CN103248619B - Communication privacy - Google Patents
Communication privacy Download PDFInfo
- Publication number
- CN103248619B CN103248619B CN201310085280.6A CN201310085280A CN103248619B CN 103248619 B CN103248619 B CN 103248619B CN 201310085280 A CN201310085280 A CN 201310085280A CN 103248619 B CN103248619 B CN 103248619B
- Authority
- CN
- China
- Prior art keywords
- user
- terminal
- packet
- voip
- communication system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to communication privacy.A kind of device, including: it is coupled to one or more terminals of packet-based network, this terminal is mounted with the first example of the communication customer end application of first user and the second example of the communication customer end application of this first user, and the application of this communication customer end is configured to enable first user utilize the first communication system realized on a packet-based network to come and other telex networks upon being performed.This device includes being coupled to packet-based network-based control device, the single privacy settings of each maintenance that this controller is arranged in the first and second examples, and therefore depend in the first and second examples which is movable, control first user relative to the privacy of other users in this first communication system.
Description
Technical field
The present invention relates to secret protection, especially the secret protection in communication.
Background technology
Some communication systems allow the user of equipment (such as personal computer) across packet-based computer network
Network (such as the Internet) communicates.These communication systems include voice-over ip (VoIP) system.
These system of users are good, because they generally have than conventional fixing circuit or mobile network
Notable lower cost.May be especially true for long haul communication.In order to use VoIP system, user
Install on their device and perform client software.This client software provides VoIP to connect and all
Such as other functions such as registration and certifications.Except voice communication, client may also provide other telecommunication medias, all
Such as video call, instant message transrecieving (IM), SMS message transmitting-receiving, file transmission and voice mail.
A type of communication system for packet-based communication uses equity (P2P) topological structure.
In order to enable the access to peer system, user must perform P2P software provider on their computers
The P2P client software provided, and to P2P system registry to obtain digital certificate.Next call or it
His communication can be established and route between the user of P2P system, and the most further uses the clothes in arranging
Business device.Instead, client P2P from the computer of other-end user in P2P system
Client software searches required IP address, and the P2P client of MPTY in the information of distribution
Software exchanges certificate with the P2P client software of called party subsequently.
It is also possible to use and utilize centralized call to arrange and/or authorize the non-P2P system of (such as via server)
System realizes VoIP or other packet-based communication.In this case, the computer of user is pacified
Dress and the client performed are to access the application of server so that call signaling can be processed by server.?
In some situation, compared with P2P topological structure, architecture based on server may be increasingly in accordance with needing
Want.
No matter use which kind of architecture or topological structure, all exist these packet-based communication system collection
Become (VoIP system to be such as integrated into social networking station to other partner communication systems or " partner's platform "
Point) growing demand.But, although user may only see this as accessing VoIP communication etc.
New user interface, but it practice, adapt to fellowship relates to making first floor system architecture be suitable to
And many technological challenges.One such challenge is when the user library (user-base) of two systems to be closed
And time guarantee appropriateness privacy.In general, packet-based communication within privacy in other situations also
It is probably a problem.
Summary of the invention
According to one or more embodiments, it is provided that communicator, this communicator includes being coupled to based on dividing
One or more terminals of the network (such as the Internet) of group.This device is mounted with the communication of first user
First example of client application and the second example of the communication customer end application of this first user.Such as,
Communication customer end can be VoIP client and/or IM client.Communication customer end application is configured to work as
First user is enable to utilize the first communication system realized on a packet-based network when being performed, with
Other telex networks.Communicator also includes controller, and this controller is coupled to packet-based network also
The single privacy settings of each maintenance being arranged in the first and second examples of client.Such as, hidden
Set up illegally to put and can determine that whether other users can contact with first user.As another example, privacy settings can be true
Fixed which information about first user is that other users are obtainable.
Which in the first and second examples be controller therefore depend on is movable, controls first user phase
For the privacy of other users in the first communication system.
There is provided present invention to introduce in simplified form and retouching the most further
Some concepts stated.Present invention is not intended as identifying the key feature of claimed subject or necessary special
Levy, be intended to be used to limit the scope of claimed subject.Theme required for protection is also not necessarily limited to solve
The realization of any or all shortcoming certainly pointed out in background section.
Accompanying drawing is sketched
In order to be better understood from the present invention and illustrate how effectively to implement the present invention, as example, will ginseng
Examine appended accompanying drawing, wherein:
Fig. 1 is schematically showing of packet-based network (such as the Internet);
Fig. 2 a is to be provided with web-client application and user terminal schematic of VoIP client application
Block diagram;
Fig. 2 b is the schematic frame of the partner server of trustship social networking site and VoIP client application
Figure;
Fig. 2 c is schematically showing of a part for the network of Fig. 1;
Fig. 3 is schematically showing of the VoIP client application user interface checked on the subscriber terminal;
Fig. 4 a is to apply showing of the buddy systems users interface checked by web client on the subscriber terminal
Meaning property represents;
Fig. 4 b is to apply the buddy systems users interface checked again by web client on the subscriber terminal
One expression;
Fig. 4 c is to apply the buddy systems users interface checked again by web client on the subscriber terminal
One expression;
The schematic table of privacy settings control when Fig. 5 is to access via the user interface of VoIP client application
Show.
Detailed description of the invention
Fig. 1 is the indicative icon of packet-based network (such as the Internet), this packet-based network
Including the element of multiple interconnection, such as it is marked as those of 102,104,105 and 106.Each network
Element intercouples with remaining element of the Internet 108, and is configured to by sending and receiving Internet protocol
(IP) data of block form are transmitted data with other these elements on the internet.Each element also has
There is the IP address being associated being located in the Internet.The element explicitly illustrated in Fig. 1 has: multiple
End user terminal (end-user terminal) 102(A) arrive 102(E), the most desk-top or on knee
PC or enable the mobile phone of the Internet;For realizing one or more VoIP of VoIP communication system
Provider's server 104;One or more web servers 105;And it is connected to another type of network
109(such as arrives traditional PSTN (PSTN) or other circuit-switched networks and/or arrives
Mobile cellular network) gateway 106.But, of course, now appreciated that than those explicit illustrate much more
Element constitute the Internet.This is schematically shown in FIG by communication cloud 108, this communication cloud
108 will include many other-end user terminals, server and gateway and Internet Service Provider
(ISP) router and the Internet backbone router.
Embodiments described here can realize in conjunction with any suitable hardware, software, firmware or a combination thereof.
In at least some of example, each embodiment can be implemented as on computer-readable recording medium the calculating of storage
The form of machine instructions.As used herein, " computer-readable recording medium " is intended to refer to whole method
The storage medium of definite form.Thus, " computer-readable recording medium " is not intended to cover non-legal theme,
Such as carrier wave or signal itself.
The communication that each in multiple end user terminal 102 is mounted with communication customer end application form is soft
Part.In embodiments, communication customer end application includes that VoIP client is applied, and will describe and VoIP
The example embodiment that client is relevant, but it is to be understood that the idea herein illustrated applies also for having and replaces
Change or the client application of additional communications functions (the such as transmitting-receiving of IM chat messages or file transmission).
Upon being performed, VoIP client application allows end user terminal 102 to use based on server
Any one in setting or P2P call setting (or more generally connecting setting), sets up via the Internet
Bi-directional communication channels with other these end user terminal 102.VoIP client application also can be directly
Or share information on the scene each other via the server 104 of the state providing user whether to have time.Each user
Information on the scene can be defined at least in part by user oneself.VoIP client application also can carry from VoIP
The server 104 of supplier is retrieved some additional informations, name and the ID of user contact are such as provided
Contacts list, " incarnation ", this incarnation is that user selects to represent themselves in VoIP system
Image.
Each in end user terminal 102 is also mounted with document-browser client software, respectively
With the form of web browser in embodiment.Upon being performed, this software allows user terminal 102 from coupling
To the information of web server searching web pages situation and any relevant data of the Internet 108, and with
These information are shown on their screen under the control at family.Web browser it be also possible to use family can be from them
Terminal 102 to web server submit to data, this web server can such as store information for other
Network element (such as user terminal 102) accesses, and/or operates the data submitted to generate sound
Or message should be sent to other network elements.
According to each embodiment, these web servers include one or more partner server 105, this
Or multiple partner server 105 runs the partner that the web browser via user terminal 102 can access and leads to
Communication system.This partner communication system combines VoIP communication system to provide additional communication medium.Such as, partner
Companion's server can add social networking site and the data processing software of related data form with trustship webpage,
In this situation, additional agents can include combining static state that VoIP provided or oolhiu interactive user profile
Record, VoIP(or IM) video call that provided of communication system and/or IM.In embodiments,
Buddy system is the partner of VoIP system, because its front end or user interface also provide for VoIP system
Access.This can be by the VoIP client utilizing the one or more places in partner server 105 to install
The replacement example of application realizes, and user can be via partner sites instead of using at their LUT
The local VoIP client installed on 102 accesses partner server.More detailed below with reference to Fig. 2 b and 2c
Its example implementation carefully is discussed.
Also can there is the VoIP client installed at one or more gateways 106 to apply, this or many
Individual gateway 106 is coupled to the Internet 108 and one or more other networks 109(such as PSTN network
And/or mobile cellular network) both.This allows the VoIP client run in end user terminal 102
End application communicates with common landline phone and/or mobile phone, respectively even if those phones do not run itself
VoIP client is applied and is not directly coupled to the Internet.It that case, the VoIP in terminal 102
Client application uses call setting based on server or P2P to come by the Internet and gateway 106
VoIP client application is set up and is connected, and provides telephone number, gateway 106 to use this electricity to gateway 106
Words number sets up the connection with phone by other networks corresponding.Or on other direction, telephone subscriber
It is usable in VoIP system identifying the dial of this user to gateway 106, and gateway 106 will lead to
Cross the Internet to be connected with terminal 102 foundation of this user.In any case, can thus via the Internet and
PSTN or mobile cellular network set up two-way communication port.
The schematic block diagram of Fig. 2 a illustrates the example of end user terminal 102, it be configured to serve as because of
The terminal of the VoIP system of special online operation.Terminal 102 includes the place being operatively coupled to the following
Reason device or CPU200: be such as connected to the network interface 202 of the modem of the Internet 108, such as
The non-volatile memory device 204 of hard disk drive or flash memory, and such as random access storage device (RAM)
The volatile storage devices of 206.Terminal 102 also includes such as keyboard 210, mouse 208, microphone 216
With one or more user input devices of photographic head 218 form, each input equipment is operatively coupled to
CPU200.Terminal 102 also includes the one or more of such as display screen 208, speaker 214 form
User's outut device, each outut device is likewise operably coupled to CPU200.
Storage device 204 stores software, and software at least includes operating system (OS) 220, web browser
The application of the document of 221 forms-browser client and VoIP client apply 222 forms based on point
The communication software of group.When starting or reset terminal 102, operating system software 220 is automatically loaded
RAM206, and perform to run from there through by CPU200.Once run, operating system 220
Subsequently can be by application (such as web client application 221 and VoIP client application 222) be loaded
In RAM206 and on CPU200, perform them, run this application.In order to illustrate in fig. 2
Property ground represent this point, operating system 220, web client application 221 and VoIP client application 222
It is shown in inside CPU200.
VoIP client application 222 includes " stack (stack) ", and this stack has three Primary layer: input
With output (I/O) layer 224, client engine layer 226 and user interface (UI) layer 228.It is responsible for for every layer
Concrete function.(or it it is generally one in the situation of top layer with two adjacent layers due to each pantostrat
Layer) communication, therefore they are considered as to be arranged in the stack shown in Fig. 2 a.Web client application 221
With VoIP client application 222 be referred to as operating system 220 " on " run.This means many
In the environment of task, they are dispatched for execution by operating system 220;Further, from input equipment 202,
216 and 218 apply 222 minimum (I/O) layer 224 to web client application 221 and VoIP client
Input and from web client application 221 and VoIP client application 222 I/O layer 224 to
The output of outut device 202,208 and 214, can via the suitable driver of operating system 220 and/or
API arbitrates.
The I/O layer 224 of VoIP client application includes audio frequency and/or Video Codec, this codec
Receive incoming encoded stream and it is decoded with on-demand output to speaker 214 and/or display
208, and this codec receives the audio frequency of un-encoded from microphone 216 and/or photographic head 218 and/or regards
Frequency evidence, encodes it so that as the other-end user terminal being streamed to VoIP system
102.I/O layer 224 may also include the control signaling controlling information for signaling between the terminal 102 of network
Agreement.
Client engine 226 processes the connection management function of VoIP system as discussed above with after image,
Such as by setting up calling based on server or P2P address search and certification or other connect.Client is drawn
Hold up other miscellaneous functions that also can be responsible for VoIP system, such as provide user to VoIP system server 104
Up-to-date contacts list and/or avatar image, or retrieve the up-to-date of user from VoIP server 104
Contacts list also retrieves the up-to-date avatar image of other users.Additionally, client engine can be via public
API retrieves information on the scene from the contacts list of other clients of user, and relatively to online that
Other clients a little provide the information on the scene of its own.The most directly exchange via public API
Field information is a kind of selection, but alternatively, can exchange via such as server 104 intermediate node such as grade
Field information.
UI layer 228 is responsible for presenting decoded video via display 208 to user, for how aobvious
Show output and user control (such as button and menu) that on device 208, arrangement is presented, and for warp
Input is received from user by the control presented.
Fig. 3 schematically shows will be aobvious when VoIP client application 222 is opened and checked for user
Show the example user interface 228 presented on device 208 to user.In this example, user interface 228 be
First user terminal 102(A) user interface of the upper VoIP client application 222 run.User interface
It is divided into multiple panel.First panel 302 shows some details of the profile of user oneself, in this example
In have the name " Joe Everyman " of user, avatar image and " emotion message ".These details can quilt
It is stored at the server 104 of VoIP system, and can be by client engine 226 from the service of VoIP system
Device 104 is retrieved, in order to make other users of VoIP system to obtain.Avatar image is that user selects to use
Themselves image (needing not to be themselves photo) is represented to other users.Emotion message is letter
Short user-defined statement, it can be used for any purpose, but be generally used for expressing the positive how are you feeling today of user,
About user live the news of event near-mid term or may affect whether user have time any at hand
Plan (the most in some cases, emotion message can be considered as a type of information on the scene).When
When other users check the profile of Joe in themselves client, these details will take via VoIP
Business device 104 is visible to them, and vice versa, and the details of other users is by obtainable for the client being Joe
(if they are in contacts list each other).
Second panel 304 of user interface 228 shows the friend of user or the contacts list of colleague, these
Friend or colleague are other users of voip network.The entrance of contacts list can be from having of user
Condition or mutual agreement.Contacts list can be stored at the server 104 of VoIP system, and
Can be retrieved from the server 104 of VoIP system by client engine 226 so that use on different terminals
The user of the different instances of VoIP client application can obtain same list.Information on the scene is also displayed on often
In panel near individual contact person.Information table on the scene is shown with dummy status, this have dummy status can include user be
No online and whether can be the most user-defined instruction.Such as, presence state may is that
User's off-line is (x);User is online and selects to be illustrated as have time (√), or user online but selects
It is illustrated as busy (-).
3rd panel 306 of user interface 228 shows the profile of the user selected from contacts list,
Be " Stephen Madeup " in this situation, another user terminal 102(B) user.Shown letter
Shelves include the name of Stephen, avatar image and emotion message, and Stephen may take to VoIP
Other details that business device 104 provides, such as current location, local zone time, sex and date of birth (DOB).
These profile details are retrieved from VoIP server 104 by client engine 226.
The fourth face plate 308 of user interface 228 shows the communication control relevant with selected contact subsequently, all
As allowed to set up voice or the button of video call and for inputting the window of chat messages.Any incoming
Chat messages and chat history also will show in this panel, and can be by file be dragged and dropped into chat window
File transmission is set up in Kou.
Schematically showing of partner server 105 illustrates now in figure 2b.Partner server 105 includes
It is operatively coupled to processor or the CPU250 of the following: be such as connected to the modulation of the Internet 108
The network interface 252 of demodulator, non-volatile memory device 254, and such as random access storage device
(RAM) volatile memory devices of 256.Also can exist for one or more use of server 105
Family input or outut device, but these have been not shown.
Storage device 254 stores software, and software at least includes operating system (OS) 270, such as social connection
The Partner Software 271 of web site form and VoIP client application 222 ' with at user terminal 102
Replacement " partner " example that " leading " or " local " example 222 of upper installation is similar.Partner Software 271
Operate on OS270 with partner's VoIP client example 222 ' both of which.Partner Software 271 is by such as
The social networking page and related data from those users eventually is provided to user terminal 102 by the Internet 108
End 102 reception, process related data and request, provide the Core Feature of partner communication system.Social connection
Net webpage is partner communication system offer front end or user interface, and in embodiments, this buddy subscriber
Interface also includes one or more control, and these one or more controls can (such as via OS270) control
VoIP client application 222 ' partner instance, and thus via partner communication system front end replace via
The master instance 222 run on the LUT 102 of user, provides VoIP communication system
Replace access mode.Note, although be not excluded for provide some UI elements from the UI layer of client 222 '
Probability, but if the front end of partner user interface to be provided, then the partner instance of client 222 ' need not
There is UI layer.
In another arranges, as the partner to the VoIP client 222 ' realized in partner server 105
The replacement (or supplementing) of example, two or more different examples of VoIP client can be pacified by user
It is contained on two or more different corresponding terminal user terminals 102, such as, the one of VoIP client
Individual example is installed on the personal terminal such as home computer or the mobile phone of such as user oneself, VoIP
Another example of client is installed on operational terminal, is such as distributed to his or her work by employer user
Make laptop computer or smart phone.Such as, at least one in multiple examples on different terminals 102
(for example, be mounted at the example on personal terminal) can be configured to enable via in partner server 105
Partner's networking software 271 accesses VoIP communication system, as such as via social networking site (and
Allow conventional access mode) the access mode of replacement;And at least one (the such as work in other examples
Make the example in terminal) can be not intended to via buddy system to access VoIP or other communication systems (or
Person stops do so due to user, or owing to for example based on work, this function is provided without or quilt
Disabling).
As any of the above-described or the two replace or supplement another arrangement in, user can be by VoIP client
Two different examples of end are arranged in same end user terminal 102.In this case, user can make
One example of VoIP client is positioned on user terminal 102, and this example is configured to enable via partner
Partner networking software 271(on server 105 such as, via social networking site) access VoIP
Communication system, and another example on same user terminal 102 is configured to access via usual manner
VoIP communication system, i.e. directly via the service of VoIP provider in the case of not having partner 105 to participate in
Device 104 and/or P2P technology.In certain embodiments, one or two in two examples can be exclusive
Property permission is set or configured into accesses VoIP communication system according to they corresponding modes, i.e. one
Allow only to access VoIP via buddy system 105, and/or one allows in the participation not having partner 105
Under only directly access VoIP via the server 104 or P2P of VoIP provider.But, replace
In embodiment, each example can allow for the access via both modes, and by user for different mesh
Safeguard simply in same terminal.
Including first terminal 102(A) user and another terminal 102(E) the situation of user shown
Illustrate that Fig. 2 c also show same user and has the VoIP being each provided with this user in figure 2 c to meaning property
The independent example 222 and 222 of client application " two different terminals 102(A) and 102(F) can
Can property, and user has at same user terminal 102(A) two of the upper VoIP client installed not
With example 222 and 222 " ' probability.
Example as aforesaid operations, it is considered to first terminal 102(A) user access social networking site
The situation of the page, this social networking site includes the profile about other users and other information.In response to
Detecting that this point, Partner Software 271 can consult look-up table, the ID of VoIP system is mapped by this look-up table
Identifier to the user identifying buddy system.Look-up table can be stored in the server of VoIP provider
104 or partner server 105 on if it finds a match, that means just to be looked on the website of buddy system
The profile of the user seen also is the user of VoIP system, and when this coupling being detected, Partner Software
271 can be in terminal 102(A) on the page just checked inserts the control being associated, such as can click on
Call icon or IM chat hurdle.Or, this function may utilize web browser 221, client 222
Local example and/or between the two (not shown) arbitration toolbar should be used at user terminal 102(A)
Locally realize, equally, if locally realized, then search and be usable in user terminal 102(A) on
The local look-up table of storage rather than on server 104 or 105 look-up table of remotely storage perform, this
Ground look-up table lists all known contact person of user of both VoIP and buddy system.
Fig. 4 a is the schematic figure of the user interface of the web browser 221 showing example social networking site
Show, wherein with user terminal 102(E in buddy system) the letter of example user " Sally Fictitious "
Shelves insert integrated VoIP(and/or IM explicitly) control 402.
First user terminal 102(A) user subsequently can be mutual with the control 402 inserted, to initiate
With the user mating user's (being user terminal 102(E in this example)) communication connection, such as VoIP
Calling, video call or IM chat sessions.Therefore, this provides and transports via in partner server 105
The partner instance 222 ' of row and do not use at the user terminal 102(A initiating user) upper run local real
Example 222 to VoIP(or IM) the replacement access mode of communication system.For convenient, initiate user and exist
This is referred to alternatively as calling party or MPTY, is referred to alternatively as called party or quilt to its user initiating communication
MPTY, but it is to be understood that be intended to cover the other type of communication in addition to voice or video call,
Such as IM message, voice mail or file transmission.
Mutual in response to user, the browser 221 run in the terminal 102 of MPTY passes through the Internet
108 send signal to Partner Software 271.Signal include voip user ID and VoIP system any its
The user certificate that he is correlated with.In response to receiving this signal, Partner Software 271(is such as via OS270) will
Certificate passes to partner instance 222 ', and controls its VoIP by the Internet 108 with suitable called party
Client sets up communication connection.This can start by initiating each MPTY of communication the most in this way
The new example 222 ' of client application, or by providing the special partner that can process multiple calling party of client
Companion's example 222 ', or the actual combination by both technology, realize.The partner that can process multiple user
In the situation of companion's example 222 ', user certificate can be used for creating different user conversations or reality in this example
Body.
Or, mutual in response to user, the browser 221 that runs in the terminal 102 of MPTY to
The upper VoIP client example 222 run of one of family terminal 102 " or 222 " ' in one send signal,
One of this user terminal 102 is configured to via buddy system 105 to access VoIP, and VoIP client
End example 222 " or 222 " ' send signal by the Internet 108 to Partner Software 271.
Considering this situation from other angle, such as other users such as Sally can initiate and first terminal 102(A)
The communication of first user (Joe), or by the user terminal 102(E of herself) on run VoIP
The local example of herself of client application, or by accessing the VoIP visitor in partner server 105
This example is also provided together with the user certificate of herself by the partner instance of family end.Even if other users are not
The registration user of VoIP system, it is possible to allow them by creating interim or that partner is special voip user
Certificate (is for example, at least ID and any other required certificate, such as certification certificate of VoIP system
And/or password) use the partner instance in partner server 105 to access VoIP system.
As mentioned, multiple examples that first user Joe may have client application are available, and
And any of which can be run in certain time arbitrary.Such as, user can have domestic consumer eventually
End 102(A) upper install master instance 222, in partner server 105 partner instance 222 ' of trustship,
Active user terminal 102(F) on another local example 222 " and/or in the use identical with master instance
Family terminal 102(A) upper another example installed.Depend on user to be currently in use in certain time arbitrary
Which example, i.e. which is executed, by suitable terminal 102(A), 105 or 102(F)
On example deliver any request setting up VoIP communication connection from any other user respectively.Currently
The example used is also considered as " activity " example.Request is delivered to suitable destination can pass through
The lookup address such as making the example of activity update at the suitable node of distributed address lookup scheme realizes.
If be performed at arbitrary certain time multiple example, then rule can be provided to determine which is preferential
And be considered as " movable ".Such as, any one run in active window, or the most not rear
Any one run in platform or system tray.
Noting, the partner instance being currently in use in partner server 105 as one or more users accesses
VoIP communication system, that do not mean that reality Media Stream must route via partner server 105 (though
So it is not excluded for that probability).On the contrary, participate in being mainly used in initiating calling or connecting setting, and once
At such as 102(A) and 102(E) etc. establish connection between two user terminals, then actual voice
Or video etc. can be across the Internet 108 direct routing between which.
Fig. 4 b shows the user terminal 102(E at Sally) on the user interface of buddy system checked
Schematic example.If first user Joe is the user of both VoIP system and buddy system, then
She can check profile (such as, his social networking profile, it is not necessary to VoIP of Joe in buddy system
His profile intrasystem is identical), and be presented and utilize the partner instance in partner server 105 to Joe
Terminal 102(A) or 102(F) the control communication initiated.Buddy systems users interface may also include fair
The control 404 of other users of family allowable search buddy system, such as, is come by the ID of VoIP system
Search, or by such as affecting common interest, target or the ground whether user is ready to get in touch
Other information such as point are searched for.
For the communication system of such as VoIP system, user the most only other users be understanding or credible
Time just accept them as contact person.However, the inventors have also recognized that for some buddy system, user
May also there is no believable contact person's circle.Such as, if buddy system is social networking or appointment website,
The whole plan then using buddy system can be to meet with stranger, but simultaneously, user can be in do so
The privacy settings that Shi Yaoqiu is stricter than existing VoIP system.Even if it is therefore desirable to provide by VoIP
Also the mechanism of suitable privacy can be safeguarded when system is mutually integrated with buddy system.
In another example, some buddy systems may be more credible than other system.Such as, in conventional society
Handing in network, the contact person that user may only accept to recognize is as friend, in this case, by this partner
It is acceptable that the contact person of system is integrated in VoIP client without extra privacy;But,
Some other type of social networkies (such as appointment design those social networkies) may less by with
Family is trusted, and it is thus desirable to stricter privacy settings.
Wherein other examples of the buddy system that privacy is probably a problem can include providing classified advertisement
Or the website of personal advertisement, forum or wherein user be not intended to allow carry with in non-commercial context
The system relevant with business that the same levels of confession is close nature.
Additionally, no matter what the problem of buddy system is, user possibly rely at home or work,
Or still use mobile terminal to walk about outside and need the privacy of different stage at home.
In order to solve the problems referred to above, each embodiment provides multiple different instances of same subscription client application,
And depend on same subscription client application different instances in which be currently movable, safeguard not
Same privacy settings.Therefore, user is able to rely on environment that he or she is operating or situation is safeguarded not
The privacy of same level.Such as, if the partner instance via client 222 ' is online, then user it may be desirable to
Than via master instance 222 online time privacy greatly, if or online on active user terminal,
Then user it may be desirable to more online than on domestic user terminal time privacy greatly.
Noting, different examples specifically refers to the example of same user.Even if being to take partner at one of example
In the case of the partner instance run on business device 105, then when so doing, partner instance still can be claimed
For the example of the client application of same user because it with the ID of this user and potential other this
Class certificate carrys out instantiation, so as to represent this user or represent this user initiate and accept communication connection
Middle action.But, at user terminal 102(A) and 102(E) the upper communication customer end installed be not with
The different instances of one client, because they represent or represent different user action.The client of given user
The example of end can be considered as to be characterized by ID or similar information.
Fig. 5 schematically shows the example user interface for controlling privacy settings of VoIP client.
Any or all in these privacy settings can be provided in different embodiments or other privacy settings.
In one embodiment, the different privacy settings of different instances can each be stored in depositing of corresponding terminal
At storage equipment, such as, in terminal 102(A of respective instance), 102(F) and 105 at storage list
Only privacy settings.But, this embodiment can only allow to control the privacy of this example when running particular instance
Arrange, such as, if user is currently in use domestic user terminal 102(A) and operational terminal 105(F)
Be closed, then the privacy settings of user's working example to be remotely controlled may is that impossible.
On the contrary, in embodiments, the some or all of privacy settings in customer instance is stored in service
On device, the server 104 of such as VoIP provider.Which the example being the most now currently in use is, this
Can allow to remotely control the privacy settings of whole example, such as, client user circle via the Internet 108
Face can be operable to for the example of each example or each type open in such as Fig. 5 single
Window, or the same window can include the single control of the example for each example or each type.
Referring again to Fig. 2 c, in order to realize this embodiment, in addition to ID, can leading to given user
Each example of letter client provides additional identification symbol or the parameter of herein referred to as " token ".Token is not
Distinguish mutually with between the client instance of type or the client instance of different grouping, or even in order to identify
Each client instance in multiple examples of given user.Such as, token can identify this example is partner
Example or the routine of VoIP client " lead " example.Or, token can include identifying given user's
The identifier of the particular instance in those examples, in this case, ID group together with token ID
Being combined in will be unique in discussed communication system.When user runs in corresponding terminal 102 or 105
During the particular instance of his or her client, this example via the Internet 108 to the clothes of VoIP provider
Business device 104 transmit its token and ID (if or to make token ID itself be unique, the most only need
Token ID to be transmitted).In response to receiving these, VoIP server 104 is configured to subsequently for this use
Token is searched at family in the look-up table 199 being stored at this server, and therefore retrieval sends request example
Associated privacy is arranged.The server 104 of VoIP provider is with being somebody's turn to do on backward counterpart terminal 102 or 105
Privacy settings required for example return.
In embodiments, privacy settings permission first user at least can be current by depending on first user
The example that is currently in use (such as by voice, video or IM message), determine other users and they
Contact by communication medium.Such as, research tool 404 may have been used with reference to Fig. 4 c, Sally
Determine that she and Joe have some common interest, and it is desirable to contact him with suggestion social activity appointment.So
And, Joe may be it is of concern that join when he is just using buddy system rather than main VoIP client example 222
The user being him may be the most credible, or may want to maintain a certain distance until the most familiar, and
And therefore it may be desirable to keep privacy greatly in this environment.It that case, he can set
Put his privacy settings so that when he use partner instance 222 ', 222 " or 222 " ' online time, Zhi Nengtong
Cross such as IM chat messages and contact him;But when he uses master instance 222 online, also by video
Or voice call he.Therefore, if Sally is shown in Joe in the environment of partner's social networking site
Face, she can only pass through appearance in the chat hurdle that the part as the VoIP control 402 inserted provides
IM chat messages contacts with him, as illustrated in fig. 4 c.If she attempts initiating audio call, then Huo Banshi
Example 222 ', 222 " or 222 " ' the privacy settings of this example that will retrieve based on it, refuse to connect and arrange
Request.
Certainly, if Sally knows the ID of the VoIP communication system of Joe, then she will remain able to
He via master instance 222 online time contact him by voice or video call.But, depend on this enforcement
Example, this ID can hide to her in the environment of buddy system, determines to share these details at least up to Joe.
In another example, whether privacy settings can allow user to depend on example and enable or disable them and can
Contacted.
In another example, privacy settings user can be allowed to depend on example that he is currently in use is seen to control him
How get up.Such as, user may be not intended to other users he use partner instance (if such as use
The example of appointment website trustship) time see his presence state or some part of his VoIP system profile.
In the situation limiting information on the scene, if it is directly shared between each client of user terminal 102,
Then as it has been described above, active instance 222 ', 222 " or 222 " ' can be from the server 104 of VoIP provider
Retrieval privacy settings, and example 222 ', 222 " or 222 " ' be subsequently based on those privacy settings, with such as
The most described upper refusal request connect arrange similar mode stop or ignore from other clients on the scene
The request of information.But, (need not be with the pass safeguarded in situation disclosed in restricting VoIP profile information
In the profile of buddy system, such as social networking profile, identical), this information can be at VoIP server 104
Place is intensively safeguarded.In that scenario, active instance 222 ', 222 " or 222 " ' can take to VoIP
Business device 104 sends message, to be labeled as some profile information to access or forbid to access.
In another embodiment, the VoIP contacts list of user can be divided into two or more differences
Packet, and can be that each in those different grouping safeguards different privacy settings.Refer again to
Fig. 2 c, can safeguard at the server 104 of VoIP provider that VoIP contacts list 198(joins with partner
Being that list is contrary, this partner's contacts list may be that part is consistent).Specific when subscription client
When example runs in terminal 102 or 105, it joins from P2P server 104 retrieval via the Internet 108
Be list, and when contact person is updated, client instance by the associated person information that updated via because of
Special net 108 uploads to VoIP server 104.By the way of similar, terminal 102 or 105 is transported
The client instance of row also can retrieve, from VoIP server 104, the finger which packet which contact person is positioned at
Show and retrieve the privacy settings of different grouping, and message can be sent to P2P server 104, to update that
Which packet a little users are positioned in and update the privacy settings of those packets.
In embodiments, only one of which VoIP contacts list 198 needs the clothes VoIP provider
Safeguard at business device 104, and different contact person packet can be by by each with in list of labelling or parameter
Contact person is associated and realizes, and it is specific that corresponding contact person is designated as being assigned in packet by this list
One, such as X or Y.
In certain embodiments, contact person's packet of first user can be at least partly dependent on and meet for the first time
See that the environment of contact person automatically determines.
Such as, can be dependent on he uses when for the first time meeting contact person example to automatically determine contact person
Initial packet.If first user is from another user being accepted as contact person in VoIP system
(contrary with the contact person in buddy system) receives request, and this request is from partner server 105
The partner instance of upper operation receives, if accepted, then the client of first user can by this contact person certainly
It is placed in dynamicly and there is stricter privacy settings (such as, can only be chatted by IM rather than voice or regard
Frequency calling contact first user) packet X in.If but request is to transport from user terminal 102
The master instance of row receives, then it can be automatically placed in the strictest packet Y.Initiate request
The type of example can be determined by token, and this token can be asked transmitted along with contact person.
From another perspective, if first user is currently in use (such as, partner another user
Run on server 105) partner instance time request become the contact person of this another user, then this another
Individual user can be automatically placed in stricter packet X.But, if first user is used at another
When master instance is just being run at family on user terminal 102, request becomes the contact person of this another user, then this is another
One user can be automatically placed in the strictest packet Y.The example that another user is currently in use
Type can be according to asking in response to the contact person from first user and the token that retrieve determine.
Alternatively or in addition, can be dependent on when for the first time meeting another user first user oneself
The example used automatically determines the initial packet of contact person.That is, depend on when receiving from another user
When contact person asks or when sending, to another user, the example that when contact person asks, first user is currently in use.
Therefore, if first user uses partner instance 222 ' to ask to become the contact person of another user, then should
Another user can be automatically placed in stricter packet X, but, if first user sends
Ask from the contact person of master instance 222, then during this contact person is placed in the strictest packet Y.
After initial packet automatically, first user can have user is manually re-assigned to other points
The option of group.In this sense, packet can be that part is automatic.
Safeguard that for different grouping the feature of different privacy settings is used as being for different clients Example maintenance
Supplementing or replacement of the feature of different privacy settings.In the situation that the two feature is used together, hidden
Therefore private look-up table 199 can include multiple entrances of privacy settings token one by one one by one, the most each packet X
Or Y has one.
Should be appreciated that above-described embodiment is only used as example and describes.
Such as, although equity (P2P) system has been mentioned as a kind of possible topological structure, but this
The bright P2P that is not exclusively suitable for, and any kind of packet-based communication system can be applied to, such as before
The most centralized VoIP system discussed.Additionally, this invention is not limited to use on the internet, and
It is can to realize on any packet-based network.Although additionally, above according to such as social networking site etc.
The buddy system of exemplary types is described, but combines P2P, VoIP or other these communication systems exist
The other type of buddy system run on packet-based network is possible.
Furthermore, it is noted that term used herein " is applied " need not refer to the most discrete any software unit,
The most single program or the program being performed separately.Any function as application-specific described above can include
One or more different code sections or independently operable code section.Such as, although in each enforcement
In example, document viewer and communication customer end are the application that can be performed separately, but they need not necessarily this
Sample.
Furthermore, it is noted that, although may have been made by above assembly (the such as memorizer of user terminal 102
Or processor, the server 104 or 105 of packet-based network or packet-based network and phone
Gateway 106 between network) reference, but these terms typically need not refer to the single unit that maybe can divide,
Such as, memorizer or storage medium or equipment can include one or more type of memory, and such as flash memory is with hard
Disk drive etc. and/or one or more physically separate memory module;The processor of user terminal can
Including multiple cores or performance element;Server can include multiple groups at the different websites that may be distributed across a network
Become server unit;And, gateway can include the multiple gateway units being distributed across a network.
Additionally, this invention is not limited to use any specific control mode safeguard and control privacy settings.More
Usually, control mode can be implemented as the form of any suitable control.In embodiments, control to set
The standby suitable code being implemented as on the server (such as server 104) of packet-based network and looking into
Look for table.But as mentioned, the control equipment of replacement can be implemented as on the different terminals of each respective instance
Suitable code and single privacy settings form (such as, partly on user terminal 102 and
Partly realize in partner server 105).In other embodiment, each user available or partner
The specialized hardware that theres is provided in terminal or via the addressable specialized hardware of another node of packet-based network
Realize some or all in privacy control equipment.
It is said that in general, any function described herein can use software, firmware, hardware (such as, fixing to patrol
Volume circuit) or these combinations realized realize.Term used herein " module ", " function ",
" assembly " and " logic " typicallys represent software, firmware, hardware or a combination thereof.In the situation that software realizes
Under, module, functionally or logically expression are held when in processor (such as, one or more CPU) upper execution
The program code of row appointed task.Program code can be stored in one or more computer-readable memory and set
In Bei.Features of the techniques described below is platform-independent, it is meant that described technology can have respectively
Plant and realize on the various commercial computing platforms of processor.
Such as, user terminal may also include so that the hardware of user terminal performs the entity (e.g., software) of operation,
Such as processor functional device, etc..Such as, user terminal can include computer-readable medium, and it can be configured
The operating system of user terminal especially user terminal and the hardware being associated is made to perform operation for safeguarding
Instruction.Therefore, instruction performs operation for configuring operating system and the hardware being associated, and with this side
Formula causes operating system with the hardware transform being associated to perform function.Can be by computer-readable medium by each
Plant difference configuration and provide instructions to user terminal.
A kind of such computer-readable medium configuration is signal bearing medium, and is therefore configured to instruct
(such as, as carrier wave), such as, by network, be sent to calculating equipment.Computer-readable medium also may be used
It is configured to computer-readable recording medium, is not the most signal bearing medium.Computer-readable recording medium
Example include random-access memory (ram), read only memory (ROM), CD, flash memory,
Harddisk memory and other can use magnetic, light and for storing the other technologies of instruction and other data
Memory devices.
Although the language special by architectural feature and/or method action describes this theme, it is to be understood that,
Subject matter defined in the appended claims is not necessarily limited to above-mentioned specific features or action.More precisely, on
State specific features and action is as realizing disclosed in the exemplary forms of claim.
Claims (10)
1. a communicator, including:
Being coupled to one or more terminals of packet-based network, described terminal is mounted with the first use
First example of the communication customer end application at family and the described communication customer end application of described first user
The second example, described communication customer end application be configured to make described first user energy upon being performed
The first communication system that enough utilizations realize on described packet-based network is come and other telex networks;
And
Being coupled to described packet-based network-based control device, described controller is configured to:
Each single privacy in locally stored described first and second examples of described controller
Arrange, effectively to safeguard each different privacy settings in described first and second examples;
Which depends in described first and second examples is the example of movable and described activity
Corresponding privacy settings, control described first user relative in described first communication system described its
The privacy of he user.
2. device as claimed in claim 1, it is characterised in that also include first in described terminal
The second terminal in terminal and described terminal, described first example of described client application is installed in
On first terminal, and described second example of described client application is installed in the second terminal.
3. device as claimed in claim 1, it is characterised in that the institute of described communication customer end application
State that the first and second examples are installed in described terminal same on.
4. device as claimed in claim 1, it is characterised in that described controller is further configured to:
Receiving which example in described first and second examples is the identifier of current active, described first
Example and the first identifier are associated, and described second example and the second identifier are associated;
The identifier received is mapped to the privacy settings of correspondence, and
Depend on arranging of being mapped and control described privacy.
5. device as claimed in claim 2, it is characterised in that described controller also includes described the
One and the second corresponding data storage cell on each in terminal, thus be described first and second
Each in example provides local privacy settings.
6. device as claimed in claim 1, it is characterised in that also include one or more second clothes
Business device, described second server is configured to run on described packet-based network the partner realized
Communication system, described partner communication system combines packet-based described first communication system to provide attached
The telecommunication media added, described second example of wherein said client application and described partner communication system
It is associated.
7. device as claimed in claim 6, it is characterised in that also include the first end of described terminal
End and the second terminal of described terminal, described first example of described client application is installed in first
In terminal, and described second example of described client application is installed in the second terminal;
The one or more second server at least includes described second terminal so that described second eventually
End is arranged to provide the access to described first communication system via described partner communication system.
8. device as claimed in claim 1, it is characterised in that:
Described controller be further configured to into described first user safeguard with from other users described
First and second contact persons' packets in each relevant single privacy settings, and therefore rely on
Described in the packet of other users described controls described first user and described first communication system
The privacy that other users are relevant.
9. device as claimed in claim 8, it is characterised in that also include one or more second clothes
Business device, described second server is configured to run on described packet-based network the partner realized
Communication system, described partner communication system combines packet-based described first communication system to provide attached
The communication medium added, wherein said controller is configured to depend on initial the most whether leading to via described partner
Communication system runs into and automatically determines the packet of contact person.
10. the method realized by server, including:
Described server is used to provide the of communication customer end application to the terminal of packet-based network
One example is for first user, and the application of described communication customer end is configured to make upon being performed described
First user can utilize the first communication system realized on described packet-based network to come and other
Telex network, described first example and first group of privacy settings of the application of described communication customer end are associated;
Described server is used to provide the application of described communication customer end to the terminal of packet-based network
The second example for described first user, described second example of described communication customer end application with
Second group of privacy settings is associated;
At described server, it is stored separately described first group of privacy settings and described second group of privacy sets
Put with effectively:
It is the different privacy settings of described first and second Example maintenance by described server;
Whenever described first example is movable, control described first according to described first group of privacy settings
The privacy of user;And
Whenever described second example is movable, control described first according to described second group of privacy settings
The privacy of user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611036778.3A CN107104935B (en) | 2012-03-16 | 2013-03-15 | Method, server and terminal equipment for protecting communication privacy |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1204687.6A GB201204687D0 (en) | 2012-03-16 | 2012-03-16 | Communication privacy |
GB1204687.6 | 2012-03-16 | ||
US13/722,974 | 2012-12-20 | ||
US13/722,974 US9240987B2 (en) | 2012-03-16 | 2012-12-20 | Separate privacy setting control of multiple communication clients of a user |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611036778.3A Division CN107104935B (en) | 2012-03-16 | 2013-03-15 | Method, server and terminal equipment for protecting communication privacy |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103248619A CN103248619A (en) | 2013-08-14 |
CN103248619B true CN103248619B (en) | 2016-12-28 |
Family
ID=48927841
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611036778.3A Active CN107104935B (en) | 2012-03-16 | 2013-03-15 | Method, server and terminal equipment for protecting communication privacy |
CN201310085280.6A Active CN103248619B (en) | 2012-03-16 | 2013-03-15 | Communication privacy |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611036778.3A Active CN107104935B (en) | 2012-03-16 | 2013-03-15 | Method, server and terminal equipment for protecting communication privacy |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN107104935B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1625737A (en) * | 2001-12-12 | 2005-06-08 | Ut斯达康有限公司 | System and methods for providing instant services in an internet protocol network |
CN102025648A (en) * | 2009-09-16 | 2011-04-20 | 腾讯科技(深圳)有限公司 | Instant messaging method and server |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0226651D0 (en) * | 2002-11-15 | 2002-12-24 | Koninkl Philips Electronics Nv | Accessing on-line services |
US20070250516A1 (en) * | 2006-04-25 | 2007-10-25 | Onebiztone Llc | Member centric information dissemination system |
US20090049190A1 (en) * | 2007-08-16 | 2009-02-19 | Yahoo!, Inc. | Multiple points of presence in real time communications |
US8166104B2 (en) * | 2009-03-19 | 2012-04-24 | Microsoft Corporation | Client-centered usage classification |
-
2013
- 2013-03-15 CN CN201611036778.3A patent/CN107104935B/en active Active
- 2013-03-15 CN CN201310085280.6A patent/CN103248619B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1625737A (en) * | 2001-12-12 | 2005-06-08 | Ut斯达康有限公司 | System and methods for providing instant services in an internet protocol network |
CN102025648A (en) * | 2009-09-16 | 2011-04-20 | 腾讯科技(深圳)有限公司 | Instant messaging method and server |
Also Published As
Publication number | Publication date |
---|---|
CN103248619A (en) | 2013-08-14 |
CN107104935A (en) | 2017-08-29 |
CN107104935B (en) | 2020-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10599869B2 (en) | Separate privacy setting control for multiple application instances of a user | |
EP2074521B1 (en) | Methods and apparatuses for managing resources within a virtual room | |
CN102164170B (en) | contextual correlation engine | |
US8195137B2 (en) | Updating contact information for mobile traffic | |
US10205687B2 (en) | Apparatus and method for managing user chat experiences with businesses | |
US8751580B2 (en) | Real-time communication and information collaboration system | |
JP7101314B2 (en) | Devices and methods for managing external permission provision and external messaging communication requests in a group-based communication system | |
CN107787050A (en) | The method and apparatus with dynamic Sexual behavior mode are supported for multiple personality | |
CN102474507A (en) | Telephony discovery mashup and presence | |
US20130227018A1 (en) | Methods and Systems for Identification in a Social Network Using a Mobile Telephone Number | |
CN112422401A (en) | Display method and device for providing interface of social network service through anonymous brief introduction | |
CN104904192B (en) | Communication session is created in alien system | |
US20070254637A1 (en) | Device, Method and Computer Program Product Readable Medium for Establishing a Communication Session | |
US11196700B1 (en) | Single-user non-transferrable communication client for public communication networks | |
US20110202668A1 (en) | Methods for Creating and Using a Telecommunications Link between Two Users of a Telecommunications Network | |
US20200402006A1 (en) | System and method for managing communications over an organizational data communication network | |
CN103248619B (en) | Communication privacy | |
KR20230161239A (en) | An operating method of a user terminal and the user terminal displaying an interface for providing an instant messaging service | |
EP2294780B1 (en) | A method for masking data | |
EP3357265B1 (en) | Delivering anonymous communication between customers at customer care site | |
Zarkadis et al. | A 16 kb/s APC system with adaptive postfilter and evaluation of its performance | |
Alonso et al. | Enabling opportunistic communications in a Social Communications Broker Architecture | |
WO2013149137A2 (en) | Apparatus and method for managing user chat experiences with businesses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150722 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20150722 Address after: Washington State Applicant after: Micro soft technique license Co., Ltd Address before: Washington State Applicant before: Microsoft Corp. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |