CA2371135A1 - Method for establishing a connection in a telecommunications network - Google Patents

Method for establishing a connection in a telecommunications network Download PDF

Info

Publication number
CA2371135A1
CA2371135A1 CA 2371135 CA2371135A CA2371135A1 CA 2371135 A1 CA2371135 A1 CA 2371135A1 CA 2371135 CA2371135 CA 2371135 CA 2371135 A CA2371135 A CA 2371135A CA 2371135 A1 CA2371135 A1 CA 2371135A1
Authority
CA
Canada
Prior art keywords
identifier
subscriber
recited
anonymous
anonymous identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2371135
Other languages
French (fr)
Inventor
Ulrich Bittroff
Laetitia De Cambray
Uwe Herzog
Christof Lorang
Carla Capellmann
Heiko Dassow
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deutsche Telekom AG
Original Assignee
Deutsche Telekom Ag
Ulrich Bittroff
Laetitia De Cambray
Uwe Herzog
Christof Lorang
Carla Capellmann
Heiko Dassow
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to DE19921838 priority Critical
Priority to DE19921838.2 priority
Priority to DE2000107385 priority patent/DE10007385A1/en
Priority to DE10007385.9 priority
Application filed by Deutsche Telekom Ag, Ulrich Bittroff, Laetitia De Cambray, Uwe Herzog, Christof Lorang, Carla Capellmann, Heiko Dassow filed Critical Deutsche Telekom Ag
Priority to PCT/EP2000/004071 priority patent/WO2000069182A2/en
Publication of CA2371135A1 publication Critical patent/CA2371135A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking

Abstract

The invention relates to a method for establishing a connection from an initiating subscriber to a designated subscriber in a telecommunications network without providing the respective initiating subscriber with the permanent identifier of the designated subscriber. The invention provides that an anonymous identifier is assigned by a confidence instance (S, C) to the permanent identifier of the designated subscriber (B). In order to establish the connection via the initiating subscriber while using the anonymous identifier of the active home exchange (V), the utilized identifier is indicated as an anonymous identifier and is routed to the confidence instance (S, C). The confidence instance (S, C) determines the assigned permanent identifier from the routed anonymous identifier and transmits it to the home exchange (V). The home exchange (V) proceeds to establish the connection to the designated subscriber (B) while using the transmitted permanent identifier. An embodiment of the method also serves to transmit an anonymous identifier for a future return call to a called subscriber.

Description

OCR. ~1. 2001 12.17PM DDK N0. 92E4~r. 4 [320.1005]
MfiTHOD h'OR ESTABLISHTNCr A CONNECTION IN A TELECOM~M.UNICA,TIONS
NETWORK
[0001] The pl~sCnt invention relates to a method for cstablishitig~ a connection from an initiating Subscriber to a da~tirration subscriber in a tclecummunications network without the respeotiwc initiating sub8crlber knowing the portnanant idcutif3er of the destination subscriber.

[0002) A rcqucsl for a call inevitably involves the disclosure of one's own telephone number. Itr the ca8e of nev~rspaper advertisements, a way out presents itself mostly via a box number whicL, however, prevents an imrxiediate conta~;t of the interested party with the advertiser, resulting in delays. Moreover, the intcrestGd party then lies to express himsclflhcrsclf in writing. However, if the telephone cumber is indicated in a newapapcr ndvcrtiscmcut, then it is mostly possible to identity IIrG owner of thre telephone nuinbcr via electronic data bases which allow a nuxnbor search, ncsul~titag in the possibility of abuse.
Thus, foi in5taziCe, a public offer of telling a precious object may attract burglars. The possibility of publishing an adverbisEnnent under a box number has to be eompletoly ruled out for some puLlic;ations :e~uh as in the case ofpiii rwalls W ith private axmouneements in stores or schools.

[0003] ThdrefOre, the object of the prc'cnt inverrtivn 18 to oprt~ to a subscriber of a tclcconuuuuications network the possibility of being called without the cailar knowiur~ his/her telephone number, hereinafter else referred to as perrxlanent identifier.
[0004 This objective is xhioved according lu the present invention in that an anonymous identifier is assikued to the permanent identifier of the dcstirrxlion subscriber by a confidence instance, in that, for e~tablxshiz~ the eonncctiorr via the initiating subscriber while using the anonymous identifier, the utilized identifts~r is recognj~P.d by the particular active Switching center as an anonymous identifier and routed t0 the ennfidenee instanec, in that. the confidence instance Qctennines the assigned permnncnt idarrtiliar 8'om the OCT, fl 1, 2001 12:1 flPM DDK ~ ° ~ N0. 9264_x. 5_ t~iu. ~ ~ns~
rocoiw:d anonymous i~irntif~er and tranoamits it to the switching center, iii that the switching center prooeeds to establish the connection to the destination subscriber while using the transmitted pormancnt iaaxitifier.
[OOOSj Althaugh a first field of application of iLd method according to the present invanliun is tslophuny, the use in other telaeomnnunicatialis networks, in particular data. izctworks, is not to be excluded.
[OOOG) An advantsigeous embodiment of the iuclhod acenxdiug to the present inve~iliurt causists in that thp coafidenoe instanco is cuuslituted by a code server ixi coixjunction with a sci-vicd control fimetiori of the teleeomrriunications network which is at loast partially dr~igned as an intelligent netwvork, and in chat the routing of the anonymous idcnti~rr &om.
tltc ~witehing center and the tronaixiission of the permanent id«itifier to the awitchiiig center taka place via a. service twitching function of the inteliigrnt ~ietwork.
[0007[ To limit the stock of numbers W rich has to he kept ready for the anonyiuuus idtmtifer, it is provided according to a rofinement to de~Gte fihe anonymous identifier at a predetermined time after the sssigiuiioiit. In a practical application of the nnetl~v~1 aceozding lu the present invention, the prodctcri>ziuCd time will hp established in accordaitcG with the pcriud of tirrxe within which the destination subscribcsr will still expect calls afixr his/her publication, fnx example, the advertisalu~at, such aq, for example, one or two wac;ks. ~7ue tn this time limitation of the smonymous idculafier, moreover, an izisignificant iiitcrest in an unauthori~Fd intrusion into the conf dr~cice instance is to be expectod no that siuiple projective iueasures arF sui~cient, if indicated.
[0008] In the method aeoording to tam present lnvPtttiori, moreover, provision can be made for the annriymous idaiitificr to be dGletable by an input of the destination subscriber. 1n tkzis mantaet, it is possible, for example, to prevent the destination subaczib~
fi~oui rc~cciving f~ucther calls concerning an advcitiacxi object after it has been sold. The delrtion of the code can bo indicated to further callers by an approrriatc spoken meosage.
l OCT. ~1. 2001 12.10~M DDK ----N0. 9264__x. 6. _ [~ZU.1005]
[0009] Anotlicr berte$eial e~mbodirtxent of the prcseirt invention cnrtisists in that a pcrn~aueut idantif~cr eau be assigned only one anonymous identi$er at s time. In this mcmncr, an abusive extension of the assignment of anonymous idcnti$em is prevented.
(0010] Zn au expedient embodiment of the prescitt invention, pmvision is made for an authorizatiau ckteck tn k~e carried out before tli~s con$dence inst2ince assigns the anonyr~iuus idcntifior. This check can prevent, for oxampld, au uuauthori~ed person from gcneratity an anonymous identi$er fir a call cumber.
[0011 j Moreover, provtsiou can be made for the conflder~ce instance to output erivr messages whets ate aaaa~ment is not possible. Such error messages can says - au anonymous identifier already c~;ists fur the entered call number, the entered call aunaber was not co~rcca, the request crn~ld riot be csuricd out due to a System error.
[0012) According tn an advantageous ombwliment of thA present in~rentior~, a user-friendly asaigruiieut of the anonymous zdentificr eau be effected in that the request for the assignment of the a~ruuymous ide~ntif~er and the commutuccttiori thereoftake place over the iiilernet.
Consoquenlly, the user can be advantageously guided ma suitable graphical usrr interfaces, infomualion and entries coruplemcntiz~tg ouc another in 2n expedient naanncr.
[0013) Further ways to request the assi~nmetlt of they anonymouo identifier and to conLtiunicate it to the destination subsct~ibcx are, in the 1SDN', preferably via the D-channel or, in the case t~f other digital subscriber lines via suitable channels, in analuk and alas digital r~ctwurks via the rrxultifrequsr~oy mcfihod, by short messages (SMS), electrons mail (F-mail), and via voice input and output. Dcpetiding on the individual aonditio~ns, ii is also posaihle to use mixed forms such as requesting by means of transmission via the naultifrequency method and communication via voico output, which allows the use of a. sintplc telcph011e with arl a~~alug subscrihex line.

OCT, ~I, 2001 12;10PM DDK ~ ---~-~ _N0. 9264_~P~

[520.1005) [0014] When using the ax~thod according to ihn present invention for the applicatiotrs mcntiutted at the outset, the method is prcfetdbly designed m such a manner that tlia asStgillllCttt is requested by an input of the daslirtdtiori suhcrxiber. It is then coraplctaly up to the dcstiuttlion subscriber whether hc/ahc wants to use an anonyncious identifier, hereinafter also referred tv ac code.
[00x31 Tn modern telephone networl,;s, tltc call tlumher of the calliztg subscriber is autonxatically transnxitted to the called subscriber. Fur legal provisions on dais becuzity and privacy, a Calling subscriber has the possibility of suppressing the ttxnsmisaioix of his/her own call number to the called subscriber. l3ccause of thi s, the called subscriber will later not he able ~o call back the caller unlo~s hcJslxc knows the call number of the caller anyway.
[0016) In sonxe cases, however, it cart be desirable tbr both subscribers tlxdt such a retittn cuttnection can he established on request of the called subscriber without the calling subscriber disclosing his/her call nutubcr.
[0017J A .ft~rther embodimcrtt of ittG present invention makes this possible in that then request fvr the asaigrtment botween the atxuttytnous and the permanent idcntifieta lakes place during the dialing of z pertnnnent identifier of a later initiating subscriber by lltcs destination subscriber, and in that the anonymous identifier is transnnitted to the lat~sr initiating subscriber. ''This procedure enn be started by the destirxation subacribar by enterfng an appxopri atc~ prefix.
[0018] The return eontaacction is then preferably established in that the anonymous identifier is eonvertc~d by the confidence iltstanee into the pe~tnatnent identifier of the destination subscriber upon request of the initiating suhscsiber, and in that the tctum connection to tire destination subscriber is cgtablisLad using the permanent identifier.
[0019) 'this e~tnbodimc~nt of the present invention allows a subSCribCr IO
receive return etilts d OCT.31.2001 12:18PM DDK --. N0.9264.~P. 8 ($20.1 tltrl]
wlvlc keeping his/her anonynuty. For imstaxice, in the case rrfrsyehologieal counseling telephone serviocs, the itec:rssiry cart atioe to prowidc r:rrtnpreher~sive, qualified counsel by way of a returxa call wittumt having to xemove the armnyrnity of tlto caller.
Arun.her application case c:an be the query of a data haw. Irr spite ofthe tclcphorric:
transmission of the query results by means of a return call, no ccmclusions about the inqui ri ng person are possible.
[OOZOj In n refincrrtent crf ne present inveu~tior~, prevision is made tbr the destirrH~ian subscriber to be ialforme~.ci of this tact by a perceiv~ahle sigaaling rwhan a rotor rr c:all is established usip ~.'fxe antonymous idcntifioc. Ti. is then posexble for the dcvinarion subscriber to adapt lii~fher behavior, in particular, to a<:cept or reject the return call.
[0021] In a further rcfuic«rant ofthis specific cmbodiurcnt, a return call between the initiating subsetibor and ~.he destination subscriber varx also be aohievcd.
in that a. c:onrtection requested by flat icri~i.rting subscriber is automdl.ir:ally established from the degtitlation subscriber upon ccrmpletiozt of the si~czaliiig after the destination subscriherr has confirmed that a conna:~.ion is to be e3tablishcd, LhH connection beizy autoirrnLically effected from the destination subscriber to the initiatirr~ subscriber.
[(1022] '!he conversion of ~hc ponnanent identifier crf the destination subscriU~sr iuto the anonymous idcnti f rr can be effected in that ihrs permaxxent identifier is i.rsrnsmitted to a code server linked to the network, in that the codh server converts the pcrrnsnent identifier into a test ar~onyrnr~us identifier arid stores the anonymou, identifier firr the period of validity thcrerrf with the perxnrutont idcrrlilier being assigned thereto, aruJ in that the node acrvcr outgun the anonymous identilicr which is transmitted to the initiating subscriber.
[0023] '1'hc oo>zvomirrn of the anonymous idcni.i:0er of the doatination suhacxtber into the permancrat idcm.ifier for the purpose of the return ca]] case, be effeclxd in that the anony;nous identifier is lrrnstztitted to the code serve, and iu that the code ~c:rver, by way of the atorGrl assigrrrnents, retrieves and outJms the permanent idcntifrcr.
S

OCT, 31. 2001 12:10PM DDK h0. 9264"-.~. 9 (520.1005]
[0024] The ostaLlishment of an anoxiyirious connev;tion between tho destination subscriber and a oallcd initiating subscriber can be carriod trot in that the identi$er of the dcstiiiation subscribor is motel to a servftc.e control function by an appmpriate switohing center, in that the aervieo control #linetinn obtains an aaon~riuous identifier teorti a code server while indicating the i~lCntifier of the destination subscriber, in that the code setvcr converl~ the identifier into a free anonymous identifier an s stores the anonymous identi$cr fvr the period of validity the~GUf with the permanent identifier bCing assignAd thereto and outputs the anonymous idciztilier to the cexvice control furictiou" in that the service eontml ftuicliort routoa the anonymous identifier to the switching centex,and iii that the switohing center establishes the co~aneCtfon with the called initiating subscriber while indicating lliC
anonymous adatltiflcT.
[002S] To allow the code server to bo idcntifiedr another refinezri~nt of the piasnnt invention makes provia~ion ibr an idP.ntifier which identifies the code server to be added for the ano,nyn~ous iQentlfier.
[0026] Tho cslablighment of a connection-back betwPGn the initiating subscriber and the destination subscriber sari be carried out in that the anonymous identifier of iha destination subscriber is routed rn a service contml fuiictiora by an appropriate switcliiux center of the network, iu that the service control fixnctiou obtains the permaTion~t idontifiat of the deatinatioi~ subscrfber from the appropriate wde server while indiaatirig tits anonymous idcntifiei, in that the service control function routes this identifier to the switching center, and in. that the switching cexiter ertablishcs the uunnectinti with the dostinYatiou subsCrlber.
[002~J Tlie method according to the present in'venti~n can advaritagcously bo used in such a marina' drat the teleaommunicationa network is a eircuit.switehed network for voice or data transrnissiun, and that the identifiers arc tclephono numbers. In this comirn:lion, preferably, prowisiun is made for the anonymous t~slaphone number to include a dialing pieBx for dialing up the wnfidence instance.
1i OCT. ~1. 2001 12.19PM DDK - N0. 9264.~.~. 10_ X520.11105]
[0028) Other apNlications can consist in that the tclecutnmunieations network is a network ~or trnnsmittil~ data of any .kind, including vidw attd audio data and/or textual massaKas and in that the identi~crs era user addressee of dais network.
[00Z9] Bxculplary embodiments of the present uivention are depicted in tho dravwing with reference to several Figures and will be cxplaiucQ in greater detail in the following deocriptiou.
[0030) Fig. 1 shows a ~chematie roprcsentatiott of a first erabodiment of the presdtu invezttion, Pig. 2 depic2S a. flow chart on the assigtrment of thes finonyrtious identifier iti accorrianco with the method au;ording t~ the present invention, Fik. 3 repree~ts a flew chart on tltG astablisbment of a eonrreatYOn in accordance with the method according to ttte present invention, Fig. ~ shown a schematic roprcacutaliun t0111uqtr~te a second embodiment of the precept invention, Fik. 5 is a flow chart on the cstablislunent of a. forward connection, Fig. 5 shows a. xlovcr chart on the ostablishment of a return cormcctio4l ac:cordfng tc~
the second exnbodimcnt, and FYg. 7 depicts a flow chart ort tho c;ummunication in an eleatxonic news system in aeenrdanee with the metliod accol'ding tn the present invcrttiou.
[0031) Itt the Figures, id~ntieal pacts are provided with the same refcro~ucG
symbols.

OCT. 71. 2001 12.19PM DDK -"'-.~~ N0, 9264-~, 11 ._ [520.1005]
[0032] Fig. 1 shows an intelligent network 1, for example a digital network with a digital subscriber lint, of which are represented xn individual switching cGillc~r V' having a switching unuit 2, a subacubm line group 3, and a service switching function 4 (wnfotxtling to TI't.l_T
Q.1211) for coupling the intetligtnt network to the distributed switched network as weal as a service control function S and a code server C which is conistitutr.~l by a computer which carries out the couver~slon ofthe~ anonymous identifies into pa~unanent identifiers and vice versa and ~uvhiel~ stores the assignments of the identifiers to the subsc.7cibers in a data base. To the example, two subscriber lines A and B are linked to the same switching center V'.
N'umcrous switchi~rtg centers exist in the network. ~ the event tlu~t lWO
subscribers to be conracctod are xiut linked t0 the carne switching oentex, the proce~bars deserlhe~i in the following take place analegnnsly.
[0033] Murcvver, user'tJ ~t'subscriber line B possesses a lcxnZinal T, for exarinple a computer, wvlrich has access to tk~e Internet and which permits a dale exchange with, service control fiuiciaon S of intelligent network 1, possibly via furihur components wtueh are not shown (fur example SMF). Moreover, service switching function 4 is connected with service control fiuictiun S via an INAY interface.
[003~4~ Service control furtctiox~ S hey, access to code server C via an A rPl interface or via a logically equivalent e~m~munieatians protocol. Dccausa of this, x'eque.Sta c»ch as ''translatcCaller mQ" anti "translateCodeU" which basically means "translate the permanent idcutifitsr of the caller indicated in brackets" and "traalslale the anonymous identifier" oan b~
routed lu code server f:.
[0035) For i~tat~ce, it' user U of subscriber liztc H wants to place a newspaper advertisement without thereby rublishing hislhar telephone nuuiber in connection with the advertised oUjecl, heJshe can rerluest the assignment of an auouymvus identifier via teaxniaal T and the Zuterztet which i9 not shown. For this purpose, hel'hG is prcwided by servic~
control function S or an interposed eornpoaent with an iiyu~ mask via which he/she enters his/her own call OCT, 31. 2001 12.19PM DDK ~~ -N0, 9264--'~, 12-~s2o. ~ en5~
number and tliG request to be pmvidod with an anonymous identifier. Sorvicc control function F foA wards this request to the cn~le server. Provided that so code has been stored yet for flue sub~cniber lfne B and that n~ other reasons exist for xofu3ing an anonymous idcutifier.
such an auouyuiuus identifier is generatESet and eo~mmuaicated to uoor U via hislhcr tcrniiual T. The user can thou malts the ettde known in the newspaper ndvertiecxncnt or another publication.
[003G] Fur instance, if the user of suhscriber Tins A wants to get iatv contact with the advertiser, he/she dials the code indicated ire the advertisement. The code iaoludcs a diuliug prefix (for example 015 I) fmrn which switchixtg center V (Fig. 1) recognizes tlral this is an anoityiuuus identifier. Therefnrn., srarvice switchi~ function 4 inquires of code smvGr C via service control ~.cnction S which permanent ideaitifier is assigrtcd to this anonymuus identifier and receives in response the perrt~anent identifier ~cwhich iE then routed to the switclury unit fur establishullg the connecaion to subscriber line B.
(0037] Fig. 2 shows the procedure for assigning an onor~ymous adcntifim.
Tuitia,Ily, request AhT far an anonymous identttier is transmitted from teimirral T to sczvice coulrul function S
vu~Iuch returns a mask tQ the terminal into which user U enters his/lier Nanuenent sub6criber number PCB (that is the call number of subscriber line B). The aubscribci number reaches wde server C: via. RArvice control function S, the eodc server gcneratiy tm axtonym0us subscriber number A~K ii of subscriber line B and returning it to tcnn~aal T
vid S.
(0038] Fig. 3 depicts the establishment of a oonacction fmm subsvribrr A to subscriber B
with the assistance ~f anonymous identifier AKB. To this end, the auuuynvus identifier AKB is initial 1y dialed by subscriber ~1, and thus routed tv switvluug center V which, after recognizing that this is an anonyx~.oue identifier, queries fihc perrttaumt identifier from code server C;, aq desscribed above. Subsequently, the conrr,oction establishment is completed cn that the call reaches sabseribor lire B.
[OO:i9~ The cot~figuratxvn shown is Fig. 4 is similar Lu ttia.t according to Fig. I ; hnvve:ver, ~NO. 9264-~. 1 ~
OCT. 71. 2001 12;19PM DDK

[52~.1UU$]
subscriber B not 11C1I1~, allocated a separate terminal. .A. configuration o~that kind can, on one hand, be used to rcquesl lhc assignment of the anonym~nc identifier aver' the telephone of subscriber B via auiLable data transmission tyPea so that subscriber B can make lonown a code, similarly as ui Fi,g. 1. On the other hand, the cnntigtuation according to Fig. 4 can also ba used to anonynize ilic idcrrtifier of suhscrih~r T3 for cextam conversations, which will be explained in. the fulluwixxg with reference to Figurns 5 and 6.
[0040] Wlxeu ~lcslanation subscriber B calls later the initiating subscriber A, th~n the connection requGyt of ddstination subscriber F3 is transmitted (Hl) to connected svvitchiag center V via tl'ie layer 3 protocol DSc I of the 15DN network as shown in Fig.
5. 'lo activate the code service, destinati0ri subscriber'fi rlaces a prefix (for example 0150) before the call nuiuLcr of initiating subscriber A. Thereupon, at H3, s<witehing center V
aenda a request to service cvtitrul function S 'via service switching fimction 4 under the INAP
protocol. The dialed call number of initiating suhscrihAr A is partially input along with the request at ZI2 as an arguntGUt. Then, at H3, additional digits of Initiating subscriber A are requested suvscy,utx~tly. At H4. the quantity of subsequently requested digits io traasmuittod. The call uutuvcr routed by destination suhacriber 13 at H4 aria switc)ning center V at HS is uacd at II6 by tire scrvice~ control function to request an anonymous identifier from code server C, the a~xuuytaous identifier being transmitted to service control function S at H7 and, at IIB, fuially to the swilctung center rwhieh, rat Ii9, establishes a connection to initiating subscriber A wlailc t<a~xautilting the anoDymous identifier of destination subscriber H.
[0041] As shown in Fig. c;, atesps kl through R9 are carried out cortospondingly if iutiatuy subscriber A requests a return connection to subscribar B who is unknown to himlhcr with We aid of the anonymous identifier and of a preceding dialing prof~~c (for example 0151). At R6, service control flanetion S requests the ananymous identifier to be translated back into tire identifier of destination suhsrnber B. Code server C delivers the identifier of dcstittatiutr subscriber B from its data ha.Re, and the connection can be established at IZ9.
[0042] Fig. 7 shows how a destination sub3eribcr B mutes a rcqueal lo a code sclver C at l0 ocT. ~1. 2001 12:19PM DDK - No. 9264'-~. 14 [520.1003]
N1. Cods server C converts ilic iQcnlafier of destination subscriher H iuato an. aaonymouc identifier and, at N2, routes flat ir~ucsl, together With the at~onymrn~s identifier, to news sc~nrcr N of the news syslGiti requested by destination suhcerih~.r 13 where it is published. Aa initiating subscriber A wlm lu~~ vn to the system at N3 reads the re~tiest of destination subscriber B at N4. Tf initiating suvsuribrr A wants to reply rhe3rAco, then heJshe, while indicating the anonymous idautifirr of destination subscriber H, ~entis hislher aaswer to coda server C at N5 which routes it tv ~lcsliztation subseriher R at Nti.

Claims (28)

1. A method for establishing a connection from an initiating subscriber to a destination subscriber in a telecommunications network without the respective initiating subscriber knowing permanent identifier of the destination subscriber, wherein - an anonymous identifier is assigned to the permanent identifier of the destination subscriber (B) by a confidence instance (S, C), - for establishing the connection via the initiating subscriber while using the anonymous identifier, the utilized identifier is recognized by the particular active switching center (V) as an anonymous identifier and routed to the confidence instance (S, C), - the confidence instance (S, C) determines the assigned permanent identifier from the received anonymous identifier and transmits it to the switching center (V), - the switching center (V) proceeds to establish the connection to the destination subscriber (B) while using the transmitted permanent identifier.
2. The method as recited in Claim 1;
wherein the confidence instance is constituted by a code server (C) in conjunction with a service control function (S) of the telecommnunications network which is at least partially designed as an intelligent network (1), and the routing of the anonymous identifier from the switching center (V) and the transmission of the permanent identifier to the switching center (V) take place via a service switching function of the intelligent network (1).
3. The method as recited in Claim 1;
wherein the anonymous identifier is deleted at a predetermined time after the assignment.
4. The method as recited in one of the preceding Claims, wherein the anonymous identifier can be deleted by an input of the destination subscriber.
5. The method as recited in one of the preceding Claims, wherein a permanent identifier can be assigned only one anonymous identifier at a time.
6. The method as recited in Claim 5:
wherein an authorization check is carried out before the confidence instance assigns the anonymous identifier.
7. The method as recited in one of the Claims 5 or 6, wherein error messages are output by the confidence instance when an assignment is not possible.
8. The method as recited in one of the preceding Claims, wherein the request for the assignment of the anonymous identifier and the communicaiton thereof take place over the Internet.
9. The method in one of the Claims 1 through 7, wherein the request for the assignment of the anonymous identifier and/or the communication thereof take(s) place via data transmission from the destination subscriber via a digital connection.
10. The method as recited in Claim 9;
wherein the digital connection is constituted by the D channel of the ISDN.
11. The method as recited in one of the Claims 1 through 7, wherein the request for the assignment of the anonymous identifier and/or the communication thereof take(s) place via data transmission from the destination subscriber by means of the multifrequency method.
12. The method as recited in one of the Claims 1 through 7, wherein the request for the assignment of the anonymous identifier and/or the communication thereof take(s) place via data transmission in the form of short messages (SMS).
13. The method as recited in one of the Claims 1 through 7, wherein the request for the assignment of the anonymous identifier and/or the communication thereof take(s) place via data transmission in the form of electronic mail (E-Mail).
14. The method as recited in one of the Claims 1 through 7, wherein the request for the assignment of the anonymous identifier and/or the communication thereof take(s) place via voice input and voice output.
15. The method as recited in one of the preceding Claims, wherein the assignment is requested by an input of the destination subscriber.
16. The method as recited in one of the Claims 1 or 2, wherein the request for the assignment between the anonymous and the permanent identifiers takes place during the dialing of a permanent identification of a later initiating subscriber by the destination subscriber, and the anonymous identifier is transmitted to the later initiating subscriber.
17. The method as recited in Claim 16 for establishing a return connection after the termination of a connection to the initiating subscriber started by the destination subscriber, wherein the anonymous identifier is converted by the confidence instance (8, C) into the permanent identifier of the destination subscriber (R) on request (R1) of the initiating subscribes, and the return connection to the destination subscriber (B) is established (R9) while using the permanent identifier.
18. The method as recited in Claim 17.
wherein the anonymous identifier assigned to the destination subscriber (B) is generated anew for each connection establishment to a later initiating subscriber.
19. The method as recited in one of the preceding Claims, wherein when a return call is established using the anonymous identifier, the destination subscriber (B) is informed of this fact by a perceivable signaling.
20. The method as recited in Claim 19, wherein a connection requested by the initiating subscriber (A) is automatically established from the destination subscriber (h) upon completion of the signaling after the destination subscriber has confirmed that a connection is to be established, the connection being automatically effected from the destination subscriber (B) to the initiating subscriber (A).
21. The method as recited in one of the Claims 17 through 20, wherein the permanent identifier is transmitted (H6) to a code server (C) linked to the network, the code server (C) converts the permanent identifier into a free anonymous identifier and stores the anonymous identifier for the period of validity thereof with the permanent identifier being assigned thereto, and the code server outputs (H7) the anonymous identifier which is transmitted to the initiating subscriber.
22. The method as recited in Claim 21, wherein the anonymous identifier is transmitted (R6) to the code server (C), and the code server (C), by the way of the stored assignments, retrieves and outputs (R7)~

the permanent identifier.
23. The method as recited in Claim 17, wherein the permanent identifier of the destination subscriber (B) is routed to a service control function (S) by the switching center (V) of the telecommunications network (1);
the service control function (S) obtains (H6) an anonymous identifier from a code server (C) while indicating the identifier of the destination subscriber (B);
the code server (C) converts the identifier into a free anonymous identifier and stores the anonymous identifier for the period of validity thereof with the permanent identifier being assigned thereto and outputs the anonymous identifier to the service control function;
the service control function (S) routes the anonymous identifier to the switching center (V);
and the switching center (V) establishes the connection with the called initiating subscriber (A) while indicating (H9) the anonymous identifier.
24. The method as recited in Claim 23, wherein an identifier which identifies the code server is added to the anonymous identifier.
25. The method as recited in ore of the Claims 23 or 24, wherein for a return call, the anonymous identifier of the destination subscriber (B) is routed to a service control function (S) by an appropriate switching center (V) of the network (1), the service control function (S) obtains (R6) the permanent identifier of the destination subscriber (B) from the appropriate code server (C) while indicating the anonymous identifier, the service control function (S) routes this identifier to the switching center (V);
and the switching center (V) establishes (R9) the connection with the destination subscriber (B).
26. The method as recited in one of the preceding Claims, wherein the telecommunications network (1) is a circuit-switched network for voice or data transmission, and the identifiers are telephone numbers.
27. The method as recited in one of the preceding Claims, wherein the anonymous telephone number includes a dialing prefix for dialing up the confidence instance (S, C).
28. The method as recited in one of the Claims 1 through 25, wherein the telecommunications network is a network for transmitting data of any kind including video and audio data and/or textual messages and the identifiers are user addresses of this network.
CA 2371135 1999-05-11 2000-05-06 Method for establishing a connection in a telecommunications network Abandoned CA2371135A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
DE19921838 1999-05-11
DE19921838.2 1999-05-11
DE2000107385 DE10007385A1 (en) 1999-05-11 2000-02-18 Method for establishing a connection in a telecommunications network
DE10007385.9 2000-02-18
PCT/EP2000/004071 WO2000069182A2 (en) 1999-05-11 2000-05-06 Method for establishing a connection in a telecommunications network

Publications (1)

Publication Number Publication Date
CA2371135A1 true CA2371135A1 (en) 2000-11-16

Family

ID=26004403

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2371135 Abandoned CA2371135A1 (en) 1999-05-11 2000-05-06 Method for establishing a connection in a telecommunications network

Country Status (4)

Country Link
EP (1) EP1179265A2 (en)
JP (1) JP2002544725A (en)
CA (1) CA2371135A1 (en)
WO (1) WO2000069182A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7013132B2 (en) 2001-09-11 2006-03-14 T-Mobile Deutschland Gmbh Method for the provision and allocation of call numbers in a telecommunication network

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2844942B1 (en) * 2002-09-24 2004-11-26 Radiotelephone Sfr Process for producing, for an access provider, a multimedia insulating identifier
FR2844943B1 (en) * 2002-09-24 2005-01-14 Radiotelephone Sfr Method for producing a first identifier insulating a user connecting to a telematic network
GB2423220B (en) * 2005-02-11 2009-10-07 Ericsson Telefon Ab L M Method and apparatus for ensuring privacy in communications between parties

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4847890A (en) * 1987-08-10 1989-07-11 The Telephone Connection Anonymous interactive telephone system
US6064878A (en) * 1996-10-23 2000-05-16 At&T Corp. Method for separately permissioned communication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7013132B2 (en) 2001-09-11 2006-03-14 T-Mobile Deutschland Gmbh Method for the provision and allocation of call numbers in a telecommunication network

Also Published As

Publication number Publication date
WO2000069182A2 (en) 2000-11-16
JP2002544725A (en) 2002-12-24
EP1179265A2 (en) 2002-02-13
WO2000069182A3 (en) 2001-03-15

Similar Documents

Publication Publication Date Title
USRE45136E1 (en) Telephone status notification system
US8792479B2 (en) System and methods to route calls over a voice and data network
US7788333B2 (en) Systems and methods for providing critical information based on profile data
ES2206722T3 (en) Transfer method of a telephone call in an internet connection session.
EP1042922B1 (en) Method and system for completing a voice connection in a switched telephone network
US6292478B1 (en) Telecommunications system
US6411704B1 (en) System and method for providing telephony services to remote subscribers
EP1222807B1 (en) Method of and system for providing intelligent network control services in ip telephony
US7636430B2 (en) Toll-free call origination using an alphanumeric call initiator
US20140323103A1 (en) Caller-callee association of a plurality of networked devices with direct dial through thin client
JP3734498B2 (en) Remote communication follow-me service
US6879680B2 (en) Method of and system for extending internet telephony over virtual private network direct access lines
EP1085738B1 (en) Telephone calling card service system integrating virtual destination numbers
US6229883B1 (en) Apparatus for providing caller ID services in internet telephony system
US7283620B2 (en) Systems and methods for originating and sending a voice mail message to an instant messaging platform
US6122357A (en) Providing enhanced services through double SIV and personal dial tone
US6366576B1 (en) Method for routing calls from a terminal in a first telecommunication network to any terminal in an external telecommunication network
US5917817A (en) User invocation of services in public switched telephone network via parallel data networks
US7693135B2 (en) Methods and apparatus for transferring from a PSTN to a VOIP telephone network
US7933390B2 (en) Region-wide messaging system and methods including validation of transactions
CA2260723C (en) A method of resource management at computer controlled telephony hardware
US6038305A (en) Personal dial tone service with personalized caller ID
US6351464B1 (en) Virtual second line hybrid network communication system
US20140029738A1 (en) System and Method for Modifying Communication Information (MCI)
US7353293B2 (en) Method for making available features for alternative connections of primary connections

Legal Events

Date Code Title Description
FZDE Dead