Title of Invention

A COMMUNICATION SYSTEM FOR PROVIDING CALL CONNECTIONS AND VOICE MAIL SERVICE

Abstract A communication system for providing call connections and voice mail service to a network-baeed telephone device, the communication system comprising: an internet telephone switch that selectively connects an incoming call to at least one end point including a called party having an internet telephone and a gateway for processing calls from a public switched telephone network (PSTN) to a computer-based network, said gateway further comprising a voice mail service which records messages at least one gatekeeper, including an address table for processing the calls between endpoints, wherein the gatekeeper routes calls to endpoints by accessing the address table for a corresponding address of said endpoint, at least one voice mail intercept service terminal for the voice mail service, said voice mail intercept service terminal receives the incoming call from, said switch under the direction of said gatekeeper and said voice mail intercept service tcnninal further connects the incoming call to said internet telephone of said called party so the called party can monitor the call.
Full Text FORM 2
THE PATENTS ACT 1970
[39 OF 1970]
COMPLETE SPECIFICATION
[See Section 10
"REAL-TIME VOICEMAIL MOtflTORIMQ ANDCALL CONTROL
VERIZON LABORATORIES INC. (formerly GTE LABORATORIES INCORPORATED), of 1209 Orange Street, Wiliriington, Delaware 19801, United States of America
The following specification particularly describes and ascertain the nature of the invention and the manner in which it is to be performed :-



REAL-TIME VOICRlMAIL MONITORING AND CALL CONTROL
Technical Field
The present invention generally relates to the field of telecommunications. More specifically, the present invention concerns a method and apparatus for controlling and monitoring a roicemail system. Background Art
Communication systems for saving and retrieving telephone messages have become an integral, indispensable part of everyday life. The ability to have an automated system answer telephone calls and take a message have permeated society. Answering machines were the first units widely used for telephone message recording and retrieving. These systems provided cither a cassette tape recording or a digital recording of the telephone message. With these systems, a recipient of a message could listen to the message as it was being recorded. During the course of the recording, the recipient could override the recording device a/id gain control of the call by lifting the receiver and answering the call. The recipient of the call could also simply rum off the machine and lift the receiver and answer the call, which would in turn disable the recording device and allow die user to regain control of the telephone call, No message would be recorded.
The next evolution was the automated voice mail system employed by many offices. This system does not require an answering machine for each person, office or even telephone number. Instead an internal telephonic network, renders the use of separate answering machines unnecessary. When a telephone call is routed to the recording device, the sound of the message itself is not heard by the recipient, instead the internal system records the call without giving the user the ability to monitor the message being recorded. In addition, complete control over the call is transferred to the automated voice mail system. The user is completely removed from the decision making process regarding the call in that the user is unable to gain control of the incoming call.
Therefore, one of the major drawbacks that exists with presently available automated voice .mail systems is the inability to monitor a cajl and allow the user to

obtain control of the telephone call.
Another majoi drawback that cxisu with present Systems is the limited access to and control of incoming calls while the cailed party is on die same line connected to some on line service, such as the Internet. Presently, when a user is on-line, there is no means available for the user to monitor the incoming call
Consequently, there exists a need wherein a called party has the capability of listening to a telephone call while the culling party is recording a message on a voice mail system and the called party also has the capability of controlling the telephone call. There is also a need to be able to listen to a message heing recorded and control the telephone call while the called party is on the same line connected to the Internet or other on-line services.
Disclosure of the Invention
These needs and others arc met with a rea'.-timc voice mail monitoring and call control system. A real-time voice mail monitoring and call control system allows a listener (the called party) to monitor a caller's (the calling party's) live voice mail message. The called party can also connect to tnc calling party at any time during the reception of the voice mail message. When the called party connect"; to the calling party, control of the call is transferred from the voice mail system to the called party. Aceordinf^y, the recorded portion of the message is then deleted from the voice mail system.
Oftentimes, when a call is placed to the called party their telephone line may be busy because tbey arc using the same line, for example, to contact an on¬line system, such as the Internet. The live voice mail monitoring and call control system allows the called party to monitor a caller's live voice mail message while maintaining die connection to the on'linc system. The called party can also decide to conoeet to the caller during the recording of the voice mail message Accordingly, if the called party decides to connect to the calling party, the recorded portion of the message is removed from the voice mail system.

Brief Description of Drawings
The foregoing and other features and advantages of the present Jive voice mail monitoring and call control system and method are readily apparent and are to be understood by referring to the following detailed description of the preferred embodiment of the present invention, taken in conjunction with the accompanying drawings, in which:
Figure 1 is a block diagram of an H.323 network; Figutt 2 is a block diagram of a centralized voice mail system according to the
present invention; " Figur.; 3a is a chart illustrating the message flow for the recording of a voice mail
message; Figure 3b is a timing diagram for the recording of a voice mail message; Figure 4a is a chart illustrating the massage flow for the play back of a voice mail
message; Figure 4b is a timing diagram for the playback of a voicemai' message; Figure S is a block diagram of the real-time voice mail monitoring and call control
system according to the present invention; Figure 6a is a chart illustrating message flow in real-time fo- the real-time voice
mail monitoring and call control system of Figure 5; tod Figure 6b is a timing diagram for the real-time voice mail Monitoring and call
control system of Figure 5. Befit Mode for Carrying Out the Invention
The H.323 standard is an International Telecommunications Union (ITU)
standard for packet basal voice and video communication which supports both
voice and video communication aver the Internet. ITU Rrcommendation H.323
describes the opcrattor of terminals and equipment that provide multimedia
communications services over packet based networks (PIN) which may not
provide a guaranteed Quality of Service (QoS), for example, for audio applications.
H 32.3 terminals entl equipment may carry real-time au'iio, video and/or data. s
Support for audio is mandatory, while data and video are optional. However, if
*"i

supported, the ability to use a. specified common mode of operation is required, so that all terminals supporting that media type can work in conjunction with each other.
The HJ23 standard is an International Telecommunications Union (ITU) .standard for packet-based voice and video communication, which supports both voice and video communication ever the Internet, FTU Recommendation H.323 describes the operation of terminals and equipment that provide multimedia communications services over packer based networks (PBN) which may not provide a guaranteed Quality of Service (QoS), for example, for audio applications. „ H.323 terminals and equipment may carry real-time audio, video and/or data. Support for audio is mandatory, while data and video are optional. However, if supported, the ability to use a specified common mode of operation is required, so that all terminals supporting that media type can work in conjunction with each other.
The packet based network over which H.323 terminals communicate, may bo a point-to-point connection, a single network segment, or art inter-network having multiple segments with complex topologies.
Figure 1 is an overview of a possible configuration of an H.323 network . The elements included in this particular network are. Proxy 10, Call Control Service Entity (CCSE) 20, Gatekeeper 30, Service Terminal 40, Public Endpoinu 50, and Gateway 60. Proxy 10 is an H.323 component whicb has the important rok- of controlling access to the Quality of Service network (QoS). The Proxy 10 also provides traffic engineering and ft security function. In this regard, the Proxy 10 routes H.323 signals between two end-points.
Call Control Service Entity (CCSE) 20 is a H.323 entity that routes H.323 call control signals. The role of the CCSE 20 is to provide the initial connection between an incoming call and the intended public cnd-point(s). The CCSE 20 is able to respond to call control events that occur during the course of this initial call placement and redirect the cail path according to a subscriber's (called party's) service path. Gatekeeper 30 plays a central role in this infrastructure. Specifically, it directs calls to the CCSE 20. W ithout the Gatekeeper 30. there would be no mechanism for initiating the communications between a public end-point such as a

callirif, patty and the CCSE 20.
Service Terminal 40 is art entity that "lives in the network;" and behaves like an H-323 terminal. In effect, the Service Termin.il 40 acts as a surrogate for a live terminal. The Service Terminal 40 provides a place for actual services to be rendered to the caller on behalf of the called party. For example, a voice mail . system would be implemented as a service terminal.
Public End-Point 50 may be any H.323 terminal, Gateway or Multipoint Control Unit. An endpotm can call and oe called, and can also generate and/or terminate information streams, A Multipoint Control Uni, (MCU) is an endpoint which provides the capability for three or more terminals/gateways to participate in a multipoint conference. Of course, this unit may also connect two terminals which may later develop into a multipoint conference
Gateway 60 is an H.323 gateway that provides for signaling conversions between a Public Switched Telephone Network (PSTN) And an H.323 network environment. The Gateway 60 is able to accept a call originating in the PSTN and pass it on to the H.323 network or vice-versa. The Gateway 60 is responsible for passing caller-ID, number-dialed, and other information in both directions.
The voice mail system contempletsd in the present invention is a centralized voice mail service. The centralized voice mail architecture is shown in ' Figure 1, The Gateway 70 interacts with a Local Exchange Carrier (LEC) switch 80 as if it were an actual messaging platform. The LEC switch can also be ar. Internet telephone switch such as an Interact Local Exchange Carrier (ILEC) or aa Internet Exchange Carrier (tEC) switch. It should be noted that the phone B 110 shown in Figure 2 is aa IP phone (a.k.a. Internet Phone). Therefore, even though phone A 100 can be a regular phone in this invention, phono B 110 is an IP phone. Furthermore, the IP phone needs additional software: wherein the software would essentially allow for the execution, in one embodiment of the invention, of the steps 1-44 as shown in the timing diagram of Figure 6b. There are two voice mail system service scenarios: recording voice messages and playing back voice messages. Figures 3a and 3b illustrate the basic flow /or the recording of a message. More specifically. Figure 3a illustrates what happens when a calling party calls a called party and decides to record a message, since the calling party

cannot connect to the called party. Figure 3b shows the timing diagram associated with Figure 3a.
to Step (1) of the process, a calling party at a first telephone device (Endpoint A) 100 attempts to contact the called party at a second telephone device (Endpoint B) 110 (Fig. 2,3a and 3b). The LEG Switch 80 is coflfijnired to forward calis placed to the second telephone device 110 to a specific port on the Gateway 70 under certain situations such as "busy" or "no answer" (step (2)). The Gateway 70 Or GW then sends an Admission Request {ARQ) to ft first Gatekeeper 120 or GK, in step (3) to p,ain permission fot the call and to recover a caJl signaling Address to be located. A Location Request (LRQ) with this address is then sent to a second Gatekeeper 122 or GK, in step (4) to determine an address for a Voice Mail Service Terminal 150 or VM
Upon determining that the called telephone device is available for connection through the second Gatekeeper 122. the second Gatekeeper 122 generates a location confirmation (LCF) signal, which is sent to the first Gatekeeper 120 in step (5). The LCF (5) signal may also include the address of the second Gatekeeper 122 for use in routing the call.
In response to the LCF (5) signal. :he first Gatcltfieper J 20 generates an admission confirmation (ACF) signal which is sent to the Gateway 70 in step (65. which in turn transmits the SETUP (7) signal to the Voice Mail Service Terminal 150 in step (7) to control the initial connection procedures becween the first and second telephone devices 100 and 110.
The Voice Mail Service Terminal 150 then generates a CALLPROCBEDING (8) status signal, which is sent to die Gateway 70 in step 8 to indicate that the call connection is being initially established. The Voice Mail Service Terminal 150 also transmits an ARQ (9) signal to the second Gatekeeper 122 in step 9 to request permission to connect the telephone devices 100 and 110. The second Gatekeeper 122 in turn determines whether a connection may be made. If a, connection may be made, the second Gatekeeper 122 generates an ACF (10) signal which is transmitted to the Voice Mai! Service Terminal 150 in step 10.
The Voice Mail Service Terminal 150 then sends an ALERTING (11) signal to the Gateway 70 in step (11). This ALERTING (11) signal allows for the

initialization of the appropriate connection protocols for connecting the call. Once the Oatcway 70 receives this ALERTING (11) signal, the Gateway 70 then transmits an ALERTING (12) signal to the first telephone device (Endpoint A) 100, This ALERT signal is transmitted as ALERTING (12) signal from the Gateway 70 to the LEC Switch 80 (step 12) and finally as ALERTING (13) signal from Switch SO to the first telephone device 100 (step 13). The first telephone device 100 responds to the ALERT signal by initializing appropriate connection protocols for connecting the call.
A CONNECT (14) signal is then transmitted from the Voice Mall Service Terminal ] 50 to the Gateway 70 in step 14. A CONNECT (15) signal is also transmitted to the LEC Switch SO (step 15) and finally from Switch 80 a CONNECT (16) signal is sent to the first telephone device 100 (step 16). The first telephone device 100 responds to the CONNECT signal by performing the appropriate connection protocols for connecting the call. Thereafter, the call connection between the Voice Mail Service Terminal 150 and the first telephone device (Endpoint A) 100 is established. At this point, the calling party is connected to the Voice Mail Service Terminal 150 and can, leave a message for the called party.
Figures 4a and 4b illustrate the playback of £ voice mail message. More specifically, Figure 4a illustrates what happens when a subscriber decides to playback messages that have been recorded onto the voice mail system. Fig, 4b shows the timing diagram associated with Fig, 4a. In step (I) of tbe process, a subscriber (called party) using a telephone device (Endpoint B) 210 attempts to retrieve their voice mail messages. The telephone device 210 issues a SETUP (1) Signal in step 1 to an IJEC Switch 205, which in turn routes a SETUP (2) signal to a Gateway 170 in step 2. The SETUP signal is generated by the telephone device 210 to establish a connection to the Gateway 170. la response to the SETUP signal, the Gateway 170 generates an ALERT signal, which is sant to the telephone device (Endpoint B) 210 as signals ALERTING (3) and ALERTING (4) in steps 3 and 4 via the LEC switch 205. This ALERT signal allows for the initialization of the appropriate connection protocols for connecting the Gateway 170 to the telephone device (Endpoint B) 210, Thereafter, the Qateway 170 connects to the

telephone device 210 by sending CONNECT signals (CONNECT (5) and CONNECT (6)) in steps 5 and 6, again via the LEC switch 205.
Once the connection between the Gateway 170 and the telephone device 210 is established, the Gateway 170 transmics PROMPT signals (PROMPT (7) and PROMPT (8)) to the telephone device 210 via the LEC switch 205 (steps 7 and 8). The PROMPT signal prompts the subscriber at the telephone device 210 to enter a password, or the like, to access the subscriber's voice mail messages.
In response, the subscriber at the telephone device 210 enters a password by Some means, such as pressing keys on the telephone device 210 or by vocalizing commands into the telephone device 210. This password is transmitted, e.g.. as a Dual-Tone Multifreqoency (DTMF) signals (DTMF (9) and DTMF (10)) from the telephone device 210 to the Gateway 170 in steps 9 and 10.
Once the Gateway 170 receives the password, the Gateway 170 transmits a AUTHREQ (II) signal to a Radius Server 2!7 in step J!. The Radius Server 217 authenticates the subscriber by checking the password and sendieg an AUTHRESP (12) signal to the Gateway 170 in step 12 if the password is properly authenticated. The Gateway 170 responds by sending an ARQ (13) signal to the first Gatekeeper 220 in step 13 to obtain permission for the call. In response, the first Gatekeeper 220 generates a location request LRQ (14) signal to be sent to the second Gatekeeper 222 in step 14 to determine the call signaling address for the Voice Mail Service Terminal 250. Alternatively, the password may be sent to the Voice Mail Service Terminal 250 which, in turn, Can authenticate the subscriber.
Upon determining the address of the Voice Mail Service Terminal 250, the second Gatekeeper 222 generates a location confirmation signal LCF In response to the LCF (15) signal, the first Gatekeeper 220 generates an admission confirmation signal ACF (16) which is sent to the Gateway 170 in step 16. The Gateway 170, in turn, transmits the SETUP (17) signal to the Voice Maii Service Terminal 250 in step 17 to control the initial connection procedures beween the telephone device 210 and the Voice Mail Service Terminal 250.
The Voice Mail Service Terminal 250 then generates a CALLFROCEEDING (18) status signal, which is sent to the Gateway 170 in step

18 to indicate that the call connection is being established. The Voice Mail Service Terminal 250 also transmits an ARQ (J 9) signal to the second Gatekeeper 222 in step 19 to request permission to connect the Gateway 170 to the Voice Mail Service Terminal 250. The second Gatekeeper 222 in turn determines whether a connection may be made. If a connection may be made, the second Gatekeeper 222 generates an ACF (20) signal, an admission confirmation, which is transmitted to the Voice Mail Service Terminal 250 in step 20.
In response ro the ACF (20) signal from the second Gatekeeper 222, \he Voice Mail Service Terminal 250 transmits ALERTING (21) sipals to the Gateway 170 in step 21. These ALERTING (21) signals allow for the iaitialization of the appropriate connection protocols for connecting the call. Once the Gateway 170 receives this ALERTING (21) signal, it responds by initiating appropriate connection protocols for the connection of the subscriber and the Voice Mail Service Terminal 250 through the Gateway 170.
A CONNECT (22) signal is then transmitted from the Voice Mail Service Terminal 250 to the Gateway 210 in step 22. The Gateway 210 responds to the CONNECT (22) 9ignal by performing the appropriate connection protocols in order to connect the call. Thereafter, the call connection between trie Voice Mail Service Terminal 250 and Gateway 210 is established. At this point, the subscriber at telephone device 200, who was already connected to the Gateway 170 by way of steps 1 through 6, is now connected to the Voice Mail Service Terminal 250 via the Gateway 170. Accordingly, the subscriber has the capability of accessing and listening to messages from the Voice Mail Service Terminal 250.
Referring now to Figure 5, there is shown an overview of the major components of an exemplary configuration for the real-time voice mail monitoring and call control system of the present invention.
The system allows a listener to monitor a calling party's live voicemail message. If and when the called party decides to connect to the calling party, control of the call is transferred from the voicemail system to the listener
In use, Endpoint A 300 transmits a call-signal to the Gatekeeper 320. The Gatekeeper 320, is responsible for address translation, the managing of the bandwidth and potentially for the routing of call control signals. For example,

given an alias, such as a phone number, the Gatekeeper 320 will locate the associated address. The Gatekeeper 320 then directs the cal! to (he CCSE (Call Control Service Entity) 330, Thus, the Gatekeeper plays a centra) roie in the infrastructure. Without the Gatekeeper 320, there would be no mcchanisir. in the standard for initiating the communication between the public Endpoint A 300 and the CCSE 330.
The CCSE 330 is an H.323 entity that routes H.323 call control signals. Generally, its role is to provide the initial connection between an incoming call and the intended public endpoint, such as Eodpoim B 310. The CCSE 330 is able to respond to call control events that occur during the course of this initial call placement and redirect the call path according to a subscriber's service profile. In operation, the CCSE 330 first routes the cal) to the Voice Mail Intercept Service Terminal (VMIST) 340 on behalf of a particular subscriber. For example, the subscriber may desire to have all calls forwarded to the voicemail system when the subscriber is unavailable to take the cal), is on another call on Che same line, or is using the line for some On-tinc service, such as the Internet. This Voice Mail Intercept Service Terminal 340 acts as an H.323 Multipoint Control Unit (MCl). Essentially, the Voice Mail Intercept Service Terminal 340 creates a three-party call among Endpoint A, Endpoint B and the Voice Mail Service Terminal 350 where one of the media paths is unidirectional. If the user at Endpoint B 310 should elect to taJce the call after listening for a while, a bi-directionai path between the Voice Mail Intercept Service Terminal 340 and the Endpoint B 310 is Created while the connection between the Voice Mail Intercept Service Terminal 340 and the Voice Mail platform 350 is dropped.
Figures 6a and 6b show more detailed signaling steps carried out by the preferred embodiment. In particular, Figure 6a illustrates how a called party can monitor a message being recorded onto the voicemail system, while retaining the option lo take control of the cal! being recorded. Figure 6b shows the timing ( diagram associated with Figure 6a. Referring to Figures 6a and 6b, the first telephone device Endpoint A (400), issues a SETUP (1) signal in step 1 to an LEC Switch 405, which in turn routes the SETUP (2) signal to the Gateway 370 in step 2. The SETUP (1) signal is generated by the first telephone device, Endpoint A

(400). to establish a connection to the second telephone device 410, Endpoint B. In response to the SETUP signals, the Gateway 370 generates an admission request signal ARQ (3), which is sent to the first Gatekeeper 420 in step 3.
In response, the first Gatekeeper 420 generates ft location request signal LRQ (4) which is sent to the second Gatekeeper 422 in step 4 to determine the address for the second telephone device (Endpoint B) 410 and whether the second telephone device 410 is available for connection. Upon determining that the second telephone device 410 is available for connection through the second Gatekeeper 422, the second Gatekeeper 422 generates a location confirmation signal LCF (5). which is sent to the first Gatekeeper420 in step 5. The LCF (5) signal may also include the address of the second Gatekeeper 422 for use in routing the call there through.
In response to the LCF (5) signal, the first Gatekeeper 420 generates an admission confirmation signal ACF (6) which is sent to the Gateway 370 in step 6, which in turn transmits the SETUP (7) signal to the CCSE 430 in step 7 to control the initial connection procedures between the first and second telephone devices 400 and 410.
The CCSE 430 then generates a CALLPROCEEDING (8) status signal, which is sent to the Gateway 370 in step $ to indicate that the call connection is being established, The CCSE 430 also transmits an ARQ (9) signal to trie second Gatekeeper 422 in step 9 to request permission to connect the two telephone devices 400 and 410. The second Gatekeeper 422 in turn determines whether a connection may be made. ]f a connection may be made, the second Gatekeeper 422 generates an ACF (10) sign*) which is transmitted to the CCSE 430 in step 10.
In response to the ACF (10) signal from the second Gatekeeper 422, ihe CCSE 430 transmits the SETUP (13) signal to the Voice Mail Intercept Service Terminal (VMIST) 440 in step 3 3, which in turn transmits a CALLPROCEEDING (14) (CaJIPr) sigaaJ to the CCSE 430 in step 14 to indicate that the call connection is being established.
Also, the VMBT 440 generates an ARQ (15) signal and transmits it to the second Gatekeeper 422 in step L5 to obtain permission to establish the call with the second telephone device 410, After receiving an ACF (16) signal from the second

Gatekeeper 422 (step 16), the VMtST 440 then generates an ARQ (17) signal and transmits it to the second Gatekeeper 422 (step 37). Thereafter, the second Gatekeeper 422 transmits an ACF (18) signal to the VMfST 440, The VMIST 440 ""responds by generating a third ARQ (19) signal (step 19). At least 3 ARQs are " necessary because the VMIST must manage at least 3 connections or legs, i e. the connections between Endpoint A 400 and the VMIST 440, between Endpoint B 410 and the VMIST 440, and between the Voice Mail Service Terminal 450 and the VMIST 440. The second Gatekeeper 422 then generates art LRQ (20) signal to the third Gatekeeper 424 in step 20. The third Gatekeeper 424 in turn generates an LCF (2 ]) signai and transmits this signal to the second Gatekeeper 422 in step 21 in order to confirm the location. The second Gatekeeper 422 then sends an ACF (22) signal to VMIST 440 in step 22 to confirm the admission.
Once the VMIST 440 receives the ACF (22) confirmation, the VMIST 440 transmits the SETUP (23) signal to the second telephone device (Endpoint B) 410 (step 23) and the SETUP (24) signal to the Voice Mai I Service Terminal 450 (step 24). Accordingly. Endpoint B 410 and the Voice Mai) Service Terminal 450 transmit CALLPROCEEDING (CallPr) (25) signal and CaliPr (26) signal to the VMIST 440 (Steps 25 and 26). This signAl initially establishes a call connection between the Endpoint B 410 and the VMIST 440 and also between the Voice Mail Service Terminal 450 and the VMIST 440. Endpoint B 410 and the Voice Mail Service Terminal 450 transmit ARQ (27) signal to Gatekeeper 422 and ARQ (29) Signal to Gatekeeper 424 respectively. They receive ACF (28) signals and ACF
(30) from the first and second Gatekeepers 422 and 424 respectively (Steps 27-30). Both Endpoint B 410 and the Voice xMaii Service Terminal 450 then send ALERT
(31) and ALERT (32) signals to the VMIST 440 in steps 31 and 32. These ALERT signals allow for the initialization of the appropriate connection protocols connecting the call. Once the VMIST 440 receives the ALERT signals, the VMIST 440 then transmits an ALERT signal to Endpoint A 400 in step 33-36. This ALERT signal is transmitted through the CCSE 430, through the Gateway 370 (Step 34), through the LEC Switch 405 (Step 3S) and finally to the first telephone device (Endpoint A) 400 (Step 36). The first telephone device 400 responds to the ALERT signal by initializing appropriate connection protocols for

connecting the call.
The CONNECT (38) signal and CONNECT (37) signal are then transmitted from the Voice Mail Service Terminal 450 and Endpoint B 410 respectively, to the VMIST 440 in steps 37 and 38. The CONNECT signal is also
'"" transmitted through the CCSE 430 (Step 39), through the Gateway 370 (Step 40), and through the LEC Switch 405 (Steps 41 and 42), and thence to the first telephone device Endpoint A 400. The first telephone device 400 respond* to the CONNECT (42) signal by performing the appropriate connection protocols for connecting the call. Thereafter, a call connection among the Voice Mail Service
^ Terminal 450. Endpoint B 410 and Endpomt A 400 is established. At this point, the subscriber (called party) at Endpoint B 410 is connected to the calling party at Endpoint A 400 and the Voice Mail Service Terminal 450. Thus the subscriber can monitor the voice message which is being recorded.
If the subscriber (called party) located at the second telephone device
"~ (Endpoint B) 410 determines that they would like to, at some point prior to the end of the message, actively participate by speaking to the calling party located at Endpoint A 400, the subscriber transmits a take-over signal to the VMIST (Voice Mall Intercept Service Terminal). This signal issued to the VMIST 440 instructs the VMIST 440 to drop the connection ;o the Voice Mail Service Terminal 450 and
r allow information lo flow from Endpoint B 410 where the subscriber is located to Endpoint A 400 where the calling party is located. Again referring to Figures 6a and 6b, the aforementioned process is shown by steps 43 and 44. Specifically, a signal UI (43) is transmitted from the Endpoint B 410 to the VMIST 440 as shown by step 43. This signal instructs the VMIST 440 to terminate the cooncction to the
^ Voice Mail Service Terminal 450. The VMIST 440 then sends a message UL (44) which informs die Voice Mail Service Terminal 450 to terminate the call and delete the partial message as shown by step 44. Of course, the message can also be reset and recorded over rather than actually erased.
Accordingly, the subscriber has the capability to listen to a message as it is
"^ being recorded and has the option of terminating the recording of the message and connecting to the calling party.
While the disclosed real-time voice mail monitoring and call control system

and method is particularly shown and described herein with reference to the preferred embodiment);, it is to be understood that various modification! in form and detail may be made therein without departing from die spirit and scope of the present invention. Accordingly, modifications, such as any examples suggested herein, but not limited thereto, arc to be considered within the scope of the present invention.

We claim:
1. A communication system for providing call connections and voice mail service to a network-baeed telephone device, the communication system comprising:
an internet telephone switch that selectively connects an incoming call to at least one end point including a called party having an internet telephone and a gateway for processing calls from a public switched telephone network (PSTN) to a computer-based network, said gateway further comprising a voice mail service which records messages at least one gatekeeper, including an address table for processing the calls between endpoints, wherein the gatekeeper routes calls to endpoints by accessing the address table for a corresponding address of said endpoint,
at least one voice mail intercept service terminal for the voice mail service, said voice mail intercept service terminal receives the incoming call from, said switch under the direction of said gatekeeper and said voice mail intercept service tcnninal further connects the incoming call to said internet telephone of said called party so the called party can monitor the call.
2, A communication, system as claimed in claim 1 wherein such
voice mail intercept service terminal is responsive to a take over
signal from the called party to cause said voice mail intercept
service terminal to establish a two-way communication
connection between the incoming call and the called party.
3. A communication system as claimed in claim 2 wherein said
takeover signals further cause said voice mail system recording
to cease.

4. A method for providing the ability to monitor a call being recorded onto a network-based voice mail system comprising the steps of: interfacing a calling party on a first endpoint with:
(a) an internet telephone switch;
(b) a packct-baaed communication network having a voice mail service; and
(c) a called party on a second endpoint, wherein said second endpoint comprises an internet telephone;
under preselected conditions directing an incoming call to a
voice mail service baaed on address information in a gatekeeper;
and
establishing a connection from the voice mail service terminal to
the called party so as to allow the called party to monitor the
message being recorded.
5. The method as claimed in claim 4, wherein it comprises the steps of allowing the called party to generate a take over signal; and establishing a two-way communication between the incoming call and the called party in response to the take over signal so that the called party can gain control of the all.
6. The method as claimed in claim 5 wherein the method comprises the step of deleting a recorded portion of a message.
7. A method for providing call connections and voice mail intercept capability wherein the method comprises the steps of: establishing a control signal connection from a calling party through an internet telephone switch to a gatekeeper;
routing call control signals from said gatekeeper to a voice mail intercept system terminal;
establishing a voice data connection between said voice mail intercept system terminal and a called party having an internet

telephone;
establishing a voice data connection between said voice mail intercept system terminal and a voice mail system; establishing a voice data connection between said voice mail intercept system terminal and said calling party; and receiving voice matt data from said calling party at said voice mail intercept system terminal and transmitting said voice mail data to both said voice mail service terminal and to said internet telephone of said called party so that said voice mail service terminal can record the voice data and said called party can monitor voice mail data.
8. A method aa claimed in claim 7, wherein it comprises the steps
of:
connecting said called party to said calling party for two-way commtmication with said calling party in response to a take over signal from said called party; and
terninatmg said voice data connection between said voice mail intercept system terminal and said voice mail service terminal.
9. The method as claimed in claim 7 wherein the method comprises the additional step of having said voice mail service terminal terminate said call.
10. The method as claimed in claim 7 wherein the method comprises the step of deleting a recorded portion of a message from the voice mail system terminal.
[RANJTJA MEHTA-DUTT]
of Remfry & Sagar
Attorney for the Applicants
Dated this 1st day of May, 2001.

Documents:

abstract1.jpg

in-pct-2001-00518-mum-cancelled pages(09-08-205).pdf

in-pct-2001-00518-mum-claims(granted)-(09-08-2005).doc

in-pct-2001-00518-mum-claims(granted)-(09-08-2005).pdf

in-pct-2001-00518-mum-correspondence(10-08-2005).pdf

in-pct-2001-00518-mum-correspondence(ipo)-(09-08-2004).pdf

in-pct-2001-00518-mum-drawing(09-08-2005).pdf

in-pct-2001-00518-mum-form 1(09-08-2005).pdf

in-pct-2001-00518-mum-form 2(granted)-(09-08-2005).doc

in-pct-2001-00518-mum-form 2(granted)-(09-08-2005).pdf

in-pct-2001-00518-mum-form 3(30-04-2001).pdf

in-pct-2001-00518-mum-form 5(30-04-2001).pdf

in-pct-2001-00518-mum-form-pct-isa-210(09-08-2005).pdf

in-pct-2001-00518-mum-petition under rule 138(09-08-2005).pdf

in-pct-2001-00518-mum-power of authority(09-08-2005).pdf


Patent Number 209315
Indian Patent Application Number IN/PCT/2001/00518/MUM
PG Journal Number 38/2007
Publication Date 21-Sep-2007
Grant Date 24-Aug-2007
Date of Filing 01-May-2001
Name of Patentee VERIZON LABORATORIES INC.,
Applicant Address 1209 ORANGE STREET, WILMINGTON, DELAWARE 19801, USA
Inventors:
# Inventor's Name Inventor's Address
1 STEVEN E. GARDELL 241 FARNUM STREET, NORTH ANDOVER, MA 01845, USA
2 ISRAEL B. ZIBMAN 423 WARD STREET, NEWTON, MA 02459, USA
3 RAHUL CHOPRA 300 SOUTHEAST MIZNER BOULEVARD, BOCA RATON, FL 33452, USA
PCT International Classification Number H04M 1/64
PCT International Application Number PCT/US99/24784
PCT International Filing date 1999-10-22
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 09/177,415 1998-10-23 U.S.A.