In all these instances, the memory locations in the primary user's telephone are remotely programmed on a dynamic basis with phone numbers and, optionally, related identifying information such as character strings, by whomever or whatever device is providing the user with stored telephone numbers for later redial.