Secure valet telephone system
A secure valet telephone system is provided having a computer accessible by a live operator, a private encrypted database containing a plurality of contact numbers for one or more parties, with the contact numbers accessible by the computer, a telephone number through which a caller may contact the live operator and be connected by the live operator to a preferred contact number of a party chosen by the computer based upon data in said database, wherein the preferred contact number is hidden from the live operator. This system facilitates more efficient calling by connecting the calling party with the call location at which the contact party is most likely to be reached. The actual number dialed is concealed from the operator in the interests of privacy and security.
The present invention claims priority to provisional application No. 60/499,257 filed on Aug. 29, 2003.
FIELD OF THE INVENTIONThe invention relates to the field of telephone communications and, more particularly, to a secure valet telephone system.
BACKGROUND OF THE INVENTIONToday telephone networks have become increasing complex. In the not so distant past, contacting an individual normally meant calling a phone number for the individual's home or business. All of the residents of a household typically shared one telephone number, and often all individuals at a place of business shared one or a few telephone numbers. Today, this is rarely the case. Nearly every individual now has a plurality of numbers through which they can be contacted. For example, an individual may have at least one home number, a cell number, a pager number, an office direct dial number, an office main number, etc. As a result of today's changing world, it has become necessary to maintain a much more extensive catalog of phone numbers than was previously needed.
Additionally, because of the numerous contact numbers at which a particular individual might be reached, making productive call connections can be difficult. In order to reach a particular individual, several potential contact numbers might need to be called before the correct contact number (i.e., the number at which the individual can be reached at that particular moment) is found.
In order to help maintain extensive catalogs of contact numbers, electronic devices have been developed to store many phone numbers for a given person. For example, most cellular phones now have an address book capability that allows storage of numerous contact numbers. However, those devices require a substantial investment of time to enter all of the data into them, and an amount of technical savvy and manual dexterity to retrieve the information. Often, entering and retrieving information can be difficult. For example, it can be difficult to page through an electronic phonebook while one is driving. Some individuals have additional difficulties in accessing information stored in this manner (e.g., visually impaired individuals). Additionally, such a device containing a substantial amount of private contact information may be lost or stolen, resulting in the loss of all the sensitive personal information stored within the device.
Directory assistance has long been available to individuals seeking assistance in obtaining telephone numbers. However, current directory assistance techniques have several shortcomings. First, they do not aid in increasing call productivity as they do not distinguish between an individual's various numbers and normally do not include cellular numbers. Moreover, current directory assistance techniques contain a security concern because the operator has access to telephone numbers of the individuals on the system. In today's security conscious environment, this may be undesirable to many people.
SUMMARYA secure valet telephone system is provided for enabling system subscribers to achieve improved call connection efficiency. The system comprises a live operator who can access upon request contact information for contact parties contained within a private encrypted database. The operator accesses the database via a computer. The computer uses the information stored within the database to determine a preferred contact number for the desired contact party. This facilitates more efficient calling by connecting the calling party with the call location at which the contact party is most likely to be reached. The actual number dialed is concealed from the operator in the interests of privacy and security.
The system may further include a method to update the database after each call to include information about the call attempt or call completion. Additionally, the system may further include a method to quickly and easily put a subscriber in touch with the operator such as via an autodialer, a one button connection, or a voice activated connection.
BRIEF DESCRIPTION OF THE DRAWINGSFor the purpose of illustrating the invention, there is shown in the drawings a form which is presently preferred; it being understood, that this invention is not limited to the precise arrangements and instrumentalities shown.
The figures show an exemplary embodiment of a secure valet telephone system in accordance with the present invention.
The system 110 employs a live operator 112, who is in communication with transmissions to and from the network 100 via standard telephone switching equipment 116. The system also contains a computer 118 capable of accessing a database 114. The term “computer” is used herein to describe a processing unit, such as a Central Processing Unit (CPU) with a graphical user interface (GUI). However, any number of alternatives may also be employed, such as a server residing on a distributed network. Using computer 118, the live operator can access selected information stored within the private encrypted database 114. In the illustrated embodiment, the database 114 is a private encrypted database that contains phone number information that is secure and may only be accessed by authorized personnel. The private encrypted database 114 contains contact information on various parties as provided by subscribers to the system, as further discussed below.
There are two types of callers who may access the system, “subscribers” and “users.” The term “subscribers” is used herein to refer to individuals who are part of the community of people belonging to the system 110 in accordance with an embodiment of the present invention. The term “users” is used herein to refer to individuals who may access the system 110 as part of a communication with a subscriber, but are not subscribers of the system (for example, a “user” may be directed to the system when calling a “subscriber”). Subscribers provide contact information on various parties, which is stored in the database 114. A party about whom information is stored comprises the target of the call. A party may or may not also be a subscriber to the system.
Once access is initiated by a subscriber, the subscriber is placed in contact with a live operator (step 203). By using a live operator, the secure valet system avoids requesting a series of prompts or entries from the subscriber, which may be difficult for some individuals to enter into the phone, as discussed above. Additionally, by providing a live operator instead of a series of prompts the system assures a rapid response in an emergency. After accessing the system, the subscriber places a request with the operator to contact a party. The operator is then provided with the requested party's contact information as contained in the private encrypted database (step 205). The private encrypted database comprises a compilation of data provided by each subscriber. The data includes the various contact locations and associated numbers for parties that are included in the subscriber's database. Such information has been previously provided by the subscriber for individuals that he or she specified, such as individuals that the subscriber calls most frequently.
A preferred contact location is retrieved from the private encrypted database (step 207), as further described below, and provided to the operator in order to allow the operator to complete the call (step 209). In a preferred embodiment, the actual phone numbers associated with a contact location are never seen by the operator. This alleviates the main concerns with live operator systems, which are compromising privacy and security. In the prior art, live operator systems necessitated providing information to the operator. In today's security conscious environment, this is not desirable. In the secure valet system in accordance with the invention, the operator is given selections for completing the call, normally displayed on a GUI provided via the computer. The display lists only the order of contact options, without displaying any actual phone numbers. For example, when attempting to contact John Smith, the information retrieved from the private encrypted database might be displayed as “John Smith cell—#1 option,” “John Smith work—#2 option,” etc.
The operator can now complete the call by choosing a location to which to direct the subscriber's call, normally to the preferred contact location for the user (Step 211) unless otherwise instructed by the subscriber. This may be accomplished using conventional telephone switching equipment to route the call over the outbound trunked phone lines into an existing telephone network. After the call has been completed, the private encrypted database may be updated to include a record of the current call (step 213) as further described below.
In order to improve call efficiency, the operator is provided with a contact selection that is most likely to result in a successful call completion (i.e., most likely to allow the subscriber to reach the called party). The preferred contact number is selected by the system from the private encrypted database in accordance with a number of predetermined criteria. Additionally, the predetermined criteria can be edited/updated both periodically by a request from a subscriber and automatically in response to system use. For example, initially a subscriber provides a series of preferred contact locations for parties he or she desires to be included in his or her information within the database. Referring to
In accordance with one exemplary embodiment of the present invention, the system may also be programmed to override the scheduled numbers in certain situations to improve call efficiency. The information in the private encrypted database is dynamically updated to include a record of the history of calls from Jane Doe to John Smith. In the example shown in
Each time a call is placed the private encrypted database is updated to reflect a history of such a call. This information can be used for the next call attempt (e.g., to determine the time elapsed since the last successful connection as discussed above) or to later determine the success/failure rate of contact attempts at particular numbers. This can be used to identify errors in the system (e.g., a wrong number programmed into the private encrypted database) or to identify times and locations that have a poor connection rate and may need adjustment (e.g., 9:00 am on Monday is programmed to use a party's work number, but the completion rate of calls between 9:00 am and 9:15 am at the work number is low and the completion rate during the same period is higher for the cell number; thus, this information indicates to the subscriber that updating the database to use the cell number during this time period would improve call completion efficiency).
Referring to
Similar to the process involved with outbound calls, the primary designated location to reach a subscriber for an inbound call at a particular day/time may be checked against the dynamically updated record of recent call activity to determine if a higher call completion rate may be achieved at an alternate number. For example, as previously described, if Jane Doe was contacted by a caller within a previously predetermined time period (e.g., 15 minutes), the operator is provided with the contact information of the number at which the previous call reached Jane Doe as the primary choice, overriding any day/time number designation.
Once the call has been completed, the private encrypted database is updated to reflect the instant call (step 411). The instant call information is now available to be used in evaluating subsequent requests to contact the subscriber.
The system in accordance with an exemplary embodiment of the present invention provides several advantageous features. Subscribers communicate with a live operator, which is the preferred method of communication for many individuals. A live operator provides a level of service and customer satisfaction above that which can be achieved from an automated system. Additionally, call efficiency (i.e., the success rate at which call completions are achieved) is improved using the preferred contact locations provided by the system as described herein. Finally, the ability of the system in accordance with an exemplary embodiment of the present invention to dynamically update the database containing the information regarding the preferred contact location further improves the call efficiency rate.
A variety of modifications to the embodiments described will be apparent to those skilled in the art from the disclosure provided herein. Thus, the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof and, accordingly, reference should be made to the appended claims, rather than to the foregoing specification, as indicating the scope of the invention.
Claims
1. A secure valet telephone system comprising:
- a computer accessible by a live operator;
- a private encrypted database containing a plurality of contact numbers for one or more parties, said contact numbers being accessible by said computer;
- a telephone number through which a caller may contact said live operator and be connected by said live operator to a preferred contact number of a party chosen by said computer based upon data in said database, wherein said preferred contact number is hidden from said live operator.
2. The system as set forth in claim 1, wherein said private encrypted database is updated to include a record of said call from said caller to said party via said operator.
3. The system as set forth in claim 1, wherein said preferred contact number comprises a number at which a previous connection was made if said previous connection occurred within a predetermined time period.
4. A secure valet telephone system comprising:
- a computer accessible by a live operator;
- a private encrypted database containing a plurality of contact numbers for subscribers to said system and being accessible by the computer;
- a telephone number through which a user may contact said live operator and be connected by said live operator to a preferred contact number of a selected subscriber to said system chosen by said computer based upon data in said database, wherein said preferred contact number is hidden from said live operator.
5. The system as set forth in claim 4, wherein said user contacts said operator by placing a call to a phone number associated with said subscriber and wherein said call is forwarded via a call forwarding feature to said operator.
6. The system as set forth in claim 4, wherein said private encrypted database is updated to include a record of said call from said user to said subscriber via said operator.
7. The system as set forth in claim 4, wherein said preferred contact number comprises a number at which a previous connection was made if said previous connection occurred within a predetermined time period.
8. A secure valet telephone system comprising:
- a private encrypted database containing one or more contact numbers for a party;
- a telephone access number through which a subscriber can obtain access to the system;
- means accessible by a live operator to connect the subscriber to the live operator and operable by the live operator to connect the subscriber to a preferred contact number for said party based upon data contained in said database, wherein said preferred contact number is hidden from said live operator.
9. The system as set forth in claim 8, wherein said subscriber contacts said operator via an autodialer feature.
10. The system as set forth in claim 8, wherein said subscriber contacts said operator via a phone having one-touch feature for connecting to said operator.
11. The system as set forth in claim 8, wherein said subscriber contacts said operator via a voice activated command.
12. The system as set forth in claim 8, wherein said private encrypted database is updated to include a record of said call from said subscriber to said party via said operator.
13. The system as set forth in claim 8, wherein said preferred contact number comprises a number at which a previous connection was made if said previous connection occurred within a predetermined time period.
14. A method for connecting a caller with of a secure valet telephone system to a user comprising the steps of:
- placing a call to said system by said caller;
- connecting said caller to said system, said system comprising a computer accessible by a live operator;
- searching a private encrypted database accessible by said computer in response to a request by said caller to contact a party;
- retrieving from said database a preferred contact location for said party; and
- connecting said caller to said party at said preferred contact location.
15. The method as set forth in claim 14, wherein said preferred contact location is determined in accordance with the time of the call.
16. The method as set forth in claim 14, wherein said preferred contact location comprises a location at which a previous connection was made if said previous connection occurred within a predetermined time period.
17. The method as set forth in claim 14, wherein a phone number associated with said preferred contact location is hidden from said operator.
18. A method as set forth in claim 14, wherein said placing step further comprises the step of:
- placing a call to a phone number associated with a subscriber to the system; and
- forwarding said call to said system via a call forwarding feature.
19. A secure valet telephone system for connecting a caller to a party comprising:
- means for connecting a caller to a computer system accessible by a live operator;
- means for determining a preferred contact location for said party; and
- means for directing a call from said caller to said party at said preferred contact location.
20. The method as set forth in claim 19, further comprising means for hiding a phone number associated with said preferred contact location from said operator.
Type: Application
Filed: Jul 12, 2004
Publication Date: Mar 3, 2005
Inventors: Stephen Parker (Devon, PA), James Fox (Newtown, PA)
Application Number: 10/889,410