DE102014105557A1 - Method for providing metadata for communication partners and communication system - Google Patents

Method for providing metadata for communication partners and communication system

Info

Publication number
DE102014105557A1
DE102014105557A1 DE102014105557.8A DE102014105557A DE102014105557A1 DE 102014105557 A1 DE102014105557 A1 DE 102014105557A1 DE 102014105557 A DE102014105557 A DE 102014105557A DE 102014105557 A1 DE102014105557 A1 DE 102014105557A1
Authority
DE
Germany
Prior art keywords
communication path
metadata
participant
subscriber
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
DE102014105557.8A
Other languages
German (de)
Inventor
Marcel Hartmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Identr GmbH
Original Assignee
IDENTR GMBH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IDENTR GMBH filed Critical IDENTR GMBH
Priority to DE102014105557.8A priority Critical patent/DE102014105557A1/en
Publication of DE102014105557A1 publication Critical patent/DE102014105557A1/en
Application status is Pending legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • H04M3/42068Making use of the calling party identifier where the identifier is used to access a profile
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Interconnection arrangements between switching centres
    • H04M7/0024Services and arrangements where telephone services are combined with data services
    • H04M7/0036Services and arrangements where telephone services are combined with data services where the data service is an information service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/1016IMS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles

Abstract

The invention relates to a communication system and to a method for providing metadata for communication between communication partners, in particular for mobile communication. The method comprises the following steps: providing a first communication path (40), in particular a voice communication path; Providing a second communication path (42), in particular a metadata communication path; Providing a host (30) with a database system (34) for storing and accessing metadata, in particular context-based metadata; in the case of contact of a source subscriber (24) with a destination subscriber (26), in particular in the case of a call: transmission of a connection request via the first communication path (40) to the destination subscriber (26); starting from the source subscriber (24), transmitting the identification feature identifying the destination subscriber (26) to the host (30) via the second communication path (42); Checking, by means of the identification feature identifying the destination subscriber (26), whether the destination subscriber (26) is capable of receiving and processing metadata contained in a record (50) for the outgoing subscriber (24) in the database system; and, if the destination subscriber (26) is enabled, transmitting metadata to the originating party (24) to the destination subscriber (26).

Description

  • The present invention relates to a method for providing metadata for communication between communication partners, in particular for mobile communication. The invention further relates to a software program with program code for carrying out the method. The invention further relates to a communication system for communication between communication partners, in particular for mobile communication.
  • Mobile communication, especially mobile telephony, has become increasingly important in recent years. Appropriate technologies have been provided so that communication partners, in particular mobile subscribers, can be reachable essentially at any time and almost everywhere. The constant accessibility is commonly seen as an advantage. However, it is sometimes also considered disadvantageous to be reachable at all times. This can be the case, in particular, when a communication subscriber on his mobile device is constantly reachable for business partners and / or employers in his free time. The advancing global interconnectedness can contribute to the aggravation of this problem, because due to the time difference between different time zones one works nearly at any time in any place of the earth.
  • In general, mobile communication involves mobile communication by voice. Various standards have been established for mobile voice communication. On the one hand, this is the GSM standard (Global System for Mobile Communications). Furthermore, the UMTS standard (Universal Mobile Telecommunications System) exists. More recently, the LTE standard (Long Term Evolution) has been implemented. To illustrate the respective functionality, reference is made to the respective standard documentation, in particular the publications of the standardization body 3GPP (Third Generation Partnership Project). Each of these standards may include enhancements to increase performance. This can be about the GSM standard GPRS and EDGE. This can be about the UMTS standard HSDPA and HSUPA. For the LTE standard, this can at least be LTE-advanced.
  • It is understood that other communication standards, in particular other mobile phone standards, are conceivable. By way of example reference is made to the WIMAX. Other standards, including local ones, are conceivable.
  • Preferably, at least some of the standards are at least partially compatible with each other. Furthermore, it is conceivable that a particular mobile device is adapted to meet several of the standards. By way of example, a mobile phone may be configured to comply with both the GSM standard and the UMTS standard and the LTE standard. It is also conceivable to simultaneously provide network coverage for several standards in one area.
  • The standards mentioned can be designed to enable a cross-standard minimal configuration. In other words, the standards can be designed to permit voice communication across standards, in particular in the form of telephone calls. Further, at least some of the standards are adapted to allow communication with wireline communication networks, particularly with a wireline telephone network (also referred to as landline).
  • The compatibility between wired and mobile networks (also referred to as radio networks), ie the limitation to a minimum functionality that can be guaranteed by all standards and networks, also requires a restriction on line reception. This leads to the fact that calls today u.U. still meet standards that have been valid for several decades. Modern communication networks can theoretically be much more powerful, but this would lead to reduced backward compatibility.
  • From the US 2008/0242293 A1 a system is known for displaying a caller name in a wireless mobile communication system comprising a wireless mobile device having a network interface and a software module, wherein the software module is adapted to store already received originating telephone numbers, send a request for a name for the originating telephone number to a server, to contain an answer to the request, to store the name received in response to the originating telephone number, and to display the name on a display.
  • Against this background, the invention has for its object to provide a communication system and a corresponding method, which can extend the minimum functionality of communication networks and in particular make phone calls between communication partners comfortable. In particular, the transmission of context-based information and / or metadata should be made possible.
  • According to a first aspect, the object of the invention is achieved by a method for providing metadata for the communication between Communication partners, in particular for mobile communication, having the following steps:
    • Providing a first communication path, in particular a voice communication path,
    • Provision of a second communication path, in particular a metadata communication path,
    • Provision of a host with a database system for storing and accessing metadata, in particular context-based metadata,
    • - in the case of contact between a source participant and a target subscriber, in particular in the case of a call:
    • Transmission of a connection request via the first communication path to the destination subscriber,
    • On the basis of the starting subscriber, transmission of an identification feature which identifies the destination subscriber to the host via the second communication path,
    • Checking, on the basis of the identification feature identifying the destination subscriber, whether the destination subscriber is capable of receiving and processing metadata which are present in a data record for the outgoing subscriber in the database system, and
    • - If the destination subscriber is capable of transmitting metadata to the original subscriber via the second communication path to the destination subscriber.
  • On the one hand, according to the invention, on the one hand it is made possible for the initial participant to contact the target participant in a conventional manner. This may in particular include a telephone call. However, extended functionality is provided because at the same time a host can be contacted via another communication path to check whether extended metadata can be provided to the target subscriber. If so, these data can be transmitted to the destination subscriber, starting from the host. In other words, the metadata can be "pushed" to the destination subscriber. The metadata can be taken from the database system of the host. The metadata can in principle also be provided by the mobile device of the outgoing subscriber.
  • Metadata may generally include characteristics or characteristics of a communication partner. This may be, for example, the clear name, a nickname, an age or date of birth, a job position, a current activity, a reference to the target subscriber, a picture of the originator, a current mood of the originator, a priority of the call as defined by the originator similar include. Such metadata can generally not in the usual way, so for example by a conventional call, not be transmitted.
  • A push message is usually sent unidirectionally from a sending device to a receiving device. To receive the push message usually no contrary information flow is required. Accordingly, push messages can be transmitted to a target device particularly quickly. The target device does not need to be queried first.
  • It is therefore of particular advantage, in addition to the first communication path, to use a second communication path in order to be able to provide metadata in parallel and essentially at the same time. If the target subscriber is capable of receiving metadata, he can better classify the call and the person of the outgoing subscriber.
  • By way of example, the starting subscriber with his real name and with further information can appear on a display of the mobile device of the destination subscriber. This may also be the case if the starting party and the destination party do not know each other directly. Even if the source party is not directly in the contact list of the destination party, metadata can be provided by the host. The only prerequisite for this is that both the destination subscriber and the original subscriber are registered or logged in to the host. Thus, if the source participant and the target subscriber use the corresponding service provider and have installed a corresponding application on their mobile devices, extended meta information and metadata can be exchanged.
  • A particular advantage of the method is that, for example, if the destination subscriber is not capable of receiving the metadata, then the "conventional" call can be established. This may be the case, for example, if the destination subscriber is simply not registered or registered with the service provider. However, it may also be the case when the destination subscriber is located in a communication network that only allows communication via the first communication path, in particular the voice communication path, and no communication via the second communication path, such as the metadata communication path. This would be the case, for example, if only one GSM network is available in the area in which the target subscriber is located.
  • The identification feature by means of which the destination subscriber is identified can basically include a unique identifier of the destination subscriber. This may be, for example, a telephone number of the destination subscriber or an identification feature derived therefrom. However, other identification features for identifying the destination subscriber are also conceivable. The same applies in principle to the starting participant, for whom an identification feature can also be stored.
  • A communication path can basically correspond to a selected network standard. Accordingly, for example, the first communication path could use the GSM standard. Furthermore, for example, the second communication path could use the UMTS standard or the LTE standard. In other words, the first communication path and the second communication path can be configured as discrete communication paths.
  • However, it is also conceivable to design the first communication path and the second communication path as virtual communication paths that use a common communication channel. By way of example, it is conceivable that both the first communication path and the second communication path share the UMTS standard or the LTE standard. In other words, a common channel is used both for transmitting voice data or connection request data and for transmitting metadata. However, it is preferred that data transmitted over the voice communication path make use of the standardized (telephone) network infrastructure. In contrast, it is preferred that metadata transmitted over the metadata communication path be sent to or sent from a proprietary host designed according to various aspects of the method described herein.
  • The host can also be considered a service provider. The host can always be executed as a virtual host. However, the host can also be a hardware host. The host can be designed as a distributed system. However, the host can also be designed as a central system.
  • At least on the mobile device of the originating subscriber, an application can be provided which can communicate with a corresponding (central) application on the host. The host can access stored data or data records via the database system. In particular, these may be user records that contain metadata identifying individual users. The metadata can be context-based. By way of example, a profile can be created for a communication partner or user that contains several subprofiles. Each of the subprofiles can be assigned corresponding metadata. For example, the subprofiles may reflect certain roles of the user. This can be about family, friends, work, club, school and similar assignments. The user may contact the destination subscriber as the starting party by way of example in his role "family". Accordingly, metadata for this role can be communicated to the target subscriber. In other words, several digital "business cards" or "signatures" may be available to the user or communication partner, from which the host selected for the selected destination subscriber is retrieved.
  • If the target participant is, for example, a business partner, he can be given a serious business "business card". If the target participant is a family member, a private "business card" can be sent to the target participant.
  • It is basically conceivable that the starting party selects the metadata to be forwarded. In particular, it is conceivable that the starting subscriber selects his role or sub-profile for the current call. However, it is also conceivable that the host is an automatic comparison between the original participant and the target subscriber and on this basis, a suitable sub-profile is selected. Metadata can be transmitted to the target participant from the selected subprofile.
  • According to a further embodiment, the method further comprises blocking the transmission of metadata to the original subscriber to the destination subscriber, if the destination subscriber is not capable. In other words, metadata that identifies the source party will not be forwarded to the destination party if it is not trained to receive the metadata.
  • On the one hand, this can be the case if there is no corresponding application on the mobile device of the destination subscriber. Such a state can be performed by a service program installed on the host, for example, by matching existing data in the database system with the identification feature that identifies the destination user. If there is no data entry for the destination subscriber, no metadata information can be transmitted to it. This condition may occur, for example, if the destination subscriber is not registered with the service provider.
  • However, the target subscriber may not be able to receive metadata even if, for example, he is in a location where about the transmission of data over the second communication path is not possible. Again, this can be determined by the host, such as when the target party is unresponsive to a ping. A ping may include a defined command that is transmitted to the destination party and provokes a defined ping response to the destination party that is sent back to the host if the destination party is reachable.
  • The method may further comprise, in accordance with a further development, the step of transmitting a message, in particular a text-based message, to the destination subscriber via the first communication path or the second communication path if the destination subscriber is not capable. For example, the message may include an invitation to join the service of the host. In other words, the message may include an invitation or request to register and install the application on the mobile device of the destination subscriber.
  • The message can be transmitted as a so-called push message to the destination subscriber. The message can be transmitted via the first communication path. By way of example, the message can be transmitted via the first communication path as an SMS message (Short Message Service). This may also be the case, for example, if the destination subscriber is in principle able to receive metadata via the second communication path, but this is currently not possible. If the first communication path is still available, a corresponding message can be generated and transmitted.
  • In an advantageous embodiment, the method further comprises the step of depositing at least one profile data record for a subscriber at the host, wherein the profile data set may preferably have a plurality of sub-profiles with associated metadata. This can be done via an external portal or via an interface at the host. The subscriber or user may use various ways to register with the service and deposit his profile record. As mentioned above, it may be advantageous to deposit several sub-profiles (such as family, leisure, company).
  • Advantageously, a method according to the aspects described here can be used, for example, in companies that supply their employees with mobile devices, in particular with mobile telephones. It has not become unusual in recent years to provide mobile phones to its employees. Often, employees are allowed to use these devices for private purposes. In general, this leads to the expectation of improved accessibility of employees. For larger organizations, hundreds or even thousands of people can be equipped with the right mobile devices. It would therefore be advantageous to use extended information in the form of metadata in the internal communication and preferably also in the external communication with the mobile devices.
  • This may include, in particular, signatures or the like that have become commonplace in e-mail communication in the business environment. Particularly in the case of large companies with many employees, it is not to be expected that an employee has stored relevant contact data of all other employees on his telephone. If a service is set up, which is designed in accordance with various aspects of the method described here, a destination subscriber can recognize in the event of a call on the basis of the signature which colleague from which area is currently calling him. Of course, the process can be used across companies. Communication with suppliers, customers and other business partners can also be optimized in this way. A significant advantage can be that company-specific specifications for the "business card" or signature can be centrally enforced and monitored. The maintenance of the profile data record can be done centrally.
  • Advantageously, the method may be developed according to any one of the following steps:
    • Time-dependent activation and / or deactivation of sub-profiles for a participant,
    • - location-dependent activation and / or deactivation of sub-profiles for a participant, and
    • - Time zone dependent activation and / or deactivation of subprofiles for a participant.
  • In other words, rules can be established that make a subscriber selectively reachable or unreachable. Thus, for example, it can be specified centrally for all employees of a company that no internal calls can be made outside of a specific time window. The constant accessibility of employees is sometimes perceived as disadvantageous.
  • Thus, if all employees of a company with their mobile devices are registered with the host and at least have a corresponding subprofile as employees of their company, this can be selectively disabled to prevent professional calls outside the shared time window. A location-dependent activation or deactivation is also conceivable in order to prevent the accessibility of the participant, for example during vacation. Also, a selective control of accessibility in the case of business travel can in this way be performed. The accessibility can also be optimized by means of a time-zone-dependent activation and / or deactivation.
  • In accordance with a further embodiment, the method also has the step of matching profile schemas between the source user and the destination user as well as a transmission of metadata depending on matching sub-profile assignments. By comparing the profile data can be identified by way of example, whether the starting participant and the target participant are employed at the same company. It could also be determined whether both are examples of the same family, the same circle of friends or the same club belonging. If a match is transmitted, the corresponding sub-profile of the original party can be selected. Accordingly, metadata associated with the sub-profile may be transmitted
  • According to a further embodiment, the method further comprises the step of transmitting a status information to the destination subscriber via the second communication path, wherein the status information describes an assigned prioritization of the connection request.
  • By way of example, the originator may define a priority or importance of the current call during contact, such as initiating the call. Accordingly, the destination subscriber can know who is currently calling and whether the current call is also important. This may allow the target subscriber to decide based on the status information whether the call is just important enough to be accepted. If the call is not important enough, the destination party can ignore the call.
  • According to a further embodiment of the method, this further comprises the step of transmitting status information via the second communication path to the output subscriber, wherein the status information describes a reaction of the destination subscriber to the connection request. This may be particularly advantageous if the destination subscriber decides not to accept the current call. Such status information can therefore be, for example, the request for a new call. It can also be the announcement of a callback. In particular, the destination subscriber can inform the subscriber in this way why he can not or does not want to accept the call at the moment.
  • According to a further development, the method further comprises the step of transmitting adapted status information as a function of a selected sub-profile of the source user and / or the destination user. The status information to be transmitted can, for example, if both participants are employed by a company, deviate from a status information that would have been transmitted if both participants belonged to a circle of friends.
  • According to a further embodiment, the method further comprises the step of assigning identification features to source users and / or destination users in dependence on a basic feature selected from a group consisting of: telephone numbers, IMSI numbers, IMEI numbers, TMSI numbers Numbers, MSISDN numbers, proprietary user numbers, and combinations thereof. It is understood that derivatives thereof are also conceivable.
  • In principle, it is conceivable to create a separate user ID for each participant. In this way, a particular subscriber can still be identified even if he changes his mobile device or his mobile service provider. It would also be conceivable to identify participants based on a combination consisting of at least two of the above numbers. In this way manipulations can be prevented. In general, the basic feature could also be encrypted.
  • The IMSI number is an International Mobile Subscriber Identity. In other words, it is a subscriber identifier for identification in mobile networks, which is deposited approximately on a smart card. The IMSI number usually allows a unique assignment of a person. The IMEI number is the so-called International Mobile Station Equipment Identity. The IMEI number usually allows a unique identification of a mobile device capable of mobile communication. Also, the TMSI number, the so-called Temporary Mobile Subscriber Identity number, allows identification of participants of a mobile communication network. The MSISDN number is the so-called Mobile Subscriber Integrated Services Digital Network Number. This may in the actual sense be a telephone number or telephone number of a subscriber, which is usually associated with a SIM card, a so-called Subscriber Identity Module card (subscriber identity module).
  • According to a further embodiment, the method further comprises the step of matching metadata for a subscriber, in particular profile records, in the database system of the host via an interface for accessing external database systems.
  • The host's database system can use the interface to access internal company databases or public databases by way of example. By way of example, social media providers (social media providers) can be accessed via the interface in order to match profile data. This can minimize the effort for the subscriber, since his record can be generated at least partially automatically.
  • According to a further embodiment of the method, the transmission of the connection request and the transmission of the identification feature take place substantially parallel and rectified. According to this aspect, the transmission of metadata to the destination subscriber can be particularly time-efficient. Namely, if the metadata are directed to the mobile device of the destination subscriber, in particular pushed, they can arrive substantially at the same time as the call signal. This can lead to significant time savings compared to methods in which metadata is interrogated from the mobile device of the destination subscriber. Namely, in the latter case, the mobile device of the destination subscriber can only query the metadata at the host when a corresponding identification feature is transmitted to the destination subscriber on the basis of the call signal.
  • According to a further aspect, the object of the invention is achieved by a software program having program code, by which a method according to one of the preceding aspects is executed when the software program is executed on a mobile device. The software program can also be referred to as an application or, shortened, as an app. It is understood that the software program may work with a corresponding program installed on the host. Accordingly, the entire software provided for carrying out the method may comprise further components. In particular, the software program can be stored on a non-volatile memory and executed from there. The software program can be made available for download in a cloud environment. In general, the software program can be provided via a network for transmission to mobile devices.
  • According to a further aspect, the object of the invention is achieved by a communication system for communication between communication partners, in particular for mobile communication, comprising
    • A network infrastructure that provides a first communication path, in particular a voice communication path, and a second communication path, in particular a metadata communication path,
    • A host with a database system for storing and accessing metadata, in particular context-based metadata,
    • At least one mobile device of a source user and a mobile device of a destination user,
    • In which the communication system is designed, in the event of contact between a source subscriber and a destination subscriber, in particular in the case of a call,
    • To transmit a connection request via the first communication path to the destination subscriber,
    • On the basis of the starting subscriber, an identification feature which identifies the destination subscriber to transmit to the host via the second communication path,
    • Check, on the basis of the identification feature identifying the destination subscriber, whether the destination subscriber is capable of receiving and processing metadata which are present in a data record for the outgoing subscriber in the database system, and
    • - If the destination subscriber is capable of transmitting metadata to the original subscriber via the second communication path to the destination subscriber.
  • It is understood that the above-described communication system according to various aspects of the above-described method can be developed.
  • It is understood that the features of the invention mentioned above and those yet to be explained below can be used not only in the particular combination indicated, but also in other combinations or in isolation, without departing from the scope of the present invention.
  • Further features and advantages of the invention will become apparent from the following description of several preferred embodiments with reference to the drawings. Show it:
  • 1 a highly simplified schematic representation of a communication system;
  • 2 a greatly simplified schematic representation of a mobile device of an originating party and a mobile device of a destination subscriber during a contact in a communication system;
  • 3 an exemplary representation of a profile data set with a plurality of sub-profiles for a subscriber;
  • 4 an exemplary representation of contact data with contact groups;
  • 5 a simplified schematic representation of two mobile devices analogous to the representation according to 2 to illustrate operations during contact;
  • 6 another highly simplified schematic representation of two mobile devices to illustrate information and choices for the target subscriber during a contact;
  • 7 another highly simplified schematic view of a communication system;
  • 8th a highly simplified schematic block diagram illustrating an exemplary method for providing metadata; and
  • 9 a further highly simplified schematic block diagram illustrating an exemplary embodiment of the method according to 8th ,
  • 1 shows a schematic, highly simplified representation of a communication system, the total with 10 is designated. In the communication system or system 10 it may be in particular a system for mobile communication. The system 10 can be a network infrastructure 12 that enables mobile communication, for example. By way of example, the network infrastructure 12 allow communication according to at least one mobile standard. Mobile standards may be, for example, the GSM standard, the UMTS standard, the LTE standard and other standards and their modifications. Preferably, the network infrastructure 12 designed to allow communication over several mobile radio standards. Accordingly, the network infrastructure 12 at least a mobile network 14 include and / or provide. The mobile network 14 can at least one base station 16 include. Exemplary are in 1 a first base station 16-1 and another base station 16-2 shown. The mobile network 14 Furthermore, at least one standard-compliant control device 18 include. The mobile network 14 can be a so-called air interface 22 deploy, via the mobile devices 24 . 26 with the mobile network 14 and - over the mobile network 14 - can communicate with each other.
  • To further design components of the mobile network 14 For example, reference is made to relevant descriptions of the UMTS standard, the GSM standard and the LTE standard.
  • By way of example, the mobile device may be 24 to act a mobile device of a starting party. By way of example, it can be the mobile device 26 to act a mobile device of a destination subscriber. Usually, the subscriber is the subscriber of the mobile network 14 who initiates a call to the destination subscriber. The call comes from the starting party. In other words, the originating party can call the destination subscriber to have a conversation with him, for example.
  • On the mobile devices 24 . 26 they can generally be mobile phones. On the mobile devices 24 . 26 In principle, it could also be other mobile devices that are capable of mobile communication. These may be, for example, mobile computers, tablet computers, handheld computers and vehicle-mounted mobile devices. The mobile devices may comprise standard-compliant transceiver units.
  • The system 10 can also host 30 of a service provider. The host 30 can be a server environment 32 include. The server environment 32 can be a database system 34 as well as a database 36 include. About the database system 34 can access data in the database 36 be accessed. Furthermore, via the database system 34 Data in the database 36 be stored. As mentioned above, the host can 30 be a cloud-based host. The host 30 can be designed as a virtual host. The host 30 can be a distributed server environment 32 with virtual servers. The host 30 may be abstract as a provider of a service or service to subscribers 24 . 26 of the mobile network 14 to be viewed as. In other words, the host can 30 provide an application through the applications of the mobile devices 24 . 26 the subscriber can access extended functionalities. In other words, the host can 30 in connection with the mobile application, an extended functionality of the mobile network 14 allow.
  • 2 illustrates in a very simplified manner a mobile device 24 a home subscriber using a mobile device 26 of a target participant comes into contact. In other words, the originating subscriber may be via his mobile device 24 the mobile device 26 of the destination subscriber. In known mobile networks 14 The initial contact usually includes a "call" of the mobile device 26 the destination subscriber via a first communication path 40 , especially about one Voice communication path. Via the first communication path 40 can provide standards-compliant contact initiation data 44 to the mobile device 26 be transmitted there and cause about a "ringing" or "call waiting". The transmission over the first communication path 40 may include a standard compliant transmission of data identifying the caller. This may include in particular the transmission of a telephone number of the caller. Usually, however, no further relevant metadata is transmitted to the caller via the first communication path.
  • It is therefore preferable if the contact initiation between the initial subscriber and the destination subscriber also includes communication via a second communication path 42 which may be referred to as a metadata communication path. Via the second communication path 42 can be metadata 46 from the mobile device 24 of the originating subscriber to the mobile device 26 of the destination subscriber. metadata 46 may include an accurate identification of the originating party and possibly even information about the purpose of the call. metadata 46 may further include, for example, caller-selected prioritization of the call.
  • As already mentioned above, the first communication path 40 and the second communication path 42 use a common communication channel. However, it is also conceivable that each of the communication paths 40 . 42 uses a separate communication channel. A communication channel can correspond approximately to a mobile radio standard. By way of example, the first communication path 40 use a channel that complies with the GSM standard. By way of example, the second communication path 42 Use a channel that complies with the UMTS standard or the LTE standard.
  • 2 further illustrates that it may be advantageous when transmitting data in the initial contact between the mobile device 24 the originator and the mobile device 26 the destination subscriber is essentially unidirectional. In particular, the transmission of metadata 46 to the mobile device 26 can be unidirectional. In other words, that means the metadata 46 on the mobile device 26 can be "pushed". This can bring speed advantages.
  • The transmission of metadata 46 over the second communication path 42 can essentially by the host 30 provided service or service. In other words, the host can 30 in addition to the original communication via the first communication path extended communication, in particular an extended data transmission including the second communication path 42 cause.
  • In particular, if the destination subscriber is not previously aware of any metadata of the originating party, the assignment of metadata to the originating party can not be solely local to the mobile device 26 of the destination subscriber. The originator is then unlikely to be in the (local) contacts on the mobile device 26 deposited.
  • The host 30 , compare too 1 , but thanks to its database system 34 with the database 36 provide a variety of contact information to the subscribers of the mobile network 14 provided they are at the service of the host 30 registered and / or registered. In other words, the host can 30 be configured to provide in particular unambiguous by means of an identification feature that can identify a subscriber to provide extended information for the subscriber, the so-called metadata 46 ,
  • For this purpose, via the second communication path 42 , compare 2 and 7 , an identifying feature identifying the destination subscriber to the host 30 be transmitted. The host 30 can use the identification feature to check whether the destination subscriber or his mobile device 26 already registered or logged in at the service. If this is the case, the host can 30 the transmission of metadata 46 , Describe the starting party closer to the target subscriber or his mobile device 26 cause.
  • The metadata identifying the source participant 46 basically in the database 36 of the host 30 be deposited. However, it is also conceivable that the metadata 46 at least partially on the mobile device 24 are deposited by the starting party. In particular, the initial participant can at least a part of the metadata to be transmitted 46 ad hoc prior to contacting the target participant.
  • The system 10 allows the inclusion of profile records 50 for the participants, compare an exemplary illustration in 3 , A profile record 50 can in the database 36 ( 1 ) be deposited. The profile record 50 can have a plurality of subprofiles 52 include. 3 exemplifies four sub-profiles 52-1 . 52-2 . 52-3 and 52-4 , Each of the subprofiles 52 of the profile data record 50 can be a "business card" or signature of the corresponding subscriber when communicating in the mobile network 14 contain. It is an advantage in the profile record 50 several subprofiles 52 provided. In this way, the participant can take multiple roles.
  • The subprofile describes by way of example 52-1 in 3 a business profile of the participant. Accordingly, metadata stored there can correspond to the business dealings. The subprofile 52-2 on the other hand, can describe a familial role of the participant. Similarly, the subprofile 52-3 describe a role of the participant in the free time or in an association. Accordingly, for example, the business subprofile 52-1 contain a serious external representation of the participant. In contrast, about the sub-profiles 52-2 and 52-3 contain a rather private external representation of the participant.
  • It may be beneficial if the host 30 is configured to perform a profile match between an initial participant and a target participant. In this way it can be determined, for example, whether both participants have matches in their business profile 52-1 exhibit. Accordingly, for example, it could be checked whether both participants are employed by the same company. It can be concluded that in the communication between the original participant and the target subscriber a specific business signature or "business card" as part of the metadata 46 to be transmitted.
  • However, it would also be conceivable, in principle, at the host 30 , especially at its database 36 known contact information 60 for a mobile network subscriber 14 to deposit. An exemplary presentation of contact data 60 is in 4 shown. Contact information 60 can use different contact groups 62-1 . 62-2 . 62-3 and 62-4 include. In particular, the contact groups 62 at least partially in their order characteristics with the subprofiles 52 of the profile data record 50 correspond. By way of example, the contact group 62-1 include business contacts or business contacts. Accordingly, the contact group 62-2 include family contacts. The contact group 62-3 can include leisure contacts or club contacts. So if contact information 60 at the host 30 can be predefined, that the target participant receives certain metadata of the original participant that his contact group 62 assigned.
  • As indicated above, this can be used in companies that offer their employees mobile devices 24 . 26 , especially mobile phones. For employees of a company can have a separate contact group 62 be created. This can in particular be done centrally, without a participant must be active. It can also contact group 62 are created for organizational units that are smaller than the company, such as departments or areas. For the different contact groups 62 Rules can be defined which metadata are to be displayed when a connection request or contact request is transmitted to the destination subscriber. For example, it is conceivable to define department-internal signatures, company-internal signatures, cross-company signatures and other signatures. Accordingly, already at the initiation of a telephone call, so when "ringing" on the mobile device 26 of the target subscriber are displayed context-dependent, who calls and what function the caller exercises in a company. This can be accomplished without a company-busy subscriber handing his data locally to his mobile device 24 . 26 must maintain.
  • As mentioned above, rules can be defined by means of which different subprofiles 52 of the profile data record 50 selectively activated and / or deactivated. In this way, business calls outside of working hours can be prevented. Accordingly, a subscriber may be mobile device 24 . 26 use in your free time without a business call threatening. Such a regulation can, for example, be centrally defined and implemented throughout the company. In doing so, consideration can be given to time zones and / or customary national features. It is also conceivable to apply different rules to executives than to salaried employees.
  • 5 illustrates various operations at the host 30 during the initial contact between the mobile device 24 the originator and the mobile device 26 of the destination participant. In a known manner, starting from the mobile device 24 over the first communication path 40 a contact request, such as a call signal to the mobile network 14 and finally the mobile device 26 of the destination subscriber. However, in parallel, you can also use the second communication path 42 Data to the host 30 be transmitted. At the host 30 can make a decision 68 expire.
  • The decision-making 68 For example, it may include checking whether the target subscriber is using his mobile device 26 in the database 36 ( 1 ) of the host 30 is deposited. If so, metadata can be sent via the second communication path 42 to the mobile device 26 be guided, compare one with 74 designated arrow. Furthermore, the host can 30 with the mobile network 14 or with components thereof (compare the control device 18 in 1 ) communicate. In the case described above, if the source party and the destination party are the host 30 are known, may be the host 30 as well as a passage of the connection request via the first communication path 40 to the mobile device 26 of the destination subscriber, compare one with 70 designated arrow. In this way, the connection request as well as the outgoing subscriber can identify identifying metadata in parallel and substantially simultaneously to the mobile device 26 be transmitted.
  • However, in the decision-making process 68 it is determined that the destination subscriber or his mobile device 26 the host 30 are unknown, the transmission of metadata over the second communication path 42 be prevented, compare one with 76 designated by crossed arrow in 5 , It would then be no communication via the second communication path 42 possible. Nevertheless, in principle, a (conventional) communication via the first communication path 40 respectively. However, designs are also conceivable in which the fact that the destination subscriber is unknown to the host or not available to the host is also used to communicate via the first communication path 40 to stop, compare one with 72 designated crossed arrow.
  • In this way, the starting participant can be assigned a (centrally stored) contact list, which he uses with his mobile device 24 can contact. As an example, it can be further specified that contacts who are not deposited in the corresponding contact list can not be called. However, it would also be conceivable to explicitly deposit contacts that should not be called. Other designs are conceivable.
  • The decision-making 68 On the one hand, a check may include whether the destination subscriber is known to the host. The decision-making 68 however, it may also include checking whether the destination subscriber is currently enabled by the host 30 Metadata over the second communication path 42 to get sent. This can be negated, for example, if the destination subscriber or the mobile device 26 not at the host 30 registered or logged in. However, a similar situation may occur when a mobile network occurs 14 in which is the mobile device 26 currently is, no transmission via the second communication path 42 offers, for example due to lack of network coverage.
  • 6 illustrates another highly simplified schematic of mobile devices 24 . 26 an initial subscriber or a destination subscriber. The mobile device 26 of the destination subscriber is shown enlarged for illustrative purposes. The communication between the mobile device 24 and the mobile device 26 can basically via the first communication path 40 and the second communication path 42 respectively. If the originating subscriber intends to call the destination subscriber, a conventional call signal will be sent via the first communication path 40 to the mobile device 26 of the destination subscriber. However, it may also be via the second communication path 42 advanced information, especially metadata.
  • By way of example, the destination subscriber can be on his mobile device 26 identification data 80 that identify the home student. The identification data 80 may include, for example, a clear name or a photo of the source party. Furthermore, the identification data 80 about a signature or "business card" include. Furthermore, the destination subscriber can prioritize 82 of the call. Accordingly, the destination subscriber can immediately recognize on his mobile device whether the call is of particular importance to the subscriber. The prioritization can be made by the originating subscriber on his mobile device 24 a corresponding transmission of data can be made via the second communication path 42 respectively.
  • Furthermore, the destination subscriber can be identified by an answer field 84 be provided the opportunity to respond to the connection request of the original participant. The answer field 84 may exemplarily offer a plurality of reaction possibilities. In this way, the destination subscriber can respond to the connection request of the original subscriber, without having to accept a call. A corresponding reaction can be made via the second communication path 42 back to the mobile device 24 be transmitted to the original participant. At any rate, when the destination subscriber responds to the connection request of the originating party, the second communication path 42 In addition to data that are transmitted from the outgoing participants to the destination subscriber, also transmit data in opposite directions, which are transmitted from the target subscriber to the outgoing subscriber, compare corresponding arrows 88 . 90 in 6 ,
  • 7 illustrates another schematic highly simplified representation of a communication system 10 , As already described above, the communication system 10 for communication between a mobile device 24 an originator and a mobile device 26 be formed of a target participant. Each of the mobile devices 24 . 26 can be a basic system 94 basically, for communication via the first communication path 40 is trained. The respective basic system 94 can an application (application or app) 96 be assigned or superimposed. The application or app 96 can be done locally on the mobile device 24 . 26 installed software to be provided. In other words, the application or app 96 as a "shell" over the base system 94 lay. Accordingly, the mobile devices 24 . 26 in addition to the conventional communication over the first communication path 40 also for extended communication via the second communication path 42 be educated. In this way, extended functionality can be provided without the conventional communication, in particular the conventional voice communication, via the first communication path 40 is impaired.
  • The host 30 can also be a portal 98 provide, via the profile records 50 with a plurality of sub-profiles 52 in the database 36 can be deposited. On appropriate profile records 50 can at an exam 100 in the host 30 be resorted to. The exam 100 can be done, for example, by means of an identification feature belonging to the host 30 from the mobile device 24 the outgoing party is transmitted. In particular, the identification feature may be the destination subscriber or his mobile device 26 mark. By way of example, the identification feature may be the number or telephone number of the mobile device 26 act. Unless the exam 100 shows that for the destination subscriber or the mobile device 26 a record 50 is present, it can be assumed that the mobile device 26 the appropriate application 96 is installed. The mobile device 26 or the destination subscriber are accordingly at the service of the host 30 registered and / or registered.
  • Thus, the host can 30 essentially (time) parallel a business card or a signature to the mobile device 26 Submit if this from the mobile device 24 (in a conventional way). The transmission of the signature 104 can be about by means of a push message from the host 30 to the mobile device 26 take place, cf. one with 104 denotes arrow.
  • Unless the exam 100 shows that the destination subscriber or the mobile device 26 not at the service of the host 30 logged in and / or registered, the host can 30 the submission of an invitation to the mobile device 26 arrange to compare with 106 designated dashed arrow in 7 , In this way, the target participant can be animated to the service of the host 30 join or join the host 30 to register. Preferably, the message containing the invitation is also designed as a push message. Preferably, the message containing the invitation may be received by a mobile device on which there is no application 26 for communication with the host 30 is installed.
  • The host 30 may also have an interface 108 for communicating with external database providers with profile records or profile recordsets. That way the host can 30 communicate with external directories and / or datasets with profile data and / or contact information to keep track of the database 36 to enlarge.
  • 8th illustrates, by way of a highly simplified block diagram, an exemplary method for providing metadata for communication purposes, in particular for mobile communication. The method may include a step S10 that includes providing a first communication path. The method may include a further step S12 that includes providing a second communication path. The method may include a further step S14 that includes providing a host that is addressable via the second communication path. In principle, the steps S10, S12 and S14 can also be arranged in parallel. The first communication path provided in step S10 can be designed, in particular, as a speech communication path. The second communication path provided in step S12 can in particular be designed as a metadata communication path. The host provided in step S14 may be configured to allow data communication between subscribers of a mobile network via the second communication path, which is essentially parallel to a (conventional) voice communication via the first communication path.
  • A further step S16 may comprise a contact initiation with a target subscriber by an outgoing subscriber. In other words, an originating subscriber can dial and call a contact of a destination subscriber via his mobile device.
  • This triggers a step S18, which may include various sub-steps. Step S18 is generally directed to the provision of metadata, particularly caller-describing metadata. A sub-step S20 may include the transmission of a connection request via the first communication path to the destination subscriber. This may include, for example, the transmission of a conventional call signal. In a further step S22, which may in principle also be connected in parallel to step S20, an identification feature which identifies the destination subscriber can be transmitted to the host via the second communication path. This usually takes place starting from the starting participant. It may be followed by a further step S24 in which it is checked whether the destination subscriber is capable of receiving and processing metadata contained in a data record for the outgoing subscriber in the Database system are present. The check can be made on the basis of the identification feature that identifies the destination subscriber. A further step S26 may follow, provided that the destination subscriber is capable of receiving and processing metadata. Step S26 may include transmitting metadata identifying the source party to the destination party.
  • 9 illustrates on the basis of another highly simplified block diagram an embodiment of the basis of the 8th illustrated method. In particular, illustrated 9 an exemplary section of the method according to 8th ,
  • The steps S20, S22, S24 and S26 may be substantially as already described in connection with FIG 8th correspond to the described steps. In addition, the illustration in accordance 9 follow steps S28 and S30. Steps S28 and S30 may be followed by step S24 if the check made in step S24 shows that the target subscriber is unable to receive and process metadata over the second communication path. Step S28 may include blocking the transmission of metadata identifying the originating party to the destination subscriber. The subsequent optional step S30 may include transmitting a message to the destination subscriber. The message may include, for example, an invitation to the destination subscriber to join the service in order to receive metadata. The message may be designed, for example, as a text-based message. In principle, the message can be transmitted to the destination subscriber via the first communication path, for example as an SMS message. However, it is also conceivable to transmit the message to the destination subscriber via the second communication path.
  • QUOTES INCLUDE IN THE DESCRIPTION
  • This list of the documents listed by the applicant has been generated automatically and is included solely for the better information of the reader. The list is not part of the German patent or utility model application. The DPMA assumes no liability for any errors or omissions.
  • Cited patent literature
    • US 2008/0242293 A1 [0008]

Claims (15)

  1. Method for providing metadata for communication between communication partners, in particular for mobile communication, comprising the following steps: - providing a first communication path ( 40 ), in particular a voice communication path, - providing a second communication path ( 42 ), in particular a metadata communication path, - provision of a host ( 30 ) with a database system ( 34 ) for storing and accessing metadata, in particular context-based metadata, - in the case of contact by a source participant ( 24 ) with a target participant ( 26 ), in particular in the case of a call: - transmission of a connection request via the first communication path ( 40 ) to the target participant ( 26 ), - starting from the starting participant ( 24 ), Transmission of an identification feature identifying the target subscriber ( 26 ), via the second communication path ( 42 ) to the host ( 30 ), - check by means of the target subscriber ( 26 ) identification feature, whether the target subscriber ( 26 ) is capable of receiving and processing metadata contained in a dataset ( 50 ) for the initial participant ( 24 ) are present in the database system, and - if the target participant ( 26 ) is capable of transmitting metadata to the original participant ( 24 ) via the second communication path ( 42 ) to the target participant ( 26 ).
  2. The method of claim 1, further comprising: - if the destination subscriber ( 26 ) is not capable of blocking the transmission of metadata to the outgoing party ( 24 ) to the target participant ( 26 ).
  3. The method of claim 1 or 2, further comprising: - if the destination subscriber ( 26 ) is not capable of transmitting a message, in particular a text-based message, to the destination subscriber ( 26 ) via the first communication path ( 40 ) or the second communication path ( 42 ).
  4. Method according to one of the preceding claims, further comprising: depositing at least one profile data record ( 50 ) for a participant at the host ( 30 ), the profile data set ( 50 ) preferably several sub-profiles ( 52 ) with associated metadata.
  5. The method of claim 4, further comprising at least one of the following steps: time-dependent activation and / or deactivation of sub-profiles ( 52 ) for a participant, - location-dependent activation and / or deactivation of sub-profiles ( 52 ) for a participant, and - time-zone-dependent activation and / or deactivation of subprofiles ( 52 ) for a participant.
  6. Method according to claim 4 or 5, further comprising: - matching of profile data between the initial participant ( 24 ) and the target participant ( 26 ), Submission of metadata depending on matching subprofile assignments.
  7. Method according to one of the preceding claims, further comprising: transmitting status information ( 82 ) via the second communication path ( 42 ) to the target participant ( 26 ), the status information ( 82 ) describes an associated prioritization of the connection request.
  8. Method according to one of the preceding claims, further comprising: transmitting status information ( 84 ) via the second communication path ( 42 ) to the starting participant ( 24 ), the status information ( 84 ) a reaction of the target participant ( 26 ) on the connection request describes.
  9. The method of claim 7 or 8, further comprising: - transmitting an adapted status information ( 82 . 84 ) depending on a selected sub-profile of the original participant ( 24 ) and / or the destination subscriber ( 26 ).
  10. Method according to one of the preceding steps, further comprising: assignment of identification features to source participants ( 24 ) and / or destination participants ( 26 ) depending on a basic feature selected from a group consisting of: telephone numbers, IMSI numbers, IMEI numbers, TMSI numbers, MSISDN numbers, proprietary user numbers, and combinations thereof.
  11. Method according to one of the preceding steps, further comprising: - in the database system ( 34 ) of the host ( 30 ), Matching metadata for a participant, in particular profile records ( 50 ), via an interface ( 108 ) to access external database systems.
  12. Method according to one of claims 4 to 11, further comprising: - matching of metadata for a plurality of subscribers, which at the initial subscriber ( 24 ) and / or the target participant ( 26 ) are deposited as contacts.
  13. Method according to one of the preceding steps, wherein the transmission of the connection request and the transmission of the identification feature take place substantially parallel and rectified.
  14. A software program having program code by which a method according to any one of the preceding claims is executed when the software program is executed on a mobile device.
  15. Communication system for communication between communication partners, in particular for mobile communication, comprising: - a network infrastructure having a first communication path ( 40 ), in particular a voice communication path, and a second communication path ( 42 ), in particular a metadata communication path, provides - a host ( 30 ) with a database system ( 34 ) for storing and accessing metadata, in particular context-based metadata, - at least one mobile device ( 24 ) of a source subscriber and a mobile device ( 26 ) of a destination subscriber, - the communication system in the case of a contact of an outgoing subscriber ( 24 ) with a target participant ( 26 ), in particular in the case of a call is designed to - a connection request via the first communication path ( 40 ) to the target participant ( 26 ), - starting from the starting participant ( 24 ), an identifier that identifies the destination subscriber ( 26 ), via the second communication path ( 42 ) to the host ( 30 ), - by reference to the target participant ( 26 ) identification feature, whether the target subscriber ( 26 ) is capable of receiving and processing metadata contained in a dataset ( 50 ) for the initial participant ( 24 ) are present in the database system, and - if the target participant ( 26 ) is able to provide metadata about the original participant ( 24 ) via the second communication path ( 42 ) to the target participant ( 26 ).
DE102014105557.8A 2014-04-17 2014-04-17 Method for providing metadata for communication partners and communication system Pending DE102014105557A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE102014105557.8A DE102014105557A1 (en) 2014-04-17 2014-04-17 Method for providing metadata for communication partners and communication system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102014105557.8A DE102014105557A1 (en) 2014-04-17 2014-04-17 Method for providing metadata for communication partners and communication system
PCT/EP2015/058402 WO2015158901A1 (en) 2014-04-17 2015-04-17 Method for providing metadata for communication partners, and communication system

Publications (1)

Publication Number Publication Date
DE102014105557A1 true DE102014105557A1 (en) 2015-10-22

Family

ID=53052807

Family Applications (1)

Application Number Title Priority Date Filing Date
DE102014105557.8A Pending DE102014105557A1 (en) 2014-04-17 2014-04-17 Method for providing metadata for communication partners and communication system

Country Status (2)

Country Link
DE (1) DE102014105557A1 (en)
WO (1) WO2015158901A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080242293A1 (en) 2007-04-02 2008-10-02 Cequint, Inc. System and method for providing caller id name display in wireless communications system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7269249B2 (en) * 2001-09-28 2007-09-11 At&T Bls Intellectual Property, Inc. Systems and methods for providing user profile information in conjunction with an enhanced caller information system
US6757533B2 (en) * 2002-01-23 2004-06-29 Nokia Corporation Rich calling line handling in call setup signalling
US20050105705A1 (en) * 2003-11-14 2005-05-19 General Instrument Corporation Personalized caller identification
EP1819125A1 (en) * 2006-02-10 2007-08-15 Siemens S.p.A. Method and apparatus to deliver precustomized business card multimedia contents through IMS based PLMNs for improving the existing calling line identification service
US20080288574A1 (en) * 2007-05-15 2008-11-20 Sony Ericsson Mobile Communications Ab Methods and Apparatus for Selectively Transferring Data Objects to a Communication Device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080242293A1 (en) 2007-04-02 2008-10-02 Cequint, Inc. System and method for providing caller id name display in wireless communications system

Also Published As

Publication number Publication date
WO2015158901A1 (en) 2015-10-22

Similar Documents

Publication Publication Date Title
US7793305B2 (en) Methods and systems for providing a communication manager for wireless wireline converged telecommunication services
US9251193B2 (en) Extending user relationships
US8860777B2 (en) Multi-enterprise video conference service
EP3059988A1 (en) Enhanced user privacy for mobile station location services
US8914024B2 (en) Discovery of network members by personal attributes
US20130058274A1 (en) Method and system for accessing wireless networks
KR100901244B1 (en) Method, system and service for achieving synchronous communication responsive to dynamic status
US9125057B2 (en) Mobile device management
US20080037720A1 (en) Voice Activated Communication Using Automatically Updated Address Books
US20060046746A1 (en) System and apparatus for managing access to wireless communication devices while present within a specified physical area
US8670546B2 (en) Systems and methods for providing a personalized communication processing service
KR101159312B1 (en) Method and system for web-based event notification
US20050198321A1 (en) Method and system for workgroup presence availability
US20100015976A1 (en) System and method for sharing rights-enabled mobile profiles
RU2412552C2 (en) Temporary enum gateway
US9442953B2 (en) Universal address book
US8649798B2 (en) Methods and devices for attracting groups based upon mobile communications device location
US8503621B2 (en) Secure voice communication channel for confidential messaging
CN1883186A (en) Mobile wireless presence and situation management system and method
US20040068502A1 (en) Context information management in a communication device
US20100048191A1 (en) Systems and methods of initiating a call
US9544409B2 (en) Automated caller identifier from contact lists of a user's contacts
US8270937B2 (en) Low-threat response service for mobile device users
US20040153518A1 (en) Intelligent selection of message delivery mechanism
EP2641382B1 (en) Interacting with a subscriber to a social networking service based on passive behavior of the subscriber

Legal Events

Date Code Title Description
R082 Change of representative

Representative=s name: WITTE, WELLER & PARTNER PATENTANWAELTE MBB, DE