CN103248619B - Communication privacy - Google Patents

Communication privacy Download PDF

Info

Publication number
CN103248619B
CN103248619B CN201310085280.6A CN201310085280A CN103248619B CN 103248619 B CN103248619 B CN 103248619B CN 201310085280 A CN201310085280 A CN 201310085280A CN 103248619 B CN103248619 B CN 103248619B
Authority
CN
China
Prior art keywords
user
terminal
packet
voip
communication system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310085280.6A
Other languages
Chinese (zh)
Other versions
CN103248619A (en
Inventor
N·巴雷特-博文
R·J·科尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1204687.6A external-priority patent/GB201204687D0/en
Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
Priority to CN201611036778.3A priority Critical patent/CN107104935B/en
Publication of CN103248619A publication Critical patent/CN103248619A/en
Application granted granted Critical
Publication of CN103248619B publication Critical patent/CN103248619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to communication privacy.A kind of device, including: it is coupled to one or more terminals of packet-based network, this terminal is mounted with the first example of the communication customer end application of first user and the second example of the communication customer end application of this first user, and the application of this communication customer end is configured to enable first user utilize the first communication system realized on a packet-based network to come and other telex networks upon being performed.This device includes being coupled to packet-based network-based control device, the single privacy settings of each maintenance that this controller is arranged in the first and second examples, and therefore depend in the first and second examples which is movable, control first user relative to the privacy of other users in this first communication system.

Description

Communication privacy
Technical field
The present invention relates to secret protection, especially the secret protection in communication.
Background technology
Some communication systems allow the user of equipment (such as personal computer) across packet-based computer network Network (such as the Internet) communicates.These communication systems include voice-over ip (VoIP) system. These system of users are good, because they generally have than conventional fixing circuit or mobile network Notable lower cost.May be especially true for long haul communication.In order to use VoIP system, user Install on their device and perform client software.This client software provides VoIP to connect and all Such as other functions such as registration and certifications.Except voice communication, client may also provide other telecommunication medias, all Such as video call, instant message transrecieving (IM), SMS message transmitting-receiving, file transmission and voice mail.
A type of communication system for packet-based communication uses equity (P2P) topological structure. In order to enable the access to peer system, user must perform P2P software provider on their computers The P2P client software provided, and to P2P system registry to obtain digital certificate.Next call or it His communication can be established and route between the user of P2P system, and the most further uses the clothes in arranging Business device.Instead, client P2P from the computer of other-end user in P2P system Client software searches required IP address, and the P2P client of MPTY in the information of distribution Software exchanges certificate with the P2P client software of called party subsequently.
It is also possible to use and utilize centralized call to arrange and/or authorize the non-P2P system of (such as via server) System realizes VoIP or other packet-based communication.In this case, the computer of user is pacified Dress and the client performed are to access the application of server so that call signaling can be processed by server.? In some situation, compared with P2P topological structure, architecture based on server may be increasingly in accordance with needing Want.
No matter use which kind of architecture or topological structure, all exist these packet-based communication system collection Become (VoIP system to be such as integrated into social networking station to other partner communication systems or " partner's platform " Point) growing demand.But, although user may only see this as accessing VoIP communication etc. New user interface, but it practice, adapt to fellowship relates to making first floor system architecture be suitable to And many technological challenges.One such challenge is when the user library (user-base) of two systems to be closed And time guarantee appropriateness privacy.In general, packet-based communication within privacy in other situations also It is probably a problem.
Summary of the invention
According to one or more embodiments, it is provided that communicator, this communicator includes being coupled to based on dividing One or more terminals of the network (such as the Internet) of group.This device is mounted with the communication of first user First example of client application and the second example of the communication customer end application of this first user.Such as, Communication customer end can be VoIP client and/or IM client.Communication customer end application is configured to work as First user is enable to utilize the first communication system realized on a packet-based network when being performed, with Other telex networks.Communicator also includes controller, and this controller is coupled to packet-based network also The single privacy settings of each maintenance being arranged in the first and second examples of client.Such as, hidden Set up illegally to put and can determine that whether other users can contact with first user.As another example, privacy settings can be true Fixed which information about first user is that other users are obtainable.
Which in the first and second examples be controller therefore depend on is movable, controls first user phase For the privacy of other users in the first communication system.
There is provided present invention to introduce in simplified form and retouching the most further Some concepts stated.Present invention is not intended as identifying the key feature of claimed subject or necessary special Levy, be intended to be used to limit the scope of claimed subject.Theme required for protection is also not necessarily limited to solve The realization of any or all shortcoming certainly pointed out in background section.
Accompanying drawing is sketched
In order to be better understood from the present invention and illustrate how effectively to implement the present invention, as example, will ginseng Examine appended accompanying drawing, wherein:
Fig. 1 is schematically showing of packet-based network (such as the Internet);
Fig. 2 a is to be provided with web-client application and user terminal schematic of VoIP client application Block diagram;
Fig. 2 b is the schematic frame of the partner server of trustship social networking site and VoIP client application Figure;
Fig. 2 c is schematically showing of a part for the network of Fig. 1;
Fig. 3 is schematically showing of the VoIP client application user interface checked on the subscriber terminal;
Fig. 4 a is to apply showing of the buddy systems users interface checked by web client on the subscriber terminal Meaning property represents;
Fig. 4 b is to apply the buddy systems users interface checked again by web client on the subscriber terminal One expression;
Fig. 4 c is to apply the buddy systems users interface checked again by web client on the subscriber terminal One expression;
The schematic table of privacy settings control when Fig. 5 is to access via the user interface of VoIP client application Show.
Detailed description of the invention
Fig. 1 is the indicative icon of packet-based network (such as the Internet), this packet-based network Including the element of multiple interconnection, such as it is marked as those of 102,104,105 and 106.Each network Element intercouples with remaining element of the Internet 108, and is configured to by sending and receiving Internet protocol (IP) data of block form are transmitted data with other these elements on the internet.Each element also has There is the IP address being associated being located in the Internet.The element explicitly illustrated in Fig. 1 has: multiple End user terminal (end-user terminal) 102(A) arrive 102(E), the most desk-top or on knee PC or enable the mobile phone of the Internet;For realizing one or more VoIP of VoIP communication system Provider's server 104;One or more web servers 105;And it is connected to another type of network 109(such as arrives traditional PSTN (PSTN) or other circuit-switched networks and/or arrives Mobile cellular network) gateway 106.But, of course, now appreciated that than those explicit illustrate much more Element constitute the Internet.This is schematically shown in FIG by communication cloud 108, this communication cloud 108 will include many other-end user terminals, server and gateway and Internet Service Provider (ISP) router and the Internet backbone router.
Embodiments described here can realize in conjunction with any suitable hardware, software, firmware or a combination thereof. In at least some of example, each embodiment can be implemented as on computer-readable recording medium the calculating of storage The form of machine instructions.As used herein, " computer-readable recording medium " is intended to refer to whole method The storage medium of definite form.Thus, " computer-readable recording medium " is not intended to cover non-legal theme, Such as carrier wave or signal itself.
The communication that each in multiple end user terminal 102 is mounted with communication customer end application form is soft Part.In embodiments, communication customer end application includes that VoIP client is applied, and will describe and VoIP The example embodiment that client is relevant, but it is to be understood that the idea herein illustrated applies also for having and replaces Change or the client application of additional communications functions (the such as transmitting-receiving of IM chat messages or file transmission).
Upon being performed, VoIP client application allows end user terminal 102 to use based on server Any one in setting or P2P call setting (or more generally connecting setting), sets up via the Internet Bi-directional communication channels with other these end user terminal 102.VoIP client application also can be directly Or share information on the scene each other via the server 104 of the state providing user whether to have time.Each user Information on the scene can be defined at least in part by user oneself.VoIP client application also can carry from VoIP The server 104 of supplier is retrieved some additional informations, name and the ID of user contact are such as provided Contacts list, " incarnation ", this incarnation is that user selects to represent themselves in VoIP system Image.
Each in end user terminal 102 is also mounted with document-browser client software, respectively With the form of web browser in embodiment.Upon being performed, this software allows user terminal 102 from coupling To the information of web server searching web pages situation and any relevant data of the Internet 108, and with These information are shown on their screen under the control at family.Web browser it be also possible to use family can be from them Terminal 102 to web server submit to data, this web server can such as store information for other Network element (such as user terminal 102) accesses, and/or operates the data submitted to generate sound Or message should be sent to other network elements.
According to each embodiment, these web servers include one or more partner server 105, this Or multiple partner server 105 runs the partner that the web browser via user terminal 102 can access and leads to Communication system.This partner communication system combines VoIP communication system to provide additional communication medium.Such as, partner Companion's server can add social networking site and the data processing software of related data form with trustship webpage, In this situation, additional agents can include combining static state that VoIP provided or oolhiu interactive user profile Record, VoIP(or IM) video call that provided of communication system and/or IM.In embodiments, Buddy system is the partner of VoIP system, because its front end or user interface also provide for VoIP system Access.This can be by the VoIP client utilizing the one or more places in partner server 105 to install The replacement example of application realizes, and user can be via partner sites instead of using at their LUT The local VoIP client installed on 102 accesses partner server.More detailed below with reference to Fig. 2 b and 2c Its example implementation carefully is discussed.
Also can there is the VoIP client installed at one or more gateways 106 to apply, this or many Individual gateway 106 is coupled to the Internet 108 and one or more other networks 109(such as PSTN network And/or mobile cellular network) both.This allows the VoIP client run in end user terminal 102 End application communicates with common landline phone and/or mobile phone, respectively even if those phones do not run itself VoIP client is applied and is not directly coupled to the Internet.It that case, the VoIP in terminal 102 Client application uses call setting based on server or P2P to come by the Internet and gateway 106 VoIP client application is set up and is connected, and provides telephone number, gateway 106 to use this electricity to gateway 106 Words number sets up the connection with phone by other networks corresponding.Or on other direction, telephone subscriber It is usable in VoIP system identifying the dial of this user to gateway 106, and gateway 106 will lead to Cross the Internet to be connected with terminal 102 foundation of this user.In any case, can thus via the Internet and PSTN or mobile cellular network set up two-way communication port.
The schematic block diagram of Fig. 2 a illustrates the example of end user terminal 102, it be configured to serve as because of The terminal of the VoIP system of special online operation.Terminal 102 includes the place being operatively coupled to the following Reason device or CPU200: be such as connected to the network interface 202 of the modem of the Internet 108, such as The non-volatile memory device 204 of hard disk drive or flash memory, and such as random access storage device (RAM) The volatile storage devices of 206.Terminal 102 also includes such as keyboard 210, mouse 208, microphone 216 With one or more user input devices of photographic head 218 form, each input equipment is operatively coupled to CPU200.Terminal 102 also includes the one or more of such as display screen 208, speaker 214 form User's outut device, each outut device is likewise operably coupled to CPU200.
Storage device 204 stores software, and software at least includes operating system (OS) 220, web browser The application of the document of 221 forms-browser client and VoIP client apply 222 forms based on point The communication software of group.When starting or reset terminal 102, operating system software 220 is automatically loaded RAM206, and perform to run from there through by CPU200.Once run, operating system 220 Subsequently can be by application (such as web client application 221 and VoIP client application 222) be loaded In RAM206 and on CPU200, perform them, run this application.In order to illustrate in fig. 2 Property ground represent this point, operating system 220, web client application 221 and VoIP client application 222 It is shown in inside CPU200.
VoIP client application 222 includes " stack (stack) ", and this stack has three Primary layer: input With output (I/O) layer 224, client engine layer 226 and user interface (UI) layer 228.It is responsible for for every layer Concrete function.(or it it is generally one in the situation of top layer with two adjacent layers due to each pantostrat Layer) communication, therefore they are considered as to be arranged in the stack shown in Fig. 2 a.Web client application 221 With VoIP client application 222 be referred to as operating system 220 " on " run.This means many In the environment of task, they are dispatched for execution by operating system 220;Further, from input equipment 202, 216 and 218 apply 222 minimum (I/O) layer 224 to web client application 221 and VoIP client Input and from web client application 221 and VoIP client application 222 I/O layer 224 to The output of outut device 202,208 and 214, can via the suitable driver of operating system 220 and/or API arbitrates.
The I/O layer 224 of VoIP client application includes audio frequency and/or Video Codec, this codec Receive incoming encoded stream and it is decoded with on-demand output to speaker 214 and/or display 208, and this codec receives the audio frequency of un-encoded from microphone 216 and/or photographic head 218 and/or regards Frequency evidence, encodes it so that as the other-end user terminal being streamed to VoIP system 102.I/O layer 224 may also include the control signaling controlling information for signaling between the terminal 102 of network Agreement.
Client engine 226 processes the connection management function of VoIP system as discussed above with after image, Such as by setting up calling based on server or P2P address search and certification or other connect.Client is drawn Hold up other miscellaneous functions that also can be responsible for VoIP system, such as provide user to VoIP system server 104 Up-to-date contacts list and/or avatar image, or retrieve the up-to-date of user from VoIP server 104 Contacts list also retrieves the up-to-date avatar image of other users.Additionally, client engine can be via public API retrieves information on the scene from the contacts list of other clients of user, and relatively to online that Other clients a little provide the information on the scene of its own.The most directly exchange via public API Field information is a kind of selection, but alternatively, can exchange via such as server 104 intermediate node such as grade Field information.
UI layer 228 is responsible for presenting decoded video via display 208 to user, for how aobvious Show output and user control (such as button and menu) that on device 208, arrangement is presented, and for warp Input is received from user by the control presented.
Fig. 3 schematically shows will be aobvious when VoIP client application 222 is opened and checked for user Show the example user interface 228 presented on device 208 to user.In this example, user interface 228 be First user terminal 102(A) user interface of the upper VoIP client application 222 run.User interface It is divided into multiple panel.First panel 302 shows some details of the profile of user oneself, in this example In have the name " Joe Everyman " of user, avatar image and " emotion message ".These details can quilt It is stored at the server 104 of VoIP system, and can be by client engine 226 from the service of VoIP system Device 104 is retrieved, in order to make other users of VoIP system to obtain.Avatar image is that user selects to use Themselves image (needing not to be themselves photo) is represented to other users.Emotion message is letter Short user-defined statement, it can be used for any purpose, but be generally used for expressing the positive how are you feeling today of user, About user live the news of event near-mid term or may affect whether user have time any at hand Plan (the most in some cases, emotion message can be considered as a type of information on the scene).When When other users check the profile of Joe in themselves client, these details will take via VoIP Business device 104 is visible to them, and vice versa, and the details of other users is by obtainable for the client being Joe (if they are in contacts list each other).
Second panel 304 of user interface 228 shows the friend of user or the contacts list of colleague, these Friend or colleague are other users of voip network.The entrance of contacts list can be from having of user Condition or mutual agreement.Contacts list can be stored at the server 104 of VoIP system, and Can be retrieved from the server 104 of VoIP system by client engine 226 so that use on different terminals The user of the different instances of VoIP client application can obtain same list.Information on the scene is also displayed on often In panel near individual contact person.Information table on the scene is shown with dummy status, this have dummy status can include user be No online and whether can be the most user-defined instruction.Such as, presence state may is that User's off-line is (x);User is online and selects to be illustrated as have time (√), or user online but selects It is illustrated as busy (-).
3rd panel 306 of user interface 228 shows the profile of the user selected from contacts list, Be " Stephen Madeup " in this situation, another user terminal 102(B) user.Shown letter Shelves include the name of Stephen, avatar image and emotion message, and Stephen may take to VoIP Other details that business device 104 provides, such as current location, local zone time, sex and date of birth (DOB). These profile details are retrieved from VoIP server 104 by client engine 226.
The fourth face plate 308 of user interface 228 shows the communication control relevant with selected contact subsequently, all As allowed to set up voice or the button of video call and for inputting the window of chat messages.Any incoming Chat messages and chat history also will show in this panel, and can be by file be dragged and dropped into chat window File transmission is set up in Kou.
Schematically showing of partner server 105 illustrates now in figure 2b.Partner server 105 includes It is operatively coupled to processor or the CPU250 of the following: be such as connected to the modulation of the Internet 108 The network interface 252 of demodulator, non-volatile memory device 254, and such as random access storage device (RAM) volatile memory devices of 256.Also can exist for one or more use of server 105 Family input or outut device, but these have been not shown.
Storage device 254 stores software, and software at least includes operating system (OS) 270, such as social connection The Partner Software 271 of web site form and VoIP client application 222 ' with at user terminal 102 Replacement " partner " example that " leading " or " local " example 222 of upper installation is similar.Partner Software 271 Operate on OS270 with partner's VoIP client example 222 ' both of which.Partner Software 271 is by such as The social networking page and related data from those users eventually is provided to user terminal 102 by the Internet 108 End 102 reception, process related data and request, provide the Core Feature of partner communication system.Social connection Net webpage is partner communication system offer front end or user interface, and in embodiments, this buddy subscriber Interface also includes one or more control, and these one or more controls can (such as via OS270) control VoIP client application 222 ' partner instance, and thus via partner communication system front end replace via The master instance 222 run on the LUT 102 of user, provides VoIP communication system Replace access mode.Note, although be not excluded for provide some UI elements from the UI layer of client 222 ' Probability, but if the front end of partner user interface to be provided, then the partner instance of client 222 ' need not There is UI layer.
In another arranges, as the partner to the VoIP client 222 ' realized in partner server 105 The replacement (or supplementing) of example, two or more different examples of VoIP client can be pacified by user It is contained on two or more different corresponding terminal user terminals 102, such as, the one of VoIP client Individual example is installed on the personal terminal such as home computer or the mobile phone of such as user oneself, VoIP Another example of client is installed on operational terminal, is such as distributed to his or her work by employer user Make laptop computer or smart phone.Such as, at least one in multiple examples on different terminals 102 (for example, be mounted at the example on personal terminal) can be configured to enable via in partner server 105 Partner's networking software 271 accesses VoIP communication system, as such as via social networking site (and Allow conventional access mode) the access mode of replacement;And at least one (the such as work in other examples Make the example in terminal) can be not intended to via buddy system to access VoIP or other communication systems (or Person stops do so due to user, or owing to for example based on work, this function is provided without or quilt Disabling).
As any of the above-described or the two replace or supplement another arrangement in, user can be by VoIP client Two different examples of end are arranged in same end user terminal 102.In this case, user can make One example of VoIP client is positioned on user terminal 102, and this example is configured to enable via partner Partner networking software 271(on server 105 such as, via social networking site) access VoIP Communication system, and another example on same user terminal 102 is configured to access via usual manner VoIP communication system, i.e. directly via the service of VoIP provider in the case of not having partner 105 to participate in Device 104 and/or P2P technology.In certain embodiments, one or two in two examples can be exclusive Property permission is set or configured into accesses VoIP communication system according to they corresponding modes, i.e. one Allow only to access VoIP via buddy system 105, and/or one allows in the participation not having partner 105 Under only directly access VoIP via the server 104 or P2P of VoIP provider.But, replace In embodiment, each example can allow for the access via both modes, and by user for different mesh Safeguard simply in same terminal.
Including first terminal 102(A) user and another terminal 102(E) the situation of user shown Illustrate that Fig. 2 c also show same user and has the VoIP being each provided with this user in figure 2 c to meaning property The independent example 222 and 222 of client application " two different terminals 102(A) and 102(F) can Can property, and user has at same user terminal 102(A) two of the upper VoIP client installed not With example 222 and 222 " ' probability.
Example as aforesaid operations, it is considered to first terminal 102(A) user access social networking site The situation of the page, this social networking site includes the profile about other users and other information.In response to Detecting that this point, Partner Software 271 can consult look-up table, the ID of VoIP system is mapped by this look-up table Identifier to the user identifying buddy system.Look-up table can be stored in the server of VoIP provider 104 or partner server 105 on if it finds a match, that means just to be looked on the website of buddy system The profile of the user seen also is the user of VoIP system, and when this coupling being detected, Partner Software 271 can be in terminal 102(A) on the page just checked inserts the control being associated, such as can click on Call icon or IM chat hurdle.Or, this function may utilize web browser 221, client 222 Local example and/or between the two (not shown) arbitration toolbar should be used at user terminal 102(A) Locally realize, equally, if locally realized, then search and be usable in user terminal 102(A) on The local look-up table of storage rather than on server 104 or 105 look-up table of remotely storage perform, this Ground look-up table lists all known contact person of user of both VoIP and buddy system.
Fig. 4 a is the schematic figure of the user interface of the web browser 221 showing example social networking site Show, wherein with user terminal 102(E in buddy system) the letter of example user " Sally Fictitious " Shelves insert integrated VoIP(and/or IM explicitly) control 402.
First user terminal 102(A) user subsequently can be mutual with the control 402 inserted, to initiate With the user mating user's (being user terminal 102(E in this example)) communication connection, such as VoIP Calling, video call or IM chat sessions.Therefore, this provides and transports via in partner server 105 The partner instance 222 ' of row and do not use at the user terminal 102(A initiating user) upper run local real Example 222 to VoIP(or IM) the replacement access mode of communication system.For convenient, initiate user and exist This is referred to alternatively as calling party or MPTY, is referred to alternatively as called party or quilt to its user initiating communication MPTY, but it is to be understood that be intended to cover the other type of communication in addition to voice or video call, Such as IM message, voice mail or file transmission.
Mutual in response to user, the browser 221 run in the terminal 102 of MPTY passes through the Internet 108 send signal to Partner Software 271.Signal include voip user ID and VoIP system any its The user certificate that he is correlated with.In response to receiving this signal, Partner Software 271(is such as via OS270) will Certificate passes to partner instance 222 ', and controls its VoIP by the Internet 108 with suitable called party Client sets up communication connection.This can start by initiating each MPTY of communication the most in this way The new example 222 ' of client application, or by providing the special partner that can process multiple calling party of client Companion's example 222 ', or the actual combination by both technology, realize.The partner that can process multiple user In the situation of companion's example 222 ', user certificate can be used for creating different user conversations or reality in this example Body.
Or, mutual in response to user, the browser 221 that runs in the terminal 102 of MPTY to The upper VoIP client example 222 run of one of family terminal 102 " or 222 " ' in one send signal, One of this user terminal 102 is configured to via buddy system 105 to access VoIP, and VoIP client End example 222 " or 222 " ' send signal by the Internet 108 to Partner Software 271.
Considering this situation from other angle, such as other users such as Sally can initiate and first terminal 102(A) The communication of first user (Joe), or by the user terminal 102(E of herself) on run VoIP The local example of herself of client application, or by accessing the VoIP visitor in partner server 105 This example is also provided together with the user certificate of herself by the partner instance of family end.Even if other users are not The registration user of VoIP system, it is possible to allow them by creating interim or that partner is special voip user Certificate (is for example, at least ID and any other required certificate, such as certification certificate of VoIP system And/or password) use the partner instance in partner server 105 to access VoIP system.
As mentioned, multiple examples that first user Joe may have client application are available, and And any of which can be run in certain time arbitrary.Such as, user can have domestic consumer eventually End 102(A) upper install master instance 222, in partner server 105 partner instance 222 ' of trustship, Active user terminal 102(F) on another local example 222 " and/or in the use identical with master instance Family terminal 102(A) upper another example installed.Depend on user to be currently in use in certain time arbitrary Which example, i.e. which is executed, by suitable terminal 102(A), 105 or 102(F) On example deliver any request setting up VoIP communication connection from any other user respectively.Currently The example used is also considered as " activity " example.Request is delivered to suitable destination can pass through The lookup address such as making the example of activity update at the suitable node of distributed address lookup scheme realizes. If be performed at arbitrary certain time multiple example, then rule can be provided to determine which is preferential And be considered as " movable ".Such as, any one run in active window, or the most not rear Any one run in platform or system tray.
Noting, the partner instance being currently in use in partner server 105 as one or more users accesses VoIP communication system, that do not mean that reality Media Stream must route via partner server 105 (though So it is not excluded for that probability).On the contrary, participate in being mainly used in initiating calling or connecting setting, and once At such as 102(A) and 102(E) etc. establish connection between two user terminals, then actual voice Or video etc. can be across the Internet 108 direct routing between which.
Fig. 4 b shows the user terminal 102(E at Sally) on the user interface of buddy system checked Schematic example.If first user Joe is the user of both VoIP system and buddy system, then She can check profile (such as, his social networking profile, it is not necessary to VoIP of Joe in buddy system His profile intrasystem is identical), and be presented and utilize the partner instance in partner server 105 to Joe Terminal 102(A) or 102(F) the control communication initiated.Buddy systems users interface may also include fair The control 404 of other users of family allowable search buddy system, such as, is come by the ID of VoIP system Search, or by such as affecting common interest, target or the ground whether user is ready to get in touch Other information such as point are searched for.
For the communication system of such as VoIP system, user the most only other users be understanding or credible Time just accept them as contact person.However, the inventors have also recognized that for some buddy system, user May also there is no believable contact person's circle.Such as, if buddy system is social networking or appointment website, The whole plan then using buddy system can be to meet with stranger, but simultaneously, user can be in do so The privacy settings that Shi Yaoqiu is stricter than existing VoIP system.Even if it is therefore desirable to provide by VoIP Also the mechanism of suitable privacy can be safeguarded when system is mutually integrated with buddy system.
In another example, some buddy systems may be more credible than other system.Such as, in conventional society Handing in network, the contact person that user may only accept to recognize is as friend, in this case, by this partner It is acceptable that the contact person of system is integrated in VoIP client without extra privacy;But, Some other type of social networkies (such as appointment design those social networkies) may less by with Family is trusted, and it is thus desirable to stricter privacy settings.
Wherein other examples of the buddy system that privacy is probably a problem can include providing classified advertisement Or the website of personal advertisement, forum or wherein user be not intended to allow carry with in non-commercial context The system relevant with business that the same levels of confession is close nature.
Additionally, no matter what the problem of buddy system is, user possibly rely at home or work, Or still use mobile terminal to walk about outside and need the privacy of different stage at home.
In order to solve the problems referred to above, each embodiment provides multiple different instances of same subscription client application, And depend on same subscription client application different instances in which be currently movable, safeguard not Same privacy settings.Therefore, user is able to rely on environment that he or she is operating or situation is safeguarded not The privacy of same level.Such as, if the partner instance via client 222 ' is online, then user it may be desirable to Than via master instance 222 online time privacy greatly, if or online on active user terminal, Then user it may be desirable to more online than on domestic user terminal time privacy greatly.
Noting, different examples specifically refers to the example of same user.Even if being to take partner at one of example In the case of the partner instance run on business device 105, then when so doing, partner instance still can be claimed For the example of the client application of same user because it with the ID of this user and potential other this Class certificate carrys out instantiation, so as to represent this user or represent this user initiate and accept communication connection Middle action.But, at user terminal 102(A) and 102(E) the upper communication customer end installed be not with The different instances of one client, because they represent or represent different user action.The client of given user The example of end can be considered as to be characterized by ID or similar information.
Fig. 5 schematically shows the example user interface for controlling privacy settings of VoIP client. Any or all in these privacy settings can be provided in different embodiments or other privacy settings.
In one embodiment, the different privacy settings of different instances can each be stored in depositing of corresponding terminal At storage equipment, such as, in terminal 102(A of respective instance), 102(F) and 105 at storage list Only privacy settings.But, this embodiment can only allow to control the privacy of this example when running particular instance Arrange, such as, if user is currently in use domestic user terminal 102(A) and operational terminal 105(F) Be closed, then the privacy settings of user's working example to be remotely controlled may is that impossible.
On the contrary, in embodiments, the some or all of privacy settings in customer instance is stored in service On device, the server 104 of such as VoIP provider.Which the example being the most now currently in use is, this Can allow to remotely control the privacy settings of whole example, such as, client user circle via the Internet 108 Face can be operable to for the example of each example or each type open in such as Fig. 5 single Window, or the same window can include the single control of the example for each example or each type.
Referring again to Fig. 2 c, in order to realize this embodiment, in addition to ID, can leading to given user Each example of letter client provides additional identification symbol or the parameter of herein referred to as " token ".Token is not Distinguish mutually with between the client instance of type or the client instance of different grouping, or even in order to identify Each client instance in multiple examples of given user.Such as, token can identify this example is partner Example or the routine of VoIP client " lead " example.Or, token can include identifying given user's The identifier of the particular instance in those examples, in this case, ID group together with token ID Being combined in will be unique in discussed communication system.When user runs in corresponding terminal 102 or 105 During the particular instance of his or her client, this example via the Internet 108 to the clothes of VoIP provider Business device 104 transmit its token and ID (if or to make token ID itself be unique, the most only need Token ID to be transmitted).In response to receiving these, VoIP server 104 is configured to subsequently for this use Token is searched at family in the look-up table 199 being stored at this server, and therefore retrieval sends request example Associated privacy is arranged.The server 104 of VoIP provider is with being somebody's turn to do on backward counterpart terminal 102 or 105 Privacy settings required for example return.
In embodiments, privacy settings permission first user at least can be current by depending on first user The example that is currently in use (such as by voice, video or IM message), determine other users and they Contact by communication medium.Such as, research tool 404 may have been used with reference to Fig. 4 c, Sally Determine that she and Joe have some common interest, and it is desirable to contact him with suggestion social activity appointment.So And, Joe may be it is of concern that join when he is just using buddy system rather than main VoIP client example 222 The user being him may be the most credible, or may want to maintain a certain distance until the most familiar, and And therefore it may be desirable to keep privacy greatly in this environment.It that case, he can set Put his privacy settings so that when he use partner instance 222 ', 222 " or 222 " ' online time, Zhi Nengtong Cross such as IM chat messages and contact him;But when he uses master instance 222 online, also by video Or voice call he.Therefore, if Sally is shown in Joe in the environment of partner's social networking site Face, she can only pass through appearance in the chat hurdle that the part as the VoIP control 402 inserted provides IM chat messages contacts with him, as illustrated in fig. 4 c.If she attempts initiating audio call, then Huo Banshi Example 222 ', 222 " or 222 " ' the privacy settings of this example that will retrieve based on it, refuse to connect and arrange Request.
Certainly, if Sally knows the ID of the VoIP communication system of Joe, then she will remain able to He via master instance 222 online time contact him by voice or video call.But, depend on this enforcement Example, this ID can hide to her in the environment of buddy system, determines to share these details at least up to Joe.
In another example, whether privacy settings can allow user to depend on example and enable or disable them and can Contacted.
In another example, privacy settings user can be allowed to depend on example that he is currently in use is seen to control him How get up.Such as, user may be not intended to other users he use partner instance (if such as use The example of appointment website trustship) time see his presence state or some part of his VoIP system profile. In the situation limiting information on the scene, if it is directly shared between each client of user terminal 102, Then as it has been described above, active instance 222 ', 222 " or 222 " ' can be from the server 104 of VoIP provider Retrieval privacy settings, and example 222 ', 222 " or 222 " ' be subsequently based on those privacy settings, with such as The most described upper refusal request connect arrange similar mode stop or ignore from other clients on the scene The request of information.But, (need not be with the pass safeguarded in situation disclosed in restricting VoIP profile information In the profile of buddy system, such as social networking profile, identical), this information can be at VoIP server 104 Place is intensively safeguarded.In that scenario, active instance 222 ', 222 " or 222 " ' can take to VoIP Business device 104 sends message, to be labeled as some profile information to access or forbid to access.
In another embodiment, the VoIP contacts list of user can be divided into two or more differences Packet, and can be that each in those different grouping safeguards different privacy settings.Refer again to Fig. 2 c, can safeguard at the server 104 of VoIP provider that VoIP contacts list 198(joins with partner Being that list is contrary, this partner's contacts list may be that part is consistent).Specific when subscription client When example runs in terminal 102 or 105, it joins from P2P server 104 retrieval via the Internet 108 Be list, and when contact person is updated, client instance by the associated person information that updated via because of Special net 108 uploads to VoIP server 104.By the way of similar, terminal 102 or 105 is transported The client instance of row also can retrieve, from VoIP server 104, the finger which packet which contact person is positioned at Show and retrieve the privacy settings of different grouping, and message can be sent to P2P server 104, to update that Which packet a little users are positioned in and update the privacy settings of those packets.
In embodiments, only one of which VoIP contacts list 198 needs the clothes VoIP provider Safeguard at business device 104, and different contact person packet can be by by each with in list of labelling or parameter Contact person is associated and realizes, and it is specific that corresponding contact person is designated as being assigned in packet by this list One, such as X or Y.
In certain embodiments, contact person's packet of first user can be at least partly dependent on and meet for the first time See that the environment of contact person automatically determines.
Such as, can be dependent on he uses when for the first time meeting contact person example to automatically determine contact person Initial packet.If first user is from another user being accepted as contact person in VoIP system (contrary with the contact person in buddy system) receives request, and this request is from partner server 105 The partner instance of upper operation receives, if accepted, then the client of first user can by this contact person certainly It is placed in dynamicly and there is stricter privacy settings (such as, can only be chatted by IM rather than voice or regard Frequency calling contact first user) packet X in.If but request is to transport from user terminal 102 The master instance of row receives, then it can be automatically placed in the strictest packet Y.Initiate request The type of example can be determined by token, and this token can be asked transmitted along with contact person.
From another perspective, if first user is currently in use (such as, partner another user Run on server 105) partner instance time request become the contact person of this another user, then this another Individual user can be automatically placed in stricter packet X.But, if first user is used at another When master instance is just being run at family on user terminal 102, request becomes the contact person of this another user, then this is another One user can be automatically placed in the strictest packet Y.The example that another user is currently in use Type can be according to asking in response to the contact person from first user and the token that retrieve determine.
Alternatively or in addition, can be dependent on when for the first time meeting another user first user oneself The example used automatically determines the initial packet of contact person.That is, depend on when receiving from another user When contact person asks or when sending, to another user, the example that when contact person asks, first user is currently in use. Therefore, if first user uses partner instance 222 ' to ask to become the contact person of another user, then should Another user can be automatically placed in stricter packet X, but, if first user sends Ask from the contact person of master instance 222, then during this contact person is placed in the strictest packet Y.
After initial packet automatically, first user can have user is manually re-assigned to other points The option of group.In this sense, packet can be that part is automatic.
Safeguard that for different grouping the feature of different privacy settings is used as being for different clients Example maintenance Supplementing or replacement of the feature of different privacy settings.In the situation that the two feature is used together, hidden Therefore private look-up table 199 can include multiple entrances of privacy settings token one by one one by one, the most each packet X Or Y has one.
Should be appreciated that above-described embodiment is only used as example and describes.
Such as, although equity (P2P) system has been mentioned as a kind of possible topological structure, but this The bright P2P that is not exclusively suitable for, and any kind of packet-based communication system can be applied to, such as before The most centralized VoIP system discussed.Additionally, this invention is not limited to use on the internet, and It is can to realize on any packet-based network.Although additionally, above according to such as social networking site etc. The buddy system of exemplary types is described, but combines P2P, VoIP or other these communication systems exist The other type of buddy system run on packet-based network is possible.
Furthermore, it is noted that term used herein " is applied " need not refer to the most discrete any software unit, The most single program or the program being performed separately.Any function as application-specific described above can include One or more different code sections or independently operable code section.Such as, although in each enforcement In example, document viewer and communication customer end are the application that can be performed separately, but they need not necessarily this Sample.
Furthermore, it is noted that, although may have been made by above assembly (the such as memorizer of user terminal 102 Or processor, the server 104 or 105 of packet-based network or packet-based network and phone Gateway 106 between network) reference, but these terms typically need not refer to the single unit that maybe can divide, Such as, memorizer or storage medium or equipment can include one or more type of memory, and such as flash memory is with hard Disk drive etc. and/or one or more physically separate memory module;The processor of user terminal can Including multiple cores or performance element;Server can include multiple groups at the different websites that may be distributed across a network Become server unit;And, gateway can include the multiple gateway units being distributed across a network.
Additionally, this invention is not limited to use any specific control mode safeguard and control privacy settings.More Usually, control mode can be implemented as the form of any suitable control.In embodiments, control to set The standby suitable code being implemented as on the server (such as server 104) of packet-based network and looking into Look for table.But as mentioned, the control equipment of replacement can be implemented as on the different terminals of each respective instance Suitable code and single privacy settings form (such as, partly on user terminal 102 and Partly realize in partner server 105).In other embodiment, each user available or partner The specialized hardware that theres is provided in terminal or via the addressable specialized hardware of another node of packet-based network Realize some or all in privacy control equipment.
It is said that in general, any function described herein can use software, firmware, hardware (such as, fixing to patrol Volume circuit) or these combinations realized realize.Term used herein " module ", " function ", " assembly " and " logic " typicallys represent software, firmware, hardware or a combination thereof.In the situation that software realizes Under, module, functionally or logically expression are held when in processor (such as, one or more CPU) upper execution The program code of row appointed task.Program code can be stored in one or more computer-readable memory and set In Bei.Features of the techniques described below is platform-independent, it is meant that described technology can have respectively Plant and realize on the various commercial computing platforms of processor.
Such as, user terminal may also include so that the hardware of user terminal performs the entity (e.g., software) of operation, Such as processor functional device, etc..Such as, user terminal can include computer-readable medium, and it can be configured The operating system of user terminal especially user terminal and the hardware being associated is made to perform operation for safeguarding Instruction.Therefore, instruction performs operation for configuring operating system and the hardware being associated, and with this side Formula causes operating system with the hardware transform being associated to perform function.Can be by computer-readable medium by each Plant difference configuration and provide instructions to user terminal.
A kind of such computer-readable medium configuration is signal bearing medium, and is therefore configured to instruct (such as, as carrier wave), such as, by network, be sent to calculating equipment.Computer-readable medium also may be used It is configured to computer-readable recording medium, is not the most signal bearing medium.Computer-readable recording medium Example include random-access memory (ram), read only memory (ROM), CD, flash memory, Harddisk memory and other can use magnetic, light and for storing the other technologies of instruction and other data Memory devices.
Although the language special by architectural feature and/or method action describes this theme, it is to be understood that, Subject matter defined in the appended claims is not necessarily limited to above-mentioned specific features or action.More precisely, on State specific features and action is as realizing disclosed in the exemplary forms of claim.

Claims (10)

1. a communicator, including:
Being coupled to one or more terminals of packet-based network, described terminal is mounted with the first use First example of the communication customer end application at family and the described communication customer end application of described first user The second example, described communication customer end application be configured to make described first user energy upon being performed The first communication system that enough utilizations realize on described packet-based network is come and other telex networks; And
Being coupled to described packet-based network-based control device, described controller is configured to:
Each single privacy in locally stored described first and second examples of described controller Arrange, effectively to safeguard each different privacy settings in described first and second examples;
Which depends in described first and second examples is the example of movable and described activity Corresponding privacy settings, control described first user relative in described first communication system described its The privacy of he user.
2. device as claimed in claim 1, it is characterised in that also include first in described terminal The second terminal in terminal and described terminal, described first example of described client application is installed in On first terminal, and described second example of described client application is installed in the second terminal.
3. device as claimed in claim 1, it is characterised in that the institute of described communication customer end application State that the first and second examples are installed in described terminal same on.
4. device as claimed in claim 1, it is characterised in that described controller is further configured to:
Receiving which example in described first and second examples is the identifier of current active, described first Example and the first identifier are associated, and described second example and the second identifier are associated;
The identifier received is mapped to the privacy settings of correspondence, and
Depend on arranging of being mapped and control described privacy.
5. device as claimed in claim 2, it is characterised in that described controller also includes described the One and the second corresponding data storage cell on each in terminal, thus be described first and second Each in example provides local privacy settings.
6. device as claimed in claim 1, it is characterised in that also include one or more second clothes Business device, described second server is configured to run on described packet-based network the partner realized Communication system, described partner communication system combines packet-based described first communication system to provide attached The telecommunication media added, described second example of wherein said client application and described partner communication system It is associated.
7. device as claimed in claim 6, it is characterised in that also include the first end of described terminal End and the second terminal of described terminal, described first example of described client application is installed in first In terminal, and described second example of described client application is installed in the second terminal;
The one or more second server at least includes described second terminal so that described second eventually End is arranged to provide the access to described first communication system via described partner communication system.
8. device as claimed in claim 1, it is characterised in that:
Described controller be further configured to into described first user safeguard with from other users described First and second contact persons' packets in each relevant single privacy settings, and therefore rely on Described in the packet of other users described controls described first user and described first communication system The privacy that other users are relevant.
9. device as claimed in claim 8, it is characterised in that also include one or more second clothes Business device, described second server is configured to run on described packet-based network the partner realized Communication system, described partner communication system combines packet-based described first communication system to provide attached The communication medium added, wherein said controller is configured to depend on initial the most whether leading to via described partner Communication system runs into and automatically determines the packet of contact person.
10. the method realized by server, including:
Described server is used to provide the of communication customer end application to the terminal of packet-based network One example is for first user, and the application of described communication customer end is configured to make upon being performed described First user can utilize the first communication system realized on described packet-based network to come and other Telex network, described first example and first group of privacy settings of the application of described communication customer end are associated;
Described server is used to provide the application of described communication customer end to the terminal of packet-based network The second example for described first user, described second example of described communication customer end application with Second group of privacy settings is associated;
At described server, it is stored separately described first group of privacy settings and described second group of privacy sets Put with effectively:
It is the different privacy settings of described first and second Example maintenance by described server;
Whenever described first example is movable, control described first according to described first group of privacy settings The privacy of user;And
Whenever described second example is movable, control described first according to described second group of privacy settings The privacy of user.
CN201310085280.6A 2012-03-16 2013-03-15 Communication privacy Active CN103248619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611036778.3A CN107104935B (en) 2012-03-16 2013-03-15 Method, server and terminal equipment for protecting communication privacy

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GBGB1204687.6A GB201204687D0 (en) 2012-03-16 2012-03-16 Communication privacy
GB1204687.6 2012-03-16
US13/722,974 2012-12-20
US13/722,974 US9240987B2 (en) 2012-03-16 2012-12-20 Separate privacy setting control of multiple communication clients of a user

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201611036778.3A Division CN107104935B (en) 2012-03-16 2013-03-15 Method, server and terminal equipment for protecting communication privacy

Publications (2)

Publication Number Publication Date
CN103248619A CN103248619A (en) 2013-08-14
CN103248619B true CN103248619B (en) 2016-12-28

Family

ID=48927841

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201611036778.3A Active CN107104935B (en) 2012-03-16 2013-03-15 Method, server and terminal equipment for protecting communication privacy
CN201310085280.6A Active CN103248619B (en) 2012-03-16 2013-03-15 Communication privacy

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201611036778.3A Active CN107104935B (en) 2012-03-16 2013-03-15 Method, server and terminal equipment for protecting communication privacy

Country Status (1)

Country Link
CN (2) CN107104935B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625737A (en) * 2001-12-12 2005-06-08 Ut斯达康有限公司 System and methods for providing instant services in an internet protocol network
CN102025648A (en) * 2009-09-16 2011-04-20 腾讯科技(深圳)有限公司 Instant messaging method and server

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0226651D0 (en) * 2002-11-15 2002-12-24 Koninkl Philips Electronics Nv Accessing on-line services
US20070250516A1 (en) * 2006-04-25 2007-10-25 Onebiztone Llc Member centric information dissemination system
US20090049190A1 (en) * 2007-08-16 2009-02-19 Yahoo!, Inc. Multiple points of presence in real time communications
US8166104B2 (en) * 2009-03-19 2012-04-24 Microsoft Corporation Client-centered usage classification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625737A (en) * 2001-12-12 2005-06-08 Ut斯达康有限公司 System and methods for providing instant services in an internet protocol network
CN102025648A (en) * 2009-09-16 2011-04-20 腾讯科技(深圳)有限公司 Instant messaging method and server

Also Published As

Publication number Publication date
CN103248619A (en) 2013-08-14
CN107104935A (en) 2017-08-29
CN107104935B (en) 2020-07-28

Similar Documents

Publication Publication Date Title
US10599869B2 (en) Separate privacy setting control for multiple application instances of a user
EP2074521B1 (en) Methods and apparatuses for managing resources within a virtual room
CN102164170B (en) contextual correlation engine
US8195137B2 (en) Updating contact information for mobile traffic
US10205687B2 (en) Apparatus and method for managing user chat experiences with businesses
US8751580B2 (en) Real-time communication and information collaboration system
JP7101314B2 (en) Devices and methods for managing external permission provision and external messaging communication requests in a group-based communication system
CN107787050A (en) The method and apparatus with dynamic Sexual behavior mode are supported for multiple personality
CN102474507A (en) Telephony discovery mashup and presence
US20130227018A1 (en) Methods and Systems for Identification in a Social Network Using a Mobile Telephone Number
CN112422401A (en) Display method and device for providing interface of social network service through anonymous brief introduction
CN104904192B (en) Communication session is created in alien system
US20070254637A1 (en) Device, Method and Computer Program Product Readable Medium for Establishing a Communication Session
US11196700B1 (en) Single-user non-transferrable communication client for public communication networks
US20110202668A1 (en) Methods for Creating and Using a Telecommunications Link between Two Users of a Telecommunications Network
US20200402006A1 (en) System and method for managing communications over an organizational data communication network
CN103248619B (en) Communication privacy
KR20230161239A (en) An operating method of a user terminal and the user terminal displaying an interface for providing an instant messaging service
EP2294780B1 (en) A method for masking data
EP3357265B1 (en) Delivering anonymous communication between customers at customer care site
Zarkadis et al. A 16 kb/s APC system with adaptive postfilter and evaluation of its performance
Alonso et al. Enabling opportunistic communications in a Social Communications Broker Architecture
WO2013149137A2 (en) Apparatus and method for managing user chat experiences with businesses

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150722

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150722

Address after: Washington State

Applicant after: Micro soft technique license Co., Ltd

Address before: Washington State

Applicant before: Microsoft Corp.

C14 Grant of patent or utility model
GR01 Patent grant