the PBX system. The Mailbox Answering Machine being a single answering machine yields no such costs.
16. No receptionists.
The Busy/No Answer Call Completion Equipment by being a voice mail type PBX support system requires receptionists. This patent document provides for a message service which instructs the calling party to dial the switchboard attendant number or the caller can automatically be connected thereto.
The MultiChannel Interactive Telephone Answering Apparatus, through the possession of certain PABX/Voice mail system elements, could and does in certain configurations provide a call direction opportunity to an automatic message attendant type service.
The Voice Mail System on Magnetic Tape directly supports a PBX; thus is adjunct to the switching system and the receptionist type functions. In addition this system states that, depending upon the configuration, the company receptionist could facilitate the required call direction to the voice mail system.
The Mailbox Answering Machine is merely an answering machine therefore does not require the assistance of switchboard operators.
17. Multiplicity of users per terminal not just one user per terminal.
With the Mailbox Answering Machine there is an indefinite number of answering machines within the one unit therefore an indefinite number of called persons can be given their own private answering machine. On the other hand the Busy/No Answer Call Completion Equipment, the MultiChannel Interactive Telephone Answering Apparatus and the Voice Mail System on Magnetic Tape, as their respective patents indicate, are both one user per terminal svstems.
SUBSTITUTE SHEET 18. No select forward or call block.
The Mulitichannel Interactive Telephone Answering Apparatus allows the telephone calls of a user designated caller or group of callers to be directed to a specific auxiliary channel, whilst the other callers do not have access to this channel, so that these special callers can leave responsive messages. Therefore this enhancement amounts to a select forward and call block type function, meaning the caller's call becomes on-line (the caller pays for the call) then the caller responds to the interactive tape recording selection steps without any guarantee of reaching the desired terminal or channel. This prior device is unlike the Mailbox Answering Machine whereby each caller will reach the terminal mailbox of the called person.
19. The Mailbox Answering Machine does not operate using a selection tree format.
The Multichannel Interactive Telephone Answering Apparatus involves a series of selection steps of which the caller's response to the series of selection steps determines which auxiliary channel is eventually chosen. Therefore this prior device answers the call, provides an initial tape response anticipating caller interaction then the analogue circuitry routes the caller to a further series of interactive tape responses and finally to the desired channel. This system is totally different to the stand alone Mailbox Answering Machine which can: route the call to the called person's mailbox in response to a typical outgoing answering machine message (Mailbox Answering Machine Version 1 ); or route the call to the called person's mailbox prior to the answering machine becoming on-line (Mailbox Answering Machine Version 2 & 3).
20. The use of solid state memory or hard disk RAM.
With the Mailbox Answering Machine the caller dials the personal number - mailbox address of the called person. This mailbox address is then recorded by the machines message storage medium being either solid state memory or hard disk random access memory, so that the given message will be deposited in the correct mailbox.
On the other hand the Multichannel Interactive Telephone Answering Apparatus, as mentioned above, uses an analogue circuitry and magnetic tape combination so that the call is routed to a series of interactive tape responses and finally to the desired channel.
In addition the MultiChannel Interactive Telephone Answering Apparatus is a slow recorded message retrieval system due to the incorporated tape playback system. Thus
SUBSTITUTE SHEET affecting the tree structure instructions, user messages, and any caller messages response times.
The Multichannel Interactive Telephone Answering Apparatus' uses a decision tree structure which could be or is the method of choice for certain corporate voice mail type applications but is clearly an obsolete recording and retrieval method in the context of answering machine mailbox type facilities provided by the Mailbox Answering Machine.
The Voice Mail System On Magnetic Tape as the name implies is another tape driven system. This system involves the accessing of a system greeting message so that the caller has the option of selecting a number of other outgoing messages such as a system directory of mailbox numbers before the caller actually tone signals to deposit a message for a particular system user.
The recording system is as follows: the system greeting message is at the centre of the tape system; whilst the other outgoing messages are adjacent to this root outgoing message; the first messages are then closest to the centre of the tape. As intended, such a system does reduce tape retrieval and recording times.
The recording and retrieval system is as follows: the caller through the use of a tone signalling device selects a user or mailbox number, the caller message is then recorded in an available cell. Each cell consists of a track and segment number. As a result of this method each user's message is retrieved by the cell number (track and segment number) and the user or mailbox number which is recorded within the tape's cell.
21. Indicator lights on IdentiCall Telephones representing each Mailbox Answering Machine called person.
If a caller calls a specific person and the specific person's answering machine mailbox is in "Ring rn off. The specific person's IdentiCall Telephones could be programπ._d so that if a IdentiCall Telephone does not become on-hook and if the call is answered by the Mailbox Answering Machine immediately after the designated time for answering the specific person's telephone calls then each IdentiCall Telephone's indicator light programmed for this specific person will come on. As a result each called person would become aware of their messages from say their bedroom even though the Mailbox Answering Machine is in the lounge room. Each called person could phone the Mailbox Answering Machine from their bedroom IdentiCall Telephone to retrieve their messages or at least would be aware of their Mailbox Answering Machine messages.
SUBSTITUTE SHEET This capability is in this section as the Mailbox Answering Machine records the called person's message and because a Mailbox Answering Machine is required for this capability.
THE ADVANTAGES THAT THE ISDN MAILBOX IMAGE AND VIDEO TELEPHONE MAILBOX ANSWERING MACHINE HAS OVER THE PRIOR DEVICES
1. The caller can give his audio visual transmission in confidence
The Video Telephone Mailbox Answering Machine requires the caller of the calling Video Telephone to address the audio visual transmission to the desired call recipient. Addressing distinguishes the desired recipient from the other audio visual transmission recipient's who share the same Video Telephone Mailbox Answering Machine. Therefore any audio visual messages recorded by the caller, by virtue of the addressing system, becomes the sole property of the person to whom the message was directed. As a result the caller's audio visual message is private thus can be given by the caller in absolute confidence. With the assumed prior devices if the video telephone answering machine is shared by users, then no audio visual message can be given in confidence.
2. Other people sharing the Video Telephone Mailbox Answering Machine do not have to retrieve your audio visual messages to retrieve their own.
Each video telephone call recipient sharing the Video Telephone Mailbox Answering Machine facility is given their very own message mailbox. And in the event that a audio visual message is recorded, it is directed to the message mailbox of the called person. As a result of this system the other people sharing the Mailbox Video Telephone Answering Machine do not review your audio visual messages nor anybody else's audio visual messages to retrieve and display their own. Likewise, you will only retrieve and display your own visual messages on the monitor, nobody else's. With the prior assumed devices the audio visual messages of the people sharing the Video Telephone Mailbox Answering Machine are indiscriminately deposited together. So that no one person can retrieve their own audio visual messages without displaying and listening to all or part thereof of the other persons' recorded messages.
3. It is the most direct way for the people sharing the Video Telephone Mailbox Answering Machine to retrieve their own audio visual messages
SUBSTITUTE SHEET Users of the Video Telephone Mailbox Answering Machine can access their audio visual messages in a time comparable to not sharing the Video Telephone Mailbox Answering Machine at all. Each called person's given Video Telephone Mailbox Answering Machine padlock command will transmit the image to the display monitor and transmit the speech representation to the audio circuitry to synthesis the caller's voice. Therefore the only audio visual messages that a given user reviews are the messages intended for this user. With the prior assumed devices the time it takes a given user to retrieve his" audio visual messages equals the time taken to review _J1 the audio visual messages or part thereof, incidentally many or all these audio visual messages may not be for the said retrieving user.
4. Mailbox indicators
The Mailbox Video Telephone Answering Machine proposes the use of an indicator light (such as a red light) for each mailbox. The purpose of each indicator light is to inform each audio visual message mailbox holder whether their is any messages in their given mailbox or not. With the prior assumed devices message indicators could do nothing but simply inform the people sharing the video telephone answering machine whether any audio visual messages are or how many messages are recorded.
5. The Video Telephone Mailbox Answering Machine compliments IdentiCall
In conventional terms, the terminal equipment becomes a private Video Telephone and Video Telephone Mailbox Answering Machine for each call recipient, even though several people share these facilities. For example if a Video IdentiCall Telephone Mailbox Answering Machine is implemented then half the family could let their personal calls ring whilst the other half have their Video Telephone Mailbox Answering Machine on. This is not possible with the prior devices.
This advantage point anticipates no additional Video IdentiCall Telephones, Image IdentiCall Telephones or IdentiCall Telephones. Refer to advantage point six if more than one Video IdentiCall Telephone, Image IdentiCall Telephone or IdentiCall Telephone is anticipated for the same telephone line.
6. Domestic PABX and Video Mail System type application
Provided there are a number of telephone jacks (extensions) within the household a telephone service subscriber could purchase a Video IdentiCall Telephone Mailbox
SUBSTITUTE SHEET Answering Machine and a number of Video Telephones to convert his domestic telephone system into a domestic PABX and Video Mail System.
Let's assume that there are three telephone jacks (extensions) within the Smith household. One telephone jack is in the: lounge room; Mr and Mrs Smith's bedroom; and Junior Smith's bedroom. Provided that there is at least a Video IdentiCall Telephone in each bedroom and a Video IdentiCall Telephone Mailbox Answering Machine unit in the lounge room then Mr Smith, Mrs Smith and Junior Smith could have their, Video IdentiCall Telephone calls directed to their respective bedrooms. In addition, after a period of telephone call answering unavailability, each person could access their lounge room Video IdentiCall Telephone Mailbox Answering Machine audio visual messages from their respective bedrooms.
7. Dialling your Video IdentiCall Telephone Mailbox Answering Machine mailbox from an outside Video Telephone
If a person calls their Video IdentiCall Telephone Mailbox Answering Machine mailbox from an outside video telephone terminal and enters their padlock command then the Video IdentiCall Telephone Mailbox Answering Machine will transmit their own audio visual messages from their personal mailbox to the calling Video Telephone.
If a person calls their Video IdentiCall Mailbox Answering Machine mailbox from a video telephone terminal and enters their padlock command and a monitor lock command then the synthesised speech is transmitted across the line to the video telephone terminal and the visual transmission will be locked or prevented from being displayed on the Video IdentiCall Telephone Mailbox Answering Machine monitor (refer to advantage point eight for more information on monitor locks). This allows video transmissions which are considered private from being displayed upon the calling Video Telephone monitor. The video might be to private for the perusal by others.
8. Terminal Type Monitor Locks
If the caller of a video telephone terminal dials the Video IdentiCall Mailbox Answering Machine: telephone line number; call direction number; terminal type number: his padlock command and the monitor lock command then the personal mailbox's visual transmission will be locked or prevented from being displayed on the Video IdentiCall Telephone Mailbox Answering Machine monitor whilst the synthesised speech is transmitted across the line.
SUBSTITUTE SHEET 9. The " IdentiCall Turn On/Turn Off" function use with the Video IdentiCall Telephone Mailbox Answering Machine
If there is a Video IdentiCall Telephone Mailbox Answering Machine unit then each person sharing this unit has the option of turning their IdentiCall ring tone on (IdentiCall Turn On). Meaning if a video telephone caller rings a particular person, the called person's ring tone will sound and in the event the telephone call is not answered the telephone caller would be given the opportunity to record a confidential audio visual message for this called person. Each person sharing the Video IdentiCall Telephone Mailbox Answering Machine also has the option of turning their respective IdentiCall ring tone off (IdentiCall Turn Off). Meaning if a video telephone caller rings a particular person, the called person's ring tone would not sound, instead the video telephone caller is immediately provided with the opportunity of recording a confidential audio visual message for this called person (refer to the below paragraph for the main advantages of IdentiCall Turn Off). The system is such that the ring tone effect of (IdentiCall Turn On and Off) takes affect on every Video IdentiCall Telephone, Image IdentiCall Telephone and IdentiCall Telephone sharing the same telephone line as the IdentiCall Telephone Mailbox Answering Machine. Further, IdentiCall Turn On/Off can be applied from inside or outside the household.
It is important to note the benefits achieved by the "IdentiCall Turn Off capability, which are as follows: the other residents will not become frustrated that the person the calls are being directed to is not home, nevertheless the phone is ringing for them. Secondly, this will prevent callers from hanging up believing that the called person is not home and that no answering machine whatsoever is running to record their audio visual or audio message.
10. Mailbox Over-Ride
"Mailbox Over-Ride" is a function which facilitates the Video IdentiCall Telephone Mailbox Answering Machine "IdentiCall Turn On/Off capability as described in advantage nine. The "Mailbox Over-Ride" function allows special callers knowing of the called person's priority code to annunciate the called person's ring tone, even though the called person has commanded the Video IdentiCall Telephone Mailbox Answering Machine to turn off the ring tone and provide the caller with the opportunity of recording a confidential audio visual message. Converse to the before mentioned, the Video IdentiCall Telephone Mailbox Answering Machines' audio visual outgoing message(s) could instruct the caller to dial such a priority code if the call is of the utmost importance. The "Mailbox Over-Ride"
SUBSTITUTE SHEET function takes affect on every Video IdentiCall Telephone and IdentiCall Telephone sharing the same telephone line as the Video IdentiCall Telephone Mailbox Answering Machine.
11. Indicator lights on Video and Image IdentiCall Telephones representing each Video Identical! Telephone Mailbox Answering Machine called person
If a caller calls a specific person and the specific person's answering machine mailbox is in "Ring Turn off". The specific person's Video and Image IdentiCall Telephones could be programmed so that if any type of IdentiCall Telephone does not become on-hook and if the call is answered by the Mailbox Answering Machine immediately after the designated time for answering the specific person's telephone calls then each Video and Image IdentiCall Telephone's indicator light programmed for this specific person will come on. As a result each called person would become aware of their audio visual or visual messages from say their bedroom even though the Video IdentiCall Telephone Mailbox Answering Machine is in the lounge room. Each called person could phone the Video IdentiCall Mailbox Answering Machine from any type of IdentiCall Telephone in their bedroom to retrieve their audio or audio visual messages or at least would be aware of their Video IdentiCall Telephone Mailbox Answering Machine messages.
This capability is in this section as the Video IdentiCall Telephone Mailbox Answering Machine records the called person's message and because a Video IdentiCall Telephone Mailbox Answering Machine is required for this capability.
12. Outgoing Audio and Audio Visual messages
If a caller is calling from a digital telephone then the called person's outgoing audio message will be retrieved. If the caller is calling from a video telephone then the called person's outgoing audio visual message will be retrieved. A command could be entered to facilitate the called person's outgoing message retrieved.
FACSIMILE MACHINES
This application makes a specific provision for a Physical Mailbox Facsimile Machine. The Physical Mailbox Facsimile Machine utilises the same call direction system as the Mailbox Answering Machine and enables physical mailbox contained correspondence.
Not detracting from the below advantage points, the physical mailbox capacity is simply created by the caller directing the facsimile transmitted correspondence to the actual called person's print container. Depending on the length of the called person addressing
SUBSTITUTE SHEET (directing) code which must be dialled by the person intending on transmitting the image, junk mail can be prevented from reaching each called person's facsimile print-out mailbox. Each called person's container can be unlocked by dialling a personal code (padlock command) and/or by using a conventional key. X
THE ADVANTAGES THAT THE PHYSICAL MAILBOX FACSIMILE MACHINE HAS OVER THE PRIOR DEVICES
1. The Physical Mailbox Facsimile Machine is the quickest way for people sharing the facsimile machine to retrieve their confidential material
With the prior mailbox devices a caller enters a PIN number before dialling the called facsimile number and the facsimile transmission is stored in the receiving facsimile machine's hard disk RAM. If the desired recipient enters his PIN number, then, as a result, his stored facsimile transmission will be printed and obtained. With this method, assuming that the page reproduction rate of a Group 3 facsimile machine is fifteen seconds per page then the desired recipient has to wait twenty five minutes per one hundred pages.
Productivity in any business is important. Let's assume that five people are sharing the group 3 facsimile machine and each receive twenty pages of facsimile per day. Assuming that the reproduction rate of the printer is fifteen seconds per page then each recipient has to wait five minutes for their correspondence. Five people multiplied by 5 minutes equals 25 minutes of wasted time each day. Seeing that there are five working days in the week, then this figure equals 125 minutes per week. Assuming that there are forty six working weeks in the year multiplied by 125 minutes per week then there is 5760 minutes lost per year. If we divide this figure by 60 minutes then there is approximately 96 hours of productivity lost per year. Assuming that such a machine is used for four years then 384 hours will be lost in productivity. If we divide this figure by seven then approximately fifty five days or eleven working weeks will be lost in time. The eleven working weeks will more or less depend upon the amount of facsimile machine transmission.
With the Physical Mailbox Facsimile Machine the correspondence is printed at the time of the transmission. The printed correspondence is then directed to the called person's physical mailbox. As a result of physical mailboxes there is no page reproduction time/productivity delay as mentioned above. Therefore this method saves each employee a considerable amount of working time, thus the concentration upon more important work related activities. Further, as a result of the Physical Mailbox Facsimile Machine freeing up the machine's printer both incoming and outgoing facsimile calls are possible.
SUBSTITUTE SHEET If the facsimile machine has no mailbox capacity whatsoever, the confidential and non confidential matter has to be reviewed by each employee which results in a time waste. In addition, in the case of transmitted confidential matter, this matter, in most cases, can no longer be considered as discreet. Hence, the Physical Mailbox Facsimile Machine is the quickest way for people sharing the facsimile machine to retrieve their confidential and non confidential material.
2 . The Physical Mailbox Facsimile Machine does not depend upon hard disk RAM storing the transmission
With the prior devices (the Mailbox Facsimile devices using hard disk RAM to store facsimile transmission). With these Mailbox Facsimile Machines a considerable amount of mass storage would have to be used for mailbox purposes if the prior Mailbox Facsimile Machines are considered against the Physical Mailbox Facsimile Machine, which proposes five physical mailbox containers supporting 500 sheets of A4 paper (collectively 2,500 A4 sheets).
The Physical Mailbox Facsimile Machine envisages a sixth physical mailbox. This mailbox would supplement the other five physical mailboxes. Hypothetically, if a mailbox contains five hundred sheets of paper, then the future printed matter for this mailbox will be switched to the supplementary mailbox. The called person's padlock command will allow access to the person's physical mailbox and in this case the supplementary physical mailbox.
With the Physical Mailbox Facsimile Machine hard disk RAM can be used for other important capabilities. Such capabilities include:
(1 ) in the case of ISDN, the support of two facsimile calls at once. Using this form the printer would respond to the first connected call, whilst the facsimile transmission of the second connected call is stored in memory. Upon completion of the first connected call the stored facsimile correspondence of the second connected call is sent to the machine's printer, before the printed matter is addressed to the called person's physical mailbox.
(2) if the facsimile transmission has to be directed to many locations known by the called person then this transmission could be stored in hard disk RAM. The caller command sequence, in the case of ISDN, would be: facsimile number, called person's physical mailbox: facsimile terminal type; and multi-location command. This command sequence would send the facsimile transmission to the called person's desired
SUBSTITUTE SHEET locations. In the case of the analogue network the called person's physical mailbox number and the facsimile terminal type number are contained in the called person's facsimile number.
(3) re-Call Direction. In the case of ISDN, by using the Call Direction system program, each terminal could be used to store the subscriber's other terminal(s) data, text, image or voice transmission if such terminal(s) are busy or if the other terminal(s) mass storage for storing transmissions is used up. In the case of the analogue network a facsimile machine can store another facsimile machine's transmission if the latter facsimile machine is busy or if the mass storage for storing transmissions is used up. The latter terminal is redialled periodically for the re-transmission of data.
3. Physical Mailbox indicators
The Physical Mailbox Facsimile Machine proposes the use of an indicator light (such as a red light) for each print mailbox. The purpose of each indicator light is to inform each mailbox holder whether their is any printed facsimile material in their given mailbox or not. Each print mailbox could also inform the mailbox holder of the amount of paper sheets deposited in the container. In the case of supplementary physical mailboxes the sheet of paper figure would start at sheet 501 and the mailbox holder's full physical mailbox would show the same paper sheet reading for accessing purposes. If the caller enters a general called person number the printed facsimile could be deposited in a general mailbox for indiscriminant review by the users.
Indicator lights and paper sheet readings facilitate immediate "hands on" of each mailbox holder's printed matter. Prior devices can do nothing to support immediate "hands on" of the printed matter.
In addition to the Physical Mailbox Facsimile Machine the application makes a specific provision for a Physical Mailbox Printer Machine.
THE ADVANTAGES THAT THE CALL DIRECTION PERSONAL COMPUTER HAS OVER THE PRIOR DEVICES
1. Call Direction Personal Computers
Provided there are a number of telephone jacks (extensions) within the household a telecommunications service subscriber could purchase a number of Call Direction Personal Computers to convert his domestic telecommunications system into an Exchange Area Network (XAN).
SUBSTITUTE SHEET Let's assume that there are four telephone jacks (extensions) within the Smith household. One telephone jack is in the: lounge room; Mr and Mrs Smith's bedroom; Junior Smith's bedroom; and Junior Junior Smith's bedroom. Let's also assume that there is a Call Direction Personal Computer in each bedroom.
Using this example, Mr and Mrs Smith's Personal Computer, Junior Smith's Personal Computer, Junior Junior Smith's Personal Computer or any other computer for that matter, can transmit data directly to and from each other by using the XAN. This allows data to be transmitted to/from a specific terminal or the number of terminals sharing the same telecommunications line(s), from within or outside the household.
Firstly, this allows Mr and Mrs Smith's Personal Computer to transmit data to and from Junior Smith's Personal Computer without such data reaching Junior Junior Smith's Personal Computer, even though they share the same telecommunications line(s). Secondly, this permits outside computers to transmit data to and from a specific computer terminal, such as, Mr and Mrs Smith's, or every computer terminal in the household, even though the Smith's share the same telecommunications line(s).
2. Dialling a Call Direction Personal Computer from an outside computer terminal using the XAN.
Assuming that a number of Call Direction Personal Computers are within the household or small business. Then a data caller from an outside computer terminal has the option of transmitting data: to and from a specific Call Direction Personal Computer sharing the same telecommunications line as other Call Direction Personal Computers: and to and from a number of Call Direction Personal Computers sharing the same telecommunication line as all the Call Direction Personal Computers (the latter is more applicable to ISDN). In the case of ISDN, the latter requires the telecommunications number, a general person code and the device type code. Such as, telecommunications number * 7 (all persons) * 3 (computer terminals).
As mentioned previously there are three versions of the Mailbox Answering Machine. Each version is based on the different methods of mailbox answering machine signalling within the different networks.
The Mailbox Answering Machine works in the following manner:
SUBSTITUTE SHEET NON DTMF SIGNALLING IN THE ANALOGUE NETWORK
MAILBOX ANSWERING MACHINE
PERSONALISED MESSAGE RECORDINGS AND PERSONALISED MESSAGE RETRIEVAL FROM A CALLING TELEPHONE.
1. The subscriber's line number is dialled and as a result the answering system places the call on-line and a recorded "user menu" message is activated. Such as, "The Smith's are unable to attend to telephone calls at the moment, please dial the appropriate digit: 1 for John; 2 for wife; 3 for child (a); 4 for child (b); 5 for the family". (Note: personal or secondary coded telephone numbers may be used instead).
2. If the caller selects a digit to dial from the audible menu and then dials the single digit code then the answering system's micro-processor calculates (decodes) the electrical representation of the dialled digit and a value is assigned to the "called person dialled digit" variable. For example if 1 is dialled the "called person dialled digit" variable value will equal 1.
3. If the called person's padlock command is dialled within a designated time. The answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 6.
4. If the caller does not dial a padlock command within a designated time. The program goes to step 5.
5. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for a "called person dialled digit" value match. The program goes to step 8. For example the program searches for a program value of 1 to match the "called person dialled digit" variable value 1.
6. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command's value match.
7. If a value match occurs for the "first called person padlock command" value then the program goes to step 3C; if a value match occurs for the "second called person padlock command" value then the program goes to step 3C; if a value match occurs for the "third called person padlock command" value then the program goes to step
SUBSTITUTE SHEET 3C; if a called person padlock command value match does not occur the program goes to the pre-start position.
8. If a value match does not occur for the dialled digit variable or if a digit is not dialled the "called person dialled digit" variable is assigned a valid "called person dialled digit" variable value and the program goes to step 9. For example, such a valid "called person dialled digit" variable value could be 1 or 5.
9. If a value match occurs for the "called person dialled digit" variable then the program goes to the "recording queue" variable array. If the caller is recording the first message then the first variable - which corresponds to the first memory location - is given the dialled digit's variable value, and so on, until the array is complete.
10. Then the memory location corresponding to or identified by the first "recording queue" variable is accessed by the recording/reading head, therefore, the electrical pulse pattern of the voice message is recorded.
1 1. The "message counter 1 " is incremented by 1: so that the next dialled digit variable value occupies the "recording queue" variable conesponding to the second memory location.
12. The "called person dialled digit" variable value is reset to 0.
13. The program proceeds to program pre-staπ position.
PERSONALISED MESSAGE RETRIEVAL FROM THE MAILBOX ANSWERING MACHINE UNIT ITSELF.
IC. If the called person's padlock command is dialled within a designated time. The answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 4.
2. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command's value match. If a value match occurs the program goes to step 3. If a value match does not occur the program goes to the message retrieval pre-start position.
3. If the "called person's padlock command" matches the value of the cunent variable in the "retrieval queue" array, then, in turn, the memory location corresponding to or identified by the current "retrieval queue" variable will be accessed by the recording/reading head, therefore, the electrical pulse pattern of this recorded message is read.
4. The "message counter 2" is incremented by 1: so that the program will proceed to the next variable in the "retrieval queue" array.
5. If "message counter 2" equals "message counter 1 " then the message retrieval has been completed. The program goes to step 7.
6. The program goes to step 3.
7. Personalised message retrieval is completed.
DTMF SIGNALLING IN THE ANALOGUE NETWORK
MAILBOX ANSWERING MACHINE
MAILBOX ANSWERING MACHINE/IDENTICALL TELEPHONE UNIT
IDENTICALL CALL DIRECTION TO THE MAILBOX ANSWERING MACHINE UNIT/IDENTICALL TELEPHONE AND THE OTHER IDENTICALL TELEPHONES SHARING THE SAME TELEPHONE LINE. PERSONALISED MESSAGE RECORDINGS; PERSONALISED MESSAGE RETRIEVAL; PERSONALISED RING TONE ON/OFF AND PERSONALISED MESSAGE OVER-RIDE TO THE MAILBOX ANSWERING MACHINE UNIT.
1. The personal or secondary coded telephone number of the subscriber is dialled. The answering machines micro-processor calculates (decodes) the electrical representation of the ringing signal and a value is assigned. For example if the main telephone number is dialled then the dialled value will equal 1.
2. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
3. If a value match occurs for the dialled digit variable then the program goes to step 16 (that is, if the Mailbox Answering Machine does not encompass an IdentiCall Telephone and if there are no other IdentiCall Telephones sharing the same telephone line).
SUBSTITUTE SHEET 4. If a value match occurs for the dialled digit variable then the program goes to step 5 (that is, if the Mailbox Answering Machine encompasses an IdentiCall Telephone and or if there are other IdentiCall Telephones sharing the same telephone line).
5. If the "called person dialled digit" variable value equals 1 then called person l's unit variable is accessed; if the "called person dialled digit" variable value equals 2 then called person 2's unit variable is accessed; if the "called person dialled digit" variable value equals 3 then called person 3's unit variable is accessed.
6. If the given "called person's unit" variable value equals 1 then the called person's ring pattern annunciates for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring pattern. Therefore the program goes to step 9. (Note: the called person's ring pattern annunciates on the other IdentiCall Telephones which have been designated (programmed) to annunciate the called person's ring pattern.)
7. If the given "called person's unit" variable value equals 2 then the program proceeds to the on-line type circuitry. The program goes to step 16.
8. If the given "called person's unit" variable value equals 3 then the called person's ring pattern annunciates for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring pattern. Therefore the program goes to step 9. (Note: the called person's ring pattern is allowed to annunciate on the other IdentiCall .Telephones which have been designated (programmed) to annunciate the called person's ring pattern.)
9. If the "called person dialled digit" variable value equals 1 then the program goes to step 10; If the "called person dialled digit" variable value equals 2 then the program goes to step 1 1; If the "called person dialled digit" variable value equals 3 then the program goes to step 12.
10. If the "First Call Direction" variable value equals 1 then the program goes to step 13; if the "First Call Direction" variable value equals 0 then the program goes to step 14.
1 1. If the "Second Call Direction" variable value equals 1 then the program goes to step 13; if the "Second Call Direction" variable value equals 0 then the program goes to step 14.
SUBSTITUTE SHEET 12. If the "Third Call Direction" variable value equals 1 then the program goes to step 13: if the "Third Call Direction" variaDle value equals 0 then the program goes to step 14.
13. The called person's ring pattern annunciates on the IdentiCall Telephone/Mailbox Answering Machine unit for a designated time: and if during this time this IdentiCall Telephone or another IdentiCall Telephone to which the call has been directed becomes off-hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit" variable value equals 3 then the "called person's unit" variable value is given the value 2 and the program goes to the pre-start position; and if this IdentiCall Telephone and the other IdentiCall Telephone(s) to which the call has been directed remain on-hook then if the "called person's unit" variable value equals 3 then the "called person's unit" variable is given the value 2 and the program goes to step 15.
14. The called person's ring pattern is not allowed to annunciate for a designated time on this IdentiCall Telephone/Mailbox Answering Machine unit. The called person's ring pattern is annunciated on the IdentiCall Telephone(s) to which the call has been directed for a designated time: and if during this time such a telephone becomes off- hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit" variable value equals 3 then the "called person's unit" variable value is given the value 2 and the program goes to the pre-start position; and if such telephones remain on-hook then if the "called person's unit" variable value equals 3 then the "called person's unit" variable is given the value 2 and the program goes to step 15.
15. Operation of IdentiCall and IdentiCall Call Direction is completed.
16. The program proceeds to the "announcement message" message location or step IB.
IB. If the "called person dialled digit" variable value equals 1 then the program goes to the "called person l's announcement message" memory location. The "called person l's announcement message" memory location conesponding to or identified by the called person's dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person l's recorded outgoing message is read. The program goes to step 4.
2. If the "called person dialled digit" variable value equals 2 then the program goes to the "called person 2's announcement message" memory location. The "called person 2's announcement message" memory location corresponding to or identified by the
SUBSTITUTE SHEET called person's dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person 2's recorded outgoing message is read. The program goes to step 5.
3. If the "called person dialled digit" variable value equals 3 then the program goes to the "called person 3's announcement message" memory location. The "called person 3's announcement message" memory location corresponding to or identified by the called person's dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person 3's recorded outgoing message is read. The program goes to step 6.
4. Such a "recorded announcement message" would be: "You have called Mr Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you". The program goes to step 7.
5. Such a "recorded announcement message" would be: "You have called Mrs Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you". The program goes to step 7.
6. Such a "recorded announcement message" would be: "You have called Junior Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you". The program goes to step 7.
7. If the caller dials 33 (Ring Tone On command) within a designated time the tone value of 33 is recorded in the "Ancillary Command" variable. The program goes to step 10.
8. If the caller dials 66 (Ring Tone Off command) within a designated time the tone value of 66 is recorded in the "Ancillary Command" variable. The program goes to step 10.
9. If the caller dials the "Called Person's Mailbox Over-Ride" command: 67 the tone value of 67 is recorded in the "Ancillary Command" variable and the program goes to step 15; 77 the tone value of 77 is recorded in the "Ancillary Command" variable and the program goes to step 16; 57 the tone value of 57 is recorded in the "Ancillary Command" variable and the program goes to step 17.
10. If the "called person's padlock command" is dialled within a designated time. The answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 12.
SUBSTITUTE SHEET 1 1. If the caller does not dial a padlock command or an ancillary command within a designated time. The program goes to step 21.
12. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command's value match.
13. If the "Ancillary Command" variable does not equal 0 and:
if a value match occurs for the "first called person padlock command" value then the program goes to step 15; if a value match occurs for the "second called person padlock command" value then the program goes to step 16; if a value match occurs for the "third called person padlock command" value then the program goes to step
17.
14. If the "Ancillary Command variable equals 0 and:
if a value match occurs for the "first called person padlock command" value then the program goes to step IOC; if a value match occurs for the "second called person padlock command" value then the program goes to step IOC; if a value match occurs for the "third called person padlock command" value then the program goes to step IOC.
15. If the "called person dialled digit" variable value equals 1 then the "first called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 24; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 24; the value 3 if the "Ancillary Command" variable value equals 67 then the program goes to step 18;
16. If the "called person dialled digit" variable value equals 2 then the "second called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 24; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 24; the value 3 if the "Ancillary Command" variable value equals 77 then the program goes to step 19;
17. If the "called person dialled digit" variable value equals 3 then the "third called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 24; the value 2 if the "Ancillary
SUBSTITUTE SHEET Command" variable value equals 66 then the program goes to step 24; the value 3 if the "Ancillary Command" variable value equals 57 then the program goes to step 20;
18. The memory location corresponding to or identified by (and containing) the first person's telephone number is accessed by the recording/reading head, therefore, the tone signals of the first called person's telephone number is read. The program goes to step 24.
19. The memory location corresponding to or identified by (and containing) the second person's telephone number is accessed by the recording/reading head, therefore, the tone signals of the second called person's telephone number is read. The program goes to step 24.
20. The memory location conesponding to or identified by (and containing) the third person's telephone number is accessed by the recording/reading head, therefore, the tone signals of the third called person's telephone number is read. The program goes to step 24.
21. The program is instructed to proceed to the "recording queue" variable array. If the caller is recording the first message then the first variable - which corresponds to the first memory location - is given the called person dialled digit variable value, and so on, until the array is complete.
22. Then the memory location conesponding to or identified by the first "recording queue" variable is accessed (gone to) by the recording/reading head, therefore, the electrical pulse pattern of the voice message is recorded.
23. The "message counter 1 " is incremented by 1 : so that the next "called person dialled digit" variable value occupies the "recording queue" variable conesponding to the
' second memory location. The program goes to step 25.
24. The "Ancillary Command" variable value is reset to 0.
25. The called person dialled digit variable value is reset to 0.
26. The program proceeds to the program pre-start position.
SUBSTITUTE SHEET PERSONALISED MESSAGE RETRIEVAL AND PERSONALISED RING TONE ON/OFF FROM THE MAILBOX ANSWERING MACHINE UNIT ITSELF.
1 C. If the "called person's padlock command" is dialled within a designated time. The answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 4.
2. If the called person dials 33 (Ring Tone On command) and the telephone is on-hook then the tone value of 33 is recorded in the "Ancillary Command" variable. The program goes to step 1.
3. If the called person dials 66 (Ring Tone Off command) and the telephone is on-hook then the tone value of 66 is recorded in the "Ancillary Command" variable. The program goes to step 1.
4. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the "called person's padlock command" value match.
5. If the "Ancillary Command" variable does not equal 0 and:
if a value match occurs for the "first called person padlock command" value then the program goes to step 7; if a value match occurs for the "second called person padlock command" value then the program goes to step 8; if a value match occurs for the "third called person padlock command" value then the program goes to step 9.
6. If the "Ancillary Command" variable equals 0 then the program goes to step 10.
7. The "first called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 14.
8. The "second called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 14.
9. The "third called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 14.
SUBSTITUTE SHEET 1,0. If the "called person's padlock command" variable value matches the value of the cunent variable in the "retrieval queue" anay, then, in turn, the memory location corresponding to or identified by the cunent "retrieval queue" variable will be accessed by the recording/reading head, therefore, the electrical pulse pattern of this recorded message is read.
11. The "message counter 2" is incremented by 1: so that the program will proceed to the next variable in the "retrieval queue" array.
12. If "message counter 2" equals "message counter 1 " then the message retrieval has been completed. The program goes to step 15.
13. The program goes to step 10.
14. The "Ancillary Command" variable value is reset to 0.
15. Personal message retrieval and ring tone tone on/off is completed.
DIGITAL NETWORK
MAILBOX ANSWERING MACHINE
MAILBOX ANSWERING MACHINE/IDENTICALL TELEPHONE UNIT
IDENTICALL CALL DIRECTION TO THE MAILBOX ANSWERING MACHINE UNIT/IDENTICALL TELEPHONE AND THE OTHER IDENTICALL TELEPHONES SHARING THE SAME TELEPHONE LINE. PERSONALISED MESSAGE RECORDINGS; PERSONALISED MESSAGE RETRIEVAL; PERSONALISED RING TONE ON/OFF AND PERSONALISED MESSAGE OVER-RIDE TO THE MAILBOX ANSWERING MACHINE UNIT.
1. The subscriber's line number is dialled, a delimiter is then entered for example * or #, followed by the called person's one or two digit number. The answering machines micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned. For example if 1 is dialled the dialled value will equal 1 .
2. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match.
SUBSTITUTE SHEET For example the program searches for a program value of 1 to match the dialled value of 1.
3. If a value match does not occur for the dialled digit variable or if a digit is not dialled the "called person dialled digit" variable is assigned a valid "called person dialled digit" variable value. For example, such a valid "called person dialled digit" variable value could be 1 or 5.
4. The program goes to step 31 (that is, if the Mailbox Answering Machine does not encompass an IdentiCall Telephone and if there are no other IdentiCall Telephones sharing the same telephone line).
5. The program goes to step 6 (that is, if the Mailbox Answering Machine encompasses an IdentiCall Telephone and/or if there are other IdentiCall Telephones sharing the same telephone line).
6. If the caller enters a delimiter, such as, * or #, followed by 33 (Ring Tone On command) within a designated time the tone value of 33 is recorded in the "Ancillary Command" variable. The program goes to step 9.
7. If the caller enters a delimiter, such as, * or #, followed by 66 (Ring Tone Off command) within a designated time the tone value of 66 is recorded in the "Ancillary Command" variable. The program goes to step 9.
8. If the caller enters a delimiter, such as, * or #, followed by the "Called Person's Mailbox Over-Ride" command: 67 the tone value of 67 is recorded in the "Ancillary Command" variable and the program goes to step 14; 77 the tone value of 77 is recorded in the "Ancillary Command" variable and the program goes to step 15; 57 the tone value of 57 is recorded in the "Ancillary Command" variable and the program goes to step 16.
9. If the "called person's padlock command" is dialled within a designated time. The answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 11.
10. If the caller does not dial a padlock command or an ancillary command within a designated time. The program goes to step 17.
.._ »_. __-">_, i i i'jTt, £__ Γ
SUBSTITUTE SHEET 1 1. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the "called person padlock command's" value match.
12. If the "Ancillary Command" variable does not equal 0 and:
if a value match occurs for the "first called person padlock command" value then the program goes to step 14; if a value match occurs for the "second called person padlock command" value then the program goes to step 15; if a value match occurs for the "third called person padlock command" value then the program goes to step 16.
13. If the "Ancillary Command variable equals 0 and:
if a value match occurs for the "first called person padlock command" value then the program goes to step 10C; if a value match occurs for the "second called person padlock command" value then the program goes to step 10C; if a value match occurs for the "third called person padlock command" value then the program goes to step IOC.
14. If the "called person dialled digit" variable value equals 1 then the "first called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 10B; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 10B; the value 3 if the "Ancillary Command" variable value equals 67 then the program goes to step 20.
15. If the "called person dialled digit" variable value equals 2 then the "second called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 10B: the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 10B: the value 3 if the "Ancillary Command" variable value equals 77 then the program goes to step 20.
16. If the "called person dialled digit" variable value equals 3 then the "third called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 10B; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 10B; the value 3 if the "Ancillary Command" variable value equals 57 then the program goes to step 20.
SUBSTITUTE SHEET Pa Λgee^ 50
17. If the "called person dialled digit" variable value equals 1 then called person l's unit variable is accessed: If the "called person dialled digit" variable value equals 2 then called person 2's unit variable is accessed; If the "called person dialled digit" variable value equals 3 then called person 3's unit variable is accessed.
18. If the given "called person's unit" variable value equals 1 then the called person's ring tone will annunciate for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring tone. Therefore the program goes to step 21. (Note: the called person's ring tone will annunciate on the other IdentiCall Telephones which have been designated (programmed) to annunciate the called person's ring tone.)
19. If the given "called person's unit" variable value equals 2 then the program proceeds to the on-line type circuitry. The program goes to step 31.
20. If the given "called person's unit" variable value equals 3 then the called person's ring tone will annunciate for a designated time if the Mailbox Answering Machine encompassing an IdentiCall Telephone is programmed to annunciate this called person's ring tone. Therefore the program goes to step 21. (Note: the called person's ring tone will annunciate on the other IdentiCall Telephones which have been designated (programmed) to annunciate the called person's ring tone.)
21. If the "called person dialled digit" variable value equals 1 then the program goes to step 22; If the "called person dialled digit" variable value equals 2 then the program goes to step 23; If the "called person dialled digit" variable value equals 3 then the program goes to step 24.
22. If the "First Call Direction" variable value equals 1 then the program goes to step 25; if the "First Call Direction" variable value equals 0 then the program goes to step 29.
23. If the "Second Call Direction" variable value equals 1 then the program goes to step 26; if the "Second Call Direction" variable value equals 0 then the program goes to step 29.
24. If the "Third Call Direction" variable value equals 1 then the program goes to step 27; if the "Third Call Direction" variable value equals 0 then the program goes to step 29.
25. The memory location conesponding to or identified by (and containing) the first person's ring tone is accessed by the recording/reading head, therefore, the tone
SUBSTITUTE SHEET signals of the first called person's telephone number is read. The program goes to step 28.
26. The memory location conesponding to or identified by (and containing) the second person's ring tone is accessed by the recording/reading head, therefore, the tone signals of the second called person's telephone number is read. The program goes to step 28.
27. The memory location conesponding to or identified by (and containing) the third person's ring tone is accessed by the recording/reading head, therefore, the tone signals of the third called person's telephone number is read. The program goes to step 28.
28. The called person's ring tone is allowed to annunciate on the IdentiCall Telephone/Mailbox Answering Machine unit for a designated time: and if during this time this IdentiCall Telephone or another IdentiCall Telephone to which the call has been directed becomes off-hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit" variable value equals 3 then the "called person's unit" variable value is given the value 2 and the program goes to the pre- start position; and if this IdentiCall Telephone and the other IdentiCall Telephone(s) to which the call has been directed remain on-hook then if the "called person's unit" variable value equals 3 then the "called person's unit" variable is given the value 2 and the program goes to step 30.
29. The called person's ring tone is not allowed to annunciate for a designated time on this IdentiCall Telephone/Mailbox Answering Machine unit. The called person's ring tone is annunciated on the IdentiCall Telephone(s) to which the call has been directed for a designated time: and if during this time such a telephone becomes off-hook then the "called person dialled digit" variable value is reset to 0 and if the "called person's unit" variable value equals 3 then the "called person's unit" variable value is given the value 2 and the program goes to the pre-start position; and if such telephones remain on-hook then if the "called person's unit" variable value equals 3 then the "called person's unit" variable is given the value 2 and the program goes to step 30.
30. Operation of IdentiCall and IdentiCall Call Direction is completed.
31. The program proceeds to the "announcement message" memory location or step IB.
IB. If the "called person dialled digit" variable value equals 1 then the program goes to the "called person l's announcement message" memory location. The "called person
SUBSTITUTE SHEET l's announcement message" memory location conesponding to or identified by the called person dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person l's recorded outgoing message is read. The program goes to step 4.
2. If the "called person dialled digit" variable value equals 2 then the program goes to the "called person 2's announcement message" memory location. The "called person 2's announcement message" memory location corresponding to or identified by the called person dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person 2's recorded outgoing message is read. The program goes to step 5.
3. If the "called person dialled digit" variable value equals 3 then the program goes to the "called person 3's announcement message" memory location. The "called person 3's announcement message" memory location conesponding to or identified by the called person dialled digit is accessed by the recording/reading head, therefore, the electrical pulse pattern of called person 3's recorded outgoing message is read. The program goes to step 6.
4. Such a "recorded announcement message" would be: "You have called Mr Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you". The program goes to step 7.
5. Such a "recorded announcement message" would be: "You have called Mrs Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you". The program goes to step 7.
6. Such a "recorded announcement message" would be: "You have called Junior Smith please leave your name, number and message after the beep, so you can be contacted as soon as possible, thank you". The program goes to step 7.
7. The program is instructed to proceed to the "recording queue" variable array. If the caller is recording the first message then the first variable - which conesponds to the first memory location - is given the "called person dialled digit" variable value, and so on, until the anay is complete.
8. Then the memory location conesponding to or identified by the first "recording queue" variable is accessed by the recording/reading head, therefore, the electrical pulse pattern of the voice message is recorded.
SUBSTITUTE SHEET 9. The "message counter 1 " is incremented by 1 : so that the next "called person dialled digit" variable value occupies the "recording queue" variable conesponding to the second memory location.
10. The "Ancillary Command" variable value is reset to 0.
11. The called person dialled digit variable value is reset to 0.
12. The program proceeds to the program pre-start position.
PERSONALISED MESSAGE RETRIEVAL AND PERSONALISED RING TONE ON/OFF FROM THE MAILBOX ANSWERING MACHINE UNIT ITSELF.
IC. If the "called person's padlock command" is dialled within a designated time. The answering system's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned. The program goes to step 4.
2. If the called person enters a delimiter, such as, * or #, followed by 33 (Ring Tone On command) and the telephone is on-hook then the tone value of 33 is recorded in the "Ancillary Command" variable. The program goes to step 1.
3. If the called person enters a delimiter, such as, * or #, followed by 66 (Ring Tone Off command) and the telephone is on-hook then the tone value of 66 is recorded in the "Ancillary Command" variable. The program goes to step 1.
4. The answering system's program compares the varying input expression against the constant expressions programmed into memory searching for the "called person padlock command's" value match.
5. If the "Ancillary Command" variable does not equal 0 and:
if a value match occurs for the "first called person padlock command" value then the program goes to step 7; if a value match occurs for the "second called person padlock command" value then the program goes to step 8; if a value match occurs for the "third called person padlock command" value then the program goes to step 9.
6. If the "Ancillary Command variable equals 0 then the program goes to step 10.
7. The first "called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 14.
SUBSTITUTE SHEET 8. The second "called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 14; the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 14.
9. The third "called person's unit" variable value is given: the value 1 if the "Ancillary Command" variable equals 33 then the program goes to step 14: the value 2 if the "Ancillary Command" variable value equals 66 then the program goes to step 14.
10. If the "called person's padlock command" matches the value of the current variable in the "retrieval queue" anay, then, in turn, the memory location conesponding to or identified by the cwrent "retrieval queue" variable will be accessed by the recording/reading head, therefore, the electrical pulse pattern of this recorded message is read.
1 1. The "message counter 2" is incremented by 1 : so that the program will proceed to the next variable in the "retrieval queue" array.
12. If "message counter 2" equals "message counter 1" then the message retrieval has been completed. The program goes to step 15.
13. The program goes to step 10.
14. The "Ancillary Command" variable value is reset to 0.
15. The subprogram is finished.
PROGRAMMING IDENTICALL AND IDENTICALL CALL DIRECTION - ANALOGUE NETWORK
- MAILBOX ANSWERING MACHINE IDENTICALL TELEPHONE
- IDENTICALL TELEPHONE
1. The "programming command" is dialled. The Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the command and a value is assigned.
2. The Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
SUBSTITUTE SHEET 3. If a value match occurs for the "programming command" dialled digit(s) variable then the program is ready to accept a Call Direction command.
4. The micro-processor calculates (decodes) the electrical representation of the Call Direction command and a value is assigned. For example if 1 is dialled the dialled value will equal 1.
5. The program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
6. If the "Call Direction dialled digit" variable value equals 1 then the program goes to step 7: if the "Call Direction dialled digit" variable value equals 2 then the program goes to 8; if the "Call Direction dialled digit" variable value equals 3 then the program goes to step 9. If the "Call Direction dialled digit" equals another value the program goes to the pre-start position.
7. The "First Call Direction" variable value is given the value 1.
8. The "Second Call Direction" variable value is given the value 1.
9. The "Third Call Direction" variable value is given the value 1.
10. Programming is completed.
PROGRAMMING IDENTICALL DELETION AND IDENTICALL CALL DIRECTION DELETION - ANALOGUE NETWORK
- MAILBOX ANSWERING MACHINE/IDENTICALL TELEPHONE
- IDENTICALL TELEPHONE
1. The "programming command" is dialled. The IdentiCall Telephone's micro¬ processor calculates (decodes) the electrical representation of the command and a value is assigned.
2. The IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
SUBSTITUTE SHEET 3. If a value match occurs for the dialled digit(s) variable then the program is ready to accept the "Call Direction Deletion" command.
4. The IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the "Call Direction Deletion" command and a value is assigned. For example if 99 is dialled the dialled value will equal 99.
5. The IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 99 to match the dialled value of 99.
6. If a value match does not occur for the "Call Direction Deletion" dialled digit variable then the program goes to the pre-start position.
7. If a value match occurs for the "Call Direction Deletion" dialled digit variable then the "First Call Direction", "Second Call Direction" and the "Third Call Direction" variables are assigned the value 0.
8. Call Direction Deletion programming is completed.
OPERATION OF IDENTICALL AND THE IDENTICALL CALL DIRECTION SERVICE - ANALOGUE NETWORK
- IDENTICALL TELEPHONE
1. The personal or secondary coded telephone number of the subscriber is dialled. The IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the ringing signal and a value is assigned.
2. The program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
3. If the "called person dialled digit" variable value equals 1 then the program goes to step 4; If the "called person dialled digit" variable value equals 1 then the program goes to step 5; If the "called person dialled digit" variable value equals 1 then the program goes to step 6..
SUBSTITUTE SHEET 4. If the "First Call Direction" variable value equals 1 then the program goes to step 7: if the "First Call Direction" variable value equals 0 then the program goes to step 8.
5. If the "Second Call Direction" variable value equals 1 then the program goes to step 7; if the "Second Call Direction" variable value equals 0 then the program goes to step 8.
6. If the "Third Call Direction" variable value equals 1 then the program goes to step 7; if the "Third Call Direction" variable value equals 0 then the program goes to step 8.
7. The called person's ring pattern is allowed to annunciate for a designated time. The program goes to the pre-start position.
8. The called person's ring pattern is not allowed to annunciate for a designated time. The program goes to the pre-start position.
9. Operation of IdentiCall and IdentiCall Call Direction is completed.
PROGRAMMING IDENTICALL AND IDENTICALL CALL DIRECTION - DIGITAL NETWORK
- MAILBOX ANSWERING MACHINE/IDENTICALL TELEPHONE
- IDENTICALL TELEPHONE
1. The programming command is dialled. The Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the command and a value is assigned.
2. The Mailbox Answering Machine/IdentiCall Telephone or the IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
3. If a value match occurs for the programming command dialled digit(s) variable then the program is ready to accept a "Call Direction" command.
4. A delimiter is entered, for example, * or #, followed by the called person's one or two digit number. The micro-processor calculates (decodes) the electrical representation of the "Call Direction" command and a value is assigned. For example if 1 is dialled the dialled value witi-equaLl
SUBSTITUTE SHEET 5. The program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
6. If the "Call Direction" dialled digit variable value equals 1 then the program goes to step 7; if the "Call Direction" dialled digit value equals 2 then the program goes to 8; if the "Call Direction dialled digit" value equals 3 then the program goes to step 9. If the "Call Direction" dialled digit variable equals another value the program goes to the pre-start position.
7. The "First Call Direction" variable value is given the value 1.
8. The "Second Call Direction" variable value is given the value 1.
9. The "Third Call Direction" variable value is given the value 1.
10. Programming is completed.
PROGRAMMING IDENTICALL DELETION AND IDENTICALL CALL DIRECTION DELETION - DIGITAL NETWORK
- MAILBOX ANSWERING MACHINE/IDENTICALL TELEPHONE
- IDENTICALL TELEPHONE
1. The "programming command" is dialled. The IdentiCall Telephone's micro¬ processor calculates (decodes) the electrical representation of the command and a value is assigned.
2. The IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value to match the dialled value.
3. If a value match occurs for the dialled digit(s) variable then the program is ready to accept the "Call Direction Deletion" command.
4. A delimiter is entered, for example, * or #, followed by the one or two digit number. The micro-processor calculates (decodes) the electrical representation of the "Call Direction Deletion" command and a value is assigned. For example if 99 is dialled the dialled value will equal 99.
SUBSTITUTE SHEET 5. The IdentiCall Telephone's program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 99 to match the dialled value of 99.
6. If a value match does not occur for the "Call Direction Deletion" dialled digit variable then the program goes to the pre-start position.
7. If a value match occurs for the "Call Direction Deletion" dialled digit variable then the "First Call Direction", "Second Call Direction" and the "Third Call Direction" variables are assigned the value 0.
8. Call Direction Deletion programming is completed.
OPERATION OF IDENTICALL AND THE IDENTICALL CALL DIRECTION SERVICE - DIGITAL NETWORK
IDENTICALL TELEPHONE
1. The subscriber's telephone line number is dialled, a delimiter is then entered, for example, * or #, followed by the called person's one or two digit number. The IdentiCall Telephone's micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned.
2. The program compares the varying input expression against the constant expressions programmed into memory searching for a digit value match. For example the program searches for a program value of 1 to match the dialled value of 1.
3. If the "called person dialled digit" variable value equals 1 then the program goes to step 4; If the "called person dialled digit" variable value equals 2 then the program goes to step 5; If the "called person dialled digit" variable value equals 3 then the program goes to step 6.
4. If the "First Call Direction" variable value equals 1 then the program goes to step 7; if the "First Call Direction" variable value equals 0 then the program goes to step 10.
5. If the "Second Call Direction" variable value equals 1 then the program goes to step 8; if the "Second Call Direction" variable value equals 0 then the program goes to step 10.
SUBSTITUTE SHEET 6. If the "Third Call Direction" variable value equals 1 then the program goes to step 9; if the "Third Call Direction" variable value equals 0 then the program goes to step 10.
7. The "First Ring Tone" memory location conesponding to or identified by the "First Call Direction" variable is accessed by the recording/reading head, therefore, the electrical pulse pattern of the first ringing signal is read. The program goes to step 11.
8. The "Second Ring Tone" memory location conesponding to or identified by the "Second Call Direction" variable is accessed by the recording/reading head, therefore, the electrical pulse pattern of the second ringing signal is read. The program goes to step 11.
9. The "Third Ring Tone" memory location conesponding to or identified by the "Third Call Direction" variable is accessed by the recording/reading head, therefore, the electrical pulse pattern of the third ringing signal is read. The program goes to step 11.
10. The called person's ring tone is not allowed to annunciate for a designated time. The program goes to the pre-start position.
11. Operation of IdentiCall and IdentiCall Call Direction is completed.
The Physical Mailbox Facsimile Machine works in the following manner:
PHYSICAL MAILBOX FACSIMILE MACHINE
THE DIRECTION OF FACSIMILE CORRESPONDENCE TO A PERSONALISED FACSIMILE CORRESPONDENCE MAILBOX FROM A CALLING FACSIMILE MACHINE-
ANALOGUE NETWORK
1. The subscriber's facsimile number is dialled and if the called facsimile machine is not busy, the facsimile machine places the call on-line.
2. If the caller dials the called person's facsimile machine mailbox code then the facsimile machine's micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned to the "called person dialled digit(s)"
SUBSTITUTE SHEET variable. For example if 1 is dialled the "called person dialled digit(s)" variable value will equal 1. The program goes to step 3.
DIGITAL NETWORK
1. The subscriber's line number is dialled, a delimiter is then entered for example, * or #, followed by the called person's facsimile machine mailbox code. The facsimile machine's micro-processor calculates (decodes) the electrical representation of the dialled digit(s) and a value is assigned to the "called person dialled digit(s)" variable. For example if 1 is dialled the "called person dialled digit" variable value will equal 1. The program goes to step 3.
3. The facsimile machine's program compares the varying input expression against the constant expressions programmed into memory searching for a "called person dialled digit(s)" value match. For example the program searches for a program value of 1 to match the "called person dialled digit" variable value 1.
4. If a value match does not occur for the "called person dialled digit(s)" variable or if a digit is not dialled within a designated time then the "called person dialled digit(s)" variable is assigned a valid "called person dialled digit(s)" variable value. For example, such a valid "called person dialled digit(s)" variable value could be 1 or 5.
5. If a value match occurs for the "called person dialled digit(s)" variable then the facsimile conespondence is mechanically directed (sent) to the physical machine location conesponding to or identified by the "called person dialled digit" variable value.
6. The "called person dialled digit(s)" variable value is reset to 0.
7. The direction of facsimile conespondence to a personalised facsimile conespondence physical mailbox is completed.
8. The program proceeds to the pre-start position of the program.
THE ACCESSING OF A PERSONAL FACSIMILE CORRESPONDENCE MAILBOX BY ENTERING A PERSONAL PADLOCK COMMAND
IC. If the called person's padlock command is dialled. The facsimile machine's microprocessor calculates (decodes) the electrical representation of the dialled digits and a value is assigned.
SUBSTITUTE SHEET 2. The facsimile machine's program compares the varying input expression against the constant expressions programmed into memory searching for the called person padlock command's value match. If a value match occurs the program goes to step 3. If a value match does not occur the program goes to the facsimile conespondence retrieval pre-start position.
3. If a value match occurs for the "first called person padlock command" then the program goes to step 4. If a value match occurs for the "second called person padlock command" then the program goes to step 5. If a value match occurs for the "third called person padlock command" then the program goes to step 6.
4. If the "first called person's facsimile mailbox lock" variable value equals 1 then the "first called person's facsimile mailbox lock" variable value is assigned the value 0. If the "first called person's facsimile mailbox lock" variable value equals 0 then the "first called person's facsimile mailbox lock" variable value is assigned the value 1. The program goes to step 7.
5. If the "second called person's facsimile mailbox lock" variable value equals 1 then the "second called person's facsimile mailbox lock" variable value is assigned the value 0. If the "second called person's facsimile mailbox lock" variable value equals 0 then the "second called person's facsimile mailbox lock" variable value is assigned the value 1. The program goes to step 8.
6. If the "third called person's facsimile mailbox lock" variable value equals 1 then the "third called person's facsimile mailbox lock" variable value is assigned the value 0. If the "third called person's facsimile mailbox lock" variable value equals 0 then the "third called person's facsimile mailbox lock" variable value is assigned the value 1. The program goes to step 9.
7. If the "first called person's facsimile mailbox lock" variable value equals 1 then the program goes to step 10. If the "first called person's facsimile mailbox lock" variable value equals 0 then the program goes to step 11.
8. If the "second called person's facsimile mailbox lock" variable value equals 1 then the program goes to step 10. If the "second called person's facsimile mailbox lock" variable value equals 0 then the program goes to step 11.
SUBSTITUTE SHEET 9. If the "third called person's facsimile mailbox lock" variable value equals 1 then the program goes to step 10. If the "third called person's facsimile mailbox lock" variable value equals 0 then the program goes to step 1 1.
10. If the "called person's facsimile mailbox lock" variable value equals 1 then the locking mechanism conesponding to the machine location which conesponds to or is identified by the "called person padlock command" is unlocked, therefore access is allowed to this called person's facsimile conespondence mailbox.
1 1. If the "called person's facsimile mailbox lock" variable value equals 0 then the locking mechanism conesponding to the machine location which conesponds to or is identified by the "called person padlock command" is locked, therefore access is prevented to this called person's facsimile conespondence mailbox.
12. Locking and unlocking a personal facsimile conespondence mailbox is completed.
13. The program goes to the pre-start position.
Mailbox Answering Machine padlock security is an issue of importance because the padlock in itself is expected to provide mailbox security. There are various forms of additional padlock security available, some being:
DIGITAL NETWORK
1 . If three wrong padlock numbers are dialled - then the machine prevents outside calling or padlock command access. Until this security function is reset.
2. Hard disk, solid state or a print-out of wrong padlock command entries. The padlock command entries could be time/dated.
3. An outgoing message warning capability, such as, "Your telephone number has been recorded in an attempt to access a padlock". In addition, this number could be prevented from attempting to access a padlock again.
4. A record of the calling telephone numbers which have successfully accessed a given padlock.
5. A record of suspicious calling telephone numbers which have successfully accessed a given padlock.
6. The designation of the calling telephone numbers which can access a given padlock.
SUBSTITUTE SHEET ANALOGUE NETWORK - DTMF SIGNALLING
1. If three wrong padlock numbers are dialled - then the machine prevents outside calling or padlock command access. Until this security function is reset.
2. If two wrong padlock numbers are dialled - then the machine dials the local exchange to inform the exchange of the third padlock attempt. This gives the network the opportunity to prepare for a calling telephone number record, which can be time/dated.
>JALOGUE NETWORK - DECADIC SIGNALLING
1. Extensive (lengthy) padlock commands.
2. If three wrong padlock numbers are dialled - then the machine prevents outside calling or padlock command access. Until this security function is reset.
3. Regular padlock changes if a security function reset is required often.
It will thus be appreciated that the present invention at least in the forms described provide a novel and useful improvement to the existing analogue and digital network and devices. Clearly however a wide variety of other implementing circuits and hardware could be used which would be apparent to a man skilled in the an.
MAILBOX ANSWERING MACHINE
BACKGROUND OF THE INVENTION.
The present invention relates to a specialised telephone answering systems or the like.
There are two principal aspects of the telephone answering service which must be considered when designing suitable equipment. First - when the called subscriber is not present at the location of the telephone set or when he is unable to answer an incoming call - such an incoming call will normally be lost. Loss of a call, which otherwise was properly set up through the Public Switched Telephone Network (PSTN), is a waste of resources, waste of the calling party time and there may be significant repercussions if relevant message is not passed on to the called subscriber. To alleviate such situation many different designs of the so called "Telephone Answering Machines" (TAM) have been produced and are available on the market. Normally TAM equipment can terminate the ringing signal,
SUBSTITUTE SHEET provides pre-recorded announcement to the calling pany and then allows a message to be recorded for later retrieval by the called subscriber.
Secondly - it is a standard feature of the presently available TAM equipment that all incoming messages are recorded together on the recording medium (magnetic tape, magnetic disks, RAM memory, etc.) in order of arrival, but without any differentiation as to the person(s) to whom the specific message(s) was directed. As a result, one has to play-back all messages regardless whom they are designated to. This last aspect is becoming a burden when more than one person is using the same telephone set.
In addition, it will be apparent to anybody skilled in the an, that the present design of the TAM equipment can operate only in the analogue telephone environment, i.e. it can not be used in conjunction with a fully digital telephone set, connected to a digital telephone line, serviced by a fully digital electronic exchange, and in particular in the ISDN environment.
PRESENT STATE OF THE ART.
May different designs have been implemented and are marketed world wide. Practically all of them have several design features common and they are suited for operation in an analogue environment only. Many of these designs are covered by specific patents like e.g. US 4,591,664 by M. Freeman, US 4,747,126 By W.G. Hood et al, US 4,809,321 by S.J. Morganstein, etc. All of these designs provide pre-recorded message upon termination of a ring signal and they record the messages from he calling pany. The incoming messages are recorded in some form of a mass-storage device like e.g. magnetic tape, magnetic disks, or electronic memory devices. Some of these equipments are specifically designed to inter-work with the PABX systems in which case they can provide certain degree of "personalised" service by directing or re-directing calls and/or messages to a designated extension, thus to the pre-determined persons. None of the above mentioned designs is capable of operating while connected to a digital line and a digital phone.
One design, cunently available on the market, stands aside from all the above-mentioned equipment because it goes well beyond an ordinary answering machine functions. The design in question is marketed under the registered trade name of ASPEN, designed by Octel Communications Corporation in California. The Aspen system provides not only recorded announcements by also has provision for individual storage areas (boxes). The Aspen system has, however, two significant limitations: 1. it is rather expensive and thus totally uneconomical to service 204 users only, and 2. in it present design form it can operate only on analogue telephone lines. In practice, therefore, it is most commonly used
SUBSTITUTE SHEET to serve numerous extensions of a P BX to which the Aspen system is connected by analogue tie lines.
TECHNICAL FIELD
The present invention relates to a telephone answering mailbox apparatus and in particular to such an apparatus which is capable of being used by individual subscribers in an economical manner, providing not only pre-recorded answering messages but also providing caller selectable mailboxes where messages for specific person may be deposited and allowing these messages to be retrieved by person concerned. The concept is adapted for use on both analogue and digital telephone lines.
SUMMARY OF THE PRESENT INVENTION.
It is an object of the present invention to provide an improved answering machine system, in conjunction with a mailbox service for individual telephone user.
It is also an object of the present invention to provide better, more versatile, answering machine service and at the same time to allow the calling party to address his/her message to an individual recipient (specific mailbox).
It is another object of the present invention to provide telephone user with clear indication if any messages have been received and to whom are they addressed.
It is still another object of the present invention to allow each telephone user to address and recover messages left for them only.
It is a further object of the present invention to provide an option of equipping a single telephone line with 2-3 telephone sets which may ring selectively depending upon which user was selected by the calling party. The ringing function of an individual phone may be switched ON or OFF by the respective users at their discretion.
It is yet another object of the present invention to use similar concept of the answering machine - mailbox operation and adapt it to digital line and switching operation.
The foregoing and additional objects, feat s and advantage of the present invention will be more readily apparent from the following detailed description of the preferced embodiment thereof and of its sequence of operation.
SUBSTITUTE SHEET ■ Page 67
DESCRIPTION OF THE PREFERRED EMBODIMENT FOR ANALOGUE ENVIRONMENT.
The following description relates to the analogue operating environment of the telephone Mailbox Answering Machine, i.e. to such parts of the telephone network and thus telephone exchanges which transmit analogue speech signals along the subscriber connecting line (subscriber loop) and which transmit ringing bunent to the called subscriber (approximately 80Vπτιs °f AC current). In these systems the telephone line, while in an idle state, has +/- 50V DC connected to the loop wires with the positive end of the supply battery grounded at the telephone exchange, 80Vrms is transmitted along the line to the called subscriber's telephone set to operate the bell during ringing period, the telephone line must be loped at the called subscriber telephone set in order to terminate the ring and while in the conversation condition a DC cunent must continue to flow through the subscriber telephone line in order that the telephone exchange will recognize this state as a continued connection and to energize the telephone instrument installed at subscribers' premises. Neither wire in the subscriber's loop may be grounded at the called subscriber's telephone set at any time.
Figure 7 shows the block diagram of the Mailbox Answering Machine in the prefened embodiment of the present invention designed for an analogue environment. The operation of the system follows the sequence of actions as described below. When the telephone line 10 is seized at the telephone exchange to which called subscribed is connected ringing cunently is sent along the line to operate ringing device in the telephone sets connected to the line. In the present embodiment telephone sets 14A, 14B and 14C are not connected to the line directly but through the switch 13 and Line Condition Detector 14. For the Mailbox Answering Machine to operate conectly either ordinary ring patter or a special ring pattern will be sent from the telephone exchange. The actual pattern of ringing signal is recognized by special circuit, Ringing Pattern Detector 1 l,a and upon recognition what pattern of ringing is being received suitable signal is sent from Ringing Pattern Detector 11 to the Logic circuit 20. Upon receipt of this signal Logic 20 communicates with the microprocessor 30 to produce suitable commands to operate switch 13 in such a way that effectively a suitable telephone set out of, say, three sets connected to the system will be connected directly the line to receive ringing signal. Lets assume that the ringing pattern received indicated that telephone 14A is to be engaged int he present connection. Microprocessor 30 will generate a command, will transmit it to the Logic circuit 20 which in turn will convert the command into electrical signal suitable to operate switch 13 and to connect telephone set 14A directly to the line. Just prior to issuing the command the
SUBSTITUTE SHEET condition of the termination of recording. When disconnection of the calling subscriber is detected or when allowed time has lapsed Micro-processor 30 will issue commands which will stop recording process, will remove loop condition applied previously to the telephone line and will restore the switch 13 to the idle condition. Idle condition for switch 13 may be default connection to any nominated telephone set as a "Master". Simultaneously two other activities will take place: first - signal previously displayed on he LCD display will be removed leaving only the LED indicator in the ON condition to signal users that there was a message recorded, and second - suitable entry concerning recorded message will be written into the RAM memory 32. Such entry may contain information like: sequential number of the message, time message arrived and duration of the message. In this state the Mailbox Answering Machine is ready to receive another call.
When any of the telephone station users wishes to retrieve his/her messages the person concerned lifts the handset of the telephone sets assigned to this person and presses one of the special buttons provided on each DTMF equipped phones, like e.g. * or #. This signal, even if received by the telephone exchange, will cause no action other than the removal of the Dial Tone (DT) from the telephone line. The telephone line will be returned back to normal operation to and from public network when telephone exchange will recognize that the handset in use has b en replaced and thus loop condition has been removed from the line. However, the DTMF receiver 12 provided the Mailbox Answering Machine upon receipt of one of these digits will recognize it as a special features access code. To recover personal messages the user concerned will following the * or # signal by one or two digits of feature access code (like e.g. 1, 2 or 3) to indicate which messages are to be retrieved.
Upon receipt of the signalling digit the DTMF detector 12 passes suitable information via
Logic 20 to microprocessor 30 which will act on this information by initiating selection from the mass Storage device 36 of the suitable messages, reading them back through the
Read/Write Logic 35 and passing to CODEC device 22 for decoding of speech signal. The original speech signal recovered from the recording in the mass Storage will then be transmitted diva the I/P switch 21 to the line 10 and through the Switch 13 to the telephone set A. B or C, as required. When the last message has been found and played back
Microprocessor 30 will initiate action in the result of which units such as Mass Storage 26,
Rad/Write Logic 35, Codec 22, I/P Switch 21, Switch 13 and Line Condition Detector 14 will all return back to normal state and be ready to receive either the next call or new instructions from the users.
The Mailbox Answering machine allows the user to record the pre-recorded message to be used as an announcement for incoming calls which have not been answered in the prescribed time. To record the message for use as an announcement the user will lift the
SUBSTITUTE SHEET handset from his/her telephone set and upon receipt of the Dial Tone from the telephone exchange will press special features access digital like e.g. * or #. Upon receipt of one of these digits telephone exchange will remove the Dial Tone while the DTMF detector 12 will pass suitable information to the Microprocessor 30. Microprocessor 30 will then issue commands to the I/P Switch 21, CODEC device 22, Read/Write Logical 35 and to the mass Storage Device 26 to set all the units into the recording mode of operation. When recording will be completed and handset replaced microprocessor 30 will recognize it and will cause all units involved in recording of the message tor return to their normal states.
An additional function of the Mailbox Answering Machine is selective disconnection of ringing from users' telephone sets, which except of Master Station which must provide ringing at all times. To de-activate ringing g function the telephone user, say e.g. user of the telephone set B ( 14B) lifts the handset and dials first the signalling digit * or # followed by a code digit the meaning of which is to cancel ringing on incoming calls. The DTMF detector upon receipt of the first signalling digit * or # passes the signal to microprocessor 30 via Logic circuit 20. At the same time telephone exchange removes Dial Tone from the line. Microprocessor 30 waits for the code digit which is to follow. If the code digit sent by the subscriber B indicates that the wishes to cancel ringing signal on incoming calls to his phone the microprocessor then records this information in the RAM memory 32 and when the next incoming call to subscriber B will be received the line will n to be extended to the telephone set 14B but it will be only monitored by the microprocessor 30 and Ringing Pattern Detector 1 1 and the Master station phone will ring. If ringing from the telephone exchange continues it will be timed out by the microprocessor action, ringing will be tripped by microprocessor 30 acting together with the ring termination element being part of the I/P Switch 13 and the pre-recorded message will be transmitted to the calling subscribe in the manner previously described. This may be followed by recording of incoming message, disconnection etc. If, however, subscriber B will decide to answer the call upon hearing the master Station ringing he will lift the handset of telephone B (14B), this will be detected by the Line Condition Detection 14 which will signal Microprocessor 30. This will result in microprocessor 30 generating suitable commands to I/P Switch 21 and to Switch 13 to connect telephone 14B directly to the line, and normal conversation may commence.
In addition to functional units described above two more devices are installed as integral part of the Mailbox Answering Machine: Power Supply Unit (PSU) 50 and Clock 40. The PSU unit is a standard unit supplied from the AC mains and delivering at this output all voltages required by logica, microprocessor, etc. The Clock 40 is basically a pulse
SUBSTITUTE SHEET generator providing continuous train of pulses of specific frequency, required by many functional units in the system, like e.g. microprocessor 30, etc.
The Mailbox Answering Machine system includes also a message waiting indicator which may be installed in the individual telephone sets comprising e.g. a single light emitting diode LED installed in the housing of the telephone et. Operation of these indicators will be controlled by the microprocessor via the Line Condition Detector unit 14. Each indicator will require two wires installed between the telephone set and the Line Condition Detector 14 to operate, electrical signals applied to those wires being controlled by the Microprocessor 30.
Microprocessor 30 is programmed to send a visual indication to the individual subscriber when there is any message waiting to be retrieved. The visual indication is provided by the single LED indicator mounted in the user telephone set. This indicator may be in the OFF state when Mailbox Answering Machine is in the stand-by condition, it may be blinking slowly to indicate that there is a message waiting and that the mailbox Answering Machine is available, and it may be blinking at a fast rate to indicate that there is a message waiting but the mailbox Answering Machine is busy. The same light while continuously ON may indicate that there are no messages waiting but the mailbox Answering machine is cunently busy, being occupied by another user. Additional feature which may be programmed into the Mailbox Answering machine is provision of the individual "personal identification numbers" (PIN) entering of which will allow the mailbox user to retrieve his/her messages. It may be noted that entering such PIN number may be possible while the user is at his own premises but equally well it may be performed when the user is out of this house and is calling in into the Mailbox Answering Machine from the telephone network. Similarly the pre-recorded messages which are transmitted back to the calling subscriber may be made individual to each mailbox Answering Machine user. The whole operation of the Mailbox Answering Machine is controlled by the software instructions stored in EPROM memory 31 and in RAM memory 32 and, therefore, any additional features may be programmed into the system and made available to the users. It will be apparent to those skilled int he art that the various functional units which form part of the Mailbox Answering Machine may be designed using standard electronic and microelectronic components freely available on the market. The mass storage device 36 may be any type of large capacity storage device c nently available on the market, in particular the hard disks (Winchester disks) of large capacity or even electronic storage devices of sufficiently large capacity may be used. It will also be apparent to persons skilled in the art that the system may be programmed in a number of different ways to provide additional features without departing from the spirit and principles described herewith.
SUBSTITUTE SHEET Operation of the Mailbox Answering Machine is best understood with reference to the flow charts of Fig. 2A-5A which show the various function of the machine in steps as executed by the Microprocessor 30 or other functional units of the machine.
having illustrated and described the principles of the present invention in reference to the prefened embodiment suitable for an analogue environment it should be apparent to those skilled in the an that such invention may be modified in anangement and in detail without departing from such principles.
It may be understood that the above described embodiment of the invention is only an illustration of the principles thereof and that numerous modifications and embodiments of the invention may be derived without changing the spirit and scope thereof.
Other advantages of the system may be summarised as follows:
1 .. The Mailbox Answering Machine which when connected to one analogue telephone line allows more than one telephone set to be connected in such a way, that incoming calls from the telephone exchange may be connected to individual telephone sets in accordance with special signal sent by the calling subscriber and which said signal indicates in an agreed manner to which particular telephone set the call should be connected, and when such all is connected only one telephone set will ring, the ringing function of which may be individually controlled by the specific telephone user, and the Mailbox Answering Machine which upon receipt of an incoming call which is not answered in the predetermined time will provide recorded announcement specific to the person called and if the called person still does not answer the income call, the Mailbox Answering Machine will provide means for recording of an incoming message, such recording being done in a manner which will group together all messages directed to one user and which messages designated to a specific user may be retrieved by a person concerned without a need to listen to all other messages that may be recorded for other users and the mailbox Answering Machine in which retrieval of recorded messages for a specific, individual user may be performed either locally or remotely, recording of the said messages being implemented by digitising voice signal and by the use of a mass storage devices like magnetic disks or an electronic memory devices and the Mailbox Answering Machine which provides visual indications concerning status of the machine, messages recorded, person to whom they are directed and some additional information like time, date, number of messages recorded, etc.
SUBSTITUTE SHEET 2. The Mailbox Answering machine in which Mass Storage devices may be external to the machine and thus they may be of any desired capacity.
3. The mailbox Answering Machine in which individual telephone sets are provided with suitable visual indicators to signal to the user that there are some messages recorded and what is the status of the Mailbox Answering Machine.
4. The Mailbox Answering Machine in which an additional feature of the "personal identification number" (PIN) is programmed.
5. The Mailbox Answering Machine in which pre-recorded messages are individual to each user of the machine.
6. The Mailbox Answering Machine in which telephone exchange provides special features supporting operation of the mailbox Answering Machine as described in this invention.
7. The Mailbox Answering machine which is equipped with small rechargeable batteries of the Power Supply Unit to allow system operation even in the case of temporary loss of power supply from the AC mains.
8. The Mailbox Answering Machine in which pre-recorded messages specific to the users may be recorded by each individual user of the machine at this/her discretion.
DIGITAL MAILBOX ANSWERING MACHINE
This pan of the invention relates to the method by means of which it is possible not only to identify the person to who the incoming call is directed before the call is answered but also to provide individual answering and recording service for incoming calls. More than one person may be identified and served by using the method described.
The proposed method does not require multiplicity of listed directory numbers to be assigned to persons included in the call identification process, thus preserving numbering capacity of the public switching centre.
SUMMARY OF THE INVENTION.
In the present analogue telephone connection the caller dials the number of the called person and the switching centre in the public network performs all the functions connected
SUBSTITUTE SHEET with setting up a call and signalling the called pany. The signalling sent to the called party normally consists of the ring signal which operates some form of a ringing (or acoustical) device located in the called party telephone apparatus. When the called party telephone rings the only response to it could be either not to respond to the call at all, or one has to lift the handset and commence conversation without any prior knowledge who the caller might be.
There are some attempts made to overcome this problem and to allow the called party to make decisions whether to answer the call or not and who the caller may be. The first solution takes form of an answering machine which when connected to the line reacts to the ring signal sent from the public switching centre, terminates the ringing, provides prerecorded message to the caller and then accepts information destined for the called person. If the machine is arranged in such a way that the proceeding on the telephone line may be heard the called person may listen to the message and to the information being forwarded by the calling party and may thus decide whether to answer the call or not and to who the call is directed. There are two main disadvantages of this method: first, before anything else happens the ring is terminated, the incoming call is answered, and therefore the calling party is charged for the call, and secondly, there is considerable delay from the time connection is established and ringing commences and the time the calling person and the one to who the call is addressed are identified.
The second solution, which was registered in the USA Patent Office under the name "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" involves complex electronic circuitry which connects to be called party's telephone line in parallel to the ordinary telephone apparatus and which is capable of recognising numbers transmitted in the DTMF code by the calling party. If the number transmitted coincides with the number prerecorded in the apparatus identification is assumed positive, called party telephone apparatus received additional special ring signal and the called party has an option to answer the call, knowing who is called and approximately who the caller might be. This device does not provide detailed identification of the caller telephone number, and before it can perform any function the call must be answered first and ring terminated.
Different, improved solution, recently offered in the modern ISDN networks, involves special programming introduction in the ISDN switching centres and assignment of special, additional directory numbers to called persons concerned. When a caller dials the ordinary listed directory number (LDN) the switching centre activates ordinary ringing signal and as a result the called party telephone apparatus rings in a normal manner. When the calling party dials different LDN number assigned to, say, second person which may
SUBSTITUTE SHEET be reached through the same telephone line, then the switching centre generates and sends down the telephone line different ringing signal. AT the called party's premises telephone apparatus will emit distinct, special ring signal which will indicate the second person wanted for the call. As a result person(s) present at the premises of the ringing telephone apparatus have a change to recognise who is being called and have an option of either answering the call or not. The recognition of the called party is provided before the call is answered and, therefore, before it is charged. At present this feature offered under the name "Identa*Ring" requires special programming to be done by the telephone operating company and it occupies listed directory numbers in the area numbering scheme. The latter may create problems in large telephone networks which use variable length listed telephone numbers. User has not influence on the specific ring signal being assigned to a specific called person. In addition, this method does not provide any features which could offer answering machine service.
Somewhat different method is proposed by NTT and registered under the name "Call System for Digital Telephone Set". This solution refers to the ISDN network and digital phone and it allows for the calling party's telephone number to be used in the called party digital telephone set for the purpose to identify who is calling and to produce suitable audio and visual signals to the call recipient. It does not, however allow for identification of the called person.
The modern ISDN network utilising comprehensive signalling system known under the name CCS No. 7, allows to provide better, more sophisticated method of the called party identification before actually answering the incoming call. It may be further extended by providing simultaneous identification of the calling party's telephone number and the called person, both before a call is answered and to provide a Mailbox Answering Machine service at the same time. This new method is subject of the present patent application, and is using the unallocated codes in the HEADING of the User Information Field of the Telephone User Part (TUP) in CCS No.7 D-channel signalling system.
SUMMARY OF THE INVENTION.
The method proposed in this part of the patent would operate as follows: the caller dials called party number and when this number is complete it is followed by a special additional digit(s) dialled by the caller. This additional digit(s) will be distinguished from the normal LDN by special delimiters, like e.g. * or #, or any combination of them. The ISDN switching system upon receipt of this special, delimited, number will send it via D channel in the CCS No. 7 signalling system to the called party location and eventually to the called party digital telephone set.
SUBSTITUTE SHEET The called party digital telephone set upon receipt of the signal through the D-channel signalling will react by generating suitable audio signal (may be in addition to a normal ring signal) combined with the message on the visual display unit installed in the telephone set. Anybody at the called party's premises will be able to read the message and identify the person to who the call is directed. The person called may or may not answer the call depending upon the decision reached after calling party has been identified. The identification of the called person is carried before the call is answered, therefore, no call charge is applied to the calling party until the call is actually answered. This operation may be greatly enhanced if it is combined with the Called ID feature offered in the modern ISDN system whereby the calling party's telephone number is sent to the called party telephone apparatus and displayed before the call is answered. This will provide ability not only to identify the called party exactly but also who is calling.
One of the important features of this new invention is that the allocation of called party's identification numbers, changing of these numbers, etc. is entirely controlled by the telephone line user rather than by telephone service company. In addition the new proposed method does no occupy any listed directory numbers in the numbering area thus preserving telephone operating company's recourses.
This new method will operate in the ISDN environment and will require some amendment to the operating software of the ISDN switching systems which will have to be implemented by telephone operating companies.
THE ADVANTAGES OF DIGITAL MAILBOX ANSWERING MACHINE SERVICE OF THE PERIOD DEVICES.
An international search has been conducted for digital Mailbox Answering machine type telephone services and devices and the advantages that it has over what is already known in this area are:
Digital Mailbox Answering Machine service addresses the basic household need to identify your own telephone calls from those directed to other residents and being able to provide telephone answering service to individual users of the telephone line. With the digital Mailbox Answering Machine one does not have to answer another resident's telephone calls again, provided the called resident is in the house. The digital mailbox Answering Machine does not need any special codes to be dialled for calling party identification as is the case with other designs like e.g. "Priority Call" and the 'Apparatus for converting a
SUBSTITUTE SHEET Standard Telephone to an Unlisted Number Telephone". There are inherent disadvantages encompassing these other devices. For instance:
1 . callers personal identification numbers (PIN) or callers telephone numbers have to be pre-programmed into the telephone or a network control point (NCP) which constantly inconveniences the person wishing to use or change such services.
2. only a limited amount of callers personal identification numbers (PIN) or callers telephone numbers can be pre-programmed into the telephone or a network control point (NCP). This limits the amount of callers who could use such a device.
3. only a limited amount of distinctly unique ring tones are possible. Therefore, only a limited number of persons can be given a distinctive ring. This again limits the amount of callers who could use prior devices. But even if distinctly unique ring tones were not limited on could not remember the ring tone of each caller.
Because only a limited amount of callers can use these devices (due to the pre¬ programming and ring tone limitations above) the prior devices are only for limited use by special callers, hence the name "Priority Call". This is in stark contrast to digital mailbox Answering machine which does not have such limitations and is capable of being used by each and every digital telephone user.
The other fundamental advantages digital Mailbox Answering Machine has over the prior devices are as follows:
4 . Improvement on service of an answering machine.
The digital mailbox Answering Machine utilises a non defined sub-addressing field in the ISDN digital telephone network. By this means some additional call information is conveyed during the initial placing of the call and as a result the telephone call recipient is identified before the telephone call is answered and charged, unlike in the ordinary answering machine equipment. The prior devices (e.g. Apparatus for converting a Standard Telephone to an Unlisted Number Telephone) implement some of the telephone answering machine functions,but all calls are immediately charged.
5 . Enhanced Logic Operation.
The digital Mailbox Answering Machine capability utilise micro-processor and software intelligence as opposed to a' hard wired logical circuitry (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone). Without micro-processor
SUBSTITUTE SHEET intelligence many of the enhanced telecommunication service provided by the digital telephone network could not be carried out.
6 . Analogue telephones are not used.
Analogue telephone terminal devices (like in Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone) are obsolete being non compatible with "end-to-end" digital transmissions, and with the digital telephones which are being used for the enhanced telecommunication services in ISDN network.
7 . No Select Forward.
With the "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" the telephone calls are "passworded" or "Screened" to enable calls by only a select few callers' to be processed, i.e. caller must enter the telephone number and after the answering machine beeps - there very own personal identification code (PIN) consisting of two, three, five, six or more digits. Conversely, with the digit Mailbox Answering Machine all telephone calls are forwarded enabling use of this feature from anywhere in the public network.
8 . No Call Blocking.
With the Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone there are number of digit checking devices which terminate (hang up) the callers telephone call if:
a. no personal identification number is dialled.
b . the wrong personal identification number is dialled.
c. the wrong personal identification number sequence is dialled.
The digital Mailbox Answering Machine does not block or hang up telephone calls, again being a device for use from anywhere in the network.
9 . No Priority Call.
The digital Mailbox Answering Machine identifies the person called, unlike the prior devices which identify a special caller (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone). Nevertheless, with the prior devices even if a special or priority caller has called, one still does not know who the call is for.
SUBSTITUTE SHEET 10. Selection.
The prior device. Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone, provides no opportunity for the callers to select or openly choose a distinctive ring tone. This is because caller PIN numbers or caller telephone numbers (as the case may be) are assigned not selected. On the other hand with the digital Mailbox Answering
Machine the caller is free to select one out several individual called person address numbers provided to the caller.
1 1 . Telephone Mailbox Answering Machine complements caller ID.
The best and most popular method for identifying callers is "Caller ID" which allows the telephone number of each and every caller to be visually displayed without realising the inherent limits of the prior devices (Apparatus for Converting a Standard telephone to an Unlisted Number Telephone and Priority Call) as per ( 1 ), (2) and (3) above. The mailbox Answering Machine, as was shown, does not have the inherent problems of the prior devices and is seen as the ideal compliment for "Caller ID".
As a result of the "Mailbox Answering machine / Caller ID" combination the telephone call recipient can identify his/her calls and can also identify which of the callers have telephoned.
"Caller ID" alone is a less attractive telephone anangement if used without digital "Mailbox Answering Machine". This is because the telephone call recipient will not be able to identify who has been called and in effect only the actual called recipient will be able to recognise the displayed caller's telephone number. In case of calling from a public telephone even this recognition will be impossible. Thus if a wrong recipient (not the person called) answers the telephone he can not recognise the displayed number - and is not' benefite by Caller ID. Needless to say, if the conect recipient (the person called) answers the telephone he can identify his displayed caller number and is thus benefited by Caller ID.
1 2. Existing digital networks circuitry use.
As a result of the digital "Mailbox Answering Machine" addressing field use, or sub- addressing field use, (as opposed to telephone numbers of callers) the existing network circuitry is capable of accepting and processing the personal number (addressing field) or digit (sub-addressing field). Therefore, unlike the prior devices, new circuitry does not require development effort.
SUBSTITUTE SHEET 1 3. Existing digital network software use.
As a result of the digital "Mailbox Answering Machine" addressing field use or sub- addressing field use (as opposed to telephone numbers of callers) the existing network software may generally be used (Minor software modifications are required) to instruct the system regarding the digital Mailbox Answering Machine procedure. Therefore, outright or major software program development is not required unlike with the'prior devices.
14. Telephone apparatus use.
Providing the network's addressing fields are used for digital Mailbox Answering Machine then existing enhanced capability telephone terminals can carry out the service, subject to network software adjustments. If the network's sub-addressing fields are used for digital Mailbox Answering Machine then, in part, new telephone set circuitry and software is required.
DESCRIPTION OF THE PREFERRED EMBODIMENT OF THE DIGITAL MAILBOX ANSWERING MACHINE.
It is a primary object of this invention to provide a new method of identification of the called person before the incoming call is answered, and thus before the caller is charged and to provide Mailbox Answering Machine service at the same time. Before explaining in details the principles of operation it is to be understood that the present invention is not limited in its application to details of the construction and arrangement of pans illustrated in the accompanying drawing. The invention is capable of other embodiments or carried out in a variety of ways. The terminology employed herein is for the purpose of description and not of limitation.
The attached drawing Fig. 6A shows the block diagram of the new digital telephone instrument, one embodiment of this invention. Broken line divides the drawing in two parts: the lower one represents a basic layout of a typical digital telephone apparatus as used in the ISDN network and the upper part represents some additional components, as an example, which may be used to provide some additional functions required in the process of identification of the called person and of providing the Mailbox Answering Machine service.
The operation of the circuit is as follows. Telephone line extended from the local switching centre is connected to terminals a and b of unit 1 which performs the functions basically of isolating line circuit from electronic circuitry contained in the digital telephone apparatus
SUBSTITUTE SHEET and at the same time it pro'ides for 2 wire to 4 wire conversion required for transmission reasons. Input signal from e public switching centre is typically a 144 kb/s digital stream which in principle consists of three components: a 64 Kb/s stream canying coded voice information, second 64 Kb/s streams designated to carry data transmission or voice and one additional 16Kb/stream used for signalling between the switching centre and telephone apparatus. This combined 144 Kb/s signal is transfened to the line interface circuit 2 which has a principal function of extracting timing signals so that local clock oscillator may be synchronised properly. The extracted clock timing signal is connected to unit 9 which is a local clock generator. The 144 Kb/s stream is then applied to a special logic circuitry 3 whose only function is to split one 144 Kb/s stream into three separate bit streams: voice, data and signalling.
The 64 Kb/s stram canying voice signal is applied to the coded circuit 4 which performs necessary coding and decoding functions required in the voice circuit. Output and input of the codec circuit 4 are connected to the handpiece device 6 containing microphone and a receiver used for voice communications. The second 64 Kb/s stream may be connected to data interface 5 which is equipped with the connection socket 7 where normally some form of data terminal equipment (DTE) will be connected, if required. The last pan of the input signal, the 16 Kb/s stream is applied to the signalling interface logic circuit 10. This circuit performs the functions of decoding incoming signals from the switching centre and transfening the resultant signals to the signalling devices 11. Although signaling devices 11 are shown as one block in reality they will consist of plurality of device, like e.g. numerical keypad, function buttons, alphanumeric display, buzzers, etc. In the reverse direction, signals produced by signalling devices, like e.g. pushing a button, are applied to the signalling interface logic 10 where it is properly coded, convened into binary form, and then applied to the logic circuitry 3 for inclusion in the signal transmitted back to the switching centre via line interface 2 and line termination unit 1. Signals transmitted via the 16Kb/s stream are refened to as channel D in the ISDN design.
When there is an incoming call a suitable signal is transmitted via the 16 Kb/s signalling bit stream, it is decoded in the signalling interface logical 10 as meaning 'to ring', and appropriate ringing signal is generated by the signalling interface logic 10 and applied to an acoustic transducer in the signalling devices group 11. Ringing signal to alert the called subscriber is. therefore, locally generated in the telephone apparatus and not in the switching centre. When the call is answered in the normal manner lifting of the handpiece causes closure of suitable contacts in the hookswitch (which is part of the signaling devices group 1 1) and this signal is applied back to the signalling interface logic 10. After coding, this signal is transmitted back to the switching centre via logical circuitry 3 and line
SUBSTITUTE SHEET interface 2 and line termination unit 1. Switching centre upon receipt of the hookswitch signal cancels the ringing signal and applies the 64 Kb/s bit stream carrying voice signal to the line. At this stage conversation may commence.
When subscriber wishes to use the telephone apparatus to make an outgoing call he lifts the
'Λ handset, operation of the hookswitch is transmitted from the signalling devices group 11, via signalling interface logic 10 to logic circuitry 3 where it is included in the overall transmission of 144 Kb/s to the switching centre. Upon receipt of this signal switching centre initiators transmission of the dial tone back to the subscriber. Subscriber operates then the numerical keypad, which is one of the elements in the signalling devices group, these signals are convened and coded in the signalling interface logic 10 into the 16 Kb/s stream and transmitted back to the switching centre. Switching action follows in the network and eventually call will be established.
When the subject of the present patent is implement din the digital telephone apparatus its operation is modified in such a way that it allows to perform additional, specific functions, but not limited to, of the called person identification and of the Mailbox Answering Machine service. This function may operate as follows: the digital Mailbox Answering Machine feature user, at a certain point in time of his choice, programs his telephone apparatus to accept certain additional signals which may be sent from the switching centre. This is done by simply pressing sequence of buttons on his telephone apparatus. The sequence of button pressing is such that it allows the signalling interface logic 10 to recognise that the signals produced are destined for the auxiliary microprocessor 12. Access to this microprocessor 12 is gained via transfer interface 14 and common signalling bus 16. Microprocessor 12 upon receipt of the special signals acts on them in accordance with software programme instructions stored in the memory 13 and saves the signals received in the memory 13 for future use. The signal stored may consist e.g. of two digits. These digits will identify certain called person at the premises where this special telephone apparatus is located.
When the caller wants to call a specific called person he/she dials normal directory number and follows it by the same two digits as stored in the memory 13 and which were disclosed to the caller beforehand by the called person. The public switching centre and the network will transmit these two additional digits via D-channel signalling to the telephone apparatus at called person premises. When this signal arrives to the telephone apparatus it is received by the signalling interface logic 10 as described before, it is recognised as a special signal and, therefore, it is applied via transfer interface 14 and common bus 16 to microprocessor 12. Upon receiving these additional digits microprocessor 12 compares the received digits
SUBSTITUTE SHEET . Page 82 with those stored in the memory, if a match is found the microprocessor generates suitable signal, transmits it via common bus 16 to device buffer 15 so that suitable announcement is activated. The announcement may take any form of audio and/or visual combination. It is prefened that one of these signals is an alphanumeric display providing clear identification of the called person. It will be obvious to a person skilled in the art that the microprocessor 12 will perform all functions according to software instructions sorted in the memory 13 or in a special, dedicated ROM memory not shown on the diagram.
The switching centre receiving dialled digits from the calling person will have to distinguish between digits as part of the listed directory number and additional digits for person identification. It is suggested that this may be achieved in a simple manner by using special delimiters, like e.g. * or # or both, before, or before and after the additional two digits serving the purpose of called person identification. The two special, additional, digits identifying the called person will be included in the D-channel signalling stream and to achieve it some minor modifications will have to be introduced to the signalling part of the switching centre software. Such modification is possible as it is intended that this new method of called person identification will utilise some of the unassigned addresses in the HEADING of the User Information Field of the Telephone User part (TUP) in the CCS No. 7 D Channel signalling.
It is obvious that with assumed two digits identification code for called person more than one combination of digits may be assigned, thus allowing identifier .on of more than one called persons and more than one function.
After an incoming call has been answered, or after sufficient delay in case when call is not answered, the special announcement signals appearing at the telephone apparatus will be cleared.
The software program operating microprocessor 12 will contain an additional routine which in case of an incoming call arriving from the switching centre containing the special called person identification digits and being unanswered will record details of such a call in the memory 13 for future use. At the same time a pre-recorded message specific to the called person will be read from mass storage device 17 and will be transmitted via message interface 16 to the logic circuit 3 where it will be include din the 64Kb stream voice channel transmitted back to the caller. After the pre-recorded message has been completed the microprocessor 12 will issue command to record the incoming message from the caller. The content of the message will be extracted from the incoming 64Kb stream and passing via message interface 16 will be stored in the mass storage device 17. Simultaneously, some distinctive indication will appear on the telephone apparatus alerting the πsex rn rhe
SUBSTITUTE SHEET fact that there were some special, unanswered calls. The telephone apparatus user has then an option, by operating special sequence of buttons, to read out from the memory details of calls recorded and to listen to recorded messages, as appropriate. After reading out the stored information these part of records may be erased.
As indicated before this new method will enhance another feature - Caller ID, which is already available in the ISDN networks. Display of information about the calling person's number combined with full identification of the called person, all before the call has been answered, provides full information to the telephone apparatus user without the need to answer the phone first and thus cause the call to be charged. In addition it provides Mailbox Answering Machine service.
It will be obvious to a person skilled in the an that any additional electronic components serving the purpose of identifying the called person will have to obtain power supply. This may be provided from the power supply unit 8 which is always provided in the digital telephone apparatus.
Operation of the digital mailbox Answering Machine may be better understood if reference is made to the flow diagrams shown on Fig. 7A - 9A which are part of this description. The flow diagrams illustrate sequence of events in the digital mailbox Answering machine when it operates in various modes.
It may be understood that the above described embodiment of the invention is only an illustration of the principles thereof and that numerous modifications and embodiments of the invention may be derived without changing the spirit and scope thereof.
EXCHANGEAREA NETWORK(XAN)-ANALOGUE
CONFIGURATIONTYPEONE
Provided there are a number of telephone jacks (extensions) within the household a telephone service subscriber could purchase a: IdentiCall Telephone/Mailbox Answering Machine Unit:
and a number of IdentiCall Telephones; a Mailbox Facsimile Machine: a Mailbox Printer Machine; and a number of Call Direction Personal Computers to convert his domestic telecommunications system into an analogue Exchange Area Network (XAN). As a result of the XAN the subscriber would avoid the cost of: a PABX and a Voice Mail System. In addition, the subscriber would be provided with capabilities suitable for the sub-addressing
SUBSTITUTE SHEET of data between computers, printers and plotters; and the sub-addressing of facsimile transmissions to physical facsimile mailbox storage containers.
Let's assume that there are three telephone jacks (extensions) within the Smith household. One telephone jack is in the: lounge room; Mr and Mrs Smith's bedroom; and Junior Smith's bedroom. Let's also assume that there is a: IdentiCall Telephone/Mailbox Answering Machine Unit: a Mailbox Facsimile Machine; and a Mailbox Printer Machine in the lounge room. In addition a IdentiCall Telephone and Call Direction Personal Computer within both Mr and Mrs Smith's bedroom and Junior Smith's bedroom.
As a result, Mr Smith, Mrs Smith and Junior Smith could have their personal telephone calls directed to their respective bedrooms. In addition, after a period of telephone call answering unavailability, each person could access their lounge room Mailbox Answering Machine messages from their respective bedrooms or from outside the household itself. Further, Mr Smith, Mrs Smith and Junior Smith's personal ring tone can be controlled: meaning each personal ring tone can be annunciated at convenient times for each called person, otherwise the Mailbox Answering Machine will immediately deposit the caller's message in the called person's answering machine mailbox. The latter capability is known as "MAM Ring Turn On/Off and the command is even operational by using the IdentiCall Telephone within the called person's respective bedroom or from outside the household itself.
There is a number of configurations for the analogue Exchange Area Network (XAN), this configuration type utilises very little Exchange Area Network (XAN) intelligence to convert the household telephone system into a domestic PABX and Voice Mail system. Prior to the IdentiCall Telephone/Mailbox Answering Machine combination "as above" a subscriber would have to purchase a PABX, a centralised voice mail system database and terminal equipment. Not to mention being liable for the expense associated with installation, maintenance and user costs.
The Exchange Area Network (XAN) could be used to sub-address data between computers, printers and plotters: and the sub-addressing of facsimile transmissions to physical facsimile mailbox storage containers.
In the analogue example provided, Mr and Mrs Smith's Personal Computer, Junior Smith's Personal Computer or any other Call Direction Computer for that matter, can transmit data to and from each other by using the XAN. The Mailbox Printer Machine could be located in, say, the lounge room so that the Personal Computer terminals within
SUBSTITUTE SHEET the household and outside the household can instruct the printer to print-out data and deposit the printed matter in Mr Smith, Mrs Smith or Junior Smith's printer mailbox.
The Mailbox Facsimile Machine creates the impression of artificial envelope conespondence through the transmission of the caller's facsimile conespondence to the f* called person's physical facsimile mailbox container. A mailbox capacity is also proposed for the following terminal types: Mailbox Multi-Function Terminals: and the like.
An example of the Exchange Area Network (XAN) is provided on page three onwards.
Let's assume that there are three people in the Smith household.
. Mr Smith;
. Mrs Smith;
. Junior Smith.
Let's assume that there are three telephone jacks (extensions) in the household.
. a telephone jack in the living room;
. a telephone jack in Mr and Mrs Smith's bedroom;
. a telephone jack in Junior Smith's bedroom.
Let's assume that in the lounge room there is a:
. IdentiCall Telephone/MAM unit;
. Physical Mailbox Facsimile Machine.
. Physical Mailbox Printer Machine.
Let's assume that in Mr and Mrs Smith's bedroom there is a:
. IdentiCall Telephone;
. Personal Computer.
Let's assume that in Junior Smith's bedroom there is a:
. IdentiCall Telephone;
. Personal Computer.
SUBSTITUTE SHEET Let's assume that:
. Mr Smith's personal telephone number is - 3440614;
. Mrs Smith's personal telephone number is - 3440615;
. Junior Smith's personal telephone number is - 3440616;
for the one telecommunications line.
Let's assume that:
. the facsimile number is - 3440617;
for the one telecommunications line.
Let's assume that:
. Mr Smith's personal facsimile number is 1;
. Mrs Smith's personal facsimile number is 2;
. Junior Smith's personal facsimile number is 3.
Let's assume that:
. the data line number is - 3440618;
for the one telecommunications line.
Let's assume that:
. Mr Smith's personal data number is 1 ;
. Mrs Smith's personal data number is 2;
. Junior Smith's personal data number is 3.
Let's assume that for the terminal type number the:
. IdentiCall Telephone(s)/MAM terminal is - ;
. Physical Mailbox Facsimile Machine terminal is * 2;
. Personal ComDuter(s) terminal is * 3:
SUBSTITUTE SHEET . Physical Mailbox Printer Machine terminal is * 4.
THE LIVING ROOM - IDENTICALL TELEPHONE/MAM UNIT
SENDER
If 3440614 is dialled - Mr Smith's ring tone would sound.
If 3440615 is dialled - Mrs Smith's ring tone would sound.
If 3440616 is dialled - Junior Smith's ring tone would sound.
If Mr Smith's ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
You have called John Smith please leave your message after the beep.
If Mrs Smith ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
You have called Mrs Smith please leave your message after the beep.
If Junior Smith's ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
You have called Junior Smith please leave your message after the beep.
RECEIVER
If Mr Smith enters his padlock command:
Mr Smith's messages are played.
If Mrs Smith enters her padlock command:
Mrs Smith's messages are played.
If Junior Smith enters his padlock command:
Junior Smith's messages are played.
SUBSTITUTE SHEET THE LIVING ROOM - PHYSICAL MAILBOX FACSIMILE MACHINE
SENDER
If 3440617 1 * 2 is dialled - The fax material is directed to Mr Smith.
If 3440617 2 * 2 is dialled - The fax material is directed to Mrs Smith.
If 3440617 3 * 2 is dialled - The fax material is directed to Junior Smith.
The personal facsimile number could annunciate a personal ring tone on the Physical Mailbox Facsimile Machine for a short designated time just to inform the called person of the caller's transmission of facsimile conespondence.
RECEIVER
If John Smith enters his padlock command:
John Smith's facsimile correspondence can be retrieved from his physical mailbox container.
If Mrs Smith enters her padlock command:
Mrs Smith's facsimile correspondence can be retrieved from her physical mailbox container.
If Junior Smith enters his padlock command:
Junior Smith's facsimile correspondence can be retrieved from his physical mailbox container.
THE LIVING ROOM - PHYSICAL MAILBOX PRINTER MACHINE
SENDER
If 3440618 1 * 4 is dialled - The print-out is directed to Mr Smith.
If 3440618 2 * 4 is dialled - The print-out is directed to Mrs Smith.
If 3440618 3 * 4 is dialled - The print-out is directed to Junior Smith.
SUBSTITUTE SHEET The personal printer number could annunciate a personal ring tone on the Physical Mailbox Printer Machine for a short designated time just to inform the called person of his/her print¬ out.
RECEIVER
If John Smith enters his padlock command:
John Smith's print-out can be retrieved from John Smith's physical mailbox container.
If Mrs Smith enters her padlock command:
Mrs Smith's print-out can be retrieved from Mrs Smith's physical mailbox container.
If Junior Smith enters his padlock command:
Junior Smith's print-out can be retrieved from Junior Smith's physical mailbox container.
MR AND MRS SMITH'S BEDROOM - STANDARD IDENTICALL TELEPHONE
SENDER
If 3440615 is dialled - Mr Smith's ring tone would sound.
If 3440616 is dialled - Mrs Smith's ring tone would sound.
If 3440617 is dialled - No response from this bedroom phone.
If Mr Smith's ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt:
You have called John Smith please leave your message after the beep.
If Mrs Smith ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt:
You have called Mrs Smith please leave your message after the beep.
SUBSTITUTE SHEET RECEIVER
If Mr Smith dials 3440614 and his padlock command.
Mr Smith's messages are played.
If Mrs Smith dials 3440615 and her padlock command.
Mrs Smith's messages are played.
MR AND MRS SMITH'S BEDROOM - PERSONAL COMPUTER
SENDER
If 3440618 1 * 3 is entered - The data is transmitted to/from this PC.
If 3440618 2 * 3 is entered - The data is transmitted to/from this PC.
If 3440618 3 * 3 is entered - No response from this PC terminal.
The personal data number could annunciate a personal ring tone on the personal computer for a short designated time to inform Mr and Mrs Smith of their print-out to their respective physical printer mailbox or the transmission of data to/from this Personal Computer.
PHYSICAL MAILBOX PRINTER MACHINE INTERFACE
If John Smith enters 3440618 1 * 4:
John Smith's data transmission is printed and deposited in his physical mailbox container.
If Mrs Smith enters 3440618 2 * 4:
Mrs Smith's data transmission is printed and deposited in her physical mailbox container.
MR AND MRS SMITH'S BEDROOM - STANDARD IDENTICALL TELEPHONE
IDENTICALL TURN ON
If Mr Smith dials 3440614 and 33 (IdentiCall turn on) and his padlock command.
SUBSTITUTE SHEET As a result, if a caller dials Mr Smith his ring tone would sound - the caller's telephone message is deposited in his answering machine mailbox if the call is not answered.
If Mrs Smith dials 3440615 and 33 (IdentiCall turn on) and her padlock command.
As a result, if a caller dials Mrs Smith her ring tone would sound - the caller's telephone message is deposited in her answering machine mailbox if the call is not answered.
IDENTICALL TURN OFF
If Mr Smith dials 3440614 and 66 (IdentiCall turn off) and his padlock command.
As a result, if a caller dials Mr Smith his ring tone would not sound - the caller's telephone message is immediately deposited in his answering machine mailbox.
If Mrs Smith dials 3440614 and 66 (IdentiCall turn off) and her padlock command.
As a result, if a caller dials Mrs Smith her ring tone would not sound - the caller's telephone message is immediately deposited in her answering machine mailbox.
MAILBOX OVER-RIDE
If a caller dials 3440614 and 67 (Mr Smith's priority command).
As a result, Mr Smith's telephone ring tone would sound - regardless of whether Mr Smith's ring tone is in IdentiCall turn off mode.
If a caller dials 3440614 and 77 (Mrs Smith's priority command).
As a result, Mrs Smith's telephone ring tone would sound - regardless of whether Mrs Smith's ring tone is in IdentiCall turn off mode.
JUNIOR SMITH'S BEDROOM - STANDARD IDENTICALL TELEPHONE
SENDER
If 3440614 is dialled - No response from this bedroom phone.
SUBSTITUTE SHEET If 3440615 dialled - No response from this bedroom phone.
If 3440616 is dialled - Junior Smith's ring tone would sound.
But if Junior Smith's ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt:
You have called Junior Smith please leave your message after the beep.
RECEIVER
If Junior Smith dials 3440616 and his padlock command.
Junior Smith's messages are played.
JUNIOR SMITH'S BEDROOM - PERSONAL COMPUTER
SENDER
If 3440618 1 * 3 is entered - No response from this PC terminal.
If 3440618 2 * 3 is entered - No response from this PC terminal.
If 3440618 3 * 3 is entered - The data is transmitted to/from this PC.
The personal data number could annunciate a personal ring tone on the personal-computer for a short designated time to inform Junior Smith of the print-out to his printer mailbox or the transmission of data to/from this Personal Computer.
PHYSICAL MAILBOX PRINTER MACHINE INTERFACE
If Junior Smith enters 3440618 3 * 4:
Junior Smith's data transmission is printed and deposited in his physical mailbox container.
JUNIOR SMITH'S BEDROOM - STANDARD IDENTICALL TELEPHONE
IDENTICALL TURN ON
If Junior Smith dials 3440616 and 33 (IdentiCall turn on) and his padlock command.
SUBSTITUTE SHEET As a result if a caller dials Junior Smith his ring tone would sound - the callers telephone message is deposited in his answering machine mailbox if the call is not answered.
IDENTICALL TURN OFF
If Junior Smith dials 3440616 and 66 (IdentiCall turn off) and his padlock command.
As a result if a caller dials Junior Smith his ring tone would not sound - the callers telephone message is immediately deposited in his answering machine mailbox.
MAILBOX OVER-RIDE
If a caller dials 3440616 and 57 (Junior Smith's priority command).
As a result Junior Smith's telephone ring tone would sound - regardless of whether Junior Smith's ring tone is in IdentiCall turn off mode.
OUTSIDE TELEPHONE CALLING - MAILBOX ANSWERING MACHINE
If Mr Smith dials 3440614 and his padlock command from outside the household.
Mr Smith's telephone messages are played.
If Mrs Smith dials 3440615 and her padlock command from outside the household.
Mrs Smith's telephone messages are played.
If Junior Smith dials 3440616 and his padlock command from outside the household.
Junior Smith's telephone messages are played.
OUTSIDE FACSIMILE CORRESPONDENCE TRANSMISSION - PHYSICAL MAILBOX FACSIMILE MACHINE
If John Smith enters 3440617 1 * 2:
John Smith can deposit facsimile correspondence in his physical mailbox container.
SUBSTITUTE SHEET If Mrs Smith enters 3440617 2 * 2:
Mrs Smith can deposit facsimile correspondence in her physical mailbox container.
If Junior Smith enters 3440617 3 * 2:
Junior Smith can deposit facsimile correspondence in his physical mailbox container.
OUTSIDE DATA TRANSMISSION - PERSONAL COMPUTERS
If John Smith enters 3440618 1 * 3: the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
If Mrs Smith enters 3440618 2 * 3: the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
If Junior Smith enters 3440618 3 * 3: the data is transmitted to/from Junior Smith's bedroom PC terminal.
OUTSIDE DATA TRANSMISSION TO THE PHYSICAL MAILBOX PRINTER MACHINE
If Mr Smith enters 3440618 1 * 4:
John Smith's data transmission is printed and deposited in his physical mailbox container.
If Mrs Smith enters 3440618 2 * 4:
Mrs Smith's data transmission is printed and deposited in her physical mailbox container.
If Junior Smith enters 3440618 3 * 4:
Junior Smith's data transmission is printed and deposited in his physical mailbox container.
SUBSTITUTE SHEET OUTSIDE DATA TRANSMISSION TO THE PHYSICAL MAILBOX PRINTER MACHINE AND TO THE CALL DIRECTION PERSONAL COMPUTERS.
If a caller enters 3440618 1 * 7:
the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
John Smith's data transmission is printed and deposited in his physical mailbox container.
If a caller enters 3440618 2 * 7:
the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
Mrs Smith's data transmission is printed and deposited in her physical mailbox container.
If a caller enters 3440618 3 * 7:
the data is transmitted to Junior Smith's bedroom PC terminal.
Junior Smith's data transmission is printed and deposited in his physical mailbox container.
DOMESTIC PABX AND VOICE MAIL SYSTEM
HOW TO PROGRAM THE TELEPHONE FOR CALLED PERSON IDENΗFICATION AND CALL DIRECTION
LIVING ROOM - IDENTICALL TELEPHONE/MAM UNIT
If Mr Smith enters the programming command and 1.
As a result, if a caller dials 3440614 this telephone will sound Mr Smith's ring tone.
Further, mailbox number one will record Mr Smith's messages.
If Mr Smith enters the programming command and 2.
As a result, if a caller dials 3440615 this telephone will sound Mrs Smith's ring tone.
SUBSTITUTE SHEET Further, mailbox number two will record Mrs Smith's messages.
If Mr Smith enters the programming command and 3.
As a result, if a caller dials 3440616 this telephone will sound Junior
Smith's ring tone.
Further, mailbox number three will record Junior Smith's messages.
MR AND MRS SMITH'S BEDROOM - IDENTICALL TELEPHONE
If Mr Smith enters the programming command and 1.
As a result, if a caller dials 3440614 this telephone will sound Mr Smith's ring tone.
If Mr Smith enters the programming command and 2.
As a result, if a caller dials 3440615 this telephone will sound Mrs Smith's ring tone.
JUNIOR SMITH'S BEDROOM - IDENTICALL TELEPHONE
If Mr Smith enters the programming command and 3.
As a result, if a caller dials 3440616 this telephone will sound Junior Smith's ring tone.
In the above examples, a subscriber has to program each personal number known as the Call Direction number(s). The terminal type number is pre-programmed.
HOW TO PROGRAM THE LOUNGE ROOM PHYSICAL MAILBOX FACSIMILE MACHINE
If Mr Smith enters the programming command and 1.
As a result, if a caller enters 3440617 1 * 2 the facsimile correspondence will be deposited in Mr Smith's physical mailbox container.
If Mr Smith enters the programming command and 2.
SUBSTITUTE SHEET As a result, if a caller enters 3440617 2 * 2 the facsimile correspondence will be deposited in Mrs Smith's physical mailbox container.
If Mr Smith enters the programming command and 3.
As a result, if a caller enters 3440617 3 * 2 the facsimile correspondence will be deposited in Junior Smith's physical mailbox container.
In the above example, a subscriber has to program each personal number known as the Call Direction number(s). The terminal type number is pre-programmed. The telecommunications line number programming is not a new requirement.
DATA TRANSFERENCE
HOW TO PROGRAM MR AND MRS SMITH'S BEDROOM - PERSONAL COMPUTER
If Mr Smith enters the programming command and 1.
As a result, if a caller dials 3440618 1 * 3 the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
If Mr Smith enters the programming command and 2.
As a result, if a caller dials 3440618 2 * 3 the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
HOW TO PROGRAM JUNIOR SMITH'S BEDROOM - PERSONAL COMPUTER
If Mr Smith enters the programming command and 3.
As a result, if a caller dials 3440618 3 * 3 the data is transmitted to/from Junior Smith's bedroom PC terminal.
In the above example, a subscriber has to program each personal number known as the Call Direction number(s). The terminal type number is pre-programmed. The telecommunications line number programming is not a new requirement.
SUBSTITUTE SHEET HOW TO PROGRAM THE LOUNGE ROOM PHYSICAL MAILBOX PRINTER MACHINE
If Mr Smith enters the programming command and 1.
As a result, if a caller enters 3440618 1 * 4 the data transmission is printed and deposited in Mr Smith's physical mailbox container.
If Mr Smith enters the programming command and 2.
As a result, if a caller enters 3440618 2 * 4 the data transmission is printed and deposited in Mrs Smith's physical mailbox container.
If Mr Smith enters the programming command and 3.
As a result, if a caller enters 3440618 3 * 4 the data transmission is printed and deposited in Junior Smith's physical mailbox container.
In the above example, a subscriber has to program each personal number known as the Call Direction number(s). The terminal type number is pre-programmed. The telecommunications line number programming is not a new requirement.
CONFIGURATION TYPE TWO
Let's assume that there are three people in the Smith household.
. Mr Smith;
. Mrs Smith;
. Junior Smith.
Let's assume that there are three telephone jacks (extensions) in the household.
. a telephone jack in the living room;
. a telephone jack in Mr and Mrs Smith's bedroom;
. a telephone jack in Junior Smith's bedroom.
Let's assume that in the lounge room there is a:
. IdentiCall Telephone/MAM unit;
SUBSTITUTE SHEET . Physical Mailbox Facsimile Machine.
Let's assume that in Mr and Mrs Smith's bedroom there is a:
. IdentiCall Telephone;
. Call Direction Personal Computer.
Let's assume that in Junior Smith's bedroom there is a:
. IdentiCall Telephone;
. Call Direction Personal Computer.
Let's assume that:
. Mr Smith's personal telephone number is - 3440614;
. Mrs Smith's personal telephone number is - 3440615;
. Junior Smith's personal telephone number is - 3440616;
for two telephone lines.
Let's assume that:
. Mr Smith's personal facsimile number is 3440617;
. Mrs Smith's personal facsimile number is 3440618;
. Junior Smith's personal facsimile number is 3440619;
for two facsimile lines.
Let's assume that:
. Mr Smith's personal data number is 3440620;
. Mrs Smith's personal data number is 3440621;
. Junior Smith's personal data number is 3440621;
for two data lines.
SUBSTITUTE SHEET Let's assume that between the customer's premises and the network that both two wire pair cable is used, therefore a two wire pair cable is used to service each two telecommunications lines. Let's also assume that each line is connected to each device.
If any of the above telecommunications numbers are dialled the central exchange (CENTREX) will attempt to switch the call to an available telecommunications line. In the above example there are 6 analogue lines therefore with the XAN Call Direction any one of the six lines could be used to connect an incoming voice, data or facsimile call.
In this example, 9 telecommunications numbers are used for the 6 lines or 3 numbers for every two lines. The 9 telecommunications numbers represent: 3 numbers for telephony; 3 numbers for facsimile: 3 numbers for data.
RING CADENCE IDENTIFICATION
I am aware that at at least nine different ring cadences are possible. In the below documentation reference is made to ring cadence identification, therefore each of the nine unique ring cadences could be be identified by the following ring cadence classification system. The inclusion of the ring cadence classification system into the documentation is for the purpose of explaining the services which could be offered by a Telecommunications Authority if a number of distinguishable ring cadences are used. Let's assume that six different cadences are used for voice:
Cadence 1 = will identify Mr Smith (called person) & the telephone/MAM (device type).
Cadence two = will identify Mrs Smith (called person) & the telephone/MAM (device type).
Cadence 3 = will identify Junior Smith (called person) & the telephone/MAM (device type).
Cadence 4 = will identify a special feature (such as a Mailbox Answering Machine call connection only), Mr Smith (called person) & the telephone/MAM (device type).
Cadence 5 = will identify a special feature (such as a Mailbox Answering Machine call connection only), Mrs Smith (called person) & the telephone/MAM (device type).
SUBSTITUTE SHEET Cadence 6 = will identify a special feature (such as a Mailbox Answering Machine call connection only), Junior Smith (called person) & Telephone/MAM (device type).
If a unique cadence is refened to in the below text it will be identified by the following:
(1) telephony (in this case, for the voice special feature being a Mailbox Answering Machine connection only) Mr Smith (representing the called person) telephony (representing the called device); or
(2) Mr Smith (representing the called person) telephony (representing the called device.
Note: the above format applies equally to facsimile and data.
For purposes of explanation, though probably inaptly put, the special feature is known as the primary cadence. The called person is known as the secondary cadence. The called device is known as the teπiary cadence.
The primary cadences rely on Caller ID use and are used only for special purposes such as call connecting a particular device. In this example, the primary cadences are telephony; facsimile; and data.
For example, if Caller ID is used the exchange could identify that Mr Smith's IdentiCall Telephone is attempting to call the Smith Mailbox Answering Machine for: message retrieval; Mr Smith Ring Turn On; or Mr Smith Ring Turn Off purposes. A telephony Mr Smith telephony cadence will be sent down the telecommunications line and the Smith Mailbox Answering Machine will only respond to this cadence version. This will prevent other voice devices from answering the Call Direction call.
If 3440614 (Mr Smith's Mailbox Answering Machine number) is dialled and if the caller's number is 3440614 (Mr Smith's IdentiCall Telephone/Mailbox Answering Machine number) then CENTREX will transmit a telephone Mr Smith telephone cadence. Once the Mailbox Answering Machine becomes off-hook Mr Smith would enter either his padlock number for message retrieval; and/or the Ring Turn On number for Mr Smith Ring
SUBSTITUTE SHEET Turn On; or the Ring Turn Off number for Mr Smith Ring Turn Off. Note: each IdentiCall Telephone's Call Direction program will not respond to a primary cadence. Firstly, because the IdentiCall Telephones are not a transmission storage device. Secondly, because the IdentiCall Telephones could interfere with Mailbox Answering Machine calling from within the household.
ANTECEDENTS
Let's assume that the Smith's subscribe to CENTREX's XAN as they have Call Direction equipment. Being a number of IdentiCall Telephones and a Multi-call Mailbox Answering Machine. The Smith's have one telecommunications line. This one line is a 4 wire line between the customer's premises and the network. The vacant 2 wires of the two wire pair cable are used in order to take advantage of the Mailbox Answering Machine and IdentiCall Telephones capabilities, being Ring Turn On/Off and Mailbox accessing from the Smith's respective bedrooms and using the IdentiCall Telephones as an intercom system. The other one line capabilities are Mailbox Answering Machine voice retrieval and the IdentiCall Telephone distinctive rings.
Mr Smith decided to have a second line connected by the Telecommunications Authority to "call direct" a second IdentiCall Telephone call.
Mr Smith purchased a Physical Mailbox Facsimile Machine. So Mr Smith decided to get a third and fourth line connected. The third and fourth line used both two wire pair of a cable. The third and fourth line were connected to all the household IdentiCall Telephones and the Multi-call Mailbox Answering Machine as well as the Physical Mailbox Facsimile Machine.
Each of the Smith's devices is equipped with Call Direction so the CENTREX's XAN or the exchange switching capabilities could be used so that one of the four lines could be used to connect an incoming voice or facsimile call.
Example 1 , Mrs Smith and Junior Smith could be using their respective bedroom telephones, whilst the MAM was recording a message for Mr Smith and the Physical Mailbox Facsimile Machine was pτ "ting and depositing image into Mr Smith's physical mailbox. Example 2, Mr and Mr:-, nith could be receiving two Mailbox Answering Machine messages each for their respective mailboxes. Example 3, the Mailbox Answering Machine could be receiving four voice transmissions for Mr Smith's mailbox.
SUBSTITUTE SHEET If the Local Exchange Area is using Common Channel Signalling 7. Caller ID could be used so that the Mailbox Answering Machine called person could access: a specific message; the messages of a particular calling party: or all his/her messages. If Caller ID is used the Mailbox Answering Machine called person has the option of deleting: a specific message; the messages of a particular calling party; or all his/her messages.
The Smith household decided to get a fifth and sixth line connected. The fifth and sixth line used both two wire pair of a cable. The fifth and sixth line were connected to all the household IdentiCall Telephones, the Mailbox Answering Machine, the Physical Mailbox Facsimile Machine: the the two Call Direction Personal Computers that the Smith's recently purchased. Both Call Direction Personal Computer had an additional Mailbox Modem Chip inserted. In addition, Mr Smith bought a Mobile IdentiCall Telephone seeing that he does much work from the car.
Each of the Smith's devices is equipped with Call Direction so the CENTREX's XAN or the exchange switching capabilities could be used so that one of the six lines could be used to connect an incoming voice, data or facsimile call.
With the Smith's cunent equipment six voice calls are possible, 4 data calls are possible, and 1 facsimile call is possible, or any combination thereof, provided that the telecommunications call connection amount does not exceed the amount of lines, being six.
Example 1, assuming that Mr Smith's ring tone is in Ring Turn On mode, a caller could telephone Mr Smith and the Local Exchange would direct the call firstly to Mr Smith's Mobile IdentiCall Telephone, if this telephone is not answered after a designated amount of rings then the telephone call is directed to Mr Smith's household IdentiCall Telephones. If the household IdentiCall Telephones are not answered within a designated time period the Mailbox Answering Machine becomes on-line and records the caller's message for Mr Smith's mailbox. After a designated Re-Call Direction time, the Mailbox Answering Machine could ring Mr Smith's Mobile IdentiCall Telephone before Mr Smith's household IdentiCall Telephones annunciate Mr Smith's ring pattern. Or Mr Smith could telephone the Mailbox Answering Machine to retrieve his messages from either his Mobile IdentiCall Telephone or from the household telephones by dialling his padlock command.
Example 2, Mr Smith, Mrs Smith and Junior Smith are all using an IdentiCall Telephone and in the meantime each family member receives a second telephone call. As a result Mr Smith, Mrs Smith and Junior Smith could use the call waiting feature and Call Direction to make the less important telephone call caller deposit a message in the Mailbox Answering
SUBSTITUTE SHEET Machine for later retrieval by the family. The IdentiCall Telephones using the Call Direction program, transmit a signal to CENTREX so that each less important telephone call caller (call waiting) is provided with a telephony called person telephony cadence for direct Mailbox Answering Machine access, as the Mailbox Answering Machine will only respond to this cadence version.
Example 3, as there are six lines, Mr Smith, Mrs Smith and Junior Smith could each be on an IdentiCall Telephone; the Mailbox Answering Machine could be receiving a voice call and as there are now two available lines, two incoming data calls could be "call directed" to either or both the Call Direction Personal Computers. As a result of all six lines being connected to each device any of the seven Call Direction devices can share the available six telecommunications lines.
The Call Dir ction program of each device, could be instructed which lines will be dedicated if any. For example the Smith's could instruct each of their devices that the first two lines are dedicated for voice. The remaining lines could be used for voice, data, text or image CENTREX would also have to be instructed that the first two lines are to be dedicated for voice, otherwise a data, text or image call could be sent down the first two lines. The use of dedicated voice lines in this example will prevent four lines being used for data and one line being used for facsimile, meaning only one incoming or outgoing voice call is possible. Without this capability a Smith or an outside caller could have to wait for a vacant telephone line.
If Mr Smith bought a Call Direction Laptop Computer or a Call Direction Notepad Computer then a caller could dial Mr Smith's data number and the Local Exchange would direct the call to Mr Smith's Call Direction Laptop Computer or Call Direction Notepad Computer before directing the call to Mr Smith's household Call Direction Personal Computer.
In the above, if a caller dials Mr Smith's data number and if Mr Smith's Call Direction portable computer is "on" then a Call Direction portable computer data connection will be established (assuming that there is enough available memory for the data transmission). If there is not enough available memory, the call will be directed to the Smith household wherein
Mr Smith's Call Direction Personal Computer will establish the data connection. If a caller dials Mr Smith's data number and if Mr Smith's Call Direction portable computer is "off then Mr Smith's household Personal Computer will establish a data connection (assuming that there is an available line).
SUBSTITUTE SHEET Pa Λgee~- 105
Mr Smith could use Call Direction to transfer any data between his Call Direction portable computer and his household Call Direction Personal Computer, direct access is possible because the Mr Smith's household and mobile Call Direction Personal Computer will only
** respond to the data Mr Smith data cadence.
In this configuration, all lines are connected to each device. Therefore, if a facsimile transmission is being sent to Mr Smith's physical mailbox facsimile machine then Mr Smith's "call direction" IdentiCall Telephones could annunciate the called person (Mr Smith) and the device type (facsimile machine) ring pattern. As a result, Mr Smith could identify that facsimile is being transmitted to the facsimile machine in the lounge room, even though Mr Smith is in his bedroom.
The above telecommunications system can be built up to respond with each families changing telecommunications needs. The system can start with as little as one IdentiCall telephone for a two wire pair cable line. Note: a two wire pair cable does not have to be used to service two lines, a separate two wire pair cable could be installed with each line connection.
The above example is a domestic example. In the case of small business, businesses could subscribe to both CENTREX and the XAN to fully utilise the advantages of both systems.
In the analogue network Re-call Direction is only used for like devices, if applicable, facsimile machine to facsimile machine, Personal Computer to Personal Computer, Mailbox Answering Machine to Mailbox Answering Machine. Please refer to page eleven for the Call Direction/Re-call Direction program - type instructions.
EXAMPLE 1
Let's assume the Smith's are not home.
The six lines are being used for voice:
The 3440614 MAM mailbox is recording a message for Mr Smith.
The 3440615 MAM mailbox is recording a message for Mrs Smith.
The 3440616 MAM mailbox is recording a message for Junior Smith.
The 3440614 MAM mailbox is recording a 2nd message for Mr Smith.
SUBSTITUTE SHEET The 3440615 MAM mailbox is recording a 2nd message for Mrs Smith.
The 3440615 MAM mailbox is recording a 3rd message for Mrs Smith.
Using CENTREX's XAN the following is possible:
Let's assume that the caller wants to telephone Mr Smith. The caller would dial 3440614 and the central exchange (CENTREX) will switch to a 3440614 cadence for an available telecommunications line.
The exchange is instructed that Mr Smith's telephone number was dialled, the Mr Smith telephony cadence is sent by the central exchange down an available telecommunications line, therefore due to the particular cadence version, the Mailbox Answering Machine becomes on-line (assuming that there is available hard disk RAM for the Call Direction) and annunciates the following voice message: "You have contacted the Mailbox Answering Machine you can now leave a message which will be directed to Mr Smith's answering machine mailbox". Let's assume the caller leaves a message. The audio message will be recorded in the cunent "transmission" memory location.
If all the lines are connected to each device, as the example shows, the Mailbox Answering Machine could service 6 voice calls simultaneously. The ability to service a number of answering machine messages at once is similar to voice mail capabilities.
Please refer to page eleven for the Call Direction/Re-call Direction program - type instructions.
EXAMPLE 2
Three lines are being used for voice:
The 3440614 MAM mailbox is recording a message for Mr Smith.
The 3440615 MAM mailbox is recording a message for Mrs Smith.
The 3440616 MAM mailbox is recording a message for Junior Smith.
Using CENTREX the following is possible:
SUBSTITUTE SHEET Let's assume that the caller wants to transmit facsimile to Mr Smith's Physical Facsimile Machine Mailbox. The caller would dial 3440617 and the central exchange (CENTREX) will switch to a 3440617 cadence for an available telecommunications line. f*
The exchange is instructed that Mr Smith's facsimile number was dialled, the Mr Smith facsimile cadence is sent by the central exchange down an available telecommunications line, therefore due to the particular cadence version, the Physical Mailbox Facsimile Machine becomes on-line. Let's assume the caller transmits facsimile. This facsimile will be printed and deposited in Mr Smiths physical facsimile machine mailbox, on a page by page basis.
Please refer to page eleven for the Call Direction/Re-call Direction program - type instructions.
EXAMPLE 3
Two lines are being used for voice:
the 3440615 called person (Mrs Smith) is talking to a third party;
the 3440616 called person (Junior Smith) is talking to a third party.
One line is sending/receiving a data transmission:
a data transmission to/from 3440622 Junior Smith's PC.
Two lines are receiving data:
a data transmission to 3440621 Mrs Smith's PC mailbox;
a data transmission to 3440622 Junior Smith's PC mailbox.
Let's assume that the caller wants to contact Mr Smith's Personal Computer to send and receive data. The caller would dial 3440620 and the central exchange (CENTREX) will switch to a 3440620 cadence for an available telecommunications line.
The exchange is instructed that Mr Smith's data number was dialled, the Mr Smith data cadence is sent by the central exchange down an available telecommunications line, therefore due to the particular cadence version, Mr Smith's Call Direction Personal Computer becomes on-line and transmits the following data message to the calling device: "You have contacted Mr Smith's Call Direction Personal Computer, you can now transmit
SUBSTITUTE SHEET your data to this Call Direction PC". Let's assume the caller transmits data. This data transmission will be stored in the available hard disk RAM.
In this example, each Call Direction Personal Computer can receive two data transmission at a time. In the event of more than two data call to a given Call Direction Personal Computer, the other Call Direction Personal Computer could be used to receive and store the data transmission as the other Personal Computer could be set to answer the data call after a designated period of time.
If the other Call Direction Personal Computer is used to store the data transmission then this Call Direction Personal Computer, would re-dial the busy Call Direction Personal Computer, using Re-call Direction, upon the completion of a designated time limit to check whether the formerly busy Personal Computer is capable of storing the data transmission(s) at present being stored in it's memory.
If the formerly busy Call Direction Personal Computer's mass storage is capable of storing the data transmission(s) then the data is transmitted to this Call Direction Personal Computer. If the formerly busy Call Direction Personal Computer's mass storage is not capable then the data is stored in the other device until a later given Re-call Direction access.
Please refer to page eleven for the Call Direction/Re-call Direction program - type instructions.
CALL DIRECTION AND RE-CALL DIRECTION PROGRAM - TYPE INSTRUCTIONS
The Multi-call Mailbox Answering Machine has been used as the example device.
If a caller dials a Smith telecommunications number the answering machine will receive a secondary and tertiary cadence or a primary, secondary and tertiary cadence. If the secondary and tertiary cadence or the primary secondary and tertiary cadence conesponds with a Mailbox Answering Machine secondary and tertiary cadence variable value or a Mailbox Answering Machine primary, secondary and tertiary cadence variable value then the cunent called person number value, which conesponds to the secondary cadence, is stored in the cunent "recipient" variable value and the cunent device type number value, which conesponds to the tertiary cadence, is stored in the cunent "device type number" variable value. Note: The primary cadence for telephony instructs the answering machine that the call is specifically for this device, therefore no other device will attempt to become off-hook, at any point in time.
SUBSTITUTE SHEET (A) If the cunent "recipient" variable value equals the secondary cadence (called person cadence) and if the cunent "device type number" variable value equals the tertiary cadence (device type cadence) and the "MAM Hard disk RAM available memory" variable value is greater than "minimum MAM Hard disk RAM available memory" variable value then this answering machine call will become off-hook (will be answered).
(B) If the cunent "recipient" variable value equals the secondary cadence (called person cadence) and if the cunent "device type number" variable value equals the tertiary cadence (device type cadence) and the "MAM Hard disk RAM available memory" variable value is less than "minimum MAM Hard disk RAM available memory" variable value then this answering machine call will remain on-hook (will not be answered). Other Re-Call Direction voice devices will be given the opportunity of recording the message for the called person and re-transmitting the message to this answering machine at a later time. "Re-call direction re-transmission" is for called person device retrieval purposes. In other words, this stops Mr Smith from accessing another answering machine such as another business' areas Mailbox Answering Machine for retrieval of some of his answering machine messages.
(C) If a primary cadence (but not for the mailbox answering machine) has not been transmitted then the cunent "specific device" variable value is not incremented to the value 1. If the cunent "specific device" variable value equals the value 0 and the cunent "recipient" variable value does not equal the secondary cadence (called person cadence) and if the cunent "device type number" variable value equals the tertiary cadence (device type cadence) and the "MAM Hard disk RAM available memory" variable value is greater than the "minimum MAM hard disk RAM available memory" then the answering machine will access the cunent "designated time count" variable value. If the cunent "designated time count" variable value equals the "answer transmission" variable value then the answering machine will answer the call after this designated amount of time has elapsed.
(D) If a primary cadence (but not for the mailbox answering machine) has not been transmitted then the cunent "specific device" variable value is not incremented to the value 1. If the cunent "specific device" variable value equals the value 0 and if the cunent "recipient" variable value does not equal the secondary cadence (called person cadence) and if the cunent "device type number" variable value does not equal the tertiary cadence (device type cadence) then the answering machine call will remain on-hook (the answering machine will not answer this call).
SUBSTITUTE SHEET (E) If a primary cadence (but not for the mailbox answering machine) has been transmitted then the cunent "specific device" variable value is incremented to the value 1. If the cunent "specific device" variable value equals the value 1 then the answering machine will not become off-hook.
Depositing a message in the called person's mailbox.
If (A) above is the case. Then the present time/date will occupy the cunent "time/date" variable value. The matched "recipient" variable value becomes the cunent "called person number" variable value. If the "called person number" variable value equals a "called person's outgoing message" variable value then that called person's outgoing message will be accessed. If the "called person number" variable value does not equal a "called person's outgoing message" variable value then a general outgoing message will be accessed. Then the voice transmission is stored in the cunent "transmission memory location".
Accessing a called person's mailbox.
I. In (A) above is the case. Then the present time/date will occupy the cunent "time/date" variable value. The matched "recipient" variable value becomes the cunent "called person number" variable value. If the "called person number" variable value equals the "called person's outgoing message" variable value then that called person's outgoing message will be accessed. If the called person's padlock command is dialled then the called person's padlock command signal is checked against "the called person padlock command" variable values.
If a padlock command match does not occur. The answering machine could either request a padlock command re-dial or the call could be terminated.
II. If a padlock command match occurs the cunent "called person number" variable value is stored in the cunent "checking called person number" variable value (as there are a number of called person number checking variables) and a cunent "cunent number count" (as there are many cunent number count variables) is reset to the variable value 1. (The first cunent represents this variable number the second cunent represents the called person variable number). If a value match occurs between the cunent "checking called person number" variable value and the cunent "called person" variable value then the program will access the cunent "transmission memory location" so that this transmission is retrieved from hard disk RAM. Then the cunent "cunent number count" is incremented by 1 (so that other cunent "called person" variable values will be checked).
SUBSTITUTE SHEET If a value match does not occur between the cunent "checking called person number" variable value and the cunent "called person" variable value then the cunent "current number count" is incremented by 1 (so that other cunent "called person" variable values will be checked).
If the cunent "cunent number count" equals the "ceiling" variable value then the cunent "checking called person" variable value is reset to 0.
After the called person has listened to his answering messages he can enter the erase command. This command will erase all the called person's cunent "called person" variable values so that the former called person's cunent "transmission memory location" can be reused.
If a erase command match occurs the cunent "called person number" variable value is stored in the cunent "erasure called person number" variable value (as there are a number of called person number erasure variables) and a cunent "cunent number count" (as there are many cunent number count variables) is reset to the variable value 1. (The first cunent represents this variable number the second cunent represents the called person variable number). If a value match occurs between the cunent "erasure called person number" variable value and the cunent "called person" variable value then the cunent "called person" variable value will be reset to 0. Then the cunent "current number count" is incremented by 1 (so that other cunent "called person" variable values will be checked in the loop). If a value match does not occur between the cunent "erasure called person number" variable value and the cunent "called person" variable value then the cunent "cunent number count" is incremented by 1 (so that other cunent "called person" variable values will be checked in the loop). If the cunent "current number count" equals the "ceiling" variable value then the cunent "erasure called person" variable value is reset to 0.
Depositing a message in a " Re-Call Direction" mailbox.
If (C) above is the case. Then the present time/date will occupy the current "time/date" variable value and the cunent "timer" variable value will be set. The matched "recipient" variable value becomes the cunent "called person number" variable value. If the "called person number" variable value does not equal a "called person's outgoing message" variable value then a "general outgoing message" will be accessed. Then the voice transmission is stored in the cunent "transmission memory location".
If the cunent "timer" variable value equals the "dial time" variable value then the program is instructed to re-dial the voice device to be Re-Call Directed. The cunent "number" variahle
SUBSTITUTE SHEET value instructs the program to access the cunent "called person number" variable value. If the cunent "called person number" variable value equals the "called person voice device telephone number" variable value then the program is instructed to access the "called person voice device telephone number" memory location (this memory location contains the called person and the voice device's variable frequency number) in order to carry out Re-Call Direction.
If the called device becomes off-hook (refer to the above). Then refer to Part II of "Accessing a Called Person's Mailbox". The variables pertaining to the former cunent "recipient" will be erased. Assuming that the called device remains on-hook (refer to the above). Then the cunent "transmission" memory location will not be accessed. Therefore the transmission is stored in the current "transmission memory location" for a later retrieval.
(Note: if Caller ID is used there would be cunent "calling person" variable value anay in the Call Direction/Re-call Direction program. Therefore a specific message, all the messages of a particular calling party could be accessed and erased).
ADDRESSING FIELD USE ONLY FOR THE CALL DIRECTION/CALL RE¬ DIRECTION PROGRAM
If the above system is used, the Call Direction and Re-call Direction program would have to be informed of the structure, unless a standard analogue structure is used. Meaning the terminal type number is part of the called person number. As a result only an addressing field is needed.
DATA EXCHANGE
Data could be converted by the network which would assist: a computer requiring data re¬ structuring; the exchange of data from two different used application programs, such personal computers can be either on the customer's premises or at different locations.
SUB-ADDRESSING FIELD USE FOR THE CALL DIRECTION/CALL RE¬ DIRECTION PROGRAM
With analogue Call Direction and Re-Call Direction sub-addressing fields could be cancelled or one sub addressing number could be used. If one sub-addressing number is used, then the following numbering system is possible:
SUBSTITUTE SHEET . 10 - 20 telephone device/called person. The first digit would represent the device number the second digit would represent the called person. f*
. 20 - 30 facsimile device/called person. The first digit would represent the device number the second digit would represent the called person.
. 30 - 40 PC device/called person. The first digit would represent the device number the second digit would represent the called person.
. 40 - 50 printer device. The first digit would represent the device number the second digit would represent the called person.
Many types of numbering systems could be implemented. I believe that a standard numbering system would be more convenient for analogue Call Direction and Re-call Direction, more particularly so if sub-addressing field(s) is/are used.
RING CADENCE DECODING DEVICE
The invention relates to an improvement in telecommunication terminal apparatus to take advantage of multiple ring cadence signalling facilities, made available by various telecommunication providers. The invention makes possible the sharing of a telephone line among several users, without each user being aware of one anothers incoming telephone calls.
OBJECTIVES
The objectives of this invention are to provide an improvement to various telecommunication terminal equipment that:
can decode several different ring cadences used by the telephone exchange equipment to direct a telephone call to a paπicular subscriber.
• will only respond to a particular ring cadence or cadences sent by the telephone exchange.
• is programmable by the user of the equipment to respond only to the ring cadence or cadences required.
SUBSTITUTE SHEET • . will allow terminal equipment such as facsimile machines and auto-answer modems to share the one telephone line.
PRESENT STATE OF THE ART
For many years, ring cadence signalling has been used on party lines, that is, where a number of subscribers share the one telephone exchange line. The party line subscribers detect their call by listening for their ring cadence signal from the telephone's bells.
The use of party lines is popular in areas with over-utilised cable reticulation systems, because it allows more subscribers to be connected to the telephone exchange than there are cable pairs in the cable reticulation system. Party lines are popular in areas where the telecommunication provider did not predict the conect growth rate when installing the cable reticulation system. However, they are still required to provide services to all subscribers, or the cost of providing a cable reticulation system with an open cable pair per subscriber could not be justified. This is typical in country areas.
With the introduction of electronic telephone exchanges, a number of telecommunication network providers are now marketing ring cadence signalling for use in residential installations. This service provides a cost effective method to the calling party by directing the call to a particular member of the household. This now allows the members in the household to answer calls directed to them and ignore the different ring sound for other calls. To provide an individual service for each member of the household without using ring cadence signalling, the telecommunications provider would need to provide an individual telephone line to each item of telecommunication equipment in the household. This would not be a practical solution because the telecommunication provider would not have the cable reticulation resources, and if they did, the average residential installation would not generate enough telecommunication traffic to justify the cost.
The problem with the present system is that although a telephone line can be several listed directory numbers, each with a unique ring cadence, all telecommunication terminal equipment in the household will emit sound to the ring signal. The problems this creates limits the potential of the ring cadence signalling system as the ring cadence decoding is performed by the called person. This means equipment such as facsimile machines, auto¬ answer modems etc. are not suitable to connect to the ring cadence signalling telephone line, as they will answer all incoming calls no matter what ring cadence is present. Another problem of the present telecommunication terminal equipment that uses audible ring signalling, is that all people in the ~>usehold are disturbed by the incoming calls.
SUBSTITUTE SHEET THE PRESENT INVENTION
The present invention solves the cunent problem of providing an individual service for each person in the household with a telephone exchange line to each piece of telecommunication equipment. By providing the ring cadence decoder facility to the various items of telecommunication terminal equipment, such as telephones, answering machines, facsimile machines and modems, it is possible to provide a service that will allow several pieces of terminal equipment, connected to the one telephone line, to be individually accessed by a calling party (see figure 10). Because the ring cadence decoding terminal equipment only responds to the ring cadence or cadences programmed by the user, devices such as facsimile machines and auto=answer modems can share a telephone line with telephones. This is possible because the calling party can direct his call to a specific piece of terminal equipment by selecting the directory number that will send the required ring cadence signal to the line. All other devices sharing the line will ignore the ring signal, thus only the terminal equipment that matches the ring cadence will respond, and therefore other people in the household are not disturbed (see figure 18).
The terminal equipment that shares the one telephone line is programmed to respond to one or more ring cadences. This means terminal equipment can either service an individual or a group of users. A typical installation requiring response to one or more ring cadences is a number of telephones and an answering machine connected across the telephone line. The telephones belonging to different users would have their own ring cadence, so an external calling party can direct the call only to the person required (see figure 19).
Users can have more than one telephone programmed to their ring cadence. Also a telephone may be programmed to respond to a number of ring cadences. The answering machine would respond to all ring cadences and answer all calls that have not been answered in the required time by the called party. Therefore the answering machine must be able to decode all ring cadences, while the telephone normally only needs to decode one or two.
The ring cadence decoding device is a combination of analogue and digital hardware controlled by a user configurable software package. Because the ring cadence decoding device has intelligence provided by the digital hardware's microcomputer, the user can configure the ring cadence decoding device via the associated terminal equipment. The user will need to be able to configure the ring cadence decoding device, to respond to one or more ring cadences.
SUBSTITUTE SHEET Figure 20 is, in principle, a block diagram of the ring cadence decoding device in the prefened embodiment of the present invention designed for an analogue environment. The operation of the ring cadence decoding device follows the sequence of actions described below.
In the idle state, the microcomputer 4 monitors the telephone line for any activity. The microcomputer monitors the line by measuring the line voltage at frequent intervals, typically 100 times per second. By analysing the telephone line voltage and time data, the microcomputer 4 can ascertain the cunent line state. The device that the microcomputer 4 uses to convert the analogue voltage to a digital value is an analogue to digital converter 3. The microcomputer 4 instructs the analogue to digital convenor 3 to read the telephone line voltage. The microcomputer 4 waits while the analogue to digital converter samples the telephone line voltage, which has been conditioned by the telephone line interface 1, and then converts the analogue signal into a binary number suitable for the microcomputer's digital environment and which represents the telephone line voltage. When the conversion is complete, the analogue to digital converter 3 signals the microcomputer 4 that the data is available. The microcomputer reads the data and stores it in memory for processing.
The above process is repeated to each telephone line connected, allowing the microcomputer to build the total picture of each line's present state, i.e. whether each line is idle, busy or ringing. The microcomputer 4 used a solid state switching matrix 2 to connect the conditioned telephone lines to either the analogue to digital converter for line monitoring or to other electronic devices within the terminal equipment.
To determine the ring signal's cadence is now a simple task for the microcomputer 4. Once the microcomputer 4 has detected a ring signal, it times the duration of the ring signal bursts and the duration between ring signal bursts. The microcomputer 4 continues timing the incoming ring signal until it has received one complete cadence cycle (see figure 21). Upon receipt, it compares the incoming ring signal's cadence timing to the cadence timing that the microcomputer has programmed in memory. When a cadence match is found microcomputer 4 will output a signal on output port 6 until the ring signal disappears, at which point the microcomputer 4 will reset the signal on ouφut port 6.
The microcomputer outputs other information on output port 6, including such signals as line ringing to indicate an incoming ring signal is present on the telephone line, whether or not the ring signal is for this device, line busy to warn that the line is in use by another device, and line enor to warn that the line is either open or short circuit. The telephone line idle state is determined by none of the above signals present on the output port 6.
SUBSTITUTE SHEET The microcomputer communicates with other devices via input/output port 5. It is this port that the ring cadence timing information and other command and operating parameters are transfened into the microcomputer 4.
XAN TELEPHONE FOR AN ANALOGUE ENVIRONMENT
This invention relates to an intelligent telephone apparatus providing the user of such apparatus the means of sub-addressing income telephone calls. Therefore this invention makes possible the sharing of a telephone exchange line among several users, without the users being disturbed by each other's incoming telephone calls.
OBJECTIVES
The objectives of this invention are to provide a telephone that is:
programmed by the user to only produce an audible ring signal when the user's ring cadence is detected on a telephone exchange line.
• programmed by the user not to produce any audible ring signal, therefore allowing an answering machine to answer the call after a predetermined number of ring cadence cycles.
connected to several telephone exchange lines, each line using multiple ring cadence signalling.
• capable of preventing an existing call being disturbed by another telephone requiring a telephone for an outgoing call.
PRESENT STATE OF THE ART
Many different telephones have been developed providing features such as hands free operation, number storage, last number redial, etc. No telephone presently on the market provides the facility of directing an incoming call to a specific member of a household. The present method of providing a telephone service to a number of persons sharing the one analogue telephone line is to provide a different ring cadence for each number. The problem with present telephones is that when an incoming call is received, all telephones connected to the telephone exchange line will ring. The person to whom the call is directed recognises his ring cadence and answers the call e.g. in the USA. The present telephone creates two problems, the first is that each person i the household must be able to recognise their own ring cadence from several, and the second is that because all the telephones ring
SUBSTITUTE SHEET together all persons in the household are disturbed by each incoming call. At present, the only way to provide an individual telephone service for each member of the household is to provide individual telephone exchange lines and telephones. This is not a practical solution because the telecommunications company providing the service would not have enough cable pairs capacity in their residential cable distribution system to provide multiple lines to
* each household, and if they could the line rental cost would be hard to justify for the small amount of traffic generated by the average household.
THE PRESENT INVENTION
The present invention solves the problems of providing an individual telephone service to members of a household on the one analogue telephone exchange line. The new telephone takes advantage of the different ring cadences sent by the telephone exchange. When the new telephone detects the ring signal it does not immediately ring but waits until the ring signal has been present long enough to determine the cadence of the ring signal. Once the incoming call ring cadence has been analysed, the new telephone can made a decision whether to ring or not. The new telephone as described above can provide an individual phone service to a member of a household. By connecting several of these new telephones to the one exchange line, it is now possible for each member of the household to have an individual telephone service.
Another feature of the new telephone is its ability to connect to several analogue exchange lines. This feature is required when the amount of telecommunication traffic, generated by the members of the household, exceeds the capacity of the existing connected telephone exchange line(s). The new telephone provides a multi-exchange line system which is transparent to the users. This is achieved because the new telephone scans the connected telephone exchange lines to determine whether they are ringing, idle or busy. This allows the new telephone to avoid connecting to a line that is not idle, that is, the line is either being used by another member of the household or the line has rung for another member of the household.
Figure 26 is an in principle block diagram of the XAN telephone in the prefened embodiment of the present invention designed for an analogue environment. The operation of the XAN telephone follows the sequence of actions described below.
IDLE STATE
In the idle state the microcomputer 7 scans all connected telephone exchange lines looking for activity. The microcomputer achieves this by connecting the telephone exchange lines to
SUBSTITUTE SHEET the line state detector 3 via the switching matrix 2. Each line is connected for a short period of time to determine whether the line is idle, busy or ringing. The line state detector 3 determines this by measuring the line voltage and comparing the measured voltage to a look up table in the microcomputer's memory. From the information gathered from the look up table the microcomputer can determine whether die lines are idle, busy or ringing.
INCOMING CALL
While the hand set is on hook the only line state the microcomputer 7 needs to act on is ringing. If a line is found to have a ringing line state the microcomputer 7 will connect the line to the ring cadence detector 4. The ring cadence detector 4 will first product an envelope of the ring signal because the ring signal frequencies do not contain any information, all the information is in the ring signal's cadence. The ring signal's envelope is used to determine its cadence that is, the duration of the ring signal bursts and the time interval between the ring signal. The ring signal's envelope timing continues until the ring cadence can be defined, this would normally take on complete ring cadence cycle (see Figure 25). Once the ring cadence has been determined the microcomputer can then look for a pattern match in the user configurable ring cadence table. If the ring cadence received from the telephone exchange matches the pattern programmed by the user the ring cadence detector 4 provides the microcomputer 7 with a pattern match response.
If no ring cadence detection is programmed by the user, the microcomputer will generate an audible ring tone for all ring cadences received. The microcomputer 7, after the ring cadence detector has signalled a match, will first check to see if the ring is programmed on. If so the microcomputer will turn the audible ring tone generator on and off with the same cadence as the receive ring signal from the telephone exchange. If the ring is programmed off, the only indication that the ring signal has been received from the telephone exchange is a lamp flashing in sequence with the ring cadence.
When the user lifts the hand set 8 of the microcomputer 7 will connect the telephone line to the analogue speed circuitry 6 via telephone exchange line interface 1 and switching matrix 2. Once the telephone line is connected to the analogue speech circuitry 6, "ring trip" signals the telephone exchange that the call has been answered, the telephone exchange remove the ring signal and provides a speech path.
When the user restores the hand set 8 at the end of the call, the microcomputer 7 disconnect the telephone line from the analogue speed circuitry, thus removing the loop from the line, restoring the line to the idle state.
SUBSTITUTE SHEET OUTGOING CALL
To make an outgoing call on the telephone the user lifts the handset which signals to the microcomputer 7 that an idle telephone line is required. The microcomputer connects each telephone line in turn to the line state detector 3 via the switching matrix 2 until an idle line is detected. The idle line is then connected to the analogue speed circuitry 6 providing a loop that signals to the telephone exchange that an outgoing call is required. The user enters the directory number required on the key pad 11 which is scanned by the microcomputer 7. As the microcomputer reads the number dialled by the user, it connect the DTMF generator to line via switching amtrix 2, then transmits the dialled number as DTMF codes.
USER PROGRAMMING
The telephone is programmed by the user entering codes via the key pad 1 1 while the hand set 8 is on hook. The on hook hand set 8 enables the programming mode. A personal identification number stops the XAN telephone configuration being altered by other persons. The configuration data programmed by the user is stored in the microcomputer's memory. This memory is battery backed up to protect against power failure.
The following is a description of each block in figure 26.
Telephone exchange line interface 1 interfaces the hards external environment to the electronics in the telephone. All eranious voltages on the line are limited to a safe level by this interface.
Switching matrix 2 provides a cross point switch to interconnect the telephone exchange line to either the DTMF generator 5, ring cadence detector 4, line state detector 3 or analogue speech circuitry 6.
DTMF generator 5 converts the numbers entered via the key pad 11 into DTMF code then send the DTMF signals to the telephone exchange line.
Ring cadence detector 4 monitors a ring signal from the telephone exchange. The ring cadence detector is a combination of interface circuitry and microcomputer hardware and software. The interface circuitry interfaces the analogue ring signal to digital environment of the microcomputer's. The microcomputer uses its software to provide the envelope function, timing function and ring cadence matching. The ring signal is first processed by an envelope detector to produce an envelope of the ring signal waveform. The ring signal waveform envelope is then processed by the microcomputer's software timers. The timers
SUBSTITUTE SHEET time the period of each ring signal burst and the gaps between bursts. The timing of the ring signal continues until the ring cadence detector has received a complete ring cadence cycle. The timing data is then compared with a ring cadence table in memory to find a match. The output of the ring cadence detector indicates a ring cadence match.
Line state detector 3 indicates whether a telephone exchange line is idle, busy or ringing.
Microcomputer 7 controls the operation of the telephone. The ring cadence detector 4 and line state detector 3 software functions are provided by the microcomputer. The microcomputer has battery backed up memory for storing configuration data etc.
Key pad 1 1 is a numerical and function key pad to control the various features of the telephone.
Audio/Visual indicator 9. The audio indicator provides audible tones for such things as confidence tone when keys are pressed on the key pad, system operation enor tones and ring tone for signalling incoming calls.
The visual indicator 10 is a mixture of lamps and alpha - numeric display to indicate such things as incoming ring signal present, time and date, number dialled, telephone operating mode (e.g. ring off or on, programming), etc.
Analogue speech circuitry 6 provides the speech path between the telephone line and the handset 8. The analogue speech circuitry 6 also provides a loop across the telephone line to indicate, to the telephone exchange, an incoming call has been answered or an outgoing call is required. The analogue speech circuitry also provides the 2 wire to 4 wire conversion for the telephone handset 8 and signals the microcomputer whether the handset is on or off hook.
Handset 8 provides the acoustic interface between the user and the analogue speech circuitry.
XAN MAILBOX FACSIMILE FOR ANALOGUE ENVIRONMENT
This invention relates to improvements to present mailbox facsimile machines by providing a electro-mechanical mailbox apparatus to provide secure storage containers for printed facsimile messages.
The objective of this invention are to provide a mailbox facsimile machine with the following:
SUBSTITUTE SHEET • The ability to direct the facsimile message print-outs to several mailbox containers.
• Provide access to .the mailbox container without interfering with incoming facsimile messages.
• Provide secure mailbox containers for facsimile message printouts. Only the recipient of die facsimile message is to have access to the print-out.
• The ability to use several different ring cadences, from the telephone exchange, to provide the routing information required by the electro-mechanical mailbox system.
The ability to connect to several different analogue telephone exchange lines, each using several different ring cadences.
• Provide a visual indicator for each mailbox when a facsimile message print-out has been received.
• Compatibility with a range of special telecommunications products and enhanced telephone exchange software, to provide a telecommunications system known as XAS (Exchange Area Network) (See Figure 28).
PRESENT STATE OF THE ART
The present state of the an mailbox facsimile machine stores the messages on electronic mass storage devices, such as disk drives or integrated circuit memory. To transmit a personal facsimile message to the facsimile machine mailbox system the calling party must know the mailbox number. This number is entered after the facsimile machine has answered the call, by the tone dialling keypad on the calling party's phone. The recipient retrieves the facsimile messages from the mailbox system by entering a personal identification number on the facsimile machine's control panel. Once the personal identification number has been entered the recipient must then wait until the facsimile machine can print out the facsimile messages stored in the mailbox.
This method of providing a facsimile mailbox machine has some impracticalities. The first being that the calling party wanting to leave a personal facsimile message in the recipient's facsimile machine's mailbox must know the mailbox number. Also the calling party must have a telephone with tone dialling facilities (in Australia tone dialling telephone penetration is only about 5%). The second impracticality is that the recipient of the facsimile message, stored in the facsimile machine's mailbox system, must wait until the messages are printed. This becomes a Droblem if long facsimile. mρ.ςςa«rp<; ha hpcn τprp ipA tw-nc- nf t o
SUBSTITUTE SHEET . Page 123 length of time taken to retrieve and print the facsimile messages (up to 15 seconds per page). Other persons requiring their message from the facsimile machine mailbox system or wanting to send a facsimile message must wait until the first person has finished printing the contents of the mailbox. The third impracticability is the amount of electronic storage needed for a facsimile mailbox system. Facsimile messages are created by digitising an image, whether the image is a page of writing or a picture. The more detail in the image the larger the facsimile message (a picture may generate a facsimile message in excess of 1,000,000 bits of information). To provide a facsimile mailbox system with electronic mass storage becomes very expensive because of the large amount of electronic mass storage required.
The impracticabilities of the present state of the art facsimile machines with mailbox facilities are the method of directional facsimile messages to a particular mailbox, the time wasted while mailbox messages are being printed, and the cost of providing enough electronic mass storage.
THE PRESENT INVENTION
This mailbox facsimile machine provides a mailbox facility for facsimile message print¬ outs. As the individual mailboxes are secure storage containers, this allows the recipients of facsimile message print-outs to have a confidential mailbox system.
Addressing facsimile mail to the facsimile mailbox system, by an external calling party, is achieved by two methods. The first method is the conventional method of using a tone dial telephone to send a mailbox address to the facsimile machine after the facsimile machine has answered the call. The second method involves a telephone exchange line having several different listed directory numbers, with each number having a unique ring cadence. Each ring cadence may be decoded by the mailbox facsimile machine as a mailbox address.
The ring cadence method of directing facsimile message to mailboxes is ideal when the users of the system prefer their own listed directory number for their facsimile service. The tone dialling method is ideal when users of the system want a general mailbox for normal facsimile messages and special mailboxes for confidential facsimile messages. The advantage of this invention is that it allows a mixture of both systems providing a flexible facsimile service to its users (See Figures 29 & 30).
Access to the mailboxes is provided by a personal identification number entered via a keypad on the facsimile machine or an optional key lock for added security. A visual indication, which may be on the telephone handsets, warns the mailbox owner when a
SUBSTITUTE SHEET facsimile message has been received. The visual indicator is reset when the facsimile messages are removed from the mailbox.
The mechanism used to provide the mailbox system is an electro-mechanical apparatus, controlled by the facsimile's electronics, that takes the facsimile message from the printer and deposits it in a physical mailbox. The messages are deposited face down so when removed from the mailbox the facsimile messages are in chronological order (See Figure 32).
Figure 33 shows the block diagram of the XAN Mailbox Facsimile Machine in the prefened embodiment of the present invention designed for an analogue environment. The operation of the system follows the sequence of actions described below.
IDLE STATE
In the idle state the microcomputer 6 controls the switching matrix 2 to connect each telephone line via the telephone line interface 1 to the line state detector 5. As each line is connected to the line state detector 5, the detector's output will indicate the state of the line, that is, idle, busy or ringing. The micro computer 6 on reading an idle or busy state from the line state detector 5 will connect the next telephone line to the line state detector 5 via the switching matrix 2. The procedure will continue until the micro computer 6 reads a ring line state from the line state detector 5 or a transmit command is entered via the keypad 9.
INCOMING CALLS
When an incoming call is detected by the microcomputer 6 reading ring state from the line state detector 5, the microcomputer 6 then checks the user configurable tables in its memory to determine if ring cadence detection is required and/or delay answer timing is required.
If ring cadence detection is required the microcomputer 6 will connect, via the switching matrix, the ring cadence detector 4 across the line. The ring cadence detector 4 will first produce an envelope of the ring signal because the ring signal frequencies do not contain any information, as all the information is in the ring cadence (see figure 34). The ring signal's envelope is used to determine its cadence, that is, the length of the bursts of ring signal and the time internal between bursts of ring signal. The ring signal's envelope timing continues until the ring cadence can be defined, which would normally take one complete ring cadence cycle. If the microcomputer 6 reads a pattern match from the ring cadence detector 4 the microcomputer 6 will proceed to connect the telephone line to the facsimile machine electronics 7 via the telephone line interface 1 and switching matrix 2. The ring cadence is also used by the microcomputer as a mail box address that is the ring cadence is unique to a listed telephone directory number therefore the ring cadence indicates the recipient of the facsimile message. The microcomputer 6 selects the recipient's mailbox via the mailbox feed and gating mechanism controlled by the electro-mechanical mailbox apparatus electronics 8.
The facsimile machine electronics 7 loops the exchange line, signalling to the telephone exchange, that the call has been answered. The microcomputer will also connect the DTMF receiver/transmitter 3 in receive mode to see if the calling party wishes to send any command via the DTMF dial on the telephone. If no DTMF control signals are received after a user programmable time the DTMF receiver/transmitter 3 is disconnected from the line allowing a normal G3 facsimile transmission to be received.
The G3 facsimile message is sent to the printer apparatus via a memory buffer. The printer output is then fed into the mailbox distribution apparatus controlled by the electro¬ mechanical mailbox apparatus electronics 8. Various friction feed rollers and gating devices, controlled by the electronics guide the facsimile message into the recipients mailbox, then the microcomputer 6 flashes the mailbox indicator lamp (see figure 31). The mailbox indicator lamp will continue to flash until the recipient of the facsimile message opens the mailbox by entering his personal identification number and operates the retrieve mail function key on the key pad 9, the microcomputer 6 will open the selected mailbox by operating the electro-mechanical mailbox door latch.
OUTGOING CALLS
To send an outgoing facsimile message, the user presses the transmit function key on key pad 9 which signal to the microcomputer 6 that an idle telephone line is required. The microcomputer connects each telephone line in turn to the line state detector 5 via the switching matrix 2 until an idle line is detected. The idle line is then connected to the facsimile machine electronics 7 providing a loop that signals to the telephone exchange that an outgoing call is required. The user enters the directory number required on the key pad 9 which is scanned by the microcomputer 6. As the microcomputer reads the number dialled by the user, it connects the DTMF receiver/transmitter in transmit mode to line via switching matrix 2, and send the number to line as DTMF codes.
The following is a description of each block in figure 35. Telephone exchange line interface 1 interfaces the harsh external environment to the electronics in the mailbox facsimile. All enoneous voltages on the line are limited to a safe level by this interface.
Switching matrix 2 provides a cross point switch to interconnect the telephone exchange line to either the DTMF receiver/transmitter, ring cadence detector, line state detector, or facsimile machine electronics.
DTMF receiver/transmitter 3 either converts the number entered, via the key pad 9, into DTMF code, then sends the DTMF signals to the telephone exchange line or receives DTMF signalling from the telephone exchange line and decodes them into digits for the microcomputer.
Ring cadence detector 4 monitors a ring signal from the telephone exchange. The ring cadence detector is a combination of interface circuitry and microcomputer hardware and software. The interface circuiting interfaces the analogue ring signal to the microcomputer's digital environment. The microcomputer uses software to provide the envelope detector, timing function and ring cadence matching. The ring signal is first processed by the envelope detector to produce an envelope of the ring signal waveform. The ring signal waveform envelope is then processed by the microcomputers software timers. The timers measure the period of each ring signal burst and the period between bursts. The timing of the ring signal continues until the ring cadence detector has received a complete ring cadence cycle. The timing data is then compared with a ring cadence table in memory to find a match. The output of the ring cadence detector indicators that a ring cadence match was found.
Line state de* >r 5 indicates whether a telephone exchange line is idle, busy or ringing.
microcomputer 6 controls the operation of the mailbox facsimile machine, the ring cadence detector 4 and line state detector 5 software functions are also provided by the microcomputer. The microcomputer has battery backed up memory for storing configuration data etc.
Facsimile machine electronics 7 are the electronics to drive the electro-mechanics of the mailbox facsimile machines message receiving and transmitting mechanism.
Electro-mechanical mailbox apparatus' electronics 8 drive the electro-mechanical feed and gating mechanisms that take the facsimile message print-outs and distribute them to the recipients' mailbox. Key pad 9 is a numerical and function key pad to control the various features of the mailbox facsimile machine.
Audio/visual indicator 9. The audio indicator provides audible tones for such things as confidence tone when keys are pressed on the key pad 9, system operation enors, and system operation status. The visual indicator is a mixture of lamps and an alphanumeric display, to indicate such things as facsimile message printouts in mailbox and operating status.
XAN MAILBOX MODEM
This invention relates to an improvement in asynchronous modems by using ring cadence decoding to provide device addressing and mailbox facilities for asynchronous data transmissions between computers, printers, plotters and other peripheral devices.
OBJECTIVES
The objectives of this invention are to provide a modem with the following:
The ability to use several different ring cadences from the telephone exchange to provide data routing information for directing data into the recipient's mailbox.
Ring cadence decoding to allow the modem to be addressed by a calling party.
The ability to connect to several telephone lines, each using ring cadence signalling to provide data routing information.
The ability to operate in auto answer mode without interfering with other telecommunication terminal equipment, such as telephones (normally an auto answer modem will answer all incoming calls).
Mailbox facilities for data, based on ring cadence signalling to provide addressing of data.
Compatibility with a range of special telecommunication products and the enhanced telephone exchange facilities to form part of a system known as XAN (Exchange Area Network). . Page 128
PRESENT STATE OF THE ART
Modems are commonly found in residential telecommunication systems, as many people have a need to communicate periodically with mainframe computers, information systems, etc., from home. Making outgoing calls does not create any problems apart from tying up the telephone line for long periods. Incoming data calls are a different matter, as the modem need to operate in auto answer mode. The modem when in auto answer mode, will answer all incoming calls making the telephone line a dedicated data service, until the modem is restored from auto answer mode.
Mailbox facilities, provided for data at present, use a system of prompts and responses to direct data into the recipient's data mailbox. The calling party wishing to transmit to receive data, to or from a data mailbox, first dials the listed directory number to access the system. Once the system has answered the call, the calling party switches his modem on line. When prompted by the system, the user logs on and proceeds to gain access to the required mailbox via various menus.
The problem of present modems, when operating in auto answer mode, is that the use of the telephone line for normal incoming voice calls is lost. This is because modems can not distinguish between voice calls and data calls, even though the telecommunication provider can supply the various services with different ring cadence signalling.
For data mailbox systems with only a single line access, it is not possible to have access directly to a particular data mailbox even though the telecommunication provider can supply call direction information. The call directing information, in the form of a unique ring cadence for each listed directory number associated with the telephone line, can not be decoded by present modems.
THE PRESENT INVENTION
The present invention enhances modems by providing them with ring cadence decoding. This enhancement greatly improves the performance of modems operating in auto answer mode in residential telecommunications systems. The modem will now only answer an incoming call if the ring signal's cadence matches the ring cadence programmed into the modem. The residential installation, having only a single telephone line, can now have ring cadence decoding modems coexisting with other telecommunication terminal equipment such as telephones (see figure 35). The ring cadence decoding modem also provides a data mailbox feature. This is achieved by using the ring cadence signalling to provide the modem with the data mailbox addressing information.
The ring cadence decoding telephone line interface for modems also has the ability to connect to several telephone lines. The modem can now monitor all connected lines for it programmed ring cadence or cadences, making all telephone lines available for data and voice calls.
Figure 36 shows the block diagram of the XAN Mailbox Modem in the prefened embodiment of the present invention designed for an analogue environment. The operation of the system follows the sequence of actions described below.
IDLE STATE
In the idle state the microcomputer 10 controls the switching matrix 2 to connect each telephone line via the telephone line interface 1 to the line state detector 6. As each line is connected to the line state detector 6, the detector's output will indicate the state of the line, that is, idle, busy or ringing. The microcomputer 10, upon reading an idle or busy state from the line state detector 6, will connect the next telephone line to the line state detector 6 via the switching matrix 2. The procedure will continue until the microcomputer 10 reads a ring line state from the line state detector 6 or a transmit command is entered via the computer bus interface 1 1.
INCOMING CALLS
When an incoming call is detected by the microcomputer 10 reading ring state from the line state detector 6, the microcomputer 10 then checks the user configurable tables in its memory to determine if ring cadence detection is required and/or delay answer timing is required.
If ring cadence detection is required the microcomputer 10 will connect, via the switching matrix 2, the ring cadence detector 5 across the line. The ring cadence detector 5 will first product an envelope of the ring signal because the ring signal frequencies do not contain any information, as all the information is in the ring cadence (see figure 37). The ring signal's envelope determines its cadence, that is, the length of the bursts of ring signal and the time interval between bursts or ring signal. The ring signal's envelope timing continues until the ring cadence can be defined, which would normally take one complete ring cadence cycle. If the microcomputer 10 reads a pattern match from the ring cadence detector 5 the microcomputer 10 will proceed to connect the telephone line to the asynchronous modem 3 via the telephone line interface 1 and switching matrix 2. The ring cadence may also be used by the microcomputer as a mail box address. That is, the ring cadence is unique to a listed telephone directory number, therefore the ring cadence indicates the recipient of the data.
The asynchronous modem 3 loops the exchange line, signalling to the telephone exchange, that the call has been answered. The microcomputer will also connect the DTMF receiver/transmitter 43 in receive mode to see if the calling party wishes to send any command via the DTMF dial on the telephone. If no DTMF control signals are received after a user programmable time the DTMF receiver/transmitter 4 is disconnected from the line allowing normal data transmission.
The asynchronous modem 3, when connected to line by the microcomputer 10, will switch into answer mode and send a burst of tone to line, disabling any echo suppressors in the telecommunication link. The asynchronous modem then sends the required carrier to line for the transmission speed selected by the user. When the carrier is detected from he calling person's modem, data transmission can proceed.
Data received from the telephone line by the asynchronous modem 3 is ready by the microcomputer 10 and either stored in a data mailbox or a receive data buffer in the mass storage buffer 7. Transmitted data is sourced from either a data mailbox or a transmit data buffer in the mass storage device 7 by the microcomputer 10 and written to the asynchronous modem 3 at the line transmission rate.
OUTGOING CALLS
Outgoing calls are originated by the host computer communicating to the microcomputer 10 via the computer bus interface 1 1. The microcomputer needs the listed directory number, and telecommunication transfer rate, e.g. 2,400 bits of data per second.
Once the microcomputer 10 has received the required data from the host computer it is able to scan for an idle line. The microcomputer 10 connects each telephone line in turn ;o the line state detector 6 via the telephone exchange line interface 1 and switching matrix 2 until an idle telephone line is found. The microcomputer dials the number of the required data service by placing the DTMF receiver/transmitter 4 in transmit mode across the line, signalling to the telephone exchange that an outgoing call is required. The receiver/transmitter 4 then sends the digits of the telephone number, as DTMF tones to the telephone exchange. The microcomputer 10, after dialling, connects the asynchronous modem 3 across the telephone line and places the DTMF receiver/transmitter 4 to the high impedance receive mode. The asynchronous modem 3 maintains the line loop to prevent the telephone exchange disconnecting the call. The asynchronous modem 3 waits for the called data service's modem to respond by sending the carrier to line. The received carrier is detected by the asynchronous modem 3 and signals the microcomputer 10 that data transmission can commence. The data received is either stored in a data mailbox in the mass storage 7 or sent to the host computer via a data receive buffer in the mass storage 7.
Transmitted data is sourced from either a data mailbox or a transmit data buffer in the mass storage 7. The asynchronous modem 3 detects the end of communications by loss of carrier signal or lack of data activity. The microcomputer can force an end to data communications by disconnecting the asynchronous modem 3 from across the line, signalling the telephone exchange that the call is completed.
The various operating modes of the data mailbox modem allow it to operate as a simple modem, a modem that is addressable by incoming telephone exchange ring cadence signalling or a mailbox modem providing the user with secure data mailboxes. The modem is configured by the user of the host computer. Configuration data is sent to the microcomputer 10 from the host computer via the computer bus interface 1 1 and stored in battery backed up memory.
The following is a description of each block in figure 36.
Telephone exchange line interface 1 interfaces the harsh external environment to the electronics in the mailbox modem. All enoneous voltages on the line are limited to a safe level by the interface.
Switching matrix 2 provides a cross point switch to interconnect the telephone exchange line to either the DTMF receiver/transmitter, ring cadence detector, line state detector, or asynchronous modem.
DTMF receiver/transmitter 4 either converts the number entered, via the key pad 9 or computer bus interface 1 1 , into DTMF code, then send the DTMF signals to the telephone exchange line or receives DTMF signalling from the telephone exchange line and decodes them into digits for the microcomputer.
Ring cadence detector 5 monitors a ring signal from the telephone exchange. The ring cadence detector is a combination of interface circuitry, and microcomputer hardware and software. The interface circuitry interfaces the analogue ring signal to the microcomputer's digital environment. The microcomputer uses software to provide the envelope detector, timing function and ring cadence matching. The ring signal is first processed by the envelope detector to produce an envelope detector, timing function and ring cadence matching. The ring signal is first processed by the envelope detector to produce an envelope of the ring signal waveform (see figure 37). The ring signal waveform envelope is then processed by the microcomputer's software timers. The timers measure the period of each ring signal burst and the period between bursts. The timing of the ring signal continues until the ring cadence detector has received a complete ring cadence cycle. The timing data is then compared with a ring cadence table in memory to find a match. The ouφut of the ring cadence detector indicates that a ring cadence match was found.
Line state detector 6 indicates whether a telephone exchange line is idle, busy or ringing.
Microcomputer 10 controls the operation of the mailbox modem. The ring cadence detector 5 and line state detector 6 software functions are also provided by the microcomputer. The microcomputer has battery backed up memory for storing configuration data, etc.
Mass Storage 7 - provided by solid state semiconductor memory, to buffer data received over the telephone line or sent by the host computer for transmission. The mass storage can also be used as mailbox storage if the modem is being shared by several users.
Key Pad 8 - is a numerical function key pad to control the various features of the modem.
The Audio/Visual Indicator 9 - provides audible tones for such things as confidence tone when keys are pressed on the key pad 8, system operation enors, and telephone line monitoring. The visual indicator is a number of lamps, and to indicate such things as modem receiving ring signal, modem in auto answer mode, etc.
Asynchronous Modem 3 converts the analogue line signals into digital signal suitable for the microcomputer 10. The asynchronous modem also provides the necessary line loop across the telephone lines to signal the telephone exchange that the modem is answering an incoming call or requesting an outgoing call.
Computer Bus Interface 1 1 provides the interconnection between the mailbox modem's microcomputer and the host personal computer's bus.
XAN-EXCHANGEAREANETWORK
This invention relates to providing an improvement to the telecommunications system to a residential subscriber. The invention allows a number of new terminal devices to take advantage of the improvement to the normal telecommunications service. These devices include an improved telephone, mailbox answering machine, mailbox facsimile machine, mailbox printer, new computer interface (see figure 38).
OBJECTIVES
The objectives of this invention are to provide an improved telecommunications system to a residential subscriber that:
• can assign several listed directory numbers to a single telephone exchange line. Each listed directory number has a unique ring cadence used by telecommunication terminal equipment as sub addressing.
Allows each directory number for a telephone exchange line to have a unique ring cadence. This will enable several ring cadence decoding telecommunication terminal equipment to share the one telephone line.
• will scan a group of telephone exchange lines assigned to the residential installation, search for an idle line and then send the ring cadence on that line.
PRESENT STATE OF THE ART
For many years ring cadence signalling has been used on party lines. That is, a number of subscribers share the one telephone exchange line. The pany line subscribers detected their calls by listening to the unique audible tone produced by their telephones in response to the ring cadence signals transmitted from the telephone exchange. The use of party line is popular in areas with over utilised cable reticulation, because it allows more subscribers to be connected to the telephone exchange than there are cable pairs.
With the introduction of new electronic telephone exchanges, the telecommunication network providers have developed private automatic branch exchange (PABX) features within the exchange. This allows a business to have a PABX system without investing in expensive office based PABX equipment. The software in the exchange provides all the features available in an office based PABX.
The problem with providing a PABX service from an electronic telephone exchange, is that all extensions individually cable back to the telephone exchange. In an office generating a great amount of telecommunication traffic, the cost of providing individual telephone exchange lines to each extension can be easily justified. In residential and small business situations, the cost of providing individual telephone exchange lines to each extension could not be justified because of the small amount of telecommunication traffic generated. It is expensive for the users of a telephone exchanged based PABX to have the telephone exchange lines (used as extensions) idle.
THE PRESENT INVENTION
The present invention solves the problem of having to provide a telephone exchange line for each telephone with a listed directory number at the subscriber's premises. By modifying the software in the new electronic telephone exchange it is possible to provide a service that will allow several telephones, each with a listed directory number, to be connected to the one telephone exchange line (see figure 39). The telephones sharing the one telephone line can be individually accessed by a calling person simply dialling the listed directory number. It should not noted that the telephone that supports this service is not a standard telephone, but a telephone developed especially for this new facility.
The new electronic telephone exchange can provide a PABX facility suitable for small businesses which provide multiple telephone exchange lines to each subscriber. The telephone exchange PABX system can now be provided using only enough telephone exchange lines for the telecommunication traffic generated by the users. The invention adds the facility to use different ring cadences on each line, thus providing a system that will support several telephone extensions on each line. This will be beneficial to the telecommunications provider and subscribers because it will increase the amount of telecommunication traffic per telephone line, as well as, reduce the telephone line cost.
The invention changes the way in which the telecommunication system relates the listed directory number to a telephone exchange line. The present system relates a single listed directory number to a telephone line while the new system relates several listed directory number to a ring cadence that may be transmitted down a designated line or group of lines. When the telephone exchange is requested by a calling party to connect to one of the special telephones via the enhanced software in the electronic telephone exchange, the exchange will first scan the telephone lines assigned to the subscriber for an idle line. Once an idle line is found, the electronic telephone exchange will connect the ring cadence that conesponds to the listed directory number. The special telephone handset then scan the telephone exchange line group for their particular ring cadence. The particular special telephone that matches the ring cadence will then inform the recipient of an incoming call by producing an audible ring tone.
Figure 40 is an "in principle" flow chart of the software enhancements required to allow the new electronic telephone exchanges to use the ring cadence signalling system suitable for the new ring cadence decoding telecommunications terminal equipment. The following is a description of the software operation for an incoming call using ring cadence signalling and a' group of multiple telephone lines to the subscribers telecommunication terminal equipment. There is no description of an outgoing call from the ring cadence decoding telecommunication terminal equipment. The existing telephone exchange software in its present form can provide all the required facilities to support this system.
The electronic telephone exchange, on receiving a directory number from a calling person, analyses the digits to determine whether the number requires ring cadence signalling. The data used by the telephone exchange to determine the need of ring cadence signalling, is stored in the subscriber's data base. The data base holds all of the information related to each subscriber, that is, any data required for providing such facilities as abbreviated dialling, incoming call redirection, etc. Ring cadence signalling data is also part of the subscriber's database.
Once the electronic telephone exchange has determined that the called person has the ring cadence signalling facility, the relevant data is extracted from the data base. This data contains the telephone line group associated with the subscriber's listed directory number and the timing for the ring cadence signalling.
The selection of an idle telephone line in the line group allows the electronic telephone exchange to connect to connect to the subscriber and then to send the selected ring cadence to the subscriber's special terminal equipment. The electronic telephone exchange, by knowing the state of each telephone line in the line group and the special subscriber terminal equipment's ability to monitor all lines in the telephone line group, allows the ring cadence signalling to be transmitted on any idle telephone line in the line group. As there are many more listed directory numbers (each with its own unique ring cadence) than lines in the line group, the ability for the electronic exchange to know the state of each line is essential.
The idle telephone line selected by the electronic telephone exchange is connected to a ring signal generator with the required ring cadence. Only one ring cadence signal per idle telephone exchange line is permitted, as multiple ring cadence signals would interact, making decoding by the telecommunication terminal equipment unreliable.
Once the ring signal generator is connected to the telephone line, the telephone exchange waits for the telecommunication terminal equipment to signal that the call has been answered. The call answer signal, provided by the terminal equipment, is a resistive loop across the line. Once the call answer signal is received by the telephone exchange, it will disconnect the ring signal generation and provide a communication path back to the calling party.
EXCHANGE AREA NETWORK (XAN) - DIGITAL
CONFIGURATION 1
Provided there are a number of telephone jacks (extensions) within the household a telephone service subscriber could purchase a: IdentiCall Telephone/Mailbox Answering Machine Unit; and a number of IdentiCall Telephones; a Physical Mailbox Facsimile Machine; a Physical Mailbox Printer Machine; and a number of Call Direction Personal Computers to convert his domestic telecommunications system into an Exchange Area Network (XAN). As a result of the XAN the subscriber would avoid the cost of: a PABX; and a Voice Mail System. In addition, the subscriber would be provided with capabilities suitable for the sub-addressing of data between computers, facsimile machines, printers and plotters.
Let's assume that there are three telephone jacks (extensions) within the Smith household. One telephone jack is in the: lounge room; Mr and Mrs Smith's bedroom; and Junior Smith's bedroom. Let's also assume that there is a: IdentiCall Telephone/Mailbox Answering Machine Unit; a Physical Mailbox Facsimile Machine; and a Physical Mailbox Printer Machine in the lounge room. In addition a IdentiCall Telephone and Call Direction Personal Computer within both Mr and Mrs Smith's bedroom and Junior Smith's bedroom.
As a result, Mr Smith, Mrs Smith and Junior Smith could have their personal telephone calls directed to their respective bedrooms. In addition, after a period of telephone call answering unavailability, each person could access their lounge room Mailbox Answering Machine messages from their respective bedrooms or from outside the household itself. Further, Mr Smith, Mrs Smith and Junior Smith's personal ring tone can be controlled: meaning each personal ring tone can be annunciated at convenient times for each called person, otherwise the mailbox answering machine will immediately deposit the caller's message in the called person's answering machine mailbox. The latter capability is known as Ring Turn On/Off and the command is even operational by using the IdentiCall Telephone within the called person's respective bedroom or from outside the household itself.
This system utilises very little digital exchange intelligence to convert the household telephone system into a domestic PABX and Voice Mail system. Prior to the IdentiCall Telephone/Mailbox Answering Machine combination "as above" a subscriber would have to purchase a PABX, a centralised voice mail system database and terminal equipment. Not to mention being liable for the expense associated with installation, maintenance and user costs.
In the digital example provided, Mr and Mrs Smith's Personal Computer, Junior Smith's Personal Computer or any other Computer for that matter, can transmit data to and from each other by using the XAN. The Physical Mailbox Printer Machine could be located in, say, the lounge room so that the Personal Computer terminals within the household and outside the household can instruct the printer to print-out data and deposit the printed matter in Mr Smith. Mrs Smith or Junior Smith's physical printer mailbox.
With the XAN a telecommunications subscriber could also subscribe to XAN modem pools, network application programs and other programs and interfaces facilitating the compatibility of different devices and data. The XAN would be a valuable addition to Centrex and other exchange capabilities.
The Physical Mailbox Facsimile Machine creates the impression of artificial envelope conespondence through the transmission of the caller's facsimile conespondence to the called person's physical facsimile mailbox container. A mailbox capacity is also proposed for the following terminal types: Multi-Function Terminals; and the like.
An example of the Exchange Area Network (XAN) is provided on page three onwards.
Let's assume that there are three people in the Smith household.
. Mr Smith;
. Mrs Smith;
. Junior Smith.
Let's assume that there are three telephone jacks (extensions) in the household.
. a telephone jack in the living room;
. a telephone jack in Mr and Mrs Smith's bedroom;
. a telephone jack in Junior Smith's bedroom. Let's assume that in the lounge room there is a:
. IdentiCall Telephone/MAM unit;
. Physical Mailbox Facsimile Machine.
Let's assume that in Mr and Mrs Smith's bedroom there is a:
. IdentiCall Telephone;
. Call Direction Personal Computer.
Let's assume that in Junior Smith's bedroom there is a:
. IdentiCall Telephone;
. Call Direction Personal Computer.
Let's assume that the telephone number (not including the first and second sub-addressing digit(s)) is:
. 344-0614
Let's assume that for the first sub-addressing digit(s):
. Mr Smith's Call Direction number is * 1;
. Mrs Smith's Call Direction number is * 2;
. Junior Smith's Call Direction number is * 3.
Let's assume that for the second sub-addressing digit(s) the:
. IdentiCall Telephone(s)/MAM terminal number is * 1;
. Mailbox Facsimile Machine terminal number is * 2;
. Personal Computer(s) terminal number is * 3;
. Mailbox Printer Machine terminal number is * 4;
SENDER
If 3440614 * 1 * 1 * is dialled - Mr Smith's ring tone would sound. If 3440614 * 2 * 1 * is dialled - Mrs Smith's ring tone would sound.
If 3440614 * 3 * 1 * is dialled - Junior Smith's ring tone would sound.
If Mr Smith's ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
You have called John Smith please leave your message after the beep.
If Mrs Smith ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
You have called Mrs Smith please leave your message after the beep.
If Junior Smith's ring tone is not answered (or is in turn off mode) then the MAM would come on and prompt:
You have called Junior Smith please leave your message after the beep.
RECEIVER
If Mr Smith enters his padlock command:
Mr Smith's messages are played.
If Mrs Smith enters her padlock command:
Mrs Smith's messages are played.
If Junior Smith enters his padlock command:
Junior Smith's messages are played.
THE LIVING ROOM - PHYSICAL MAILBOX FACSIMILE MACHINE
SENDER
If 3440614 * 1 * 2 * is dialled - The fax material is directed to Mr Smith.
If 3440614 * 2 * 2 * is dialled - The fax material is directed to Mrs Smith.
If 3440614 * 3 * 2 * is dialled - The fax material is directed to Junior Smith. The first sub-addressing digit could annunciate a personal ring tone on the IdentiCall Telephone/MAM unit and/or the Physical Mailbox Facsimile Machine for a short designated time just to inform the called person of the caller's transmission of facsimile conespondence.
RECEIVER
If John Smith enters his padlock command:
John Smith's facsimile correspondence can be retrieved from his physical mailbox container.
If Mrs Smith enters her padlock command:
Mrs Smith's facsimile correspondence can be retrieved from her physical mailbox container.
If Junior Smith enters his padlock command:
Junior Smith's facsimile correspondence can be retrieved from his physical mailbox container.
THE LIVING ROOM - PHYSICAL MAILBOX PRINTER MACHINE
SENDER
If 3440614 * 1 * 4 * is dialled - The print-out is directed to Mr Smith.
If 3440614 * 2 * 4 * is dialled - The print-out is directed to Mrs Smith.
If 3440614 * 3 * 4 * is dialled - The print-out is directed to Junior Smith.
The first sub-addressing digit could annunciate a personal ring tone on the IdentiCall Telephone/MAM unit and/or the Physical Mailbox Printer Machine for a short designated time just to inform the called person of his/her print-out.
RECEIVER
If John Smith enters his padlock command:
John Smith's print-out can be retrieved from his physical mailbox container. If Mrs Smith enters her padlock command:
Mrs Smith's print-out can be retrieved from his physical mailbox
!>» container.
If Junior Smith enters his padlock command:
Junior Smith's print-out can be retrieved from his physical mailbox container.
MR AND MRS SMITH'S BEDROOM - STANDARD IDENΗCALL TELEPHONE
SENDER
If 3440614 * 1 * 1 * is dialled - Mr Smith's ring tone would sound.
If 3440614 * 2 * 1 * is dialled - Mrs Smith's ring tone would sound.
If 3440614 * 3 * 1 * is dialled - No response from this bedroom phone.
If Mr Smith's ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt:
You have called John Smith please leave your message after the beep.
If Mrs Smith ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt:
You have called Mrs Smith please leave your message after the beep.
RECEIVER
If Mr Smith dials 3440614 * 1 * 1 # and his padlock command.
Mr Smith's messages are played.
If Mrs Smith dials 3440614 * 2 * 1 # and her padlock command.
Mrs Smith's messages are played. MR AND MRS SMITH'S BEDROOM - PERSONAL COMPUTER
SENDER
If 3440614 * 1 * 3 * is entered - The data is transmitted to/from this PC.
If 3440614 * 2 * 3 * is entered - The data is transmitted to/from this PC.
If 3440614 * 3 * 3 * is entered - No response from this PC terminal.
The first sub-addressing digit could annunciate a personal ring tone on the IdentiCall Telephone for a short designated time to inform Mr and Mrs Smith of their print-out to their respective physical printer mailbox container or the transmission of facsimile conespondence to their respective physical facsimile mailbox container.
PHYSICAL MAILBOX PRINTER MACHINE INTERFACE
If John Smith enters 3440614 * 1 * 4 *:
John Smith's data transmission is printed and deposited in his physical mailbox container.
If Mrs Smith enters 3440614 * 2 * 4 *:
Mrs Smith's data transmission is printed and deposited in her physical mailbox container.
IDENTICALL TURN ON
If Mr Smith dials 3440614 * 1 * 1 # and 33 * (IdentiCall turn on) and his padlock command.
As a result, if a caller dials Mr Smith his ring tone would sound - the caller's telephone message is deposited in his answering machine mailbox if the call is not answered.
If Mrs Smith dials 3440614 * 2 * 1 # and 33 * (IdentiCall turn on) and her padlock command.
As a result, if a caller dials Mrs Smith her ring tone would sound - the caller's telephone message is deposited in her answering machine mailbox if the call is not answered. IDENTICALL TURN OFF
If Mr Smith dials 3440614 * 1 * 1 # and 66 * (IdentiCall turn off) and his padlock command.
As a result, if a caller dials Mr Smith his ring tone would not sound - the caller's telephone message is immediately deposited in his answering machine mailbox.
If Mrs Smith dials 3440614 * 2 * 1 # and 66 * (IdentiCall turn off) and her padlock command.
As a result, if a caller dials Mrs Smith her ring tone would not sound - the caller's telephone message is immediately deposited in her answering machine mailbox.
MAILBOX OVER-RIDE
If a caller dials 3440614 * 1 * 1 # and 67 * (Mr Smith's priority command).
As a result, Mr Smith's telephone ring tone would sound - regardless of whether Mr Smith's ring tone is in IdentiCall turn off mode.
If a caller dials 3440614 * 2 * 1 # and 77 * (Mrs Smith's priority command).
As a result, Mrs Smith's telephone ring tone would sound - regardless of whether Mrs Smith's ring tone is in IdentiCall turn off mode.
JUNIOR SMITH'S BEDROOM - STANDARD IDENTICALL TELEPHONE
SENDER
If 3440614 * 1 * 1 * is dialled - No response from this bedroom phone.
If 3440614 * 2 * 1 * is dialled - No response from this bedroom phone.
If 3440614 * 3 * 1 * is dialled - Junior Smith's ring tone would sound.
But if Junior Smith's ring tone is not answered (or is in turn off mode) then the MAM in the living room would come on and prompt: You have called Junior Smith please leave your message after the beep.
RECEIVER
If Junior Smith dials 3440614 * 3 * 1 # and his padlock command.
Junior Smith's messages are played.
JUNIOR SMITH'S BEDROOM - PERSONAL COMPUTER
SENDER
If 3440614 * 1 * 3 * is entered - No response from this PC terminal.
If 3440614 * 2 * 3 * is entered - No response from this PC terminal.
If 3440614 * 3 * 3 * is entered - The data is transmitted to/from this PC.
The first sub-addressing digit could annunciate a personal ring tone on the IdentiCall Telephone for a short designated time to inform Junior Smith of the print-out to his printer mailbox or the transmission of facsimile conespondence to his physical facsimile mailbox container.
PHYSICAL MAILBOX PRINTER MACHINE INTERFACE
If Junior Smith enters 3440614 * 3 * 4 *:
Junior Smith's data transmission is printed and deposited in his physical mailbox container.
JUNIOR SMITH'S BEDROOM - STANDARD IDENTICALL TELEPHONE
IDENTICALL TURN ON
If Junior Smith dials 3440614 * 3 * 1 # and 33 * (IdentiCall turn on) and his padlock command.
As a result if a caller dials Junior Smith his ring tone would sound - the callers telephone message is deposited in his answering machine mailbox if the call is not answered. IDENTICALL TURN OFF
If Junior Smith dials 3440614 * 3 * 1 # and 66 * (IdentiCall turn off) and his padlock command.
As a result if a caller dials Junior Smith his ring tone would not sound - the callers telephone message is immediately deposited in his answering machine mailbox.
MAILBOX OVER-RIDE
If a caller dials 3440614 * 3 * 1 # and 57 * (Junior Smith's priority command).
As a result Junior Smith's telephone ring tone would sound - regardless of whether Junior Smith's ring tone is in IdentiCall turn off mode.
OUTSIDE TELEPHONE CALLING - MAILBOX ANSWERING MACHINE
If Mr Smith dials 3440614 * 1 * 1 # and his padlock command from outside the household.
Mr Smith's telephone messages are played.
If Mrs Smith dials 3440614 * 2 * 1 # and her padlock command from outside the household.
Mrs Smith's telephone messages are played.
If Junior Smith dials 3440614 * 3 * 1 # and his padlock command from outside the household.
Junior Smith's telephone messages are played.
OUTSIDE FACSIMILE CORRESPONDENCE TRANSMISSION - PHYSICAL MAILBOX FACSIMILE MACHINE
If John Smith enters 3440614 * 1 * 2 *:
John Smith can deposit facsimile correspondence in his physical mailbox container. If Mrs Smith enters 3440614 * 2 * 2 *:
Mrs Smith can deposit facsimile correspondence in her physical mailbox container.
If Junior Smith enters 3440614 * 3 * 2 *:
Junior Smith can deposit facsimile correspondence in his physical mailbox container.
OUTSIDE DATA TRANSMISSION - PERSONAL COMPUTERS
If John Smith enters 3440614 * 1 * 3 *: the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
If Mrs Smith enters 3440614 * 2 * 3 *: the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
If Junior Smith enters 3440614 * 3 * 3 *: the data is transmitted to/from Junior Smith's bedroom PC terminal.
OUTSIDE DATA TRANSMISSION TO THE PHYSICAL MAILBOX PRINTER MACHINE
If John Smith enters 3440614 * 1 * 4 *:
John Smith's data transmission is printed and deposited in his physical mailbox container.
If Mrs Smith enters 3440614 * 2 * 4 *:
Mrs Smith's data transmission is printed and deposited in her physical mailbox container.
If Junior Smith enters 3440614 * 3 * 4 *:
Junior Smith data transmission is printed and deposited in his physical mailbox container. DATA TRANSMISSION TO THE PHYSICAL MAILBOX PRINTER MACHINE AND TO THE CALL DIRECTION PERSONAL COMPUTERS.
If a caller enters 3440614 * 1 * 7 *:
the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
John Smith's data transmission is printed and deposited in his physical printer mailbox container.
If a caller enters 3440614 * 2 * 7 *:
the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
Mrs Smith's data transmission is printed and deposited in her physical printer mailbox container.
If a caller enters 3440614 * 3 * 7 *:
the data is transmitted to Junior Smith's bedroom PC terminal.
Junior Smith's data transmission is printed and deposited in his physical printer mailbox container.
DATA TRANSMISSION TO THE PHYSICAL MAILBOX FACSIMILE MACHINE AND TO THE CALL DIRECTION PERSONAL COMPUTERS.
If a caller enters 3440614 * 1 * 5 *:
the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
John Smith's data transmission is printed and deposited in his physical fax. mailbox container.
If a caller enters 3440614 * 2 * 5 *:
the data is transmitted to Mr and Mrs Smith's bedroom PC terminal.
Mrs Smith's data transmission is printed and deposited in her physical fax. mailbox container.
If a caller enters 3440614 * 3 * 5 *: the data is transmitted to Junior Smith's bedroom PC terminal.
Junior Smith's data transmission is printed and deposited in his physical fax. mailbox container.
HOW TO PROGRAM THE TELEPHONE FOR CALLED PERSON IDENTIFICATION
AND CALL DIRECTION
LIVING ROOM - IDENTICALL TELEPHONE/MAM UNIT
If Mr Smith enters the programming command and * 1 *.
As a result, if a caller dials 3440614 * 1 * 1 * this telephone will sound Mr Smith's ring tone.
Further, mailbox number one will record Mr Smith's messages.
If Mr Smith enters the programming command and * 2 *.
As a result, if a caller dials 3440614 * 2 * 1 * this telephone will sound Mrs Smith's ring tone.
Further, mailbox number two will record Mrs Smith's messages.
If Mr Smith enters the programming command and * 3 *.
As a result, if a caller dials 3440614 * 3 * 1 * this telephone will sound Junior Smith's ring tone;
Further, mailbox number three will record Junior Smith's messages.
MR AND MRS SMITH'S BEDROOM - IDENTICALL TELEPHONE
If Mr Smith enters the programming command and * 1 *.
As a result, if a caller dials 3440614 * 1 * 1 * this telephone will sound Mr Smith's ring tone.
If Mr Smith enters the programming command and * 2 *.
As a result, if a caller dials 3440614 * 2 * 1 * this telephone will sound Mrs Smith's ring tone. JUNIOR SMITH'S BEDROOM - IDENTICALL TELEPHONE
If Mr Smith enters the programming command and * 3 *.
As a result, if a caller dials 3440614 * 3 * 1 * this telephone will sound Junior Smith's ring tone.
In the above examples, a subscriber has to program the first sub-addressing digit(s) known as the Call Direction number(s). The second sub-addressing digit(s) known as the terminal type number is pre-programmed.
HOW TO PROGRAM THE LOUNGE ROOM PHYSICAL MAILBOX FACSIMILE MACHINE
If Mr Smith enters the programming command and * 1 *.
As a result, if a caller enters 3440614 * 1 * 2 * the facsimile correspondence will be deposited in Mr Smith's physical mailbox container.
If Mr Smith enters the programming command and * 2 *.
As a result, if a caller enters 3440614 * 2 * 2 * the facsimile correspondence will be deposited in Mrs Smith's physical mailbox container.
If Mr Smith enters the programming command and * 3 *.
As a result, if a caller enters 3440614 * 3 * 2 *
the facsimile correspondence will be deposited in Junior Smith's physical mailbox container.
In the above example, a subscriber has to program the first sub-addressing digit(s) known as the Call Direction number(s). The second sub-addressing digit(s) known as the terminal type number is pre-programmed. DATA TRANSFERENCE
HOW TO PROGRAM MR AND MRS SMITH'S BEDROOM - PERSONAL COMPUTER
If Mr Smith enters the programming command and * 1 *.
As a result, if a caller dials 3440614 * 1 * 3 * the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
If Mr Smith enters the programming command and * 2 *.
As a result, if a caller dials 3440614 * 2 * 3 * the data is transmitted to/from Mr and Mrs Smith's bedroom PC terminal.
HOW TO PROGRAM JUNIOR SMITH'S BEDROOM - PERSONAL COMPUTER
If Mr Smith enters the programming command and * 3 *.
As a result, if a caller dials 3440614 * 3 * 3 * the data is transmitted to/from Junior Smith's bedroom PC terminal.
In the above examples, a subscriber has to program the first sub-addressing digit(s) known as the Call Direction number(s). The second sub-addressing digit(s) known as the terminal type number is pre-programmed.
HOW TO PROGRAM THE LOUNGE ROOM PHYSICAL MAILBOX PRINTER MACHINE
If Mr Smith enters the programming command and * 1 *.
As a result, if a caller enters 3440614 * 1 * 4 * the data transmission is printed and deposited in Mr Smith's physical mailbox printer machine.
If Mr Smith enters the programming command and * 2 *.
As a result, if a caller enters 3440614 * 2 * 4 * the data transmission is printed and deposited in Mrs Smith's physical mailbox printer machine.
If Mr Smith enters the programming command and * 3 *. . Page 151
As a result, if a caller enters 3440614 * 3 * 4 * the data transmission is printed and deposited in Junior Smith's physical mailbox printer machine. t«
In the above example, a subscriber has to program the first sub-addressing digit(s) known as the Call Direction number(s). The second sub-addressing digit(s) known as the terminal type number is pre-programmed.
CONFIGURATION TWO
Let's assume that there are three people in the Smith household.
. Mr Smith;
. Mrs Smith;
. Junior Smith.
Let's assume that there are three telephone jacks (extensions) in the household.
. a telephone jack in the living room;
. a telephone jack in Mr and Mrs Smith's bedroom;
. a telephone jack in Junior Smith's bedroom.
Let's assume that in the lounge room there is a:
. IdentiCall Telephone/MAM unit;
. Physical Mailbox Facsimile Machine;
. Physical Mailbox Printer Machine.
Let's assume that in Mr and Mrs Smith's bedroom there is a:
. IdentiCall Telephone;
. Call Direction Personal Computer.
Let's assume that in Junior Smith's bedroom there is a:
. IdentiCall Telephone; . Call Direction Personal Computer.
Let's assume that there are three Microlink (Basic Rate) ISDN lines for the Smith household which use:
. 344-0614
Let's assume that for the first sub-addressing digit(s):
. Mr Smith's called person number is * 1;
. Mrs Smith's called person number is * 2;
. Junior Smith's called person number is * 3.
Let's assume that for the second sub-addressing digit(s) the:
. IdentiCall Telephone(s)/MAM terminal number is * 1;
. Mailbox Facsimile Machine terminal number is * 2;
. Personal Computer(s) terminal number is * 3;
. Mailbox Printer Machine terminal number is * 4;
Let's assume that if the above addressing field is dialled the central exchange (CENTREX's XAN) will switch the call to a suitable channel of the three Microlink (Basic Rate) ISDN circuits.
Let's assume that either a proprietary Bus or S-Bus wiring is used. With a proprietary Bus one Bus is connected to each device. With S-Bus wiring multiple standard S-Busses are connected to each device. Either way all three Microlink ISDN circuits are connected to each device.
Let's assume that either a modified NTl or a number of modified NTl's are used. The modified NTl can accept multiple subscriber loops as inputs and has a single proprietary Bus output. The number of modified NTl's provide the interface in the subscriber's premises between the 2 wire subscriber loops from the network and the 4 wire S-Busses. With either method calls can be paralleled to any specific device. Therefore, if 3440614 is dialled CENTREX's XAN will switch to a suitable Microlink ISDN circuit and all three Microlink ISDN circuits are connected to all of the above devices.
ANTECEDENTS
Let's assume that the Smith household has one Microlink ISDN circuit and that a proprietary Bus is used. The "D" channel is used for control signalling. Let's also assume that the Smith's have a number of Call Direction Telephones and a Multi-call Mailbox Answering Machine. A Microlink B channel takes full advantage of the Mailbox Answering Machine and IdentiCall Telephones capabilities, being, Ring Turn On/Off and Mailbox accessing from the Smith's respective bedrooms, using the IdentiCall Telephones as an intercom system and to "call direct" a second IdentiCall Telephone and/or Mailbox Answering Machine call. In addition to the capability of IdentiCall Telephone distinctive rings and Mailbox Answering Machine voice mailbox messaging.
The Smith's decided to get a second Microlink ISDN circuit. The second ISDN circuit uses the proprietary Bus. The Smith's purchased a Physical Mailbox Facsimile Machine, which is now connected to the proprietary Bus.
As a result of this configuration the "B" channels could be used to facilitate: six voice transmission connections; four image transmission connections; four text transmission connections: and four data transmission connections, or any combination thereof, possibly per device, provided that the connection amount does not exceed the ampunt of "B" channels, in this case, being four.
Example 1, Mrs Smith could be using her bedroom telephone, whilst the MAM was recording two messages for Mr Smith and the Physical Mailbox Facsimile Machine was printing and depositing image into Mr Smith's physical mailbox. Example 2, Mr and Mrs Smith could be receiving two Mailbox Answering Machine messages each for their respective mailboxes. Example 3, the Mailbox Answering Machine could be receiving four transmissions. Three of which are image the fourth being voice. The three image transmissions would be "Re-Call Directed" to the Physical Mailbox Facsimile Machine upon the formerly used Physical Mailbox Machine's hard disk RAM becoming available. (Note: the printing and the depositing of the image into the called person's physical mailbox would make the Physical Mailbox Facsimile Machine's hard disk RAM become available). The Mailbox Answering Machine voice transmission would be deposited into the called person's voice mailbox. Meaning the called person could access all his voice transmissions.
Caller ID could be subscribed to so that the Mailbox Answering Machine called person could access: a specific message; the messages of a particular calling party; or all his/her messages. Further, the Mailbox Answering Machine called person has the option of deleting: a specific message; the messages of a particular calling party; or all his/her messages. If Caller ID is used the Physical Mailbox Facsimile Machine called person could make: a specific facsimile transmission; the facsimile transmissions of a particular calling party; or all his facsimile transmission jump queue. Meaning the facsimile transmission calling number is entered so that a specific or all the facsimile transmissions of that calling party jump the print and physical mailbox queue. The called person's number could be entered so that all this person's facsimile transmissions jump the print and physical mailbox queue.
The Smith's decided to get a third Microlink ISDN circuit. The third ISDN circuit uses the proprietary Bus. The Call Direction Personal Computers, that the Smith's recently purchased, are connected to the proprietary Bus. In addition, Mr Smith bought a Mobile IdentiCall Telephone seeing that he does much work from the car.
As a result of this configuration the "B" channels could be used to facilitate: six voice transmission connections; six image transmission connections; six text transmission connections; and six data transmission connections, or any combination thereof, possibly per device, provided that the connection amount does not exceed the amount of "B" channels, in this case, being six.
Example 1, assuming that Mr Smith's ring tone is in Ring Turn On mode, a caller could telephone Mr Smith and the Local Exchange would direct the call firstly to Mr Smith's Mobile IdentiCall Telephone, if this telephone is not answered after a designated amount of rings then the telephone call is directed to Mr Smith's household IdentiCall Telephones. If the household IdentiCall Telephones are not answered within a designated time period the Mailbox Answering Machine becomes on-line and records the caller's message for Mr Smith's mailbox. After a designated Re-Call Direction time, the Mailbox Answering Machine could use Re-call Direction to ring Mr Smith's Mobile IdentiCall Telephone before Mr Smith's household IdentiCall Telephones annunciate Mr Smith's ring tone. Conversely, Mr Smith could telephone the Mailbox Answering Machine to retrieve his messages from either his Mobile IdentiCall Telephone or from the household telephones by dialling a number combination and/or his padlock command. Example 2, Mr Smith, Mrs Smith and Junior Smith are all using an IdentiCall Telephone and in the meantime each family member receives a second telephone call. As a result Mr Smith, Mrs Smith and Junior Smith could use the call waiting feature and Call Direction to make the less important telephone call caller deposit a message in the Mailbox Answering Machine for later retrieval by the family. The IdentiCall Telephones using the Call Direction program, transmit a signal to CENTREX so that each less important telephone call caller (call waiting) is provided with a "B" channel for direct Mailbox Answering Machine access.
Example 3, as there are six "B" channels, Mr Smith, Mrs Smith and Junior Smith could each be on an IdentiCall Telephone: the Mailbox Answering Machine could be receiving a voice call and as there are now two available "B" channels, for example, two incoming data calls could be "call directed" to either or both of the Call Direction Personal Computers.
If Mr Smith bought a Call Direction Laptop Computer or a Call Direction Notepad Computer then a caller could dial the line number, the Mr Smith number and the portable and household computer combination number and the Local Exchange would direct the call firstly to Mr Smith's Call Direction Laptop Computer or Call Direction Notepad Computer before directing the call to Mr Smith's household Call Direction Personal Computer.
If a caller dials the "above" number sequence and if Mr Smith's Call Direction portable computer is "on" then a Call Direction portable computer data connection will be established (assuming that there is enough available memory for the data transmission). If there is not enough available memory, the call will be directed to the Smith household wherein Mr Smith's Call Direction Personal Computer will establish a data call connection.
If a caller dials the "above" number sequence and if Mr Smith's Call Direction portable computer is "off then Mr Smith's household Personal Computer will establish a data connection (assuming that there is an available "B" channel).
If a caller dials the line number, the Mr Smith number and the household computer number, as a result, the call will be directed to Mr Smith's household Call Direction Personal Computer. If a caller dials the line number, the Mr Smith number and the portable computer number, as a result, the call will be directed to Mr Smith's Call Direction portable computer.
Mr Smith could use Call Direction to transfer any data between his Call Direction portable computer and his household Call Direction Personal Computer, direct access is possible if Mr Smith dials the required number combination and either the household or the portable computer number, depending on which computer needs to be connected.
In the above, each device is connected to the proprietary Bus.
Therefore, if a facsimile transmission is being sent to Mr Smith's physical mailbox facsimile machine then Mr Smith's "call direction" IdentiCall Telephones could annunciate the called person (Mr Smith) and the device type (facsimile machine) ring tone. As a result, Mr Smith could identify that facsimile is being transmitted to the facsimile machine in the lounge room, even though Mr Smith is in his bedroom.
The above telecommunications system can be built up to respond with each families changing telecommunications needs. The system can start with as little as one IdentiCall telephone for a single Microlink ISDN circuit.
Using the XAN each device is connected to the proprietary Bus. The devices used can each accommodate, in this example, six "B" channel connections at once. (Other than each IdentiCall Telephone which can accommodate a single voice call, the Mailbox Answering Machine responds to the other voice calls. For example, if there are five IdentiCall telephones and there is a person talking on each then the MAM will accept the sixth call). Re-call direction is only used if a multi-call device has no available hard disk RAM. Examples of configuration two of the Digital Exchange Area Network have been provided.
In this example, there are 3 Microlink ISDN circuits. As a result of this configuration and Call Direction equipment the "B hannels could be used to facilitate: six voice transmission connections; six image transmission connections; six text transmission connections: and six data transmission connections, or any combination thereof, possibly per device, provided that the connection amount does not exceed the amount of "B" channels, in this case, being six.
EXAMPLE 1
Let's assume the Smith's are not home.
The six 3440614 "B" channels are being used for voice:
The 3440614 * 1 * 1 MAM mailbox is recording a message for Mr Smith.
The 3440614 * 1 * 2 MAM mailbox is recording a message for Mrs Smith. The 3440614 * 1 * 3 MAM mailbox is recording a message for Junior Smith.
The 3440614 * 1 * 1 MAM mailbox is recording a 2nd message for Mr Smith.
The 3440614 * 1 * 2 MAM mailbox is recording a 2nd message for Mrs Smith.
The 3440614 * 1 * 2 MAM mailbox is recording a 3rd message for Mrs Smith.
If the three lines are connected to each device, as the example shows, the Mailbox Answering Machine could service 6 voice calls simultaneously. The ability to service a number of Mailbox Answering Machine messages at once is similar to voice mail capabilities.
Please refer to page twelve for the Call Direction/Re-call Direction program - type instructions.
EXAMPLE 2
The six 3440614 "B" channels are receiving an image transmission.
a facsimile transmission to Mr Smith 3440617 * 1 * 2. Mr Smith's facsimile transmission is being printed.
a facsimile transmission to Mrs Smith 3440617 * 2 * 2. Mrs Smith's facsimile transmission is being stored in hard disk RAM.
a facsimile transmission to Junior Smith 3440617 * 3 * 2. Junior Smith's facsimile transmission is being stored in hard disk RAM.
a facsimile transmission to Mr Smith 3440617 * 1 * 2. Mr Smith's 2nd facsimile transmission is being stored in hard disk RA M.
a facsimile transmission to Mrs Smith 3440617 * 2 * 2. Mrs Smith's 2nd facsimile transmission is being stored in hard disk RA M. a facsimile transmission to Mrs Smith 3440617 * 2 * 2. Mrs Smith's 3rd facsimile transmission is being stored in hard disk RAM.
If the three lines are connected to each device, as the example shows, the Physical Mailbox Facsimile Machine could service 6 image calls simultaneously. The first call's image transmission would be printed and deposited in the called person's "physical mailbox, on a page by page basis. The other image transmissions are stored in hard disk RAM. Each such transmission will be retrieved in chronological order and will be printed and deposited in the called person's respective physical mailbox, on a page by page basis.
For the purposes of Physical Mailbox Facsimile Machine hard disk RAM conservation the limit upon image transmission could be a designated amount of memory. Once a designated amount of memory is used for the purposes of temporarily storing image transmissions, hard disk RAM could be used in the Call Direction Personal Computers, Physical Mailbox Printer Machine or Mailbox Answering Machine. These other devices would store the facsimile transmission only until the designated amount of Physical Mailbox Facsimile Machine memory for temporarily storing image transmissions is not transgressed.
The Call Direction Personal Computers, Physical Mailbox Printer Machine and Mailbox Answering Machine would re-dial the Physical Mailbox Facsimile Machine using Re-call Direction upon the completion of a designated time limit to check whether the former used Physical Mailbox Facsimile Machine memory is capable of storing the image transmissions stored in memory of the other devices. If the Physical Mailbox Facsimile Machine memory is capable of storing the image transmissions then the image is transmitted to the Physical Mailbox Facsimile Machine. If the Physical Mailbox Facsimile Machine memory is not capable then the image is stored in the other devices until a later Physical Mailbox Facsimile Machine Re-call Direction access.
Let's assume for example: That the Physical Mailbox Facsimile Machine's printer is printing an image transmission, but in the meantime, many facsimile transmission have been sent and the Physical Mailbox Facsimile Machine's hard disk RAM which has reached the designated amount of memory usage for image transmissions. Then all future facsimile transmissions, will be sent to a device type with a sufficient hard disk RAM. Such as the: Call Direction Personal Computers, Physical Mailbox Facsimile Machine, Physical Mailbox Printer Machine and Mailbox Answering Machine. Pagte 159
A practical example of the above is as follows: the caller dials the line number and * 1 (called person) * 2 (device number). Let's assume that the Physical Mailbox Facsimile Machine has approached the designated amount of memory usage for image transmissions. The Physical Mailbox Facsimile Machine's Call Direction program informs the unit whether there is available memory for the Call Direction transmission. And each other device's Call Direction/Re-call Direction program informs their respective device whether there is available memory for the Re-call Direction transmission.
Seeing that the Physical Mailbox Facsimile Machine was dialled. This device is first to check whether there is available memory for a facsimile transmission. If so, this terminal will become off-hook. If not, then this terminal remains on-hook. In the advent of hard disk RAM being available for Re-call Direction transmission, the Call Direction Personal Computers (assuming they have the most available hard disk RAM) are the first device type to become off-hook.
In this example, the Call Direction Personal Computers and the Physical Mailbox Printer Machine have no more memory available for Re-call Direction whereas the Mailbox Answering Machine has memory available for Re-Call Direction. Therefore the former device types remain on-hook. And the latter device will become off-hook.
In the case of the Mailbox Answering Machine becoming off-hook. The Mailbox Answering Machine stores the called person number (Mr Smith) and the device number (facsimile machine) in the Re-Call Direction program and the caller's facsimile transmission is stored in the Mailbox Answering Machine's available hard disk RAM. Given the called person number and the device number the Mailbox Answering Machine will re-dial the Physical Mailbox Facsimile Machine after a designated time period has elapsed, attempting to carry out Re-Call Direction.
Please refer to page twelve for the Call Direction/Re-call Direction program - type instructions.
EXAMPLE 3
Two 3440614 "B" channels are being used for voice:
The 3440614 * 2 * 1 called person (Mrs Smith) is talking to a 3rd party. The 3440614 * 3 * 1 called person (Junior Smith) is talking to a 3rd party.
Two 3440614 "B" channels are sending/receiving data.
a data transmission to/from Mrs Smith PC 3440618 * 2 * 3.
a data transmission to/from Junior Smith PC 3440618 * 3 * 3.
Two 3440614 "B" channels are receiving data.
a data transmission to Mrs Smith PC 3440618 * 2 * 3.
a data transmission to Junior Smith PC 3440618 * 3 * 3.
Let's assume for example: that each Call Direction Personal Computer can only send and receive one data transmission at a time. In the event of more than one data call to a given Call Direction Personal Computer, such a Call Direction Personal Computer can be used to receive and store data transmission(s).
For the puφoses of Call Direction Personal Computer, Call Direction Laptop Computer, or Call Direction Notepad Computer (refened to as a Personal Computer for convenience), hard disk RAM conservation the limit upon data transmission could be equivalent to a designated amount of memory use. Once a designated amount of memory is used for the purposes of storing data transmissions, hard disk RAM could be used in the other Call Direction Personal Computer, Physical Mailbox Facsimile Machine, Physical Mailbox Printer Machine or Mailbox Answering Machine. These other devices would store the data transmission only until the designated amount of memory in the Call Direction Personal Computer for storing data transmissions is not transgressed. This would give the used up hard disk RAM Call Direction Personal Computer operator enough time to store the data upon floppy disk(s) or re-transmit the data. One or more of the following devices, the: Call Direction Personal Computer, Physical Mailbox Facsimile Machine, Physical Mailbox Printer Machine or Mailbox Answering Machine would re-dial the used up hard disk RAM
Call Direction Personal Computer using Re-call Direction upon a designated time limit to check whether the formerly used up hard disk RAM Call Direction Personal Computer's hard disk RAM is capable of storing the data transmission(s) at present being stored in memory of the other devices.
One or more of the following devices, the: Call Direction Personal Computer, Physical Mailbox Facsimile Machine Physical Mailbox Printer Machine or Mailbox Answering Machine would re-dial the used up hard disk RAM Call Direction, using Re-call Direction, upon the completion of a designated time limit to check whether the former used up Call Direction Personal Computer hard disk RAM is capable of storing the data transmission(s) stored in memory of the other devices.
If the given Call Direction Personal Computer memory is capable of storing the data transmission(s) then the data is transmitted to this Call Direction Personal Computer. If the given Call Direction Personal Computer hard disk RAM is not capable then the data is stored in the other devices until a later given Call Direction Personal Computer Re-call Direction access.
Let's assume for example: that Mr Smith's Call Direction Personal Computer is sending and receiving a data transmission, but in the meantime, many data transmissions have been sent to Mr Smith's Call Direction Personal Computer's hard disk RAM which has reached the designated amount of memory usage for data transmissions. As a result, all future data transmissions for Mr Smith's Call Direction Personal Computer will be sent to a device type with a sufficient hard disk RAM. Such as, the: other Call Direction Personal Computer, Physical Mailbox Facsimile Machine, Physical Mailbox Printer Machine and Mailbox Answering Machine.
A practical example of the above is as follows: the caller dials the line number and * 1 (called person) * 3 (terminal device). Let's assume that Mr Smith's Call Direction Personal Computer has approached the designated amount of memory usage for data transmissions. This Call Direction Personal Computer's Call Direction program informs the unit whether there is available memory for the Call Direction transmission. And each other device's Call Direction/Re-call Direction program informs their respective device whether there is available memory for the Re-call direction transmission.
Seeing that Mr Smith's Call Direction Personal Computer was dialled. This device is first to check whether there is available memory for a data transmission. If so, this terminal will become off-hook. If not, then this terminal remains on-hook. In the advent of hard disk RAM being available for Re-Call Direction transmission, the Call Direction Personal Computers (assuming they have the most available hard disk RAM) are the first device type to become off- hook.
In this example, the Physical Mailbox Facsimile Machine, Physical Mailbox Printer Machine and Mailbox Answering Machine have no more memory available for Re-call Direction whereas Junior Smith's Call Direction Personal Computer has memory available for Re-Call Direction. Therefore the former device types remain on-hook. And the latter device will become off-hook.
In the case of Junior Smith's Call Direction Personal Computer becoming off-hook. This Call Direction Personal Computer stores the called person number (Mr Smith) and the device number (Personal Computers) in the Re-Call Direction program and the caller's data transmission is stored in the Junior Smith's Call Direction Personal Computer's available hard disk RAM. Given the called person number and the terminal type number Junior Smith's Call Direction Personal Computer will re-dial Mr Smith's Call Direction Personal Computer after a designated time period has elapsed, attempting to carry out Re-Call Direction.
Please refer to page twelve for the Call Direction/Re-call Direction program - type instructions.
CALL DIRECTION AND RE-CALL DIRECTION PROGRAM - TYPE INSTRUCTIONS
The Mailbox Answering Machine Call Direction example, provided on page three, has been used for the Call Direction/Re-Call Direction type instructions.
If the caller dials the called pany number and when this number is complete it is followed by the called person number and the device type number. The called person number and the device type number will be distinguished from the normal LDN by special delimiters, like e.g. * or #, or any combination of them. The ISDN switching system upon receipt of the called person number and the device type number will send it via the D-channel in the CCS No. 7 signalling system to the answering machine. The called person number value is stored in the cunent "called person number" variable value and the cunent device type number value is stored in the cunent "device type number" variable value. Then "MAM Hard disk RAM available memory" variable value is accessed.
(A) If the cunent "called person number" variable value equals the sent called person number value and if the cunent "device type number" variable value equals the sent device type number value and the "MAM Hard disk RAM available memory" variable value is greater than the "minimum MAM Hard disk RAM available memory" variable value then this answering machine call will become off-hook (will be answered).
(B) If the cunent "called person number" variable value equals the sent called person number value and if the cunent "device type number" variable value equals the sent device type number value and the "MAM Hard disk RAM available memory" variable value is less than the "minimum MAM hard disk RAM available memory" variable value then this answering machine call will not become off-hook (will no be answered). Other Re-Call Direction program devices will be given the opportunity of recording the message for the called person and re-transmitting the message to the answering machine at a later time. "Re-call direction re-transmission" is for called person device retrieval purposes. In other words, this stops Mr Smith from accessing a Personal Computer or Facsimile Machine for retrieval of some of his answering machine messages.
(C) If the cunent "called person number" variable value equals the sent called person number value and if the cunent "device type number" variable value does not equal the sent device type number value and the "MAM Hard disk RAM available memory" variable value is greater than the "minimum MAM hard disk RAM available memory" then the answering machine will access the "designated time count" variable value. If the "designated time count" variable value equals the "answer transmission" variable value then the answering machine will answer the call after this designated amount of time has elapsed. This designated time period gives more suitable hard disk RAM storage devices such as personal computers the first opportunity to answer this call).
(D) If the cunent "called person number" variable value equals the sent called person number value and if the "device type number" variable value does not equal the sent device type number value and the "MAM hard disk RAM available memory" variable value is less than the "minimum MAM hard disk RAM available memory" then this answering machine call will not become off-hook (the answering machine will not answer this call).
Depositing a message in the called person's mailbox.
If either (A) or (C) above is the case. Then the present time/date will occupy the cunent "time/date" variable value. If the "called person number" variable value equals the "called person's outgoing message" variable value then that called person's outgoing message will be accessed. Then the voice transmission is stored in the cunent "transmission memory location".
Accessing a called person's mailbox.
I. If the caller dials the called party number and when this number is complete it is followed by the called person number, the device type number and the padlock command. The called person number, the device type number and the padlock number will be distinguished from the normal LDN by special delimiters, like e.g. * or #, or any combination of them. The ISDN switching system upon receipt of the called person number, the device type number and the padlock command will send it via the D-channel in the CCS No. 7 signalling system to the answering machine. The called person number value is stored in the cunent "called person number" variable value and the cunent device type number value is stored in the cunent "device type number" variable value and the padlock command value is checked against "the called person padlock command" variable value.
If a padlock command match does not occur. The answering machine could either request a padlock command re-dial or the call could be terminated.
II. If a padlock command match occurs the cunent "called person number" variable value is stored in the cunent "checking called person number" variable value (as there are a number of called person number checking variables) and a cunent "cunent number count" (as there are many cunent number count variables) is reset to the variable value 1. (The first current represents this variable number the second cunent represents the called person variable number). If a value match occurs between the cunent "checking called person number" variable value and the cunent "called person" variable value then the program will access the cunent "transmission memory location" so that this transmission is retrieved from hard disk RAM. Then the cunent "cunent number count" is incremented by 1 (so that other cunent "called person" variable values will be checked). If a value match does not occur between the cunent "checking called person number" variable value and the cunent "called person" variable value then the cunent "cunent number count" is incremented by 1 (so that other current "called person" variable values will be checked). If the cunent "current number count" equals the "ceiling" variable value then the cunent "checking called person" variable value is reset to 0.
After the called person has listened to his answering messages he can enter the erase command. This command will erase all the called person's cunent "called person" variable values so that the former called person's cunent "transmission memory location" can be reused.
If a erase command match occurs the cunent "called person number" variable value is stored in the cunent "erasure called person number" variable value (as there are a number of called person number erasure variables) and a cunent "cunent number count" (as there are many cunent number count variables) is reset to the variable value 1. (The first cunent represents this variable number the second cunent represents the called person variable number). If a value match occurs between the cunent "erasure called person number" variable value and the cunent "called person" variable value then the cunent "called person" variable value will be reset to 0. Then the cunent "current number count" is incremented by 1 (so that other cunent "called person" variable values will be checked in the loop). If a value match does not occur between the cunent "erasure called person number" variable value and the cunent "called person" variable value then the cunent "cunent number count" is incremented by 1 (so that other current "called person" variable values will be checked in the loop). If the cunent "cunent number count" equals the "ceiling" variable value then the current "erasure called person" variable value is reset to 0.
Re-Call Direction
If (C) above is the case. Then the present time/date will occupy the cunent "time/date" variable value and the cunent "timer" variable value will be set. If the cunent "called person's number" variable value and the cunent "device type number" variable value equals the "called person's number outgoing message" variable value and the "device type number outgoing message" variable value then the program accesses the outgoing message for this called person and this device type. Then the voice transmission is stored in the cunent "transmission memory location".
If the cunent "timer" variable value equals the "dial time" variable value then the program is instructed to re-dial the device type. The cunent "number" variable value instructs the program to access the cunent "called person number" variable value and the cunent "device type number" variable value. If the cunent "called person number" variable value and the cunent "device type number" variable value equals the "called person and device type telephone number" variable value then the program is instructed to access the "called person and device type telephone number" memory location (this memory location contains the called person and device type's variable frequency number) in order to carry out Re- Call Direction.
If the called device becomes off-hook (refer to the above). Then refer to Part II of "Accessing a Called Person's Mailbox". The variables pertaining to the former cunent "called person" will be erased. Assuming that the called device remains "on-hook" (refer to the above). Then the "transmission memory locations" will not be accessed. Therefore the transmissions are stored in the "transmission memory locations" for a later retrieval.
(Note: if Caller ID is used there would be cunent "calling person" variable value anay in the Call Direction/Re-call Direction program. Therefore a specific message, all the messages of a particular calling party could be accessed and erased). RE-CALL DIRECTION PREVENTION
It is assumed that a unit would be developed which would contain elements of the Call Direction Personal Computer, Physical Mailbox Facsimile Machine, IdentiCall Telephone and Mailbox Answering Machine. As realised, the hard disk RAM would have a large storage capacity.
Such a device would limit the need for Re-Call Direction, thus restricting waste of: the consumer's resources in the form of call charges and possible unnecessary product purchases; and the Telecommunications Authority's resources in the form of unnecessary telecommunications call set ups and/or connections. Such a unit would only be bought by those requiring the use of the facilities provided by the unit's conglomerate devices.
SUPPLEMENT TO CONFIGURATION TWO
Let's assume that there are three people in the Smith household.
. Mr Smith;
. Mrs Smith;
. Junior Smith.
Let's assume that there are three telephone jacks (extensions) in the household.
. a telephone jack in the living room;
. a telephone jack in Mr and Mrs Smith's bedroom;
. a telephone jack in Junior Smith's bedroom.
Let's assume that in the lounge room there is a:
. Video IdentiCall Telephone MAM unit;
. Mailbox Facsimile Machine;
. Physical Mailbox Printer Machine.
Let's assume that in Mr and Mrs Smith's bedroom there is a:
. Video IdentiCall Telephone; . Personal Computer.
Let's assume that in Junior Smith's bedroom there is a:
. Video Telephone;
. Personal Computer.
Let's assume that there are three Microlink ISDN lines for the Smith household which use:
. 344-0614
Let's assume that for the first sub-addressing digit(s):
. Mr Smith's called person number is * 1 ;
. Mrs Smith's called person number is * 2;
. Junior Smith's called person number is * 3.
Let's assume that for the second sub-addressing digit(s) the:
. Video IdentiCall Telephone/MAM terminal number is * 1 ;
. Mailbox Facsimile Machine terminal number is * 2;
. Personal Computer(s) terminal number is * 3;
. Mailbox Printer Machine terminal number is * 4;
Let's assume that if the above addressing field is dialled the central exchange (CENTREX's XAN) will switch the call to a suitable channel of the three Microlink (Basic Rate) ISDN circuits.
Let's assume that either a proprietary Bus or S-Bus wiring is used. With a proprietary Bus one Bus is connected to each device. With S-Bus wiring multiple standard S-Busses are connected to each device. Either way all three Microlink ISDN circuits are connected to each device.
Let's assume that either a modified NTl or a number of modified NTl's are used. The modified NTl can accept multiple subscriber loops as inputs and has a single proprietary Bus output. The number of modified NTl's provide the interface in the subscriber's premises between the 2 wire subscriber loops from the network and the 4 wire S-Busses. With either method calls can be paralleled to any specific device.
Therefore, if 3440614 is dialled CENTREX's XAN will switch to a suitable Microlink ISDN circuit and all three Microlink ISDN circuits are connected to all of the above devices.
In this example, there are 3 Microlink ISDN circuits. As a result of this configuration and Call Direction equipment the "B" channels could be used to facilitate: six voice transmission connections: six image transmission connections; six text transmission connections; and six data transmission connections, or any combination thereof, possibly per device, provided that the connection amount does not exceed the amount of "B" channels, in this case, being six.
EXAMPLE 1
Let's assume the Smith's are not home.
The six 3440614 "B" channels are being used for voice:
The 3440614 * 1 * 1 Video 'Phone MAM is recording a message for Mr Smith.
The 3440614 * 1 * 2 Video 'Phone MAM is recording a message for Mrs Smith.
The 3440614 * 1 * 3 Video 'Phone MAM is recording a message for Junior Smith.
The 3440614 * 1 * 1 Video 'Phone MAM is recording a 2nd message for Mr Smith.
The 3440614 * 1 * 2 Video 'Phone MAM is recording a 2nd message for Mrs Smith.
The 3440614 * 1 * 2 Video 'Phone MAM is recording a 3rd message for Mrs Smith.
If the three lines are connected to each device, as the example shows, the Video Telephone Mailbox Answering Machine could service 6 voice calls simultaneously. The ability to service a number of Video Mailbox Answering Machine messages at once is similar to video mail capabilities.
Seeing that there is a Video IdentiCall Telephone within Mr Smith's bedroom. If Mr Smith decides to telephone the Video Telephone Mailbox Answering Machine to retrieve his audio visual messages then Mr Smith would dial 3440614 * 1 * 1 * and his padlock command.
If Mr Smith decides to telephone the Video Telephone Mailbox Answering Machine to retrieve his audio messages then Mr Smith would dial 3440614 * 1 * 1 * the monitor lock command and his padlock command. Mr Smith may only request his audio messages as the visual messages may be to private to be displayed upon the calling video telephone. As a result the synthesised speech is transmitted to Mr Smith's Video Telephone whilst the visual transmission is transmitted to the "off monitor of the Video IdentiCall Telephone Mailbox Answering Machine. Note: the monitor lock command will cause the message recipient's visual transmission(s) to be transmitted to, but not displayed upon, the called Video IdentiCall Telephone Mailbox Answering Machine monitor.
The Call Direction program - type instructions have been provided below.
If the caller dials the called pany number and when this number is complete it is followed by the called person number, the device type number, the monitor lock command and the padlock command. The called person number, the device type number, the monitor lock number and the padlock number will be distinguished from the normal LDN by special delimiters, like e.g. * or#, or any combination of them. The ISDN switching system upon receipt of the called person number, the device type number, the monitor lock command and the padlock command will send it via the D-channel in the CCS No. 7 signalling system to the Video Telephone Mailbox Answering Machine. The called person number value is stored in the cunent "called person number" variable value and the cunent device type number value is stored in the cunent "device type number" variable value and the monitor lock command value causes the cunent "monitor lock check" variable to be incremented to the variable value 1 and the padlock command value is checked against "the called person padlock command" variable value.
If a padlock command match does not occur. The answering machine could either request a padlock command re-dial or the call could be terminated.
If a padlock command match occurs the cunent "called person number" variable value is stored in the cunent "checking called person number" variable value (as there are a number of called person number checking variables) and a current "current number count" (as there are many cunent number count variables) is reset to the variable value 1. (The first cunent represents this variable number the second cunent represents the called person variable number). If a value match occurs between the cunent "checking called person number" variable value and the cunent "called person" variable value then the cunent "monitor lock check" variable value status is checked. (Meaning if the cunent "monitor lock check" variable value equals 0 then the audio visual transmission will be transmitted across the line. If the current "monitor lock check" variable value equals 1 then the visual transmission will be transmitted to the "off monitor of the Video Telephone Mailbox Answering Machine unit whilst the synthesised speech will be transmitted across the line.) The program will access the cunent "transmission memory location" so that this transmission is retrieved from hard disk RAM. Then the cunent "cunent number count" is incremented by 1 (so that other cunent "called person" variable values will be checked). If a value match does not occur between the cunent "checking called person number" variable value and the cunent "called person" variable value then the cunent "cunent number count" is incremented by 1 (so that other cunent "called person" variable values will be checked). If the cunent "cunent number count" equals the "ceiling" variable value then the cunent "checking called person" variable value is reset to 0.
IDENΗCALL TELEPHONE
FIELD OF THE INVENTION
The IdentiCall Telephone is designed for use on a single or multiple Integrated Services Digital Network (ISDN) Microlink, also known as a Basic Rate circuit and provides an improved facility whereby a particular called person can be identified when the call is initiated. This feature will be used by the telephone system to provide personalised ring signals and selective audible ringing in accordance with user programmable instructions. This particular person feature forms the basis for further developments including a Personalised Message Answering Machine, Personalised Mailbox Facsimile Machine Call Direction Personal Computer and other individually addressable devices. It is noted the term Telephone may equally apply to an instrument for audio communications only and to one which incorporates both audio and video communications facilities. These latter devices sometimes known as Video Telephones use the capacity of the ISDN 64 kb/s channel to transmit a compressed video or slow scan image of the people speaking to each other via the telephone.
The special features which rriake the IdentiCall Telephone unique apply to both audio only and audio/video versions of the device. BACKGROUND OF THE INVENTION
In the normal telephone connection the caller dials the number of the called person and the
♦* switching centre in the public network performs all the functions connected with setting up of a call and signalling the called party. The signalling sent to the called party normally consists of the ring signal which operates some form of a ringing (or acoustical) device located in the called party telephone apparatus. When the called party telephone rings the only response to it could be either not to 10XG respond to the call at all, or one has to lift the handset and commence conversation without any prior knowledge of who the call is for and who the caller may be.
There have been some attempts made to overcome this problem and to allow the called party to make decisions whether to answer the call or not, based on being able to identify who the call is for and who the caller may be. The first solution takes the form of an answering machine which when connected to the line reacts to the ring signal sent from the public switching centre, terminates the ringing, provides a prerecorded message to the caller and then accepts information destined for the called person. If the X machine is ananged in such a way that the proceedings on the telephone line may be heard the called person may listen to the message and to the information being forwarded by the calling pany and may thus decide whether to answer the call or not by being able to identify who the call has been directed to and who is calling. There are two main disadvantages of this method: first, before anything else happens the incoming call is answered, the ring is terminated, and therefore the calling party is charged for the call, and secondly there is considerable delay from the time connection is established and ringing commences to the time the calling person and the one to whom the call is addressed can be identified.
Subsequent devices were based on an intent to provide Called Party Identification (CPI). In this category will be found devices such as the "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" (United States Patent No. 4,639,552); "Priority Call" (United States Trade Mark), "Call System for a Digital Telephone Set" (Japanese Application No. 60- 128294), and "Caller ID" (United States Trade Mark). The most successful type of device of this group is the visual display device under the trade mark of "Caller ID" and the patent of the "Call System for a Digital Telephone Set". These devices can identify each and every calling telephone number in the digital network. Other devices can identify only a limited or "special" number of callers due to programming and distinctive ring limitations (amongst other limitations), therefore each have had varying amounts of success depending on the particular application and environment in which they are operating. The "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" involves sophisticated electronic circuitry which connects to the called party's telephone line in parallel to the ordinary telephone apparatus and which is capable of recognising the calling party's Personal Identification Number (PIN) transmitted in the DTMF code. If the transmitted calling party's code coincides with the number prerecorded in the apparatus then identification is assumed positive, therefore the call is not terminated and the aforementioned apparatus annunciates a special ring signal so that the called party has the option to answer the call, knowing approximately who the caller might be. The "Call System for Digital Telephone Set" is proposed by NTT and as shown is registered in Japan. This solution refers to the Integrated Services Digital Network (ISDN) and a digital phone and it allows for the calling party's telephone number to be used in the called party digital telephone set for the puφose of identifying who is calling and to produce suitable audio and visual signals to the call recipient. It does not, however, allow for identification of the called persons.
Thus there is no existing device which allows calls to be directed to a particular person providing the opportunity for additional selective handling of such calls. The absence of such a facility results in all persons at the called premises being disturbed by incoming calls and being left with a judgement as to whether to answer the call.
The intent of this invention is to satisfy this need by providing a telephone instrument which will read a particular person address code transmitted as part of the telephone number sequence, cross reference to stored data and give a unique audio/visual signal if a match is found. Further application of the unique address code will be to cause the telephone to emit a ring signal in response to this code but not to any other differently coded call incoming on the ISDN exchange lines to which it is connected.
Thus the capability of the normal telephone service will be extended to provide direct communication to a number of individuals without the added cost (and perhaps restrictions due to limited line availability) of each individual requiring a separate exchange line.
SUMMARY OF THE INVENTION
A puφose of the present invention is to provide a telephone instrument being an audio only or an audio/video device for use with the digital public switched telephone network and which may be connected to one or more ISDN Microlink circuits.
A further puφose of the present invention is to use either the standard S-Bus wiring or a modified format of the 4 wire S-Bus combining n(2B+D) channels onto the one Bus (where B = 64 kb/s for user applications and D = 16 kb/s signalling and slow speed data channel).
A further purpose of the present invention is to provide a telephone system where the allocation of sub address codes, ring sequences and programming is under the control of the user.
A further puφose of the present invention is to provide a telephone which on receipt of an incoming call meeting various addressing requirements will record in memory details of the calling telephone number and will emit an audible ring signal in accordance with programming instructions and provide a visual display showing the called party and the telephone number of the calling party.
A further purpose of the present invention is to make provision for the audible ring to be switched off.
A further purpose of the present invention is to provide a telephone which will emit a standard audible ring sequence when the incoming call does not contain any user sub address codes.
A further purpose of the present invention is to provide a telephone which may be programmed by the user to also respond to selected sub address codes by emitting unique ring sequences programmed into the telephone.
A further purpose of the present invention is to provide a telephone which may be programmed to respond only to a programmed sub address code.
ADVANTAGES OVER PRIOR DEVICES
An International Search has been conducted for IdentiCall type telephone services and devices and the advantages of this invention over the cunent state of the an are:
Telephone IdentiCall addresses the basic household and small business need to identify an individual's telephone calls from those directed to other users. With Telephone IdentiCall one does not have to answer another person's telephone calls because the called party is known. Telephone IdentiCall does not achieve, and did not set out to achieve, the identification of telephone callers. This facility is embodied in the ISDN system.
Other devices such as "Priority Call" and the "Apparatus for Converting Standard Telephone to an Unlisted Number Telephone" also achieve this objective but are not designed for use on ISDN circuits and have other inherent disadvantages including: (1) Callers Personal Identification Numbers (PIN) or callers, telephone numbers have to be pre-programmed into the telephone or a Network Control Point (NCP) which constantly inconveniences the person wishing to use or change such services.
(2) Only a limited number of callers personal identification numbers (PIN) or callers telephone numbers can be pre-programmed into the telephone or a network control point (NCP). This limits the number of callers who could use such a device.
(3) Only a limited number of distinctly unique ring tones are possible. Therefore, only a limited number of callers can be given a distinctive ring. This again limits the number of callers who could use the prior devices. But even if distinctly unique ring tones were not limited one could not remember the ring tone of each caller.
Because only a limited number of callers can use these devices (due to the pre¬ programming and ring tone limitations above) the prior devices are only for limited use or your special callers, hence the name "Priority Call". This is in stark contrast to Telephone IdentiCall which does not have such limitations and is capable of being used by each and every telephone user.
The other fundamental advantages Telephone IdentiCall has over the prior devices are as follows:
(4) Improvement on services of an answering machine. Telephone IdentiCall utilises a non-defined sub-addressing field in the digital telephone network. By this means some additional call information is conveyed during the initial placing of the call. By this means the telephone call recipient is identified before the telephone call is answered and charged, unlike in the ordinary answering machine equipment. The prior devices (e.g. Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone) implement some of the telephone answering machine functions, therefore, all calls are immediately charged.
(5) A telephone with IdentiCall capabilities utilises microprocessor and software intelligence as opposed to hard wired logic circuitry (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone). Without microprocessor intelligence many of the enhanced telecommunication services (including Telephone IdentiCall) provided by the digital telephone network cannot be carried out.
(6) No Select Forward. With the "Apparatus for Convening a Standard Telephone to an Unlisted Number Telephone" the telephone calls are "passworded" or "screened" to enable calls by only a select few callers, i.e. callers must enter the telephone number and after the answering machine beep - their very own personal identification code
(PIN) consisting of two, three, five, six or more digits. Conversely, with Telephone
*♦ IdentiCall all telephone calls are forwarded with those not having a sub address particular person code being processed as general number calls.
(7) No Call Block. With the "Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone" there are a number of digit checking devices which terminate (hang up) the callers telephone call if:
a. no personal identification number is dialled;
b. the wrong personal identification number is dialled;
c. the wrong personal identification number sequence is dialled.
Telephone IdentiCall does not block or hang up telephone calls, again being a device for use from anywhere in the network.
(8) No Priority Call. Telephone IdentiCall identifies the person called, unlike the prior devices which identify a special caller (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone and Priority Call). Nevertheless, with the prior devices even if a special or priority caller has called, one still does not know who the call is for.
(9) Telephone IdentiCall Compliments Caller ID. The best and most popular method for identifying callers is "Caller ID" which allows the telephone number of each and every caller to be visually displayed without realising the inherent limits of the prior devices (Apparatus for Converting a Standard Telephone to an Unlisted Number Telephone and Priority Call) as per (1), (2) and (3) above. Telephone IdentiCall, as has been shown, does not have the inherent problems of the prior devices and is seen as the ideal compliment for "Caller ID".
* As a result of the "IdentiCall/Caller ID" combination the telephone recipient can identify calls intended specifically for them and can also identify the number of the
* originating caller, all before the call is answered.
"Caller ID" alone is a less attractive telephone device without "Telephone IdentiCall". This is because the people sharing the telephone will not be able to identify who has been called and in effect only the actual called recipient is likely to be able to recognise the displayed caller's telephone number. So if a wrong recipient (not the person called) answers the telephone he cannot recognise the displayed number - and is not benefited by Caller ID.
Needless to say, if the conect recipient (the person called) answers the telephone he may identify the displayed caller number and if so is benefited by Caller ID).
(10) Existing Network Software Use. Because the ISDN system provides for the use of sub address data which is passed through the public network without processing, the introduction of IdentiCall telephones requires no modification to network software.
(1 1) There is no need to hear nor answer the telephone call for another called person. By using the Indenticall Telephone Call Direction capability, telephone calls can be directed to any specific or any number of IdentiCall Telephones sharing the same telephone lines. Thus for example telephone calls can be directed to each called person's respective bedroom, thus suppressing the need to hear each other called person's personal ringing signal. In addition, each called person can utilise the "Ring Turn On/Off capability, which allows each called person to turn off their personal ringing signal if they are unavailable to take calls and likewise turn on their personal ringing signal once they are available.
DETAILED DESCRIPTION OF THE INVENTION
Two variations of the connection of multiple ISDN circuits to the IdentiCall equipment are discussed. A single version only of the application of the IdentiCall principle to the remainder of the system is contained in this description. Other embodiments are possible using different names. '. e version contained herein is for the puφose of description and is not intended to limit the methods of application covered by this patent.
The first version of connecting multiple Microlink services is shown in Fig 42/59 The IdentiCall Telephone will be connected to the standard S-Bus wiring from one or more Network Terminating (NT) units (for convenience refened to as NTl units) providing the interface in the subscribers premises between the 2 wire subscriber loops from the network and the 4 wire S-Busses. The prefened embodiment of the telephone unit will allow a base unit fitted for one S-Bus connection to be upgraded for additional S-Bus connection by field upgrade kits.
The alternate version for connecting multiple Microlink services is shown in Fig 43/59 & 44/59. In considering the various X telephone equipment available in the analogue environment and the expectation of users to have all existing facilities plus new ones with a change to an improved system, it is anticipated new services may become available. These will meet requirements in the large gap between Microlink services with 2 off B channels and Macrolink with 30 off B channels (in Europe and Australia). The Telecommunications
*♦ Authorities are cunently imposing a minimum of 20 off B channels on a Macrolink service.
The void to be filled for residential and small business applications is for the lower end, for
* example 4 or 6 off B channels to serve the multiline type of telephone commonly used by many people.
This second alternative for the IdentiCall telephone is modelled on all the channels (multiple B + combined D signalling) being multiplexed on to a proprietary Bus. This may be done in a unit which combines the outputs of several NT units into a single Bus (Fig 43/59) or in the prefened embodiment is achieved in a special version of the NT which can accept multiple subscriber loops as inputs and has a single proprietary Bus output which may multiplex for example 6 off B channels and a D signalling channel serving all B channels (Fig 44/59). Refer to page 20 for section titled XAN ISDN Network Terminating Unit and Bus.
The development of one alternative or the other will be affected by decisions taken by the Telecommunications Authorities. In either case the principles of operation of the IdentiCall equipment are the same but with different hardware and software to interface to either multiple S-Buses or a single proprietary Bus as the case may be.
The following description focuses on the operation of the IdentiCall equipment, rather than the various aspects of an ISDN telephone, and for simplicity considers a single Microlink service (Fig 41/59). As mentioned above the hardware and software requirements to allow the equipment to operate with multiple Microlinks will vary with developments by or authorised by the Authorities.
A single S-Bus connected to one Microlink service is carrying 2B + D channels. The 2B represents 2 x 64 kb/s user channels and the D channel signalling is a packet data channel of 16 kb/s capacity.
* Signalling functions do not require the full capacity of the D channel which can therefore also be used for other low data rate applications. The actual data rate on the S-Bus is 192 ' kb/s with the remaining 48 kb/s being associated with system overheads.
The individual IdentiCall telephone may be programmed by the user for specific features. The unique ring sequence is associated with an individuals' sub address code. A selection of ring sequences is programmed into permanent memory. These ring sequences may be _r
Page 178 recalled by a number for reference puφoses. X Ring sequence Q is the general ring for calls not using a sub address and may not be allocated to a particular individual.
While following programming instructions a user will key in the allocated sub-address, a user definable PIN and the reference number describing the ring sequence. If any are already allocated to this telephone the entry cannot be made until a clearing procedure is completed. When the data is accepted, the telephone will sound one sequence of the selected ring. Both the sub address and ring sequence records in memory will be flagged to prevent reassignment to another user. An individual telephone may be programmed to ring for a number of different sub-address codes. Unless specifically inhibited, it will always respond with ring sequence Q to a general call not containing a sub address.
Without erasing programmed information, an individual telephone may be programmed to not ring in response to valid coding on any incoming calls. Audible signalling only is inhibited in the "ring off" mode and visual signalling will still be given. The specified procedure when canied out will select this mode and turn on a flashing visual indicator as a reminder that the phone is in a silent mode.
The Call Direction facility of IdentiCall is used to cause only a selected telephone/s to ring in response to an incoming call with a given sub-address. This feature overcomes the need for everyone in the premises to hear an incoming call, even though they would be aware of the called party by the distinctive ring sequence. Each telephone may be programmed to respond in the desired manner to given calls. For the telephone which is required to ring in response to a particular sub-address, the user will follow the programming procedure which stores required sub-address codes in temporary memory positions. The procedure will allow the general number to be also optionally included if required, if previously erased. When the entry is completed and until such time as the Call Direction mode is cancelled a visual indicator will be turned on and be in a steady state mode and the telephone will ring only in response to the nominated incoming calls.
By setting up various telephones on the services with Call Direction responding to different sub addresses, personalised calling facilities to a number of individuals can be established on a common Microlink facility.
In some situations a telephone in a particular area may be required to respond to most incoming calls and it may not be practical in this case to nominate the code sequences which are to be accepted. The programming sequence for Call Direction may provide for nominating the address codes which are to be excluded. As before the visual indicator to show Call Direction mode is selected will be initiated when the programming sequence is completed.
The IdentiCall telephone (Fig 47/59) is connected across the S Bus with the line interface module providing buffering and switching between the line and the remainder of the telephone electronics. Where the telephone has the extended option for connection to multiple S-Busses, a conesponding number of Line Interface Modules will be included.
The operation of the IdentiCall telephone is that of an ISDN telephone as regards a number of the basic functions. On receipt of a telephone call on the general number, the microprocessor will monitor the D channel to determine if the call includes a sub-address code. If no sub-address is included, this will be a General Incoming call and the program in microprocessor 1 1 will access the memory 13 to determine if the Call Direction mode is activated and if the telephone has been programmed not to respond to a General Incoming call. Unless inhibited by both of these factors the program will require the telephone to respond with a visual and audible indication.
The microprocessor 1 1 will extract from the D channel signalling information, the record of the telephone number of the calling pany and display this on the readout on the telephone, illuminate a General call indicator as well as recording the data in the memory 13 for later use.
The program in microprocessor 1 1 will access the memory to determine if audible signalling has been inhibited by selection of the "ring off mode. If "ring off is selected, the calling party will believe the telephone is ringing (even though it is not) until it is answered at another telephone on the S-Bus or by an answering machine or terminated by the exchange or by the calling party. If "ring off is not selected the microprocessor program will access the memory 13 to determine the ring sequence conesponding to number Q for a general call and will cause the audible signalling device to respond with this sequence. If the call is answered the ring sequence will be terminated and the codec 5 will provide two way conversion between digital and analogue formats. On termination of the call the record of the telephone number of the calling pany will be erased from memory and the visual displays comprising readout and General call indicator will disappear.
After an absence from the phone, the user may intenogate the memory 13 to obtain a readout on the visual display of the originating phone number of calls which were not answered. The program provides for each number to be erased if required after display. Provision may be included for the information held in memory, recording details of incoming calls, to be accessed by transmitting the data via the S-Bus to a printer or electronic storage device, such as a personal computer.
If a sub address code is associated with the phone number to indicate a telephone call to a particular person, the microprocessor 11 will access memory 13 to determine if the Call Direction mode is being used to cause this particular telephone to respond to a given sub address. Unless inhibited by Call Direction the program will require the telephone to respond with a visual and audible indication.
The microprocessor 1 1 will extract from the D Channel signalling information, the record of the telephone number of the calling party and display this on the readout on the telephone along with the paπicular called person's sub address code, illuminate a Particular person indicator as well as recording the data in the memory 13 for later use. The program in micro-processor 1 1 will access the memory to determine if audible signalling has been inhibited by selection of the "ring off mode. If "ring off is selected, the calling pany will believe the teleph ne is ringing (even though it is not) until it is answered by another telephone on the S-Bus or by an answering machine or terminated by the exchange or by the calling party. If "ring off is not selected the microprocessor program will access the memory 13 to determine the ring sequence which has been assigned by the user to this particular user's sub address code. The program will cause the audible signalling device to respond with this nominated sequence.
If the call is answered the ring sequence will be terminated and the codec 5 will provide two way conversion between digital and analogue formats. On termination of the call the record of the telephone number of the calling party will be erased from memory and the visual displays comprising readout and Particular person indicator will disappear.
After an absence from the phone the user may intenogate the memory 1 to obtain the read out on the visual display of the originating phone numbers along with, in this case, the user sub-address codes, of calls which were not answered. The program provides for each number to be erased if required after display. Provision may be included for the information held in memory, recording details of incom calls, to be accessed by transmitting the data via S-Bus to a printer or electronic storage device, such as a personal computer. XAN ISDN NETWORK TERMINATION UNIT AND BUS
The present Integrated Services Digital Network (ISDN) connections provided by
»* telecommunications providers are Microlink (Basic Access Rate) and Macrolink. The Microlink service provides two 64Kbit "B" channels and a 16Kbit "D" channel, while the Macrolink service provides a minimum of twenty 64Kbit "B channels to a maximum of thirty 64Kbit "B" channels and a 64Kbit "D" channel. Residential customers and small businesses presently using analogue telecommunication facilities have a great need for four to six exchange line systems. As ISDN services can only provide a two channel Microlink or a twenty to thirty channel Macrolink, small business and some residential customers requiring four to six channels, cannot obtain a satisfactory service.
To overcome the void in ISDN services, a network terminating unit capable of connecting to several Microlinks is required. The network termination unit presently provided for Microlink services interfaces a single Microlink to a "S" bus. The terminal equipment connects to the ISDN service via the "S" bus, thus each piece of terminal equipment has access to the 2 "B" channels and the "D" channel. To provide a service ble for small business, several Microlink are needed, each providing 2 "B" channels and one "D" channel. To support a multiple Microlink system, a new bus for connection of terminal equipment and a new network termination unit for the interfacing of the Microlinks to the bus are required.
The new bus is the cabling within the subscribers premises which canies a number of Basic Rate Access ISDN services. The bus will be a multiple wire system with transmit and receive pairs for data transmission and possible pairs for power feeding. The bus is linked via the new network termination unit to the ISDN exchange. The terminal equipment connects directly to the new bus providing access to all the "B" channels and "D" channels.
The data rate on the new bus is determined by the maximum number of Basic Rate Access ISDN services the new bus is capable of supporting. Each Basic Rate Access requires a 144 kbits per second service multiplied by the maximum number of Basic Rate Accesses, •* plus framing information required to manage the bus.
_► Power feeding if provided on the new bus allows power derived from the network and/or locally (including batteries) to be used. Power feeding the terminal equipment via to the bus eliminates the need of providing separate mains power outlets for each device.
The new network termination unit conveπs each two wire Basic Access Service from the ISDN exchange into a multi-wire bus. The network termination unit multiplexes the multiple Microlink onto the new bus, plus provides the framing information required by the terminals. The new network termination unit adjusts timing differences between the Basic Rate Access connections, then time division multiplexes the channels, adding framing information to allow the terminal equipment to be able to decode the data stream. As the multiplexed data is assembled, the new network termination unit transmits it over the bus.
Data from the various terminal equipment connected to the bus is de-multiplexed by the network terminating unit allowing it to be transmitted over the Basic Rate Access connection back to the ISDN Exchange.
The new bus and network termination unit provides the solution for small business and residential telecommunication needs by allowing multiple terminal equipment to be connected to several Basic Rate Access ISDN services.
IDENTICALL MAIL BOX ANSWERING MACHINE
FIELD OF THE INVENTION
The IdentiCall Message Answering Machine (MAM) is a unit for use on an Integrated Services Digital Network which enables incoming messages to be recorded in personalised mail boxes providing security for each user of the system and avoiding the need to listen to all messages to locate your own.
The Message Answering Machine has the capability to process a number of calls simultaneously.
It is noted the term Telephone may equally apply to an instrument for audio communications only and to one which incorporates both audio and video communications facilities. These latter devices sometimes known as video telephones use the capacity of the ISDN 64 kb/s channel to transport a compressed video or slow scan image of the people speaking to each other via the telephone.
The Message Answering Machine for the ISDN application is recording the incoming data on the user channel and does not differentiate between data which is audio only and data which is audio and video. Thus it will meet both applications.
BACKGROUND OF THE INVENTION
It has been a long established practice for telephone users to combine a telephone answering machine with the normal telephone instrument which will answer incoming calls and provide facility for the caller to leave messages when the called party is either out, unable to come to the telephone, or does not wish to be involved in the telephone conversations with certain parties.
In the simplest form, the messages are recorded sequentially on the recording medium. Where this telephone service is used by a number of people, each recipient must listen to or at least scan all recorded messages in order that they can recover the messages intended for them. This system wastes a considerable amount of everyone's time as well as denying any degree of confidentiality for the recorded material.
Many different designs have been implemented and are marketed world wide. Practically all of them have several design features common and they are suited for operation in an analogue environment only. Many of these designs are covered by specific patents including US 4,591 ,664 by M. Freeman, US 4,747, 126 by W. G. Hood et al, US 4,809,321 by S. J. Morganstein. All of these designs provide a pre-recorded message upon termination of a ring signal and they record the messages from the calling party. The incoming messages are recorded in some form of mass-storage device like e.g. magnetic tape, magnetic discs, or electronic memory devices. Some of these equipments are specifically designed to inter-work with PABX systems in which case they can provide a certain degree of "personalised" service by directing or redirecting calls and/or messages to designated extensions, thus to the predetermined persons. None of the above mentioned designs are capable of operating while connected to a digital line and a digital phone.
One design, cunently available on the market, stands aside from all the above mentioned equipment because it goes well beyond an ordinary answering machine function. The design in question is marketed under the registered trade name of ASPEN, designed by Octel Communications Corporation in California. The Aspen system provides not only recorded announcements but also has provision for individual mail-boxes where messages for specific person(s) are stored in individual storage areas (boxes). The Aspen system has, however, two significant limitations: ( 1 ) it is rather expensive and thus totally uneconomical to serve a restricted number of users, and (2) in its present design form it can operate only on analogue telephone lines. In practice, therefore, it is most commonly used to serve numerous extensions of a PABX to which the Aspen system is connected by analogue tie lines.
By combining the ability of IdentiCall to address an incoming call to an individual with the partitioning capabilities of the answering machine, this invention for use with digital transmission networks will provide personalised acknowledgment when answering the call and will ensure the messages will become the sole property of the person to whom they were addressed. Pa *gee"- 184
To ensure messages are responded to without any unnecessary delays, it is important to indicate the presence of a message in a mail box. Because in some cases the caller is not able to provide the sub address code required for recognition of the intended called party, a general purpose mail box is required in the recording facility which can be accessed by all authorised users of the system for retrieval of those messages applicable to them. A similar form of indicating the presence of messages is vital for this mail box because of the probable tendency to only consider material recorded in the personalised mail box.
Coφorations are known to use voice mail systems but these require central intelligence in the form of a PABX and the voice mail data base itself, together with connectivity to an anay of telephone extensions. The proposed invention does away with PABX's, centralised voice mail data bases and the multiplicity of telephone extensions and terminal equipment. The proposed invention uses the concept of redialling not to access ones telephone terminal messages but instead ones personal messages. The mail box answering machine is an ideal solution in a residential or small business environment.
SUMMARY OF THE INVENTION
A puφose of the present invention is to provide an Answering Machine for use with the (ISDN) Telephone Network.
A further puφose of the present invention is to provide an Answering Machine which may be connected to multiple ISDN Microlink services by use of standard S-Bus wiring or a modified format of the 4 wire S-Bus combining n(2B+D) channels onto the one Bus (where B = 64 kb/s for user applications and D = 16kb/s signalling and slow speed data channel).
A further puφose of the present invention is to provide an Answering Machine which will record incoming data which may be from an audio only source or from an audio/video source such as a video telephone.
A further purpose of the present invention is to provide an Answering Machine which has the capability of simultaneously processing a number of incoming calls.
A further puφose of the present invention is to provide an improved answering machine system which incorporates the facility for messages to be addressed to individual recipients by way of individual mail boxes accessed by using Call Direction when the call is initiated. A puφose of the individual mail boxes is to provide security of information by allowing personally addressed information to be accessed only by the individual addressee.
A further purpose of the individual mail boxes to save individuals time by removing the need for them to review all messages to determine which ones are intended for them.
A further purpose of the present invention is to provide for individual, personal messages which may be audio only or audio and video, to be directed to the calling party when the call directed phone call is answered, which will advise the caller that the message will be recorded in an individual mail box.
A further purpose of the present invention is to provide an announcement at the start of each message to indicate the time of day and the date the message was received.
A further purpose of the present invention is to provide indications that messages have been stored in mail boxes to clearly signal the need or otherwise of reviewing the mail box contents.
A further puφose of the present invention is to allow each recipient to determine which messages should be retained and which should be erased to provide individual control over the management of the stored messages.
A further purpose of the present invention is to provide the facility for the answering machine to interact with a number of IdentiCall telephones connected to the service and to provide for the control system of each mail box to either answer an incoming call after a defined ringing period, or to answer it immediately.
A further puφose of the present invention is to optionally allow the answering machine to indicate a call by giving a short duration ring of the unique sequence established for the person being called.
A further purpose of the present invention is to provide a means of monitoring messages during recording while still maintaining security.
A further purpose of the present invention is to provide a mail box which shall be a General Mail box in which shall be recorded messages which are not addressed to an individual recipient.
A further puφose of the present invention is to allow an individual to gain access to his mail box by use of a padlock command. The padlock command shall be user definable. Access shallbe possible from a telephone associated with the answering machine or from any separate telephone, either internal or external to the premises.
A further purpose of the present invention is to enable each individual to review the messages in the General Mail box from any telephone as before by using their padlock command followed by a preset command.
A further puφose of the present invention is to enable the individual reviewing the General Mail box to nominate each message to be retained or erased before proceeding to the next message.
DETAILED DESCRIPTION OF THE INVENTION
The invention of the IndentiCall telephone for digital networks has been in response to a requirement for a positive identification to be given of the individual party to whom an incoming call is directed. By providing the indication of who the call is intended for and coupling this with a feature of (ISDN) which will display the telephone number of the calling party, an informed decision can be made by an individual on whether or not to answer the call. As previously noted the telephone may be an audio only device or one having both audio and video facilities sometimes refened to as a video telephone.
The present invention extends the principle of the IdentiCall telephone to a telephone answering machine designed for use with Integrated Services Digital Telephone Network (ISDN). By use of the facility to address incoming calls to a particular person, it becomes possible to store messages with addressing codes which will allow recall by addressee as though stored in individual mailboxes.
If the called pany has programmed the IdentiCall telephone for ring signal off or is simply not present to answer the call, the Mailbox Answering Machine (MAM) will intercept the call after the preset delay or immediately if so programmed, transmit a personalised audio message and provide the caller with an opportunity to leave a recorded message containing audio only or audio and video information which will be held in a secure confidential manner and be accessible only to the person to whom it was addressed.
Two variations of the connection of multiple Integrated Services Digital Network circuits to the IdentiCall equipment are discussed. A single version only of the application of the IdentiCall principle to the remainder of the system is contained in this description. Other embodiments are possible using different names. The version contained herein is for the puφose of description and is not intended to limit the methods of application covered by this patent. The first version of connecting multiple Microlink services is shown in Fig 49/59. The IdentiCall Mailbox Answering Machine will be connected to the standard S-Bus wiring from one or more Network Terminating (NT) units (for convenience refened to as NTl units) providing the interface in the subscribers premises between the 2 wire subscriber loops from the network and the 4 wire S-Busses. The prefened embodiment of the telephone Mailbox Answering Machine unit will allow a base unit fitted for one S-Bus connection to be upgraded for additional S-Bus connection by field upgrade kits.
The alternate version for connecting multiple Microlink services is shown in Fig 50/59 & 51/59. In considering the various telephone equipment available in the analogue environment and the expectation of users to have all existing facilities plus new ones with a change to an improved system, it is anticipated new services may become available. These will meet requirements in the large gap between Microlink services with 2 off B channels and Macrolink with 30 off B channels (in Europe and Australia). The Telecommunications Authorities are cunently imposing a minimum of 20 off B channels on a Macrolink service. The void to be filled for residential and small business applications is for the lower end, for example 4 or 6 off B channels to serve the multiline type of telephone commonly used by many people.
This second alternative for the IdentiCall telephone is modelled on all the channels (multiple B + combined D signalling) being multiplexed to a proprietary Bus. This may be done in a unit which combines the outputs of several NT units into a single Bus (Fig 50/59) or in the prefened embodiments is achieved in a special version of the NT which can accept multiple subscriber loops as inputs and has a single proprietary Bus output which may multiplex for example 6 off B channels and a D signalling channel serving all B channels (Fig 51/59). Refer to page 20 for section titled XAN ISDN Network Terminating Unit and Bus.
The development of one alternative or the other will be affected by decisions taken by the Telecommunications Authorities. In either case the principles of operation of the IdentiCall equipment are the same but with different hardware and software to interface to either multiple S-Buses or a single proprietary Bus as the case may be.
The following description focuses on the operation of the IdentiCall equipment, rather than the various aspects of an ISDN telephone, and for simplicity considers a single Microlink service. As mentioned above the hardware and software requirements to allow the equipment to operate with multiple Microlinks will vary with developments by or authorised by the Authorities (Refer to Fig 52/59 and Fig 53/59). A single S-Bus connected to one Microlink service is carrying 2B + D channels. The 2B represents 2 x 64 kb/s user channels and the D channel signalling is a packet data channel of 16 kb/s capacity.
Signalling functions do not require the full capacity of the D channel which can therefore also be used for other low data rate applications. The actual data rate on the S-Bus is 192 kb/s with the remaining 48 kb/s being associated with system overheads.
The IdentiCall Message Answering Machine may be programmed by the user for specific features. The unique ring sequence is associated with an individual's sub address code. A selection of ring sequences is programmed into permanent memory. These ring sequences may be recalled by a number for reference puφoses. Ring sequence Q is the general ring for calls not using a sub address and may not be allocated to a particular individual. It is necessary for each individual user to register onto the answering machine. As part of the programming instructions for this purpose a user will key in the allocated sub-address, a user definable personal identification number known as the Padlock Command and the number describing the ring sequence. This ties together the factors relating to each authorised individual user on the system and records the Padlock Command which must be used to access particular functions. In this way security of information is ensured and users may change their Padlock Command as they consider it necessary. If any of the selected codes are already allocated to the answering machine the entry cannot be made until a clearing procedure is completed. When the entry is accepted, the machine will sound one sequence of the selected ring. Both the sub address and ring sequence records in memory will be flagged to prevent reassignment to another user. The ring sequence Q is reserved for calls to the number which do not contain a sub address code.
The Call Direction facility of IdentiCall is used both for initiating distinctive ring sequences as well as directing messages into "personal mailboxes" by the assignment of individual address codes. If a sub-address code is not received, the answering machine will use the ring sequence and the mailbox address relating to General calls.
If a person will not be available to answer the telephone and wishes to reduce the delay before the answering machine intercepts an incoming call, the machine can be accessed and an "answer immediately" record placed in memory 13 against a given user sub address code. When an incoming call is received, the microprocessor 11 will monitor the D channel to determine if the call includes a sub address code. If a sub address code is received the program in microprocessor 1 1 will check the code against those registered onto the system and held in memory to verify the particular person code is valid. The program will then access the memory to determine if an "answer immediately" flag is set against the record for the particular address code.
The MAM may be programmed into a "Silent" or "Single Ring" mode. In the latter, the signalling device will give one complete cycle of the programmed ring sequence conesponding to the address on an incoming call. In "Silent" mode no ring is given.
Depending on the programmed instruction, the MAM will either answer the call immediately or when the call has remained unanswered for the standard specified number of "rings" as programmed into the machine as the default condition.
The MAM will record details of the call in the memory 13 for future use. These details will include the telephone number of the originating telephone and the sub address code to which the call was made and a time and date record from the internal clock. A flag will also be set against the address to show a call to this person was answered. At the same time a pre-recorded message specific to the called person will be read from mass storage device 16 and will be transmitted via message interface 12 to the logic circuit 4 where it will be included in the 64 kb/s stream transmitted back to the caller. It will advise the caller the message will be recorded in an individual mailbox and then ask them to commence the message. After the pre recorded message has been completed the microprocessor 1 1 will issue a command to record the incoming message from the caller. The caller's message will be preceded by a record of the actual time of day obtained from the system internal 24 hour clock. On replay of the message this will provide a time reference reproduced as a synthesised voice for the start of each message. The content of the message which may be audio only or audio and video will be extracted from the incoming data stream and passing via message interface 12 will be stored in the mass storage device 16 incoφorating addressing codes which are specific to the called person. A distinctive indication will appear on the answering machine alerting the user to the fact that there were personally addressed incoming calls which have been answered by the MAM.
In the case of an incoming call which does not include valid special called person identification digits, the MAM will cany out the sequences as in the particular person case above but the message addressing, pre-recorded announcement, record flags and physical indicators will relate to a General Mailbox.
If a further call is received the same sequence as before will be canied out with each call being recorded in separately addressed files. In some cases it is valuable to be able to monitor calls as they are recorded. However it is vital that the integrity of the secure mail boxes is maintained. By entering a users "Padlock Command" on the MAM, it is possible to use the monitor facilities of the unit to listen to and view recordings, as they are made, going to the individual mailbox relating to that Padlock Command and the General mailbox. No information at all will be received relating to messages for other mailboxes. As implied by the operation of the system and the security requirements, the vision monitor built into the MAM unit will only display images when the inbuilt monitoring facility is being used under the authority of a valid Padlock Command.
Because the machine can process multiple calls at the same time, it is possible that at any given time, a particular Padlock Command may be valid for more than one call. As it is not practical to listen to more than one call at a time, the monitor selector circuit will stop on the first call it accesses. The microprocessor will sequence through the address in memory 13 to determine if the Padlock Command is valid for any other calls in progress. If others are found, the monitor will sequence to each in turn after holding for a preset time on the previous call. If required, a pause function built into the sequencing may be activated to hold the monitor on a selected call. Scanning can be recommenced by initiation of the function manually or will automatically occur when the call being monitored is terminated.
The message waiting indicators on the MAM unit will indicate two specific cases of call interception by the MAM.
1 . At least one call was answered which did not include particular person sub address codes. Refer to the General Mailbox.
2. At least one call was answered which did include particular person sub address . codes. Refer to Personal Mailboxes.
Provision shall be included in the microprocessor program for cancellation of the "message waiting" signals. This can only be canied out as part of a sequence requiring the entry of a Padlock Command, to avoid unauthorised cancellation.
From (a) the telephone associated with the MAM or (b) from another IdentiCall telephone on the system or (c) from a telephone on the external network, it will be possible for an individual to review the recorded messages in the MAM provided that person is aware of the authorised access codes. A specified address code, made known to users, must be entered to gain access to the MAM. This is followed by a user programmable "Padlock Command" which the microprocessor 1 1 will compare against the codes stored in memory 13. If a match is not found, the program will initiate a standard message from store indicating "invalid padlock command - please recheck your code". If a match is found the MAM will check the memory for a message flag in the record conesponding to this mailbox. If no flag is found the program will call up a standard message from the store indicating "no messages in your mailbox".
The program will then step on to checking the General Mailbox indicator as covered below.
If a flag is found the MAM will play each message which has been stored against this individual address code. Between each stored message the MAM will replay a message from mass store 16 asking if the previous message is to be retained or erased. After entry of a specified address code conesponding to the required action, the microprocessor will initiate this action then replay the next message. The sequence will continue until no further messages are found which will initiate a standard message from the mass storage device indicating "no further messages found - do you wish to cancel the personal mailbox message indicator." If a "yes" code is entered the flag for this person will be reset. The program in the microprocessor will check the mailbox records in memory 13. If no other message flags relating to any other authorised user are found, the Personal Mailbox Message indicator on the MAM will be cancelled. If a "no" code is entered the program would step to this point.
The program will check whether the General Mailbox message indicator is activated. If 'no' the routine will call up a standard message from the mass store indicating "there are no messages in the General Mailbox". The sequence will be terminated by placing the handset "on hook". If 'yes' the routine will call up a standard message asking "do you wish to review messages in the General Mailbox".
If a 'no' code is entered the sequence will be terminated by placing the handset "on hook". If a 'yes' code is entered the process of reviewing messages will proceed as before including the option to retain or erase messages. When no further messages are found the routine will call up a standard message indicating "no further messages found - do you wish to cancel the general mailbox message indicator". If a 'yes' code is entered the action will be initiated and the sequence terminated by placing the handset on "hook". Access to the General Mailbox may be obtained without first reviewing a personal mailbox. This will be initiated by following entry of the "Padlock Command" by a delimiter such as # then entering a specified General Mailbox Address code which is common to all users. The program will first check the "Padlock Command" against the codes stored in memory 13. If a match is not found, the program will initiate a standard message from store indicating "invalid padlock command - please recheck your code". If a match is found, the program will step on to checking the General Mailbox indicator and proceed as before.
An authorised user may enter the Padlock Command as part of the inquiry sequence and obtain a readout on the inbuilt visual display of the telephone numbers of the originating telephones _r all calls to their own and to General mailbox which were answered by the IdentiCall Message Answering Machine. Provision shall be included for each record to be erased after display, if required. Where necessary these records may be read out of memory and transmitted to a printer or electronic storage device such as the IdentiCall Mailbox Facsimile / Printer Machine.
XAN ISDN NETWORK TERMINATION UNIT AND BUS
The present Integrated Services Digital Network (ISDN) connections provided by telecommunications providers are Microlink (Basic Access Rate) and Macrolink. The Microlink service provides two 64Kbit "B" channels and a 16Kbit "D" channel, while the Macrolink service provides a minimum of twenty 64Kbit "B channels to a maximum of thirty 64Kbit "B" channels and a 64Kbit "D" channel. Residential customers and small businesses presently using analogue telecommunication facilities have a great need for four to six exchange line systems. As ISDN services can only provide a two channel Microlink or a twenty to thirty channel Macrolink, small business and some residential customers requiring four to six channels, cannot obtain a satisfactory service.
To overcome the void in ISDN services, a network terminating unit capable of connecting to several Microlinks is required. The network termination unit presently provided for Microlink services interfaces a single Microlink to a "S" bus. The terminal equipment connects to the ISDN service via the "S" bus, thus each piece of terminal equipment has access to the 2 "B" channels and the "D" channel. To provide a service suitable for small business, several Microlink are needed, each providing 2 "B" channels and one "D" channel. To support a multiple Microlink system, a new bus for connection of terminal equipment and a new network termination unit for the interfacing of the Microlinks to the bus are required. The new bus is the cabling within the subscribers premises which canies a number of Basic Rate Access ISDN services. The bus will be a multiple wire system with transmit
♦ . and receive pairs for data transmission and possible pairs for power feeding. The bus is linked via the new network termination unit to the ISDN exchange. The terminal equipment connects directly to the new bus providing access to all the "B" channels and "D" channels.
The data rate on the new bus is determined by the maximum number of Basic Rate Access ISDN services the new bus is capable of supporting. Each Basic Rate Access requires a 144 kbits per second service multiplied by the maximum number of Basic Rate Accesses, plus framing information required to manage the bus.
Power feeding if provided on the new bus allows power derived from the network and/or locally (including batteries) to be used. Power feeding the terminal equipment via to the bus eliminates the need of providing separate mains power outlets for each device.
The new network termination unit converts each two wire Basic Access Service from the ISDN exchange into a multi-wire bus. The network termination unit multiplexes the multiple Microlink onto the new bus, plus provides the framing information required by the terminals. The new network termination unit adjusts timing differences between the Basic Rate Access connections, then time division multiplexes the channels, adding framing information to allow the terminal equipment to be able to decode the data stream. As the multiplexed data is assembled, the new network termination unit transmits it over the bus.
Data from the various terminal equipment connected to the bus is de-multiplexed by the network terminating unit allowing it to be transmitted over the Basic Rate Access connection back to the ISDN Exchange.
The new bus and network termination unit provides the solution for small business and residential telecommunication needs by allowing multiple terminal equipment to be connected to several Basic Rate Access ISDN services.
IDENTICALL MAILBOX FACSIMILE/PRINTER MACHINE
FIELD OF THE INVENTION
This invention, which is a progression of the associated XAN Mailbox Facsimile Machine for analogue networks into Integrated Service Digital Network (ISDN), is designed to offer improvements to other present mailbox facsimile machines by providing a number of secure individual mailboxes for holding printed messages. The machine may also be used as a dial up mail box printer assembly accessing the same secure mailboxes.
It has the capability to process a number of calls simultaneously by recording subsequent calls in a mass storage facility until the printer is available to produce the document and forward it to the individual mailbox. The operation of the device is described whereby the storage capacity can be used as a temporary store until the Re-Call operation of the device retransmits the data to the intended device.
SUMMARY OF THE INVENTION
A puφose of the present invention is to provide a Facsimile/Printer Machine for use with the Integrated Services Digital Network which allows printed messages to be stored in secure mailbox containers.
A further puφose of the present invention is provide a Facsimile/Printer Machine which may be connected to multiple Integrated Services Digital Network (ISDN) Microlink services by use of standard S-Bus wiring or a modified format of the 4 wire S-Bus combining n(2B+D) channels onto the one Bus (where B = 64kb/s for user applications and D = 16 kb/s signalling and slow speed data channel).
A further purpose of the present invention is to provide a machine which can process a number of calls simultaneously A' holding incoming material in a data storage facility until the printer is available for autoi .c production of printed documents.
A further puφose of the present invention is to be able to use the sub-address codes which may be included with the called telephone number to identify the called person allowing the printout to be directed to that individual's personal mailbox.
A further puφose of the present invention is to identify facsimiles which were not directed to a personal mailbox by the use of a sub-address code and to store these in a General mailbox.
A further puφose of the present invention is to provide a visual indicator on each mailbox to indicate the presence of a document.
A further puφose of the present invention is to maintain compatibility with the various other IdentiCall Integrated Service Digital Network (ISDN) products.
A further puφose of the present invention is to provide a printer mechanism incoφorating the individual mailbox facilities which may be accessed via the telephone network for providing printouts of data from other sources including personal computers and other IdentiCall equipment.
A further purpose of the present invention is to be able to access the mailbox containers without interfering with the printing of incoming documents.
A further puφose of the present invention is to provide secure individual mailboxes for the storage of printed documents which may only be accessed by an authorised individual. Such access would normally be to one personal mailbox plus the general mailbox.
A further puφose of the present invention is to use the information contained in the D signalling channel to identify the number of the calling machine and to print it on each page of the received printout.
A further purpose of the present invention is to provide a device which by the Re-Call facility can be used as a temporary storage unit for incoming data until it can be retransmitted to the intended device.
BACKGROUND OF THE INVENTION
A number of facsimile machines cunently available provide facilities for sending documents which are to be held in a secure environment for retrieval by the authorised recipient. All of these machines store the messages in an electronic mass storage device such as a disc drive. Messages are directed to the secure storage facility by entry of the person's code by tone dialling on the keypad of the calling machine, after the called machine answers. The recipient may initiate a print of the messages held in storage by entry of a personal identification number.
The above method of providing security of documents has a number of disadvantages. Some of these are unique to the analogue telephone network but others are equally applicable to an Integrated Services Digital Network (ISDN) machine because they relate to storage of the information. The major disadvantage is that when the recipient requires the messages from store it is necessary to initiate a printout and wait while this is completed,
** otherwise the security of the documents is lost. While this is being done the machine is at least partially unavailable to other users. Based on prints requiring up to 15 seconds per page to complete, the recipient could waste a lot of time waiting at the machine. The scenario becomes even less attractive if a person considers the use of personal addressing for all messages instead of onlv the confidential ones. In even a small business environment with several users who receive an average number of facsimiles the amount of disc storage space which must be available to the machine becomes significant. It is also difficult to define requirements, which must be based on averages, because the storage space required for each page is determined by the amount of information (i.e.detail) on the page.
A further disadvantage of the present devices is that in the majority of equipment, there is no provision for receiving messages from more than one source at a time. This leads to considerable wasted time on the part of the sender and in some cases considerable delays because messages cannot be sent.
The various limitations of the present machines are overcome by the present invention. Messages are either printed as they are received or temporarily stored in an electronic mass storage device and automatically printed when the printer unit becomes available, then filed in secure individual mail boxes ready for collection. Thus the recipient does not waste time sorting through all the messages to find his own and/or waiting for the messages in store to be printed. When messages are being collected, the normal operation of the machine is not inhibited.
The prefened embodiment of the machine will allow a separate set of sub-address numbers to be used to access the machine as a mailbox printer machine providing the same security of documents for output printed via the telephone network from other equipment including personal computers and other IdentiCall equipment.
DETAILED DESCRIPTION OF THE INVENTION
The IdentiCall Mailbox Facsimile/Printer Machine applies the technology developed for the IdentiCall Telephone and the IdentiCall Message Answering Machine to a Facsimile/Printer Machine for use on Integrated Service Digital Network (ISDN) which deposits messages in secure personal physical mailboxes. The machine also utilises the data canied in the D signalling channel to print the number of the originating machine along with date, time, page number etc. as a header on each page.
The originating machine number is from network signalling data and not from programming of the sending machine and therefore gives positive proof of origin.
Two variations of the connection of multiple ISDN circuits to the IdentiCall equipment are discussed. A single version only of the application of the IdentiCall principle to the remainder of the system is contained in this description. Other embodiments are possible using different names. The version contained herein is for the puφose of description and is not intended to limit the methods of application covered by this patent.
The first version of connecting multiple Microlink services is shown in Fig 55/59. The IdentiCall Mailbox Facsimile/Printer Machine will be connected to the standard S-Bus wiring from one or more Network Terminating (NT) units (for convenience refened to as NTl units) providing the interface in the subscribers premises between the 2 wire subscriber loops from the network and the 4 wire S-Busses. The prefened embodiment of the device will allow a base unit fitted for one S-Bus connection to be upgraded for additional S-Bus connection by field upgrade kits.
The alternate version for connecting multiple Microlink services is shown in Fig 56/59 & 57/59. In considering the various telephone equipment available in the analogue environment and the expectation of users to have all existing facilities plus new ones with a change to an improved system, it is anticipated new services may become available. These will meet requirements in the large gap between Microlink services with 2 off B channels and Macrolink with 30 off B channels (in Europe and Australia). The Tele¬ communications authorities are cunently imposing a minimum of 20 off B channels on a Macrolink service. The void to be filled for residential and small business applications is for the lower end, for example 4 or 6 off B channels to serve the multiline type of telephone commonly used by many people. This would then be highly applicable to a facsimile machine in particular which is capable of handling a number of calls simultaneously.
This second alternative for the IdentiCall Facsimile/Printer Machine is modelled on all the channels (multiple B + combined D signalling) being multiplexed to a proprietary Bus. This may be done in a unit which combines the outputs of several NT units into a single Bus (Fig 56/59) or in the prefened embodiments is achieved in a special version of the NT which can accept multiple subscriber loops as inputs and has a single proprietary Bus output which may multiplex for example 6 off B channels and a D signalling channel serving all B channels (Fig 57/59). Refer to page 18 for section titled XAN ISDN Network Terminatin 'gto Unit and Bus.
The development of one alternative or the other will be affected by decisions taken by the Telecommunications Authorities. In either case the principles of operation of the IdentiCall equipment are the same but with different hardware and software to interface to either multiple S-Buses or a single proprietary Bus as the case may be. The following description focuses on the operation of the IdentiCall equipment, rather than the various aspects of an ISDN device, and for simplicity considers a single Microlink service. As mentioned above the hardware and software requirements to allow the equipment to operate with multiple Microlinks will vary with developments by or authorised by the Authorities (Refer Fig 58/59 & 59/59 for in principle layouts).
A single S-Bus connected to one Microlink service is carrying 2B + D channels. The 2B represents 2 x 64 kb/s user channels and the D channel signalling is a packet data channel of 16 kb/s capacity.
Signalling functions do not require the full capacity of the D channel which can therefore also be used for other low data rate applications. The actual data rate on the S-Bus is 192 kb/s with the remaining 48 kb/s being associated with system overheads.
It is necessary for each individual user to register onto the Facsimile/Printer Machine. As part of the programming instructions for this puφose a user will key in the allocated sub- address and a user definable personal identification number known as the Padlock Command. The program in microprocessor 11 will access the memory 13 to determine the next available mailbox location. The location will be indicated by rapid flashing of the message indicator on the nominated mailbox. Acknowledging the allocation confirms the location and clears the indicator. The entry program will allow for additional sub-address codes to be attached to the one Padlock Command to provide for receiving information both as a facsimile and as a data print-out. This ties together the factors relating to each authorised individual user on the system and records the Padlock Command which must be used to access particular functions. In this way security of information is ensured and users may change their Padlock Command as they consider it necessary. If either the sub-address or selected Padlock Command are already allocated to the answering machine the entry cannot be made until a clearing procedure is completed.
The Call Direction facility of IdentiCall is used for directing messages into personal mailboxes by the assignment of individual address codes. If a sub address code is not received, the Facsimile/Printer Machine will direct the message to the mailbox for General calls. A valid sub address code is required as part of the address for an incoming transmission to be recognised as a printer application.
When an incoming call is received, the microprocessor 1 1 will determine if the unit is already processing data to the printer. If no transfer is in progress, the microprocessor 1 1 will monitor the D signalling channel to determine if the call includes a sub address code. If a sub address code is received the program in microprocessor 1 1 will check the code against those registered onto the system and held in memory to verify the particular person code is valid. The program will then access the memory to determine which mailbox
* y location is assigned to the particular person.
r» The microprocessor 1 1 will record details of the call in the memory 13 for future use.
These details will include the telephone number of the originating telephone and the sub address code, if any, to which the call was made.
Having received and verified the required signalling information and determined from the sub address information that a facsimile transmission will follow, the microprocessor 1 1 will answer the call and connect it to the facsimile electronics 17 which will commence handshake routines with the sending machine.
The microprocessor 1 1 will set a flag against the address in memory to indicate a call for this mailbox address has been answered and the conesponding mailbox message indicator will be flashed at a slow rate. This indicator will continue to flash until the mailbox is opened. The microprocessor will also pass instructions to the electro mechanical assembly 18 to set the document transfer gates in the conect positions for the output from printer 19 to be directed to the assigned mailbox as determined by the information stored in memory 13. If no sub address or one not registered on the system was received, the printer output will be directed to the General mailbox. If a valid sub-address was received, the printer ouφut will be directed to the mailbox assigned to that sub-address.
The prefened embodiment of the electro-mechanical assembly will be such that the default position of the gates will direct messages to the General mailbox. In the event of any gate not setting conectly and therefore not sending a conect verification to the microprocessor, the program will cause the mechanism to revert to the default position to enable the message to still be received.
In this case a fault light on the assembly will be illuminated to draw attention to the problem which will also alert users to the possibility of their documents being in the General *"" mailbox.
,* Before the message is printed on each page, a header will be printed. The facsimile electronics assembly 17 will obtain the time and date from the clock associated with the microprocessor and the number of the calling machine from the information in memory 13.
The ouφut of the facsimile electronics is passed to the printer assembly which incoφorates a memory buffer to maximise throughput. The printer output passes into the electro- mechanical assembly which incoφorates friction feed rollers and document transfer gating devices to direct the document to the conect mailbox. The documents will feed into the mailbox face down, thus presenting them in the conect order as received when they are removed from the mailbox and turned face up.
When the final page of the facsimile transmission has been printed, the microprocessor will cause the electro mechanical assembly to return to the default position ready for the next transmission.
If the microprocessor 1 1 receives and verifies the required signalling information and determines from a comparison of the sub address information and the records in memory 13 that the following transmission is a printer application, the call will be answered and directed to the printer assembly.
The microprocessor 1 1 will set a flag against the address in memory to indicate a call for this mailbox address has been answered and the conesponding mailbox message indicator will be flashed at a slow rate. This indicator will continue to flash until the mailbox is opened. The microprocessor will also pass instructions to the electro mechanical assembly 18 to set the document transfer gates in the conect positions for the output from printer 19 to be directed to the assigned mailbox as determined by the information stored in memory 13.
When a further incoming call is received, the microprocessor 1 1 will determine if the unit is already processing data to the printer. If a transfer is in progress, the microprocessor will read the address into memory and determine from the sub address if it is a facsimile or a printer application for establishing the required protocols.
The microprocessor will create a file in the electronic mass store 20 with a numerical reference and the call addressing information. The microprocessor will handle the protocols as previously determined and store the received data in the file created for this call.
When the data transfer in progress to the printer is concluded, the microprocessor will examine the files to determine if any material is held in the electronic mass store 20 waiting for transfer to the printer. If files are found to be present, the one with the lowest numerical reference will be accessed and transfened from store to the printer as though it was an incoming call. In this way the previously described procedure will be followed. On completion of the transfer of this file it will be deleted to provide automatic file management. The processor will recheck the files to determine if material is held in store waiting for transfer to the printer. The above process will be repeated until all files in store have been processed.
To retrieve documents from a personal mailbox, the individuals' Padlock Command must be entered as part of the set down retrieval procedure via the keyboard included in signalling devices 10. The microprocessor 11 will check the Padlock Command code against the records in memory 13 to determine which mailbox is assigned to this user. The program will then pass an instruction to the electromechanical lock mechanism for this box causing it to unlock. If the door is not opened within a predetermined time the microprocessor program will cause the electromechanical mechanism to relock the door. When the door is opened for removal of the documents, the mechanism will be reset to lock as the door is again closed. When closed and relocked, the program will check the status of a document detector in the box. If it shows empty the flag against the record in memory 13 will be reset and the flashing mailbox indicator will be turned off. If a document is detected in the mailbox the indicator will continue to flash.
Documents in the General Mailbox are able to be accessed by any authorised user. To retrieve documents from the General mailbox, an authorised Padlock Command followed by a pre-assigned common code must be entered as part of the set down retrieval procedure via the keyboard included in signalling devices 10. The microprocessor 1 1 will check the validity of this command against the records in memory 13 and if valid will pass on instruction to the electro mechanical lock mechanism for the General mailbox causing it to unlock.
If the door is not opened within a predetermined time the microprocessor program will cause the electromechanical mechanism to relock the door. When the door is opened for removal of the documents, the mechanism will be reset to lock as the door is again closed. When closed and relocked, the program will check the status of a document detector in the X box. If it shows empty the flag against the record in memory 13 will be reset and the flashing mailbox indicator will be turned off. If a document is detected in the mailbox the indicator will continue to flash.
To send a facsimile message the document is loaded into the feed tray of the scanner mechanism built into the facsimile electronics assembly 17. The keyboard associated with signalling devices 10 is used to instruct the microprocessor a circuit, is required and the called number may be either entered via the keyboard or accessed from the abbreviated dialling section in memorv 13. The Re-Call facilities of IdentiCall equipment provide a unique capability which further enhances the intelligent system whereby spare capacity in an IdentiCall device can be used to provide temporary storage to cover periods of non availability of other devices either due to lack of storage space or other causes such as equipment turned off. Where any incoming ca" includes a sub address code for a device type which is different to say the Facsimile/Printer Machine, the call would not normally be answered. However the microprocessor is required to read the code to determine the intended device type. Where it does not match its own device type code it will create a temporary record in memory to monitor the time the call remains unanswered.
If this time accumulates to equal a preset programmed time stored in the record as the Re- Call Answer Delay relating to answering other devices, a flag will be set against the temporary record to indicate Re-Call will be required, a file in the MAM storage device will be created with addressing information from the record in memory and the call will be answered. From the device type addressing information, the microprocessor can determine from stored data any protocols relating to this type of device. The required commands will be transmitted and the incoming material will be stored in the file created for this call. The flag set against the temporary record to indicate Re-Call will be required, will turn on an indicator to show a Re-Call message is recorded.
The record will be retained for a preset time as stored in the memory as the ReCall Interval. When the elapsed time equals the ReCall Internal the device will seek an available line and using the addressing information held in memory, address a call to the device originally intended to receive the data. If the device answers the call, the file holding the data will be accessed and the data transmitted. When the transmission is completed and the call terminated, the flag for this event in the Re-Call record will be reset. The microprocessor will scan the memory to determine if any other ReCall flags are present.
If no others exist, the ReCall Indicator will be reset.
If the device did not answer the call within a time interval less than the ReCall Answer Delay the call will be terminated and the device will again monitor elapsed time until it equals the ReCall Interval and the sequence is repeated.
ISDN NETWORK TERMINATION UNIT AND BUS
The present Integrated Services Digital Network (ISDN) connections provided by telecommunications providers are Microlink (Basic Access Rate) and Macrolink. The Microlink service provides two 64Kbit "B" channels and a 16Kbit "D" channel, while the Macrolink service provides a minimum of twenty 64Kbit "B channels to a maximum of thirty 64Kbit "B" channels and a 64Kbit "D" channel. Residential customers and small businesses presently using analogue telecommunication facilities have a great need for four to six exchange line systems. As ISDN services can only provide a two channel Microlink or a twenty to thirty channel Macrolink, small business and some residential customers requiring four to six channels, cannot obtain a satisfactory service.
To overcome the void in ISDN services, a network terminating unit capable of connecting to several Microlinks is required. The network termination unit presently provided for Microlink services interfaces a single Microlink to a "S" bus. The terminal equipment connects to the ISDN service via the "S" bus, thus each piece of terminal equipment has access to the 2 "B" channels and the "D" channel. To provide a service suitable for small business, several Microlink are needed, each providing 2 "B" channels and one "D" channel. To support a multiple Microlink system, a new bus for connection of terminal equipment and a new network termination unit for the interfacing of the Microlinks to the bus are required.
The new bus is the cabling within the subscribers premises which canies a number of Basic Rate Access ISDN services. The bus will be a multiple wire system with transmit and receive pairs for data transmission and possible pairs for power feeding. The bus is linked via the new network termination unit to the ISDN exchange. The terminal equipment connects directly to the new bus providing access to all the "B" channels and "D" channels.
The data rate on the new bus is determined by the maximum number of Basic Rate Access ISDN services the new bus is capable of supporting. Each Basic Rate Access requires a 144 kbits per second service multiplied by the maximum number of Basic Rate Accesses, plus framing information required to manage the bus.
Power feeding if provided on the new bus allows power derived from the network and/or locally (including batteries) to be used. Power feeding the terminal equipment via to the bus eliminates the need of providing separate mains power outlets for each device.
The new network termination unit converts each two wire Basic Access Service from the ISDN exchange into a multi-wire bus. The network termination unit multiplexes the multiple Microlink onto the new bus, plus provides the framing information required by the terminals. The new network termination unit adjusts timing differences between the Basic Rate Access connections, then time division multiplexes the channels, adding framing information to allow the terminal equipment to be able to decode the data stream. As the multiplexed data is assembled, the new network termination unit transmits it over the bus. Data from the various terminal equipment connected to the bus is de-multiplexed by the network terminating unit allowing it to be transmitted over the Basic Rate Access connection back to the ISDN Exchange.
The new bus and network termination unit provides the solution for small business and residential telecommunication needs by allowing multiple terminal equipment to be connected to several Basic Rate Access ISDN services.

Claims

1. A method of identifying the person to whom an incoming telephone call is directed before said call is answered, said method comprising the use of unassigned codes in the HEADING of the User Information Field of the Telephone User Part (TUP) in the CCS No. 7 D-channel signalling system in the ISDN network for transmission of suitable information from the calling person to the called person's telephone apparatus.
2. The method as claimed in claim 1 wherein more than one called person may be identified .
3. The method as claimed in claim 2 wherein an intelligent means of called person indentification is used comprising a microprocessor controlled by a stored program located in the telephone apparatus.
4. The method as claimed in claim 3 wherein one or more digits are used to identify the called person, said one or two digits being transmitted before or after dialling of the called person's directory number.
5. The method as claimed in claim 4 wherein digits used to identify the called person are delimited by a suitable isign like * or # or any combination thereof.
6. The method as claimed in claim 5 wherein details of the unanswered mcomming calls together with the called person indentification digit (s) are recorded in the telephone apparatus memory for future read out by the telephone apparatus user.
7. The method as claimed in claim 6 wherein if said call is not answered within a predetermined time the announcement of such indentification is deleted from the signalling devices and record of the event is entered into the memory.
8. The method as claimed in claim 1 wherein recognition of the called person identification signal is done by microcomponents which constitute part of the standard digital telephone apparatus with modified software.
SUBSTITUTE S
PCT/AU1990/000526 1989-10-31 1990-10-31 Called person identification in telecommunication WO1991007041A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPJ713889 1989-10-31
AUPJ7138 1989-10-31

Publications (1)

Publication Number Publication Date
WO1991007041A1 true WO1991007041A1 (en) 1991-05-16

Family

ID=3774319

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU1990/000526 WO1991007041A1 (en) 1989-10-31 1990-10-31 Called person identification in telecommunication

Country Status (2)

Country Link
IE (1) IE903907A1 (en)
WO (1) WO1991007041A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2273019A (en) * 1992-11-27 1994-06-01 Samsung Electronics Co Ltd Facsimile system capable of reporting the receipt of a message
WO1996027974A1 (en) * 1995-03-08 1996-09-12 Telefonaktiebolaget Lm Ericsson (Publ) A telephone set having calling party dependent ringing
WO1997028631A1 (en) * 1996-02-01 1997-08-07 Northern Telecom Limited Telecommunications functions management system
EP0818927A2 (en) * 1996-07-08 1998-01-14 Samsung Electronics Co., Ltd. Method and apparatus for controlling use of a telephone line
WO1998003004A1 (en) * 1996-07-11 1998-01-22 British Telecommunications Public Limited Company Telephone apparatus
EP0825751A2 (en) * 1996-08-19 1998-02-25 Casio Computer Co., Ltd. Control of a telecommunication receiving terminal by a transmitting terminal before the receiver terminal goes off the hook
GB2328109A (en) * 1997-08-02 1999-02-10 Mervyn Howard Elliott A telephone apparatus comprising means for generating a unique ringing sound identifying the called party
WO1999033254A1 (en) * 1997-12-19 1999-07-01 Ericsson Inc. System and method for allowing distinctive alerting
GB2333209A (en) * 1998-01-08 1999-07-14 Matsushita Electric Ind Co Ltd Caller-influenced call notification at called mobile terminal
WO2000011854A1 (en) * 1998-08-24 2000-03-02 John David Brownlie Automatic answer mode provision for some telephone network calls
EP0993166A1 (en) * 1998-10-07 2000-04-12 Alcatel Answering machine for an analog telecommunication system
US6771761B1 (en) 1999-12-29 2004-08-03 Bellsouth Intellectual Property Corporation System and method for caller-selectable call routing from a single telephone number
WO2009076739A1 (en) * 2007-12-19 2009-06-25 Bce Inc. Method and system for routing calls placed to a telephony identifier associated with a group of identities
US8249224B2 (en) 2003-12-15 2012-08-21 International Business Machines Corporation Providing speaker identifying information within embedded digital information
US8675830B2 (en) 2007-12-21 2014-03-18 Bce Inc. Method and apparatus for interrupting an active telephony session to deliver information to a subscriber
US8693652B2 (en) 2007-12-27 2014-04-08 Bce Inc. Method and system for processing calls in an architecture allowing a telephony identifier to be associated with a group of identities
US8712029B2 (en) 2008-12-24 2014-04-29 Bce Inc. Method and system for routing telephony communications together with modified calling party identifier information
US8897427B2 (en) 2007-11-21 2014-11-25 Bce Inc. Method and apparatus for enabling a calling party to leave a voice message for a called party
US9042526B2 (en) 2007-11-23 2015-05-26 Bce Inc. Method and apparatus for enabling a calling party to leave a voice message for a called party in response to a command provided by the calling party
US20210274036A1 (en) * 2018-07-17 2021-09-02 Google Llc Indicating callers for incoming voice calls on a shared speech-enabled device
US11317174B2 (en) 2007-12-27 2022-04-26 Bce Inc. Method and system for modifying routing information associated to a party

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4720848A (en) * 1983-12-05 1988-01-19 Nippo Communication Industrial Co. Communication system with voice announcement means
JPS6364451A (en) * 1986-09-05 1988-03-22 Seki Unyu Kk Telephone system with recipient identifying device
JPS63245046A (en) * 1987-03-31 1988-10-12 Toshiba Corp Communication terminal equipment
JPS6489842A (en) * 1987-09-30 1989-04-05 Toshiba Corp Receiver
JPH01243757A (en) * 1988-03-25 1989-09-28 Toshiba Corp Communication terminal equipment
JPH01258533A (en) * 1988-04-08 1989-10-16 Hitachi Ltd Telephone system with incoming information display function
AU3434289A (en) * 1988-07-25 1990-02-19 John James Anderson Personal signalling telephone
AU5327390A (en) * 1989-04-17 1990-10-18 John James Anderson Improvements in telephones and answering systems

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4720848A (en) * 1983-12-05 1988-01-19 Nippo Communication Industrial Co. Communication system with voice announcement means
JPS6364451A (en) * 1986-09-05 1988-03-22 Seki Unyu Kk Telephone system with recipient identifying device
JPS63245046A (en) * 1987-03-31 1988-10-12 Toshiba Corp Communication terminal equipment
JPS6489842A (en) * 1987-09-30 1989-04-05 Toshiba Corp Receiver
JPH01243757A (en) * 1988-03-25 1989-09-28 Toshiba Corp Communication terminal equipment
JPH01258533A (en) * 1988-04-08 1989-10-16 Hitachi Ltd Telephone system with incoming information display function
AU3434289A (en) * 1988-07-25 1990-02-19 John James Anderson Personal signalling telephone
AU5327390A (en) * 1989-04-17 1990-10-18 John James Anderson Improvements in telephones and answering systems

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN, E-643, page 93; & JP,A,63 064 451 (SEKI UNYU K.K.), 22 March 1988. *
PATENT ABSTRACTS OF JAPAN, E-713, page 14; & JP,A,63 245 046 (TOSHIBA CORP), 12 October 1988. *
PATENT ABSTRACTS OF JAPAN, E-791, page 67; & JP,A,1 089 842 (TOSHIBA CORP), 5 April 1989. *
PATENT ABSTRACTS OF JAPAN, E-865, page 58; & JP,A,1 243 757 (TOSHIBA CORP), 28 September 1989. *
PATENT ABSTRACTS OF JAPAN, E-872, page 46; & JP,A,1 258 533 (HITACHI LTD), 16 October 1989. *

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2273019A (en) * 1992-11-27 1994-06-01 Samsung Electronics Co Ltd Facsimile system capable of reporting the receipt of a message
WO1996027974A1 (en) * 1995-03-08 1996-09-12 Telefonaktiebolaget Lm Ericsson (Publ) A telephone set having calling party dependent ringing
US6134320A (en) * 1996-02-01 2000-10-17 Nortel Networks Corporation Telecommunications functions management system providing selective alerting based on caller identifier
WO1997028631A1 (en) * 1996-02-01 1997-08-07 Northern Telecom Limited Telecommunications functions management system
US6226379B1 (en) 1996-02-01 2001-05-01 Nortel Networks Limited Telecommunications functions management system providing distinctive alerting based on caller identifier
EP0818927A2 (en) * 1996-07-08 1998-01-14 Samsung Electronics Co., Ltd. Method and apparatus for controlling use of a telephone line
WO1998003004A1 (en) * 1996-07-11 1998-01-22 British Telecommunications Public Limited Company Telephone apparatus
EP0825751A2 (en) * 1996-08-19 1998-02-25 Casio Computer Co., Ltd. Control of a telecommunication receiving terminal by a transmitting terminal before the receiver terminal goes off the hook
EP0825751A3 (en) * 1996-08-19 2004-07-14 Casio Computer Co., Ltd. Control of a telecommunication receiving terminal by a transmitting terminal before the receiver terminal goes off the hook
GB2328109A (en) * 1997-08-02 1999-02-10 Mervyn Howard Elliott A telephone apparatus comprising means for generating a unique ringing sound identifying the called party
WO1999033254A1 (en) * 1997-12-19 1999-07-01 Ericsson Inc. System and method for allowing distinctive alerting
GB2333209B (en) * 1998-01-08 2003-02-12 Matsushita Electric Ind Co Ltd Portable terminal device
GB2333209A (en) * 1998-01-08 1999-07-14 Matsushita Electric Ind Co Ltd Caller-influenced call notification at called mobile terminal
WO2000011854A1 (en) * 1998-08-24 2000-03-02 John David Brownlie Automatic answer mode provision for some telephone network calls
EP0993166A1 (en) * 1998-10-07 2000-04-12 Alcatel Answering machine for an analog telecommunication system
US6771761B1 (en) 1999-12-29 2004-08-03 Bellsouth Intellectual Property Corporation System and method for caller-selectable call routing from a single telephone number
US8249224B2 (en) 2003-12-15 2012-08-21 International Business Machines Corporation Providing speaker identifying information within embedded digital information
US8897427B2 (en) 2007-11-21 2014-11-25 Bce Inc. Method and apparatus for enabling a calling party to leave a voice message for a called party
US9042526B2 (en) 2007-11-23 2015-05-26 Bce Inc. Method and apparatus for enabling a calling party to leave a voice message for a called party in response to a command provided by the calling party
US8494134B2 (en) 2007-12-19 2013-07-23 Bce Inc. Method and system for routing calls placed to a telephony identifier associated with a group of identities
WO2009076739A1 (en) * 2007-12-19 2009-06-25 Bce Inc. Method and system for routing calls placed to a telephony identifier associated with a group of identities
US8675830B2 (en) 2007-12-21 2014-03-18 Bce Inc. Method and apparatus for interrupting an active telephony session to deliver information to a subscriber
US8693652B2 (en) 2007-12-27 2014-04-08 Bce Inc. Method and system for processing calls in an architecture allowing a telephony identifier to be associated with a group of identities
US9203967B2 (en) 2007-12-27 2015-12-01 Bce Inc. Method and system for processing calls in an architecture allowing a telephony identifier to be associated with a group of identities
US11317174B2 (en) 2007-12-27 2022-04-26 Bce Inc. Method and system for modifying routing information associated to a party
US8712029B2 (en) 2008-12-24 2014-04-29 Bce Inc. Method and system for routing telephony communications together with modified calling party identifier information
US20210274036A1 (en) * 2018-07-17 2021-09-02 Google Llc Indicating callers for incoming voice calls on a shared speech-enabled device
US11758042B2 (en) * 2018-07-17 2023-09-12 Google Llc Indicating callers for incoming voice calls on a shared speech-enabled device

Also Published As

Publication number Publication date
IE903907A1 (en) 1991-05-08

Similar Documents

Publication Publication Date Title
WO1991007041A1 (en) Called person identification in telecommunication
US5963620A (en) Integrated communications control device for a small office configured for coupling within a scalable network including multiple simultaneous call capability
EP0580190B1 (en) Interface to and operation of a voice messaging system
CA2181199C (en) Intelligent message leaving
US6542584B1 (en) Digital telephone system with automatic voice mail redirection
US4672660A (en) Method and system for identifying telephone callers
US4996704A (en) Electronic messaging systems with additional message storage capability
US6442248B1 (en) System for providing analog and digital telephone functions using a single telephone line
US5550900A (en) Apparatus and method for routing messages in a telephone message center
US6324263B1 (en) Digital telephone system with automatic routing based upon caller ID
EP0196781B1 (en) Method &amp; apparatus for automatically transmitting a message to a telephone terminal
US6038443A (en) Calling party announcement apparatus
US5117451A (en) Interface to and operation of a voice messaging system
US6067349A (en) Dialing using caller ID
US20040234050A1 (en) Network based voice mail with call screening
US4607144A (en) Apparatus for enhancing the use of electromechanical key telephone systems
EP0455912A2 (en) Electronic messaging system with multiple personal greetings
US6252944B1 (en) Telephone call/voice processing system
US8194845B2 (en) Telephone system
PL174342B1 (en) Method of and system for identifying manager&#39;s termianl equipment number within a pbx
US5805673A (en) Method and apparatus for reliable access to audio and facsimile message storage and retrieval system
JP2001007928A (en) Voice message transmission system to retrieve and store voice message from other message transmission system
WO1997001252A1 (en) Method and apparatus for paging based on caller id
US7221741B1 (en) Dialing using caller ID
JP3219124B2 (en) LAN-PBX communication device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AT AU BB BG BR CA CH DE DK ES FI GB GR HU JP KP KR LK LU MC MG MW NL NO RO SD SE SU US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BF BJ CF CG CH CM DE DK ES FR GA GB GR IT LU ML MR NL SE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA