US20080192918A1 - Method and system for establishing a telephone connection - Google Patents
Method and system for establishing a telephone connection Download PDFInfo
- Publication number
- US20080192918A1 US20080192918A1 US11/983,802 US98380207A US2008192918A1 US 20080192918 A1 US20080192918 A1 US 20080192918A1 US 98380207 A US98380207 A US 98380207A US 2008192918 A1 US2008192918 A1 US 2008192918A1
- Authority
- US
- United States
- Prior art keywords
- subscriber device
- user
- telephone system
- telephone
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/18—Comparators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/20—Aspects of automatic or semi-automatic exchanges related to features of supplementary services
- H04M2203/2005—Temporarily overriding a service configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
Definitions
- aspects of the invention relate to the field of establishing a telephone connection. More specifically, aspects relate to the field of establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B-subscriber device) in a telephone system arranged for connecting said A-subscriber device and B-subscriber device.
- A-subscriber device A-subscriber device
- B-subscriber device second subscriber device
- Telephone calls are progressively experienced as intrusions in the daily life of people. Even more than e.g. e-mail spam messages, unsolicited telephone calls are considered undesired, time-consuming and annoying. Furthermore, the field of e-mail spam prevention has seen considerable development, whereas filters for unsolicited telephone calls appear to have advanced less.
- US 2006/0147014 discloses a telephone handling list for multiple users.
- the handling of incoming phone calls includes receiving an indication from one or more call recipients reflecting a desire to block future calls from a call source.
- the call source is identified by the phone number of the call source.
- a number of received indications reflecting a desire to block future calls from the call source is determined and compared to a threshold.
- An identifier of the call source is added to a list of call sources from which future calls are specially handled when the number of indications meets the threshold.
- Handling an incoming call from an undesired call source includes receiving an indication of a call placed to a call recipient.
- a source of the call is identified. Whether the identified call source is included in the list of call sources from which future calls are specially handled is determined. Special handling is applied to the call when the identified call source is included in the list.
- a method for establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B-subscriber device) in a telephone system.
- the telephone system is arranged for connecting the A-subscriber device (the calling party) and the B-subscriber device (the called party).
- the method includes receiving a request from the A-subscriber device to establish a connection with the B-subscriber device and also receiving a personal identity code of a user of said A-subscriber device.
- the connection can be established between the A-subscriber device and the B-subscriber device only after having received said personal identity code of said user of said A-subscriber device.
- the applicant also proposes one or more computer programs and a carrier (e.g. computer readable media) containing one or more of these computer programs or instructions for carrying out the method.
- a carrier e.g. computer readable media
- a telephone system for establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B-subscriber device).
- the system comprises a request receiver adapted for receiving a request from the A-subscriber device to establish a connection with the B-subscriber device and an identity code receiver adapted for receiving a personal identity code of a user of said A-subscriber device.
- a connection establisher adapted for establishing said connection between said A-subscriber device and said B-subscriber device only after having received said personal identity code of said user of said A-subscriber device.
- the telephone system may include a system or network of a conventional fixed system (e.g POTS), a mobile or wireless telecommunication system, combinations thereof as well as internet telephony using e.g. voice over IP techniques (VoIP).
- a conventional fixed system e.g POTS
- a mobile or wireless telecommunication system e.g., a GSM network
- VoIP voice over IP techniques
- the personal identity code may comprise one or more parts.
- the telephone system does not necessarily refer to a client-server system.
- aspects of the invention may also be applicable in peer-to-peer networks, such as e.g. used for bittorrent applications, wherein a telephone system or (some) functionality may be considered to be part of one of more of the user devices participating in the peer-to-peer network.
- the telephone system By receiving a personal identity code of a user, the telephone system is able to actually recognize the person that is requesting services of the system instead of only recognizing the device that is used. Consequently, the telephone system can apply measures to a particular user instead of only to a device as a result of the received authentication information. In other words, measures applied to a particular users cannot be avoided or circumvented by using a different device. An example of such a measure may be restricting the access of a particular user to services of the telecommunication system.
- claims 2 and 16 provide the advantage of a subscriber-only telephone system.
- claims 3 and 17 provide the advantage that the A-subscriber device code (e.g. the telephone number) can be coupled to personal identity code.
- A-subscriber device code e.g. the telephone number
- claims 4 and 18 allows the user of the A-subscriber device to call the B-subscriber subscriber device only if the user of the B-subscriber device is known by the telephone system by his or her personal identity code.
- claims 5 and 19 provides the user of the B-subscriber device with the possibility to restrict access to the telephone system for the user of the A-subscriber device if the telephone call is perceived by the user of the B-subscriber device as unsolicited or undesired. Access is restricted on the basis of the personal identity code of the user of the A-subscriber device and, therefore, this user cannot simply circumvent this measure by using a different A-subscriber device.
- the personal identity code may e.g. be stored such that further attempts to establish a connection by the person owning the code are first checked against this storage before a connection can be established.
- access restrictions may only apply if more than a single access restriction signal has been received for a particular user, either from the user of the same B-subscriber device or from users of other B-subscriber devices during other calls.
- claims 6 and 20 define measures for restricting the access to the telephone system.
- the telephone call that triggered the user of the B-subscriber device to issue the access restricting signal may be terminated. Furthermore, if multiple calls were made in parallel (e.g. from a call centre), all these calls can be terminated. Also, further (future) connections can be prevented.
- the embodiments of claims 7 and 21 provides several mechanisms for mitigating restriction of the access rights to the telephone system.
- the applicant proposes to restrict access to the telephone system for the user of the A-subscriber device for which the at least one access restriction signal was received in dependence of a communication history between said user and said user of the B-subscription device from which the access restriction signal was received.
- access restriction to the telephone system may be performed immediately if the user of the A-subscriber device is unknown to the user of the B-subscriber device (e.g. if the users have not called each other previously).
- the calling party and called party know each other, access to the telephone system is not restricted at once (but possibly only after several access restriction signals have been received for different telephone calls).
- the communication history between users of the telephone system can be traced on the basis of the received personal identity codes.
- claims 8 and 22 provides another measure for mitigating access restriction to the telephone system for the user of the A-subscriber device.
- claims 9 and 23 provide the advantage that the user of the A-subscriber device may be warned in advance of the access restriction.
- a pre-programmed warning signal may be provided.
- claims 10 and 24 allows that the recipient of a telephone call determines whether other future recipients may receive telephone calls from the user of the A-subscriber device.
- the embodiments of claims 11 and 25 prevent sniffing of personal identity codes.
- Secured communication can be obtained by e.g. encrypting data and/or by using secure connections.
- claims 12 and 26 provide subscribers with the possibility to approve telephone communication with each other prior to establishing the telephone connection.
- users may use their telephones to dial each others number (possibly in combination with the personal identity codes). If the telephone system receives the telephone numbers and the personal identity, the approval may be deemed to be given.
- An aspect of the invention also relates to a telephone device for use in the method and system as described above.
- the telephony device should be adapted to issue the personal identity code to the telephone system for setting up the connection.
- FIG. 1 is a schematic illustration of a communication system for performing a method according to an embodiment of the invention
- FIG. 2 is a schematic illustration of a telephone system according to an embodiment of the invention.
- FIG. 3 is a schematic illustration of a telephone device according to an embodiment of the invention.
- FIG. 4 is a time diagram illustrating steps of a method according to a first embodiment of the invention.
- FIG. 5 is a time diagram illustrating steps of a method according to a second embodiment of the invention.
- FIG. 6 is a time diagram illustrating steps of a method according to a third embodiment of the invention.
- FIG. 7 is a time diagram illustrating steps of a method according to a fourth embodiment of the invention.
- FIG. 1 shows a telephone infrastructure 1 comprising a telephone system 2 .
- the telephone system 2 which may e.g. comprise a server, is connected via a first telecommunication network 3 to an A-subscriber device 4 and via a second telecommunication network 5 to a B-subscriber device 6 .
- the first and second telecommunication networks 3 , 5 may comprise one or more wired or wireless networks.
- the A-subscriber device 4 is connected to the telephone system 2 via a wired network
- the B-subscriber device 6 is partly connected via a wireless access network.
- the telephone infrastructure 1 may also be suitable for internet telephony, including VoIP telephony.
- the A-subscriber device 4 and B-subscriber device 6 may be any type of device suitable for telephony communication.
- the telephone system 2 enables the establishment of a telephone connection via the networks 3 and 5 between the A-subscriber device 4 and the B-subscriber device 6 .
- networks 3 and 5 may be the same network or networks using the same technology.
- the A-subscriber device 4 (the call source) is assumed to be used by the calling party and the B-subscriber device (the call destination) is assumed to be used by the called party.
- the telephone system 2 comprises a processor 10 and a memory 11 and is configured to allow communication with both the A-subscriber device and the B-subscriber device via the networks 3 , 5 . It should be appreciated that the telephone system 2 is normally capable of connecting to more than the two telephone devices shown in FIG. 1 . It should also be appreciated that the functions may be largely implemented as software code portions of one or more computer programs executed by the processor 10 (tasks may be distributed over multiple processors).
- the telephone server 2 comprises a request receiver 13 adapted for receiving a request from the A-subscriber device 4 to establish a connection with the B-subscriber device 6 .
- the telephone server 2 also comprises an identity code receiver 14 adapted for receiving a personal identity code of a user of the A-subscriber device 4 and a connection establisher 15 adapted for establishing the connection between the A-subscriber device 4 and the B-subscriber device 6 only after receiving the personal identity code of the user of the A-subscriber device 4 .
- each user or family
- the telephone system also contains a storage module 16 for storing the personal identity code of the user of the A-subscriber device 4 .
- the personal identity code may be pre-stored in the storage module, e.g. while entering a subscription of the user for use of the telephone system 2 .
- a determination module 17 is provided that is adapted for determining if the personal identity code received by the identity code receiver 14 matches the personal identity code stored by the storage module 16 .
- the processor 10 may be programmed such that the connection establisher 15 only establishes the connection between the A-subscriber device 4 and the B-subscriber device 6 if the personal identity code received by the personal identity code receiver 14 matches the personal identity code stored by the storage module 16 .
- the telephone system 2 also contains a device code receiver 18 adapted for receiving a code of the A-subscriber device 4 .
- the device code e.g. comprises the telephone number of the A-subscriber device 4 , a code similar to a telephone number (e.g. the IMSI) and/or a hardware code (such as the IMEI number or a MAC address of the A-subscriber device 4 ). It should be appreciated that the device code may also be a common code of a call centre.
- the storage module 16 may also be configured for storing at least a personal identity code of a user of the B-subscriber device. Again, the storage module 16 may pre-store such a code on entering the subscription of the user of the B-subscriber device 6 in the telephone system 2 .
- the request receiver 13 may be adapted for filtering a telephone number of the B-subscriber device 6 from the request for establishing the telephone connection.
- the telephone system 2 may be arranged such that the connection establisher 15 establishes the telephone connection only if the storage module 16 has stored the personal identity code of the user of the B-subscriber device 6 for the received telephone number. This link can e.g. be made via the telephone number of the B-subscriber device 6 that is received by the request receiver 13 .
- the availability of the personal identity code of the users of the A-subscriber device 4 and/or the B-subscriber device 6 allows the telephone system 2 to identify users requesting services from the telephone system 2 .
- the users may be connected to devices by the telephone system 2 , e.g. by linking the received personal identity code to one or more known device codes or by receiving the device code from the A-subscriber device 4 and/or B-subscriber device 6 in the process of establishing a connection or during the connection.
- the availability of the personal identity code (possibly in combination with other identity codes and/or one or more device codes) provides the telephone system 2 with the possibility to trigger actions directed to one or more particular users.
- the telephone system 2 comprises an access restriction receiver 19 adapted for receiving one or more access restriction signals.
- the telephone system 2 also comprises an access restrictor 20 adapted to restrict access to the telephone system 2 for the user of said A-subscriber device 4 in response to receiving the one or more access restriction signals. If the access restriction receiver 19 receives an access restriction signal (e.g. from the B-subscriber device 6 ), the telephone system 2 determines the personal identity code of the user of the A-subscriber device 4 that was engaged in the telephone call and for which the access restriction signal was received. The personal identity code is remembered, e.g. by flagging the personal identity code of user of the A-subscriber device 4 (or an associated field) in a database or by storing the personal identity code of the user of the A-subscriber device 4 in a separate register.
- an access restriction signal e.g. from the B-subscriber device 6
- the personal identity code is remembered, e.g. by flagging the personal identity code of user of the A-subscriber device 4 (
- the telephone system 2 may have a connection terminator 21 adapted for terminating the ongoing connection with the A-subscriber device 4 .
- the connection terminator 21 may also be configured for terminating one or more co-existing connections with the A-subscriber device 4 .
- the latter option may be used if the user of the A-subscriber device 4 for which the access restriction signal was received was engaged in multiple calls. In this situation, each of these calls may be terminated. It should be clear that the user of the A-subscriber device 4 was not necessarily the calling party in all these multiple calls.
- the telephone system 2 may also contain a connection preventor 22 adapted for preventing establishment of further connections for user of said A-subscriber device 4 . That is, if the user of the A-subscriber device 4 desires to make another call and if the telephone system 2 identifies the user as being flagged in response to receiving one or more access restrictions signals for this user, the connection preventor 22 prevents that a telephone connection is established with the desired B-subscriber device. It should be clear that this measure cannot be circumvented by using a different A-subscriber device 4 , since also for the further call the personal identity code should be sent before, with or following the request for establishing a telephone connection. The telephone system 2 will then determine that a telephone connection should not be set up for this user.
- connection preventor 22 may, alternatively or in addition to the measure described in the previous paragraph, prevent that the user of the A-subscriber device 4 is called (i.e. the user of the A-subscriber device 4 is now a calling party).
- the storage module 16 of the telephone system 2 stores one or more telephone numbers (or associated information) of the A-subscriber device and links one or more of these telephone numbers to the personal identity code. If a request is made to establish a telephone connection with a B-subscriber device, the telephone system 2 determines the personal identity code linked to the telephone number of the A-subscriber device 4 . If the telephone system 2 determines that access restrictions apply for the user being assigned this personal identity code, the connection will not be established by using the connection preventor 22 . The calling party may be informed of this situation by the telephone system 2 .
- the measures may apply to the company or group. It is also possible to combine a common code of a particular company or group with a personal code of a user within that company or group. Measures may then either apply to the company or group (on the basis of the common personal identity code) and/or to a person of the company or group (on the basis of the personal identity code). As an example, a company may receive a warning signal from the telephone system 2 on the basis of the common personal identity code of the company, while the above measures apply in full to a particular user of that company that was engaged in the telephone call during which the access restriction signal was received. The telephone system 2 is aware of both the company identity code and the personal identity code in such a situation.
- the number of access restriction signals before access to the telephone system 2 is restricted may be set. As an example, 50, 25, 10, 5, 2 or 1 acess restriction signals may need to be received by the telephone system 2 for a particular personal identity code before access is restricted to the telephone system 2 .
- the telephone system 2 comprises an assessor module 23 .
- the assessor module 23 is adapted to control the access restrictor 20 such that restricting access to the telephone system 2 for the user of the A-subscriber device 4 is e.g. dependent on the number of times that access has been restricted for this user and/or the number of access restriction signals that have been received for this user.
- the telephone system 2 may be configured to restrict access for a particular time period, using a timer 24
- the telephone system 2 is configured to take account of a telephone communication history between the user of the A-subscriber device 4 and the user of the B-subscriber device 6 from which the access restriction signal was received.
- access restriction to the telephone system 2 may be performed immediately if the user of the A-subscriber device 4 is unknown to the user of the B-subscriber device 6 (e.g. if the users have not called each other previously) and this user transmits an access restriction signal.
- the calling party and the called party know each other, access to the telephone system 2 is not restricted at once (but possibly only after several access restriction signals have been received for different telephone calls, either from the same user of the B-subscriber device or from other users).
- the assessor module 23 therefore, is configured to keep track of past phone calls between users (e.g. on the basis of the personal identity codes of the calling and called parties).
- the telephone system 2 may also comprise a warning signal transmitter 25 adapted for providing a warning signal to the user of the A-subscriber device 4 in response to receiving one or more access restriction signals.
- the warning signal may contain information for the user of the A-subscriber device 4 of possible consequences of further violations.
- the warning signal may be transmitted to the A-subscriber device 4 or to another device when information is available how this device can be addressed. As an example, if the telephone system 2 has information of an e-mail address of the user of the A-subscriber device 4 , the warning message may be transmitted to this e-mail address.
- the telephone system 2 may be capable of connecting multiple subscriber devices.
- the telephone system 2 may be arranged for establishing a connection with a first B-subscriber device and with a second B-subscriber device.
- the access restriction signal receiver 19 may be adapted for receiving an access restriction signal from the first B-subscriber device.
- the connection preventor 22 can be configured to prevent the second B-subscriber device from receiving telephone calls from a user of the A-subscriber device 4 in response to receiving said one or more access restriction signals.
- a called party may determine the access of other future called parties to telephone calls of an A-subscriber device 4 for which one or more asccess restriction signals were received.
- the telephone system 2 is arranged for receiving at least the personal identity codes in a secured manner using e.g. secured connections, data encryption techniques or a combination of both. These measures reduce the chance that personal identity codes are intercepted by third parties.
- the telephone system 2 comprises an approval module 26 adapted for receiving a first approval signal from a user of A-subscriber device 4 for telephone communication with a user of the B-subscriber device 6 and for receiving a second approval signal from the user of the B-subscriber device 6 for telephone communication with the user of the A-subscriber device 4 .
- the approval module 26 controls the connection establisher 15 such that a telephone connection can be established only if both the first and second approval signal have been received. If an approval signal is received, the timer 24 may be used to set a time limit within which the approval signal of the other user should be received to update the status of the telephone system 2 that a telephone connection is allowed to be established between the users that have mutually approved future telephone calls from each other. It is noted that the approval module 26 may also be applied independently from receiving personal identity codes. As an example, the approval may be based on the telephone numbers of the A-subscriber device 4 and B-subscriber device 6 alone.
- FIG. 3 is a schematic illustration of a telephone device, e.g. the A-subscriber device 4 or the B-subscriber device 6 of FIG. 1 .
- the A-subscriber device 4 contains a processor 30 , a memory 31 (e.g. internal memory, a SIM card or another memory card) and a keyboard 32 .
- a processor 30 e.g. central processing unit (CPU)
- a memory 31 e.g. internal memory, a SIM card or another memory card
- a keyboard 32 e.g. keyboard
- the A-subscriber device 4 may comprise other components, such as a display.
- the A-subscriber device 4 should be capable of transmitting a personal identity code to the telephone system 2 .
- the personal identity code can be made available in various ways.
- the personal identity code can be entered by the user using the keyboard 32 .
- This code can be stored in the memory 31 and be made available for use when sending a request to establish a telephone connection to the telephone system 2 .
- the personal identity code may be entered by the user of the A-subscriber device 4 with the keyboard 32 in combination with the telephone number of the B-subscriber device 6 with which a connection is sought.
- the personal identity code is already stored in the memory 31 .
- Most telephone devices allow that the telephone device may be operated only after entering a personal identity number (PIN) or password.
- PIN personal identity number
- the personal identity code can be made available or retrieved from the memory 31 in dependence of entering the correct PIN or password.
- the personal identity code is available until a PIN or password should be entered again (e.g. if the telephone device has been switched off and on again).
- a PINS or passwords are valid for various users of a single telephone device, several personal identity codes may be stored and made available, linked to the PIN or password, for a single device for multiple users.
- the telephone device 4 , 6 may be configured to transmit an access restriction signal to the telephone system 2 if the user of the telephone device perceives an incoming phone call as unsolicited or undesired.
- An access restriction signal may e.g. be transmitted by operating a dedicated key, a soft key related to a particular function indicated on a display of the telephone device or a special combination of keys.
- the telephone device should be configured such that at least one personal identity code can be transmitted to the telephone system 2 .
- the telephone device may also be configured to transmit a device code, such as the telephone number or related information.
- a request is received by the request receiver 13 of the telephone system 2 from the A-subscriber device 4 for establishing a telephone connection with the B-subscriber device 6 .
- the personal identity code of the user of the A-subscriber device 4 is also received by the identity code receiver 14 .
- the personal identity code may be received before the request, simultaneously with the request or after the request for establishing a telephone connection.
- the telephone connection with the B-subscriber device 6 is established in step 42 using the connection establisher 15 .
- the phone call is continued until either of the parties terminates the connection.
- the user of the B-subscriber device 6 may operate the device 6 to transmit an access restriction signal.
- the access restriction signal receiver 19 of the telephone system 2 receives the access restriction signal from the B-subscriber device 6 in step 43 .
- the telephone system 2 may restrict access to the user of the A-subscriber device 4 in various ways.
- the access restrictor 20 blocks the access to the telephone system 2 , indicated by the arrow 44 , possibly after operating the assessor module 23 as described above. Access is restricted by flagging the personal identity code of the user of the A-subscriber device 4 .
- the connection preventor 22 prevents establishing of a telephone connection for this subsequent call, indicated by the cross in step 45 .
- step 50 indicates that the telephone system 2 receives the request from the A-subscriber device 4 for establishing a telephone connection with the B-subscriber device 6 in combination with the personal identity code of the user of the A-subscriber device 4 .
- Step 51 indicates the establishment of the telephone connection, whereas step 52 again indicates receiving an access restriction signal from the B-subscriber device 6 by the access restriction signal receiver 19 .
- FIG. 5 The form of access restriction to the telephone system 2 in FIG. 5 is different from FIG. 4 (and may thus be applied instead or in combination with the access restriction illustrated and described with reference to FIG. 4 ).
- the access restriction signal from the B-subscriber device 6 triggers the telephone system 2 to prevent a connection with another B-subscriber device 6 (indicated as B 2 ).
- B 2 the access restriction signal from the B-subscriber device 6 triggers the telephone system 2 to prevent a connection with another B-subscriber device 6 (indicated as B 2 ).
- the user of the A-subscriber device 4 after one or more access restrictions signals have been received, tries to make another telephone call (either with the same telephone device or with another telephone device) to telephone device B 2 in step 53 , his request for connection and the personal identity code are received by the telephone system 2 .
- the telephone system 2 determines that the user that was assigned the personal identity code has been flagged as having received one or more access restriction signals.
- the telephone connection with telephone device B 2 is not established (indicated by the cross in step 54 ).
- a new telephone connection with the B-subscriber device 6 can not be established (steps 55 and 56 ).
- the user of the A-subscriber device 4 may still be able to establish a telephone connection with other telephone devices.
- access to the telephone device B 2 in FIG. 5 has been restricted (e.g. because the telephone number of telephone device B 2 was explicitly indicated by a user of the B-subscriber device 6 that transmitted the original access restriction signal upon determination in the telephone system 2 )
- other telephone devices may still be called.
- the telephone system 2 in the embodiment of FIG. 5 may still enable the user of the A-subscriber device 4 to establish a telephone connection to emergency telephone numbers and/or to another selected group of numbers.
- the user of the A-subscriber device 4 may only be excluded from making a telephone connection with a selected group of telephone devices or devices of a particular group of users (possibly indicated by their personal identity codes).
- the selected group may involve all subscribers.
- step 60 indicates that the telephone system 2 receives the request from the A-subscriber device 4 for establishing a telephone connection with the B-subscriber device 6 in combination with the personal identity code of the user of the A-subscriber device 4 .
- Step 61 indicates the establishmentof the telephone connection, whereas step 62 again indicates receiving an access restriction signal from the B-subscriber device 6 by the access restriction signal receiver 19 .
- FIG. 6 The form of access restriction to the telephone system 2 in FIG. 6 is different from FIGS. 4 and 5 (and may thus be applied instead or in combination with the access restriction illustrated and described with reference to FIG. 4 and/or FIG. 5 ).
- the user of the A-subscriber device 4 for which the original access restriction signal has been received is excluded from receiving telephone calls. If the user of the telephone device B 2 attempts to make a telephone call to the user of the A-subscriber device 4 (step 63 ), the telephone system 2 will find a flag for the user of the telephone number of the A-subscriber device 4 (and possibly other telephone numbers). In reaction to this finding, the telephone system 2 , more particularly the connection preventor 22 , will prevent in step 64 a telephone connection to be established with the A-subscriber device 4 (or with the other telephone numbers stored in relation to the personal identity code of the user).
- the described access restriction may take place by the access restrictor 20 in response to receiving one or more access restriction signals by the access restriction signal receiver 19 .
- the access restrictor 20 may be controlled by the assessor module 23 as described with reference to FIG. 2
- FIG. 7 shows an embodiment using the approval module 26 . It should be noted that this embodiment can be applied independently of the use of a personal identity code of the user of the A-subscriber device 4 , although use of this code is illustrated in FIG. 7 .
- the user of A-subscriber device 4 may request establishing a telephone connection with the B-subscriber device 6 .
- This request and the personal identity code of the user of the A-subscriber device 4 are received in steps 70 and 71 .
- the approval module 26 interprets the request as a first approval signal for telephone communication with the user of the B-subscriber device 6 .
- the connection establisher 15 does not yet actually establish the telephone connection, until a corresponding request is received from the B-subscriber device 6 (indicated by steps 72 and 73 ). This request is interpreted as a second approval signal for telephone communication with the user of the B-subscriber device 6 . If both approval signals are received, the connection establisher 15 allows establishing a telephone connection between the A-subscriber device 4 and the B-subscriber device 6 (step 74 ). The telephone connection does not have to be established immediately.
- the telephone system 2 may apply the timer 24 to set a validity period of the first approval signal. If the second approval signal is received in the validity period, the establishment of a telephone connection is allowed. In order to make the user of the other telephone device aware of the existence of the first approval signal, the telephone system 2 may apply a notification signal to alert the user of the B-subscriber device 6 .
- the validity period may be set to e.g. one hour, one day, one week or two weeks.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Computer Security & Cryptography (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Meter Arrangements (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
- The present application is a continuation-in-part of and claims priority of International patent application Serial No. PCT/NL2007/000224, filed Sep. 11, 2007, and published in English the content of which is hereby incorporated by reference in its entirety.
- The discussion below is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
- Aspects of the invention relate to the field of establishing a telephone connection. More specifically, aspects relate to the field of establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B-subscriber device) in a telephone system arranged for connecting said A-subscriber device and B-subscriber device.
- Telephone calls are progressively experienced as intrusions in the daily life of people. Even more than e.g. e-mail spam messages, unsolicited telephone calls are considered undesired, time-consuming and annoying. Furthermore, the field of e-mail spam prevention has seen considerable development, whereas filters for unsolicited telephone calls appear to have advanced less.
- Therefore, various options have been considered in reducing unsolicited telephone calls.
- US 2006/0147014 discloses a telephone handling list for multiple users. The handling of incoming phone calls includes receiving an indication from one or more call recipients reflecting a desire to block future calls from a call source. The call source is identified by the phone number of the call source. A number of received indications reflecting a desire to block future calls from the call source is determined and compared to a threshold. An identifier of the call source is added to a list of call sources from which future calls are specially handled when the number of indications meets the threshold. Handling an incoming call from an undesired call source includes receiving an indication of a call placed to a call recipient. A source of the call is identified. Whether the identified call source is included in the list of call sources from which future calls are specially handled is determined. Special handling is applied to the call when the identified call source is included in the list.
- The method of the prior art can be circumvented easily by using another call source, i.e. another telephone number. There exists a need in the art for an improved method of reducing unsolicited telephone calls.
- This Summary and Abstract are provided to introduce some concepts in a simplified form that are further described below in the Detailed Description. This Summary and Abstract are not intended to identify key features or essential features of the claimed subject matter, nor are they intended to be used as an aid in determining the scope of the claimed subject matter. In addition, the description herein provided and the claimed subject matter should not be interpreted as being directed to addressing any of the short-comings discussed in the Background.
- A method is proposed for establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B-subscriber device) in a telephone system. The telephone system is arranged for connecting the A-subscriber device (the calling party) and the B-subscriber device (the called party). The method includes receiving a request from the A-subscriber device to establish a connection with the B-subscriber device and also receiving a personal identity code of a user of said A-subscriber device. The connection can be established between the A-subscriber device and the B-subscriber device only after having received said personal identity code of said user of said A-subscriber device.
- The applicant also proposes one or more computer programs and a carrier (e.g. computer readable media) containing one or more of these computer programs or instructions for carrying out the method.
- Furthermore, a telephone system is proposed for establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B-subscriber device). The system comprises a request receiver adapted for receiving a request from the A-subscriber device to establish a connection with the B-subscriber device and an identity code receiver adapted for receiving a personal identity code of a user of said A-subscriber device. Also provided is a connection establisher adapted for establishing said connection between said A-subscriber device and said B-subscriber device only after having received said personal identity code of said user of said A-subscriber device.
- It should be appreciated that the telephone system may include a system or network of a conventional fixed system (e.g POTS), a mobile or wireless telecommunication system, combinations thereof as well as internet telephony using e.g. voice over IP techniques (VoIP).
- It should further be appreciated that the personal identity code may comprise one or more parts.
- It should also be appreciated that the telephone system does not necessarily refer to a client-server system. Aspects of the invention may also be applicable in peer-to-peer networks, such as e.g. used for bittorrent applications, wherein a telephone system or (some) functionality may be considered to be part of one of more of the user devices participating in the peer-to-peer network.
- By receiving a personal identity code of a user, the telephone system is able to actually recognize the person that is requesting services of the system instead of only recognizing the device that is used. Consequently, the telephone system can apply measures to a particular user instead of only to a device as a result of the received authentication information. In other words, measures applied to a particular users cannot be avoided or circumvented by using a different device. An example of such a measure may be restricting the access of a particular user to services of the telecommunication system.
- The embodiments of
claims - The embodiment of
claims - The embodiments of
claims - The embodiments of
claims - It should be appreciated, however, that access restrictions may only apply if more than a single access restriction signal has been received for a particular user, either from the user of the same B-subscriber device or from users of other B-subscriber devices during other calls.
- The embodiments of
claims - The embodiments of
claims 7 and 21 provides several mechanisms for mitigating restriction of the access rights to the telephone system. In particular, the applicant proposes to restrict access to the telephone system for the user of the A-subscriber device for which the at least one access restriction signal was received in dependence of a communication history between said user and said user of the B-subscription device from which the access restriction signal was received. As an example, access restriction to the telephone system may be performed immediately if the user of the A-subscriber device is unknown to the user of the B-subscriber device (e.g. if the users have not called each other previously). However, if the calling party and called party know each other, access to the telephone system is not restricted at once (but possibly only after several access restriction signals have been received for different telephone calls). The communication history between users of the telephone system can be traced on the basis of the received personal identity codes. - The embodiments of
claims 8 and 22 provides another measure for mitigating access restriction to the telephone system for the user of the A-subscriber device. - The embodiments of
claims 9 and 23 provide the advantage that the user of the A-subscriber device may be warned in advance of the access restriction. A pre-programmed warning signal may be provided. - The embodiments of
claims - The embodiments of
claims - The embodiments of
claims 12 and 26 provide subscribers with the possibility to approve telephone communication with each other prior to establishing the telephone connection. In particular, users may use their telephones to dial each others number (possibly in combination with the personal identity codes). If the telephone system receives the telephone numbers and the personal identity, the approval may be deemed to be given. Reference is made to a co-pending international patent application of the applicant (“Method and system for prior approval of telephone communication”) filed on the same date as the present application, the contents of the international application being incorporated in the present application by reference in its entirety. - An aspect of the invention also relates to a telephone device for use in the method and system as described above. In particular, the telephony device should be adapted to issue the personal identity code to the telephone system for setting up the connection.
- Hereinafter, embodiments of the invention will be described in further detail. It should be appreciated, however, that these embodiments may not be construed as limiting the scope of protection for the present invention.
- In the drawings:
-
FIG. 1 is a schematic illustration of a communication system for performing a method according to an embodiment of the invention; -
FIG. 2 is a schematic illustration of a telephone system according to an embodiment of the invention; -
FIG. 3 is a schematic illustration of a telephone device according to an embodiment of the invention; -
FIG. 4 is a time diagram illustrating steps of a method according to a first embodiment of the invention; -
FIG. 5 is a time diagram illustrating steps of a method according to a second embodiment of the invention; -
FIG. 6 is a time diagram illustrating steps of a method according to a third embodiment of the invention; and -
FIG. 7 is a time diagram illustrating steps of a method according to a fourth embodiment of the invention. - Details about telecommunication infrastructures and procedures for establishing and terminating a telephone connection are assumed to be known to the skilled person and will not be described. As an example, for GSM telephony, reference is made to the book “The GSM System for Mobile Communications” by M. Mouly and M. Pautet, 1992 (ISBN 2-9057190-0-7). For UMTS telephony, reference is made to the book “WCDMA for UMTS”; edited by Harri Holma and Antti Toskala, 2001 (ISBN 0 471 48687 6).
-
FIG. 1 shows atelephone infrastructure 1 comprising atelephone system 2. Thetelephone system 2, which may e.g. comprise a server, is connected via afirst telecommunication network 3 to anA-subscriber device 4 and via asecond telecommunication network 5 to a B-subscriber device 6. The first andsecond telecommunication networks FIG. 1 , theA-subscriber device 4 is connected to thetelephone system 2 via a wired network, whereas the B-subscriber device 6 is partly connected via a wireless access network. Thetelephone infrastructure 1 may also be suitable for internet telephony, including VoIP telephony. TheA-subscriber device 4 and B-subscriber device 6 may be any type of device suitable for telephony communication. Thetelephone system 2 enables the establishment of a telephone connection via thenetworks A-subscriber device 4 and the B-subscriber device 6. Of course,networks - The specific functions of the
telephone system 2 are schematically illustrated inFIG. 2 and will now be described in further detail. Thetelephone system 2 comprises aprocessor 10 and amemory 11 and is configured to allow communication with both the A-subscriber device and the B-subscriber device via thenetworks telephone system 2 is normally capable of connecting to more than the two telephone devices shown inFIG. 1 . It should also be appreciated that the functions may be largely implemented as software code portions of one or more computer programs executed by the processor 10 (tasks may be distributed over multiple processors). - The
telephone server 2 comprises arequest receiver 13 adapted for receiving a request from theA-subscriber device 4 to establish a connection with the B-subscriber device 6. Thetelephone server 2 also comprises anidentity code receiver 14 adapted for receiving a personal identity code of a user of theA-subscriber device 4 and aconnection establisher 15 adapted for establishing the connection between theA-subscriber device 4 and the B-subscriber device 6 only after receiving the personal identity code of the user of theA-subscriber device 4. Although for individual consumers, each user (or family) preferably owns a unique personal identity code, it may in some case be advantageous to assign a common identity code to groups of users (e.g. companies), such as call centres, in order to allow measures being applied to a call centre in its entirety. - The telephone system also contains a
storage module 16 for storing the personal identity code of the user of theA-subscriber device 4. The personal identity code may be pre-stored in the storage module, e.g. while entering a subscription of the user for use of thetelephone system 2. Adetermination module 17 is provided that is adapted for determining if the personal identity code received by theidentity code receiver 14 matches the personal identity code stored by thestorage module 16. Theprocessor 10 may be programmed such that theconnection establisher 15 only establishes the connection between theA-subscriber device 4 and the B-subscriber device 6 if the personal identity code received by the personalidentity code receiver 14 matches the personal identity code stored by thestorage module 16. - The
telephone system 2 also contains adevice code receiver 18 adapted for receiving a code of theA-subscriber device 4. The device code e.g. comprises the telephone number of theA-subscriber device 4, a code similar to a telephone number (e.g. the IMSI) and/or a hardware code (such as the IMEI number or a MAC address of the A-subscriber device 4). It should be appreciated that the device code may also be a common code of a call centre. - The
storage module 16 may also be configured for storing at least a personal identity code of a user of the B-subscriber device. Again, thestorage module 16 may pre-store such a code on entering the subscription of the user of the B-subscriber device 6 in thetelephone system 2. Therequest receiver 13 may be adapted for filtering a telephone number of the B-subscriber device 6 from the request for establishing the telephone connection. Thetelephone system 2 may be arranged such that theconnection establisher 15 establishes the telephone connection only if thestorage module 16 has stored the personal identity code of the user of the B-subscriber device 6 for the received telephone number. This link can e.g. be made via the telephone number of the B-subscriber device 6 that is received by therequest receiver 13. - The availability of the personal identity code of the users of the
A-subscriber device 4 and/or the B-subscriber device 6 allows thetelephone system 2 to identify users requesting services from thetelephone system 2. The users may be connected to devices by thetelephone system 2, e.g. by linking the received personal identity code to one or more known device codes or by receiving the device code from theA-subscriber device 4 and/or B-subscriber device 6 in the process of establishing a connection or during the connection. The availability of the personal identity code (possibly in combination with other identity codes and/or one or more device codes) provides thetelephone system 2 with the possibility to trigger actions directed to one or more particular users. - In particular, the
telephone system 2 comprises anaccess restriction receiver 19 adapted for receiving one or more access restriction signals. Thetelephone system 2 also comprises anaccess restrictor 20 adapted to restrict access to thetelephone system 2 for the user of saidA-subscriber device 4 in response to receiving the one or more access restriction signals. If theaccess restriction receiver 19 receives an access restriction signal (e.g. from the B-subscriber device 6), thetelephone system 2 determines the personal identity code of the user of theA-subscriber device 4 that was engaged in the telephone call and for which the access restriction signal was received. The personal identity code is remembered, e.g. by flagging the personal identity code of user of the A-subscriber device 4 (or an associated field) in a database or by storing the personal identity code of the user of theA-subscriber device 4 in a separate register. - There exist various possibilities for restricting access to the
telephone system 2. - The
telephone system 2 may have aconnection terminator 21 adapted for terminating the ongoing connection with theA-subscriber device 4. Theconnection terminator 21 may also be configured for terminating one or more co-existing connections with theA-subscriber device 4. The latter option may be used if the user of theA-subscriber device 4 for which the access restriction signal was received was engaged in multiple calls. In this situation, each of these calls may be terminated. It should be clear that the user of theA-subscriber device 4 was not necessarily the calling party in all these multiple calls. - In particular, the
telephone system 2 may also contain aconnection preventor 22 adapted for preventing establishment of further connections for user of saidA-subscriber device 4. That is, if the user of theA-subscriber device 4 desires to make another call and if thetelephone system 2 identifies the user as being flagged in response to receiving one or more access restrictions signals for this user, theconnection preventor 22 prevents that a telephone connection is established with the desired B-subscriber device. It should be clear that this measure cannot be circumvented by using a differentA-subscriber device 4, since also for the further call the personal identity code should be sent before, with or following the request for establishing a telephone connection. Thetelephone system 2 will then determine that a telephone connection should not be set up for this user. - Moreover, the
connection preventor 22 may, alternatively or in addition to the measure described in the previous paragraph, prevent that the user of theA-subscriber device 4 is called (i.e. the user of theA-subscriber device 4 is now a calling party). Thestorage module 16 of thetelephone system 2 stores one or more telephone numbers (or associated information) of the A-subscriber device and links one or more of these telephone numbers to the personal identity code. If a request is made to establish a telephone connection with a B-subscriber device, thetelephone system 2 determines the personal identity code linked to the telephone number of theA-subscriber device 4. If thetelephone system 2 determines that access restrictions apply for the user being assigned this personal identity code, the connection will not be established by using theconnection preventor 22. The calling party may be informed of this situation by thetelephone system 2. - If a company or another group of people is assigned a common personal identity code, the measures may apply to the company or group. It is also possible to combine a common code of a particular company or group with a personal code of a user within that company or group. Measures may then either apply to the company or group (on the basis of the common personal identity code) and/or to a person of the company or group (on the basis of the personal identity code). As an example, a company may receive a warning signal from the
telephone system 2 on the basis of the common personal identity code of the company, while the above measures apply in full to a particular user of that company that was engaged in the telephone call during which the access restriction signal was received. Thetelephone system 2 is aware of both the company identity code and the personal identity code in such a situation. - It should be appreciated that the measures described in the previous paragraphs do not necessarily apply already in response to a single access restriction signal. The number of access restriction signals before access to the
telephone system 2 is restricted may be set. As an example, 50, 25, 10, 5, 2 or 1 acess restriction signals may need to be received by thetelephone system 2 for a particular personal identity code before access is restricted to thetelephone system 2. - It will be clear that the measures described above can be harsh for a particular user of the
A-subscriber device 4. This is particularly true if receipt of a single access restriction signal (or only a few) is sufficient for thetelephone system 2 to restrict access. To mitigate this situation, thetelephone system 2 comprises anassessor module 23. Theassessor module 23 is adapted to control theaccess restrictor 20 such that restricting access to thetelephone system 2 for the user of theA-subscriber device 4 is e.g. dependent on the number of times that access has been restricted for this user and/or the number of access restriction signals that have been received for this user. Also, thetelephone system 2 may be configured to restrict access for a particular time period, using atimer 24 - In particular, the
telephone system 2 is configured to take account of a telephone communication history between the user of theA-subscriber device 4 and the user of the B-subscriber device 6 from which the access restriction signal was received. As an example, access restriction to thetelephone system 2 may be performed immediately if the user of theA-subscriber device 4 is unknown to the user of the B-subscriber device 6 (e.g. if the users have not called each other previously) and this user transmits an access restriction signal. However, if the calling party and the called party know each other, access to thetelephone system 2 is not restricted at once (but possibly only after several access restriction signals have been received for different telephone calls, either from the same user of the B-subscriber device or from other users). Theassessor module 23, therefore, is configured to keep track of past phone calls between users (e.g. on the basis of the personal identity codes of the calling and called parties). - The
telephone system 2 may also comprise awarning signal transmitter 25 adapted for providing a warning signal to the user of theA-subscriber device 4 in response to receiving one or more access restriction signals. The warning signal may contain information for the user of theA-subscriber device 4 of possible consequences of further violations. The warning signal may be transmitted to theA-subscriber device 4 or to another device when information is available how this device can be addressed. As an example, if thetelephone system 2 has information of an e-mail address of the user of theA-subscriber device 4, the warning message may be transmitted to this e-mail address. - Of course, the
telephone system 2 may be capable of connecting multiple subscriber devices. In particular, thetelephone system 2 may be arranged for establishing a connection with a first B-subscriber device and with a second B-subscriber device. The accessrestriction signal receiver 19 may be adapted for receiving an access restriction signal from the first B-subscriber device. Theconnection preventor 22 can be configured to prevent the second B-subscriber device from receiving telephone calls from a user of theA-subscriber device 4 in response to receiving said one or more access restriction signals. In other words, a called party may determine the access of other future called parties to telephone calls of anA-subscriber device 4 for which one or more asccess restriction signals were received. - The
telephone system 2 is arranged for receiving at least the personal identity codes in a secured manner using e.g. secured connections, data encryption techniques or a combination of both. These measures reduce the chance that personal identity codes are intercepted by third parties. - The
telephone system 2 comprises anapproval module 26 adapted for receiving a first approval signal from a user ofA-subscriber device 4 for telephone communication with a user of the B-subscriber device 6 and for receiving a second approval signal from the user of the B-subscriber device 6 for telephone communication with the user of theA-subscriber device 4. Theapproval module 26 controls theconnection establisher 15 such that a telephone connection can be established only if both the first and second approval signal have been received. If an approval signal is received, thetimer 24 may be used to set a time limit within which the approval signal of the other user should be received to update the status of thetelephone system 2 that a telephone connection is allowed to be established between the users that have mutually approved future telephone calls from each other. It is noted that theapproval module 26 may also be applied independently from receiving personal identity codes. As an example, the approval may be based on the telephone numbers of theA-subscriber device 4 and B-subscriber device 6 alone. -
FIG. 3 is a schematic illustration of a telephone device, e.g. theA-subscriber device 4 or the B-subscriber device 6 ofFIG. 1 . - The
A-subscriber device 4 contains aprocessor 30, a memory 31 (e.g. internal memory, a SIM card or another memory card) and akeyboard 32. Of course, theA-subscriber device 4 may comprise other components, such as a display. - As explained above, the
A-subscriber device 4 should be capable of transmitting a personal identity code to thetelephone system 2. The personal identity code can be made available in various ways. - In a first example, the personal identity code can be entered by the user using the
keyboard 32. This code can be stored in thememory 31 and be made available for use when sending a request to establish a telephone connection to thetelephone system 2. - In a second example, the personal identity code may be entered by the user of the
A-subscriber device 4 with thekeyboard 32 in combination with the telephone number of the B-subscriber device 6 with which a connection is sought. - In a third example, the personal identity code is already stored in the
memory 31. Most telephone devices allow that the telephone device may be operated only after entering a personal identity number (PIN) or password. The personal identity code can be made available or retrieved from thememory 31 in dependence of entering the correct PIN or password. The personal identity code is available until a PIN or password should be entered again (e.g. if the telephone device has been switched off and on again). In this example, if multiple PINS or passwords are valid for various users of a single telephone device, several personal identity codes may be stored and made available, linked to the PIN or password, for a single device for multiple users. - Furthermore, the
telephone device telephone system 2 if the user of the telephone device perceives an incoming phone call as unsolicited or undesired. An access restriction signal may e.g. be transmitted by operating a dedicated key, a soft key related to a particular function indicated on a display of the telephone device or a special combination of keys. - It should be clear that further examples can be envisaged. The telephone device should be configured such that at least one personal identity code can be transmitted to the
telephone system 2. The telephone device may also be configured to transmit a device code, such as the telephone number or related information. - In the sequel of the description, some examples of the operation of the
telephone system 2 will be given with reference toFIGS. 4-7 . It should be appreciated that these examples, or the steps thereof, may be combined or applied in isolation. - In
FIG. 4 , in step 40 a request is received by therequest receiver 13 of thetelephone system 2 from theA-subscriber device 4 for establishing a telephone connection with the B-subscriber device 6. Instep 41, the personal identity code of the user of theA-subscriber device 4 is also received by theidentity code receiver 14. Of course, the personal identity code may be received before the request, simultaneously with the request or after the request for establishing a telephone connection. In response to receiving the personal identity code, the telephone connection with the B-subscriber device 6 is established instep 42 using theconnection establisher 15. - If the user of the B-
subscriber device 6 perceives the call as desired, the phone call is continued until either of the parties terminates the connection. - If the user of the B-
subscriber device 6 perceives the call as unsolicited or undesired, the user of the B-subscriber device 6 may operate thedevice 6 to transmit an access restriction signal. The accessrestriction signal receiver 19 of thetelephone system 2 receives the access restriction signal from the B-subscriber device 6 instep 43. - The
telephone system 2 may restrict access to the user of theA-subscriber device 4 in various ways. - In
FIG. 4 , in response to receiving the access restriction signal, the access restrictor 20 blocks the access to thetelephone system 2, indicated by thearrow 44, possibly after operating theassessor module 23 as described above. Access is restricted by flagging the personal identity code of the user of theA-subscriber device 4. - If the user of the
A-subscriber device 4 attempts to make another call using thetelephone system 2, the device used by this user should again transmit the personal identity code of this user. Upon determining that a flag exists for this particular identity code by thedetermination module 17, theconnection preventor 22 prevents establishing of a telephone connection for this subsequent call, indicated by the cross instep 45. - In
FIG. 5 ,step 50 indicates that thetelephone system 2 receives the request from theA-subscriber device 4 for establishing a telephone connection with the B-subscriber device 6 in combination with the personal identity code of the user of theA-subscriber device 4.Step 51 indicates the establishment of the telephone connection, whereasstep 52 again indicates receiving an access restriction signal from the B-subscriber device 6 by the accessrestriction signal receiver 19. - The form of access restriction to the
telephone system 2 inFIG. 5 is different fromFIG. 4 (and may thus be applied instead or in combination with the access restriction illustrated and described with reference toFIG. 4 ). - In
FIG. 5 , the access restriction signal from the B-subscriber device 6 triggers thetelephone system 2 to prevent a connection with another B-subscriber device 6 (indicated as B2). If the user of theA-subscriber device 4, after one or more access restrictions signals have been received, tries to make another telephone call (either with the same telephone device or with another telephone device) to telephone device B2 instep 53, his request for connection and the personal identity code are received by thetelephone system 2. Thetelephone system 2 determines that the user that was assigned the personal identity code has been flagged as having received one or more access restriction signals. As a consequence, the telephone connection with telephone device B2 is not established (indicated by the cross in step 54). Similarly, a new telephone connection with the B-subscriber device 6 can not be established (steps 55 and 56). - In contrast with the embodiment of
FIG. 4 , in the situation ofFIG. 5 , the user of theA-subscriber device 4 may still be able to establish a telephone connection with other telephone devices. Whereas access to the telephone device B2 inFIG. 5 has been restricted (e.g. because the telephone number of telephone device B2 was explicitly indicated by a user of the B-subscriber device 6 that transmitted the original access restriction signal upon determination in the telephone system 2), other telephone devices may still be called. As an example, thetelephone system 2 in the embodiment ofFIG. 5 may still enable the user of theA-subscriber device 4 to establish a telephone connection to emergency telephone numbers and/or to another selected group of numbers. On the other hand, the user of theA-subscriber device 4 may only be excluded from making a telephone connection with a selected group of telephone devices or devices of a particular group of users (possibly indicated by their personal identity codes). Of course, the selected group may involve all subscribers. - In
FIG. 6 ,step 60 indicates that thetelephone system 2 receives the request from theA-subscriber device 4 for establishing a telephone connection with the B-subscriber device 6 in combination with the personal identity code of the user of theA-subscriber device 4.Step 61 indicates the establishmentof the telephone connection, whereasstep 62 again indicates receiving an access restriction signal from the B-subscriber device 6 by the accessrestriction signal receiver 19. - The form of access restriction to the
telephone system 2 inFIG. 6 is different fromFIGS. 4 and 5 (and may thus be applied instead or in combination with the access restriction illustrated and described with reference toFIG. 4 and/orFIG. 5 ). - In the embodiment of
FIG. 6 , the user of theA-subscriber device 4 for which the original access restriction signal has been received is excluded from receiving telephone calls. If the user of the telephone device B2 attempts to make a telephone call to the user of the A-subscriber device 4 (step 63), thetelephone system 2 will find a flag for the user of the telephone number of the A-subscriber device 4 (and possibly other telephone numbers). In reaction to this finding, thetelephone system 2, more particularly theconnection preventor 22, will prevent in step 64 a telephone connection to be established with the A-subscriber device 4 (or with the other telephone numbers stored in relation to the personal identity code of the user). - It should be appreciated that in the embodiments of
FIGS. 4-6 , the described access restriction may take place by theaccess restrictor 20 in response to receiving one or more access restriction signals by the accessrestriction signal receiver 19. In general, but particularly if only a single or a few access restriction signals are sufficient to restrict access for the user, theaccess restrictor 20 may be controlled by theassessor module 23 as described with reference toFIG. 2 - Finally,
FIG. 7 shows an embodiment using theapproval module 26. It should be noted that this embodiment can be applied independently of the use of a personal identity code of the user of theA-subscriber device 4, although use of this code is illustrated inFIG. 7 . - In
FIG. 7 , the user ofA-subscriber device 4 may request establishing a telephone connection with the B-subscriber device 6. This request and the personal identity code of the user of theA-subscriber device 4 are received insteps approval module 26 interprets the request as a first approval signal for telephone communication with the user of the B-subscriber device 6. Theconnection establisher 15 does not yet actually establish the telephone connection, until a corresponding request is received from the B-subscriber device 6 (indicated bysteps 72 and 73). This request is interpreted as a second approval signal for telephone communication with the user of the B-subscriber device 6. If both approval signals are received, theconnection establisher 15 allows establishing a telephone connection between theA-subscriber device 4 and the B-subscriber device 6 (step 74). The telephone connection does not have to be established immediately. - The
telephone system 2 may apply thetimer 24 to set a validity period of the first approval signal. If the second approval signal is received in the validity period, the establishment of a telephone connection is allowed. In order to make the user of the other telephone device aware of the existence of the first approval signal, thetelephone system 2 may apply a notification signal to alert the user of the B-subscriber device 6. The validity period may be set to e.g. one hour, one day, one week or two weeks. - Although the subject matter has been described in language directed to specific environments, structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not limited to the environments, specific features or acts described above as has been held by the courts. Rather, the environments, specific features and acts described above are disclosed as example forms of implementing the claims.
Claims (27)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL1033356 | 2007-02-08 | ||
NL1033356 | 2007-02-08 | ||
NL1034361 | 2007-09-11 | ||
NLPCT/NL2007/000224 | 2007-09-11 | ||
NL1034361 | 2007-09-11 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NLPCT/NL2007/000224 Continuation-In-Part | 2007-02-08 | 2007-09-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080192918A1 true US20080192918A1 (en) | 2008-08-14 |
Family
ID=39592973
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/983,802 Abandoned US20080192918A1 (en) | 2007-02-08 | 2007-11-09 | Method and system for establishing a telephone connection |
US11/983,816 Abandoned US20080196094A1 (en) | 2007-02-08 | 2007-11-09 | Method and system for restricting access to an electronic message system |
US11/983,799 Active 2030-05-28 US8443424B2 (en) | 2007-02-08 | 2007-11-09 | Method and system for reducing the proliferation of electronic messages |
US11/983,809 Abandoned US20080196093A1 (en) | 2007-02-08 | 2007-11-09 | Method and system for reducing the proliferation of electronic messages |
US11/983,783 Abandoned US20080194234A1 (en) | 2007-02-08 | 2007-11-09 | System and method of establishing a telephone connection |
US11/983,798 Abandoned US20080195713A1 (en) | 2007-02-08 | 2007-11-09 | Method and system for transmitting an electronic message |
US11/956,656 Abandoned US20080195515A1 (en) | 2007-02-08 | 2007-12-14 | Combined payment and communication service method and system |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/983,816 Abandoned US20080196094A1 (en) | 2007-02-08 | 2007-11-09 | Method and system for restricting access to an electronic message system |
US11/983,799 Active 2030-05-28 US8443424B2 (en) | 2007-02-08 | 2007-11-09 | Method and system for reducing the proliferation of electronic messages |
US11/983,809 Abandoned US20080196093A1 (en) | 2007-02-08 | 2007-11-09 | Method and system for reducing the proliferation of electronic messages |
US11/983,783 Abandoned US20080194234A1 (en) | 2007-02-08 | 2007-11-09 | System and method of establishing a telephone connection |
US11/983,798 Abandoned US20080195713A1 (en) | 2007-02-08 | 2007-11-09 | Method and system for transmitting an electronic message |
US11/956,656 Abandoned US20080195515A1 (en) | 2007-02-08 | 2007-12-14 | Combined payment and communication service method and system |
Country Status (3)
Country | Link |
---|---|
US (7) | US20080192918A1 (en) |
EP (1) | EP1956541A1 (en) |
AR (7) | AR064057A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080194234A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | System and method of establishing a telephone connection |
US20090158403A1 (en) * | 2007-12-14 | 2009-06-18 | Dirk Leonard Benschop | Method and system for permitting or denying service |
US20090178117A1 (en) * | 2008-01-03 | 2009-07-09 | Dlb Finance & Consultancy B.V. | System and method of retrieving a service contact identifier |
US20090187666A1 (en) * | 2008-01-17 | 2009-07-23 | Dlb Finance & Consultancy B.V. | Method and system for controlling a computer application program |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7398550B2 (en) * | 2003-06-18 | 2008-07-08 | Microsoft Corporation | Enhanced shared secret provisioning protocol |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US9733811B2 (en) | 2008-12-19 | 2017-08-15 | Tinder, Inc. | Matching process system and method |
US12105941B2 (en) | 2007-12-19 | 2024-10-01 | Match Group, Llc | Matching process system and method |
US8752169B2 (en) * | 2008-03-31 | 2014-06-10 | Intel Corporation | Botnet spam detection and filtration on the source machine |
US9704177B2 (en) | 2008-12-23 | 2017-07-11 | International Business Machines Corporation | Identifying spam avatars in a virtual universe (VU) based upon turing tests |
US9697535B2 (en) | 2008-12-23 | 2017-07-04 | International Business Machines Corporation | System and method in a virtual universe for identifying spam avatars based upon avatar multimedia characteristics |
US20100185739A1 (en) * | 2009-01-16 | 2010-07-22 | Gary Stephen Shuster | Differentiated spam filtering for multiplexed message receiving devices |
WO2010099243A1 (en) * | 2009-02-24 | 2010-09-02 | Doxo, Inc. | Provider relationship management system that facilitates interaction between an individual and organizations |
US8553778B2 (en) | 2009-03-19 | 2013-10-08 | International Business Machines Corporation | Coding scheme for identifying spatial locations of events within video image data |
US8537219B2 (en) | 2009-03-19 | 2013-09-17 | International Business Machines Corporation | Identifying spatial locations of events within video image data |
US8656476B2 (en) * | 2009-05-28 | 2014-02-18 | International Business Machines Corporation | Providing notification of spam avatars |
US8832204B1 (en) * | 2009-09-24 | 2014-09-09 | Sprint Communication Company L.P. | Text message spam solutions |
CN101859426B (en) * | 2010-02-02 | 2013-04-10 | 深圳市国民电子商务有限公司 | Electronic ticket service system and realizing method thereof |
US20110276640A1 (en) * | 2010-03-01 | 2011-11-10 | Mary Jesse | Automated communications system |
US9294308B2 (en) * | 2011-03-10 | 2016-03-22 | Mimecast North America Inc. | Enhancing communication |
US9251360B2 (en) | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment |
US9253176B2 (en) | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment |
EP2842070B1 (en) | 2012-04-27 | 2020-08-05 | Intralinks, Inc. | Computerized method and system for managing networked secure collaborative exchange |
US9553860B2 (en) | 2012-04-27 | 2017-01-24 | Intralinks, Inc. | Email effectivity facility in a networked secure collaborative exchange environment |
US20140279031A1 (en) * | 2013-03-14 | 2014-09-18 | Randy Mersky | Mobile in-store loyalty advertising and marketing system and method |
EP3069462A4 (en) | 2013-11-14 | 2017-05-03 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
WO2015164521A1 (en) | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
CN104506743B (en) * | 2014-12-17 | 2017-11-03 | 百度在线网络技术(北京)有限公司 | A kind of method and device of dynamic interception phone |
US10033702B2 (en) | 2015-08-05 | 2018-07-24 | Intralinks, Inc. | Systems and methods of secure data exchange |
US9911134B2 (en) * | 2016-01-20 | 2018-03-06 | Zipstorm, Inc. | Recipient centric messaging system and protocols to implement it over data networks |
USD781311S1 (en) | 2016-08-30 | 2017-03-14 | Tinder, Inc. | Display screen or portion thereof with a graphical user interface |
USD781882S1 (en) | 2016-08-30 | 2017-03-21 | Tinder, Inc. | Display screen or portion thereof with a graphical user interface of an electronic device |
USD780775S1 (en) | 2016-08-30 | 2017-03-07 | Tinder, Inc. | Display screen or portion thereof with a graphical user interface of an electronic device |
USD854025S1 (en) | 2016-08-30 | 2019-07-16 | Match Group, Llc | Display screen or portion thereof with a graphical user interface of an electronic device |
USD852809S1 (en) | 2016-08-30 | 2019-07-02 | Match Group, Llc | Display screen or portion thereof with a graphical user interface of an electronic device |
US10505871B1 (en) * | 2017-11-30 | 2019-12-10 | Sandeep Jain | Future messaging maximizing contextual relevancy and minimizing information overload based distractions |
US11037114B2 (en) | 2018-03-22 | 2021-06-15 | Diebold Nixdorf, Incorporated | System and method for financial transactions |
US10977722B2 (en) | 2018-08-20 | 2021-04-13 | IM Pro Makeup NY LP | System, method and user interfaces and data structures in a cross-platform facility for providing content generation tools and consumer experience |
US10497372B1 (en) * | 2019-07-18 | 2019-12-03 | Capital One Services, Llc | Voice-assistant activated virtual card replacement |
Citations (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5475819A (en) * | 1990-10-02 | 1995-12-12 | Digital Equipment Corporation | Distributed configuration profile for computing system |
US5870473A (en) * | 1995-12-14 | 1999-02-09 | Cybercash, Inc. | Electronic transfer system and method |
US6298383B1 (en) * | 1999-01-04 | 2001-10-02 | Cisco Technology, Inc. | Integration of authentication authorization and accounting service and proxy service |
US20010026609A1 (en) * | 1999-12-30 | 2001-10-04 | Lee Weinstein | Method and apparatus facilitating the placing, receiving, and billing of telephone calls |
US6453327B1 (en) * | 1996-06-10 | 2002-09-17 | Sun Microsystems, Inc. | Method and apparatus for identifying and discarding junk electronic mail |
US6457060B1 (en) * | 1998-04-30 | 2002-09-24 | Openwave Systems Inc. | Method and apparatus for flexibly linking to remotely located content on a network server through use of aliases |
US20020156728A1 (en) * | 2000-08-18 | 2002-10-24 | Rainer Jaschhof | Method and arrangement for the transmission of an electronic sum of money from a credit reserve by wap |
US20020174194A1 (en) * | 2001-05-18 | 2002-11-21 | Eoin Mooney | Providing access to a plurality of message accounts from a single web-based interface |
US20030018721A1 (en) * | 2001-06-29 | 2003-01-23 | Virad Gupta | Unified messaging with separate media component storage |
US20030023873A1 (en) * | 2001-03-16 | 2003-01-30 | Yuval Ben-Itzhak | Application-layer security method and system |
US20030026396A1 (en) * | 2001-08-02 | 2003-02-06 | Alcatel | Method of executing transactions of electronic money amounts between subscriber terminals of a communication network, and communication network, transaction server and program module for it |
US6529943B1 (en) * | 1998-04-24 | 2003-03-04 | Canon Kabushiki Kaisha | Server, client, client server system, method for controlling them and storage medium therefor |
US20030112948A1 (en) * | 2001-12-19 | 2003-06-19 | Wendell Brown | System and method for establishing a connection between parties based on their availability |
US20030154165A1 (en) * | 2000-08-18 | 2003-08-14 | Michael Horn | Method and arrangement for the transmission of an electronic sum of money from a credit reserve |
US6615231B1 (en) * | 1999-12-15 | 2003-09-02 | Microsoft Corporation | System and method for directing requests to specific processing |
US20030204719A1 (en) * | 2001-03-16 | 2003-10-30 | Kavado, Inc. | Application layer security method and system |
US20030233318A1 (en) * | 2001-11-26 | 2003-12-18 | King Douglas W. | Systems and methods for fund transfers |
US20040019651A1 (en) * | 2002-07-29 | 2004-01-29 | Andaker Kristian L. M. | Categorizing electronic messages based on collaborative feedback |
US6718389B2 (en) * | 1998-02-19 | 2004-04-06 | Sbc Properties, L.P. | System and method for executing a request from a client application |
US20040176072A1 (en) * | 2003-01-31 | 2004-09-09 | Gellens Randall C. | Simplified handling of, blocking of, and credit for undesired messaging |
US20040205135A1 (en) * | 2003-03-25 | 2004-10-14 | Hallam-Baker Phillip Martin | Control and management of electronic messaging |
US20040213396A1 (en) * | 2003-04-25 | 2004-10-28 | Macnamara John J. | Methods for blocking repeated occurrences of nuisance calls |
US20050021649A1 (en) * | 2003-06-20 | 2005-01-27 | Goodman Joshua T. | Prevention of outgoing spam |
US20050081051A1 (en) * | 2003-10-09 | 2005-04-14 | International Business Machines Corporation | Mitigating self-propagating e-mail viruses |
US6889325B1 (en) * | 1999-04-28 | 2005-05-03 | Unicate Bv | Transaction method and system for data networks, like internet |
US20050111648A1 (en) * | 2003-11-26 | 2005-05-26 | Roome William D. | Multi-stage telephone number dialing system and method for providing limited access to a telephone subscriber |
US6952769B1 (en) * | 2000-04-17 | 2005-10-04 | International Business Machines Corporation | Protocols for anonymous electronic communication and double-blind transactions |
US20050249214A1 (en) * | 2004-05-07 | 2005-11-10 | Tao Peng | System and process for managing network traffic |
US20050273857A1 (en) * | 2004-06-07 | 2005-12-08 | Check Point Software Technologies, Inc. | System and Methodology for Intrusion Detection and Prevention |
US7035634B2 (en) * | 2000-04-10 | 2006-04-25 | Honeywell International Inc. | In-flight e-mail system |
US20060187901A1 (en) * | 2005-02-23 | 2006-08-24 | Lucent Technologies Inc. | Concurrent dual-state proxy server, method of providing a proxy and SIP network employing the same |
US20060224681A1 (en) * | 2005-03-29 | 2006-10-05 | Wurster Charles S | Mobile communications device e-mail message delivery |
US20060239190A1 (en) * | 2005-04-25 | 2006-10-26 | Matsushita Electric Industrial Co., Ltd. | Policy-based device/service discovery and dissemination of device profile and capability information for P2P networking |
US20060253597A1 (en) * | 2005-05-05 | 2006-11-09 | Mujica Technologies Inc. | E-mail system |
US20060265325A1 (en) * | 2003-12-18 | 2006-11-23 | Fajardo Alfredo C | System and method for facilitating payment via a communications network using value accredited to a customer of the communications network |
US7155001B2 (en) * | 2001-10-24 | 2006-12-26 | Sbc Properties, L.P. | System and method for restricting and monitoring telephone calls |
US20070005716A1 (en) * | 2005-07-01 | 2007-01-04 | Levasseur Thierry | Electronic mail system with pre-message-retrieval display of message metadata |
US20070106734A1 (en) * | 2005-11-10 | 2007-05-10 | Motorola, Inc. | Incentive driven subscriber assisted spam reduction |
US20070124226A1 (en) * | 2007-02-08 | 2007-05-31 | Global Personals, Llc | Method for Verifying Data in a Dating Service, Dating-Service Database including Verified Member Data, and Method for Prioritizing Search Results Including Verified Data, and Methods for Verifying Data |
US20070180039A1 (en) * | 2006-02-01 | 2007-08-02 | David Sutidze | Anonymous disposable email addressing system and method of use thereo |
US20070289002A1 (en) * | 2006-06-09 | 2007-12-13 | Van Der Horst Timothy | Multi-channel user authentication apparatus system and method |
US20080052324A1 (en) * | 2002-08-01 | 2008-02-28 | International Business Machines Corporation | Reducing Data Storage Requirements on Mail Servers by Storing a Shared Copy of a Message |
US20080107101A1 (en) * | 2006-11-02 | 2008-05-08 | Mitac Technology Corp. | Multi-dialing-number VOIP phone call connection method |
US20080137828A1 (en) * | 2006-12-12 | 2008-06-12 | Mazen Chmaytelli | Systems and methods for caller identification customization and remote management of communication devices |
US20080147837A1 (en) * | 2005-02-24 | 2008-06-19 | Amit Klein | System and Method for Detecting and Mitigating Dns Spoofing Trojans |
US20080196094A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for restricting access to an electronic message system |
US20090012878A1 (en) * | 2005-08-09 | 2009-01-08 | Tedesco Daniel E | Apparatus, Systems and Methods for Facilitating Commerce |
US7500108B2 (en) * | 2004-03-01 | 2009-03-03 | Microsoft Corporation | Metered execution of code |
US7523164B2 (en) * | 2001-08-16 | 2009-04-21 | Sun Microsystems, Inc. | Systems and methods for transaction messaging brokering |
US20090158403A1 (en) * | 2007-12-14 | 2009-06-18 | Dirk Leonard Benschop | Method and system for permitting or denying service |
US20090171821A1 (en) * | 2007-08-07 | 2009-07-02 | Dennis Denker | Systems and methods for providing resource allocation in a networked environment |
US20090178117A1 (en) * | 2008-01-03 | 2009-07-09 | Dlb Finance & Consultancy B.V. | System and method of retrieving a service contact identifier |
US20090187666A1 (en) * | 2008-01-17 | 2009-07-23 | Dlb Finance & Consultancy B.V. | Method and system for controlling a computer application program |
US7840206B2 (en) * | 2005-10-05 | 2010-11-23 | Canon Kabushiki Kaisha | Wireless communication system and authentication method and communication control method in wireless communication system |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI109505B (en) | 1997-03-24 | 2002-08-15 | Fd Finanssidata Oy | Use of banking services in a digital cellular radio system |
CA2357016A1 (en) | 1999-01-14 | 2000-07-20 | Tumbleweed Communications Corp. | Web-based delivery of secure e-mail messages |
AU2001249239A1 (en) | 2000-03-17 | 2001-10-03 | America Online, Inc. | Shared groups rostering system |
WO2002039282A1 (en) * | 2000-11-13 | 2002-05-16 | Warp Solutions, Inc. | System and method for discovering, advertising, and finding networked services using dynamic directory |
JP3693951B2 (en) | 2001-11-26 | 2005-09-14 | 日本電気株式会社 | E-mail system and spam mail prevention method |
KR20040074118A (en) | 2002-01-17 | 2004-08-21 | 김태준 | An Internet Mail Method and System based on Sender Mailbox |
US6944663B2 (en) * | 2002-03-06 | 2005-09-13 | Sun Microsystems, Inc. | Method and apparatus for using client puzzles to protect against denial-of-service attacks |
JP2003348162A (en) | 2002-05-24 | 2003-12-05 | Nec Corp | Spam mail prevention method and spam mail prevention system |
JP2006504297A (en) | 2002-10-16 | 2006-02-02 | モバイル・コヒージョン・リミテッド | Service access gateway |
NL1022704C2 (en) | 2003-02-17 | 2004-08-19 | Digipay Nederland N V | Banking method using central transaction server, has accounts on server linked with separate identifying telephone numbers |
WO2004075086A1 (en) | 2003-02-18 | 2004-09-02 | Wang Soo Ryu | Method for providing finance service using phone number and account balance |
FR2851834A1 (en) | 2003-02-28 | 2004-09-03 | France Telecom | Appointment booking system uses client stations linked by network to server offering limited access for patients to make reservations |
US7344787B2 (en) * | 2003-10-29 | 2008-03-18 | General Motors Corporation | Two-stage compression for air supply of a fuel cell system |
MY143168A (en) | 2004-06-22 | 2011-03-31 | Paysetter Pte Ltd | System and method for transferring credit between subscribers of differing telecommunications carriers |
US7509422B2 (en) * | 2004-07-21 | 2009-03-24 | Microsoft Corporation | System and method for locating web services |
US7610344B2 (en) * | 2004-12-13 | 2009-10-27 | Microsoft Corporation | Sender reputations for spam prevention |
US7894588B2 (en) | 2004-12-21 | 2011-02-22 | Aol Inc. | Telephone call handling list for multiple users |
US9455844B2 (en) * | 2005-09-30 | 2016-09-27 | Qualcomm Incorporated | Distributed processing system and method |
PL1956777T3 (en) | 2007-02-08 | 2013-08-30 | Scipioo Holding B V | Method and system for reducing the proliferation of electronic messages |
-
2007
- 2007-11-09 US US11/983,802 patent/US20080192918A1/en not_active Abandoned
- 2007-11-09 US US11/983,816 patent/US20080196094A1/en not_active Abandoned
- 2007-11-09 US US11/983,799 patent/US8443424B2/en active Active
- 2007-11-09 US US11/983,809 patent/US20080196093A1/en not_active Abandoned
- 2007-11-09 US US11/983,783 patent/US20080194234A1/en not_active Abandoned
- 2007-11-09 US US11/983,798 patent/US20080195713A1/en not_active Abandoned
- 2007-11-30 AR ARP070105335A patent/AR064057A1/en unknown
- 2007-11-30 AR ARP070105336A patent/AR064058A1/en unknown
- 2007-11-30 AR ARP070105331A patent/AR064053A1/en unknown
- 2007-11-30 AR ARP070105333A patent/AR064055A1/en unknown
- 2007-11-30 AR ARP070105334A patent/AR064056A1/en unknown
- 2007-11-30 AR ARP070105332A patent/AR064054A1/en unknown
- 2007-12-14 EP EP07123267A patent/EP1956541A1/en not_active Withdrawn
- 2007-12-14 US US11/956,656 patent/US20080195515A1/en not_active Abandoned
- 2007-12-28 AR ARP070105949A patent/AR064580A1/en unknown
Patent Citations (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5475819A (en) * | 1990-10-02 | 1995-12-12 | Digital Equipment Corporation | Distributed configuration profile for computing system |
US5870473A (en) * | 1995-12-14 | 1999-02-09 | Cybercash, Inc. | Electronic transfer system and method |
US6453327B1 (en) * | 1996-06-10 | 2002-09-17 | Sun Microsystems, Inc. | Method and apparatus for identifying and discarding junk electronic mail |
US6718389B2 (en) * | 1998-02-19 | 2004-04-06 | Sbc Properties, L.P. | System and method for executing a request from a client application |
US6529943B1 (en) * | 1998-04-24 | 2003-03-04 | Canon Kabushiki Kaisha | Server, client, client server system, method for controlling them and storage medium therefor |
US6457060B1 (en) * | 1998-04-30 | 2002-09-24 | Openwave Systems Inc. | Method and apparatus for flexibly linking to remotely located content on a network server through use of aliases |
US6298383B1 (en) * | 1999-01-04 | 2001-10-02 | Cisco Technology, Inc. | Integration of authentication authorization and accounting service and proxy service |
US6889325B1 (en) * | 1999-04-28 | 2005-05-03 | Unicate Bv | Transaction method and system for data networks, like internet |
US6615231B1 (en) * | 1999-12-15 | 2003-09-02 | Microsoft Corporation | System and method for directing requests to specific processing |
US20010026609A1 (en) * | 1999-12-30 | 2001-10-04 | Lee Weinstein | Method and apparatus facilitating the placing, receiving, and billing of telephone calls |
US7035634B2 (en) * | 2000-04-10 | 2006-04-25 | Honeywell International Inc. | In-flight e-mail system |
US6952769B1 (en) * | 2000-04-17 | 2005-10-04 | International Business Machines Corporation | Protocols for anonymous electronic communication and double-blind transactions |
US20020156728A1 (en) * | 2000-08-18 | 2002-10-24 | Rainer Jaschhof | Method and arrangement for the transmission of an electronic sum of money from a credit reserve by wap |
US20030154165A1 (en) * | 2000-08-18 | 2003-08-14 | Michael Horn | Method and arrangement for the transmission of an electronic sum of money from a credit reserve |
US20030023873A1 (en) * | 2001-03-16 | 2003-01-30 | Yuval Ben-Itzhak | Application-layer security method and system |
US20030204719A1 (en) * | 2001-03-16 | 2003-10-30 | Kavado, Inc. | Application layer security method and system |
US20020174194A1 (en) * | 2001-05-18 | 2002-11-21 | Eoin Mooney | Providing access to a plurality of message accounts from a single web-based interface |
US20030018721A1 (en) * | 2001-06-29 | 2003-01-23 | Virad Gupta | Unified messaging with separate media component storage |
US20030026396A1 (en) * | 2001-08-02 | 2003-02-06 | Alcatel | Method of executing transactions of electronic money amounts between subscriber terminals of a communication network, and communication network, transaction server and program module for it |
US7523164B2 (en) * | 2001-08-16 | 2009-04-21 | Sun Microsystems, Inc. | Systems and methods for transaction messaging brokering |
US7155001B2 (en) * | 2001-10-24 | 2006-12-26 | Sbc Properties, L.P. | System and method for restricting and monitoring telephone calls |
US20030233318A1 (en) * | 2001-11-26 | 2003-12-18 | King Douglas W. | Systems and methods for fund transfers |
US20030112948A1 (en) * | 2001-12-19 | 2003-06-19 | Wendell Brown | System and method for establishing a connection between parties based on their availability |
US20040019651A1 (en) * | 2002-07-29 | 2004-01-29 | Andaker Kristian L. M. | Categorizing electronic messages based on collaborative feedback |
US20080052324A1 (en) * | 2002-08-01 | 2008-02-28 | International Business Machines Corporation | Reducing Data Storage Requirements on Mail Servers by Storing a Shared Copy of a Message |
US20040176072A1 (en) * | 2003-01-31 | 2004-09-09 | Gellens Randall C. | Simplified handling of, blocking of, and credit for undesired messaging |
US20040205135A1 (en) * | 2003-03-25 | 2004-10-14 | Hallam-Baker Phillip Martin | Control and management of electronic messaging |
US20040213396A1 (en) * | 2003-04-25 | 2004-10-28 | Macnamara John J. | Methods for blocking repeated occurrences of nuisance calls |
US7711779B2 (en) * | 2003-06-20 | 2010-05-04 | Microsoft Corporation | Prevention of outgoing spam |
US20050021649A1 (en) * | 2003-06-20 | 2005-01-27 | Goodman Joshua T. | Prevention of outgoing spam |
US20050081051A1 (en) * | 2003-10-09 | 2005-04-14 | International Business Machines Corporation | Mitigating self-propagating e-mail viruses |
US20050111648A1 (en) * | 2003-11-26 | 2005-05-26 | Roome William D. | Multi-stage telephone number dialing system and method for providing limited access to a telephone subscriber |
US20060265325A1 (en) * | 2003-12-18 | 2006-11-23 | Fajardo Alfredo C | System and method for facilitating payment via a communications network using value accredited to a customer of the communications network |
US7500108B2 (en) * | 2004-03-01 | 2009-03-03 | Microsoft Corporation | Metered execution of code |
US20050249214A1 (en) * | 2004-05-07 | 2005-11-10 | Tao Peng | System and process for managing network traffic |
US20050273857A1 (en) * | 2004-06-07 | 2005-12-08 | Check Point Software Technologies, Inc. | System and Methodology for Intrusion Detection and Prevention |
US20060187901A1 (en) * | 2005-02-23 | 2006-08-24 | Lucent Technologies Inc. | Concurrent dual-state proxy server, method of providing a proxy and SIP network employing the same |
US20080147837A1 (en) * | 2005-02-24 | 2008-06-19 | Amit Klein | System and Method for Detecting and Mitigating Dns Spoofing Trojans |
US20060224681A1 (en) * | 2005-03-29 | 2006-10-05 | Wurster Charles S | Mobile communications device e-mail message delivery |
US20060239190A1 (en) * | 2005-04-25 | 2006-10-26 | Matsushita Electric Industrial Co., Ltd. | Policy-based device/service discovery and dissemination of device profile and capability information for P2P networking |
US20060253597A1 (en) * | 2005-05-05 | 2006-11-09 | Mujica Technologies Inc. | E-mail system |
US20070005716A1 (en) * | 2005-07-01 | 2007-01-04 | Levasseur Thierry | Electronic mail system with pre-message-retrieval display of message metadata |
US20090012878A1 (en) * | 2005-08-09 | 2009-01-08 | Tedesco Daniel E | Apparatus, Systems and Methods for Facilitating Commerce |
US7840206B2 (en) * | 2005-10-05 | 2010-11-23 | Canon Kabushiki Kaisha | Wireless communication system and authentication method and communication control method in wireless communication system |
US20070106734A1 (en) * | 2005-11-10 | 2007-05-10 | Motorola, Inc. | Incentive driven subscriber assisted spam reduction |
US20070180039A1 (en) * | 2006-02-01 | 2007-08-02 | David Sutidze | Anonymous disposable email addressing system and method of use thereo |
US20070289002A1 (en) * | 2006-06-09 | 2007-12-13 | Van Der Horst Timothy | Multi-channel user authentication apparatus system and method |
US20080107101A1 (en) * | 2006-11-02 | 2008-05-08 | Mitac Technology Corp. | Multi-dialing-number VOIP phone call connection method |
US20080137828A1 (en) * | 2006-12-12 | 2008-06-12 | Mazen Chmaytelli | Systems and methods for caller identification customization and remote management of communication devices |
US20080195515A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Combined payment and communication service method and system |
US20080196093A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for reducing the proliferation of electronic messages |
US20080196092A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for reducing the proliferation of electronic messages |
US20080194234A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | System and method of establishing a telephone connection |
US20080195713A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for transmitting an electronic message |
US20080196094A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for restricting access to an electronic message system |
US20070124226A1 (en) * | 2007-02-08 | 2007-05-31 | Global Personals, Llc | Method for Verifying Data in a Dating Service, Dating-Service Database including Verified Member Data, and Method for Prioritizing Search Results Including Verified Data, and Methods for Verifying Data |
US20090171821A1 (en) * | 2007-08-07 | 2009-07-02 | Dennis Denker | Systems and methods for providing resource allocation in a networked environment |
US20090158403A1 (en) * | 2007-12-14 | 2009-06-18 | Dirk Leonard Benschop | Method and system for permitting or denying service |
US20090178117A1 (en) * | 2008-01-03 | 2009-07-09 | Dlb Finance & Consultancy B.V. | System and method of retrieving a service contact identifier |
US20090187666A1 (en) * | 2008-01-17 | 2009-07-23 | Dlb Finance & Consultancy B.V. | Method and system for controlling a computer application program |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080194234A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | System and method of establishing a telephone connection |
US20080196092A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for reducing the proliferation of electronic messages |
US20080196093A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for reducing the proliferation of electronic messages |
US20080196094A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for restricting access to an electronic message system |
US20080195713A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for transmitting an electronic message |
US8443424B2 (en) | 2007-02-08 | 2013-05-14 | Scipioo Holding B.V. | Method and system for reducing the proliferation of electronic messages |
US20090158403A1 (en) * | 2007-12-14 | 2009-06-18 | Dirk Leonard Benschop | Method and system for permitting or denying service |
US20090178117A1 (en) * | 2008-01-03 | 2009-07-09 | Dlb Finance & Consultancy B.V. | System and method of retrieving a service contact identifier |
US8239921B2 (en) | 2008-01-03 | 2012-08-07 | Dlb Finance & Consultancy B.V. | System and method of retrieving a service contact identifier |
US20090187666A1 (en) * | 2008-01-17 | 2009-07-23 | Dlb Finance & Consultancy B.V. | Method and system for controlling a computer application program |
US8463921B2 (en) | 2008-01-17 | 2013-06-11 | Scipioo Holding B.V. | Method and system for controlling a computer application program |
Also Published As
Publication number | Publication date |
---|---|
AR064054A1 (en) | 2009-03-11 |
US20080194234A1 (en) | 2008-08-14 |
AR064057A1 (en) | 2009-03-11 |
US20080196092A1 (en) | 2008-08-14 |
EP1956541A1 (en) | 2008-08-13 |
AR064580A1 (en) | 2009-04-08 |
AR064056A1 (en) | 2009-03-11 |
US20080196093A1 (en) | 2008-08-14 |
US20080195515A1 (en) | 2008-08-14 |
AR064058A1 (en) | 2009-03-11 |
AR064053A1 (en) | 2009-03-11 |
US20080196094A1 (en) | 2008-08-14 |
US20080195713A1 (en) | 2008-08-14 |
AR064055A1 (en) | 2009-03-11 |
US8443424B2 (en) | 2013-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080192918A1 (en) | Method and system for establishing a telephone connection | |
EP1956817A1 (en) | Method and system for establishing a telephone connection | |
US11689656B2 (en) | Computing device and system for rendering contact information that is retrieved from a network service | |
EP1989868B1 (en) | Secure voice communication channel for confidential messaging | |
US20220255949A1 (en) | Method of verification | |
US8416933B2 (en) | Trusted environment for communication between parties | |
US8457290B2 (en) | Method, apparatus, and computer program products for providing dynamic replacement communication identification service | |
US20110211682A1 (en) | Telephony fraud prevention | |
CA2739187A1 (en) | Systems and methods of initiating a call | |
JP2009528626A (en) | Instant messaging control | |
US9025740B2 (en) | Method and system for improved communication security | |
EP2761847B1 (en) | Method and system for managing the communication between two users | |
US20090129293A1 (en) | Recording a circuit switched call using an ip based control interface | |
US9294520B2 (en) | Entitlement for call routing and denial | |
KR20100082651A (en) | System and apparatus for providing message service | |
JPH10145355A (en) | Caller information notification method and incoming control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DLB FINANCE & CONSULTANCY B.V., NETHERLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENSCHOP, DIRK LEONARD;BENSCHOP, HENDERIK REINOUT;REEL/FRAME:020474/0501 Effective date: 20080201 Owner name: HITD INFORMATION TECHNOLOGY B.V., NETHERLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENSCHOP, DIRK LEONARD;BENSCHOP, HENDERIK REINOUT;REEL/FRAME:020474/0501 Effective date: 20080201 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |