. . "FIGS. 5a and 5 b are a flow chart illustrating a method for identifying an unidentified caller in a voice messaging environment;" . . .