EP2478474A1 - Système assisté par ordinateur pour retrouver des objets - Google Patents

Système assisté par ordinateur pour retrouver des objets

Info

Publication number
EP2478474A1
EP2478474A1 EP10757755A EP10757755A EP2478474A1 EP 2478474 A1 EP2478474 A1 EP 2478474A1 EP 10757755 A EP10757755 A EP 10757755A EP 10757755 A EP10757755 A EP 10757755A EP 2478474 A1 EP2478474 A1 EP 2478474A1
Authority
EP
European Patent Office
Prior art keywords
person
code
module
database
telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP10757755A
Other languages
German (de)
English (en)
Inventor
Alexander Holst
Daniel Taschik
Stephan JÄKEL
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Findpilot GmbH
Original Assignee
Findpilot GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Findpilot GmbH filed Critical Findpilot GmbH
Publication of EP2478474A1 publication Critical patent/EP2478474A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • the invention relates to a computerized system by means of which the owner of an object is assisted in recovering it as soon as possible after it has been lost.
  • an article retrieval system comprising a communication system adapted to establish a telephone connection between a finder and a recipient when a code applied to the lost article is known.
  • This system is described both with a central office and with automatic forwarding.
  • a finder's call is automatically forwarded to the owner, there is a risk that the owner will log in by name and the finder will misuse the information. For example, using the owner's name, he could find out to which lock a found key could belong.
  • the invention has for its object to provide a system for retrieving objects available by means of which lost objects can be recovered as quickly and safely.
  • the object is achieved according to the invention by the features of claims 1, 15 and 17.
  • a computerized system for establishing a telephone connection between a first person and a second person comprises the following elements: a) a database for managing data records with codes and destination telephone numbers assigned to the codes, b) a call acceptance module, by means of which a first telephone connection between the first person and the system C) a communication module which is adapted to identify the input of codes by the first person; d) a verification module for checking whether a destination telephone number is stored for an identified code in the database , e) a connection establishment module adapted to establish a second telephone connection between the system and the second person by entering a code to which a destination telephone number is stored in the database, a man-machine filter for checking whether a telephone connection established with the destination telephone number has been answered by a human or a machine, a control module by means of which a coupling module can be activated on the basis of information contained in the system or entered into the system, h) by means of the coupling
  • the second person may also be a group of persons consisting of several persons.
  • the system has the advantage over known systems that it works computer-controlled and thus also works independently of a person-occupied exchange. As a result, a cost-effective, continuous accessibility is possible.
  • the system according to the invention has several elements which go beyond mere call forwarding. For example, prior to connecting two persons, the system first establishes a first telephone connection and then establishes a second telephone connection independent of the first telephone connection. This makes it possible, with the aid of a human-machine filter, to first check whether the second telephone connection has actually been established with a human or with a machine, for example a mailbox or an answering machine. This is important because the mailbox or answering machine may reflect private information (eg, name, place of residence, etc.) that should not be communicated to the first person for security reasons.
  • private information eg, name, place of residence, etc.
  • the human-machine filter can be implemented by requesting the input of a specific number, sequence of numbers or repetition of a specific word or text after the first telephone connection has been accepted. If the request is adequately answered, the system recognizes that the second telephone connection has been made to a human and allows the coupling module to be activated by means of the control module, whereby the first telephone connection and the second telephone connection can be interconnected. If the request is not adequately met, the system can prevent activation of the coupling module.
  • the system according to the invention therefore combines the security of an exchange occupied by persons with the cost advantages of a computer-controlled system. It also has one of
  • the call setup module is independent of the first telephone connection between the first person and the system, it can optionally be set up as soon as the first person has entered the code and the system knows which destination telephone number to dial. A connection between the system and the second person can therefore already be established while the first person is still receiving information from the system. Thus, unwanted waiting times for the first person can be avoided.
  • the latter has a reproduction device for the reproduction of a warning message, by means of which the second person is informed prior to activating the coupling module and is warned against the disclosure of personal data.
  • a playback device for the reproduction of a warning message, by means of which the second person is informed prior to activating the coupling module and is warned against the disclosure of personal data.
  • the security of the system can be further increased, since then before establishing a connection between the first person and the second person, the second person is actively warned against reporting with his own name and the indication of other personal information.
  • Such an indication may protect against the finder of an item (eg, a key) being stimulated to abuse the item rather than return it.
  • the control module can be designed such that the second person can prevent the activation of the coupling module.
  • This embodiment takes into account the cases in which, although the second telephone connection with the second person has come about, the second person can not or does not want to speak with the first person. In this case, the second person has the opportunity to prevent them from being connected to the first person. This can be done by pressing, for example a specific key, utterance of a particular voice command by the second person, or disconnection (hang up).
  • the database is designed to store voice recordings and / or other electronic information, each voice record and / or other electronic information being associated with a specific code.
  • the mentioned voice recordings are, in particular, messages which the first person of the second person can leave.
  • the first person may notify the second person by voice message that they have found a subject at a particular location, e.g. deposited in a restaurant, a lost property office, etc.
  • An advantage of storing such information in a neutral database is that there is no risk that the second person's confidential information will reach the first person.
  • Other electronic information means, for example, the telephone number transmitted by the telephone of the first person, GPS data and / or address data of the position of the first person during the call or the position of the lost object, etc.
  • other electronic information may help the second person to recover a lost item. If, for example, GPS data is stored as other information where the
  • GPS enabled device e.g. a mobile phone
  • the GPS enabled device is capable of directing the second person to the position defined by the GPS data.
  • the system includes a conversion module for the optional conversion of voice recordings into a digital format and for digital storage.
  • a conversion module for the optional conversion of voice recordings into a digital format and for digital storage.
  • analogue or digital voice recordings can be converted into a predefined format before being stored in the database. The presence of such a module enables the recording and storage or replay of voice recordings in the most appropriate formats for the respective system components.
  • PBXs Software for telecommunications systems
  • PBXs Software for telecommunications systems
  • the conversion module is designed to automatically analyze incoming e-mails for one or more parameters and, if the parameter (s) are contained in an e-mail, convert a voice recording contained in the e-mail into a predefined digital format and store it in the database.
  • the parameter may, for example, be the first word of the text body or the first word of a line of the text body. If this word is contained in the e-mail, the e-mail is processed by the conversion module without the need for further manual work steps.
  • lost items can be deposited by the first person in such a product deposit and can be picked up by or ordered from the second person there.
  • Product storage facilities are letter or parcel machines, such as a Packstation®, as well as mobile product storage facilities, such as trucks and other vehicles, in particular couriers, etc.
  • An advantage of such devices is that not only a potential telephone contact between the first Person and the second person can take place without the need for other people (eg a staffed exchange) must be active; with computer-controlled product deposits, it is also possible to organize the return of a lost item without the involvement of third parties. It is even possible to safely carry out the return without the first and second persons communicating directly with each other. This can be done, for example, as follows.
  • the Finder decides to hand over the item to a parcel machine.
  • the parcel machine offers the option "Return a found item", which selects the first person. If the device has a code reading device, the code located on the found object is read out. Alternatively, the finder may be prompted to enter the code to prevent any items from being placed in the parcel machine. Due to the interface of the parcel machine with the system according to the invention, it is checked whether the entered code exists. If this is the case, a flap opens and the first person is prompted to insert the item found in the parcel machine. Once the item has been placed, the flap closes and the first person is asked if they are interested in a finder's reward.
  • any proposed finder's reward can either be paid anonymously by debit card, credit card or other cashless payment. If the person does not wish such a disbursement or does not have a medium for cashless payment transactions, alternatively a cash payment or the indication of an account connection, or a postal address, which makes it possible later, to transfer the finder's reward from the second person to the first person.
  • the second person After submission of the found object, the second person is informed about the find of the object and the kind of return. This can be done, for example, by sending an e-mail and / or an SMS and / or by a call.
  • the second person will be informed where the found object is and will be given the opportunity to personally pick up the item at that location or arrange for a chargeable shipment of the item to a freely definable location.
  • GPS data from the parcel station can also be automatically transmitted to a GPS-capable device, which immediately informs the second person how far away the object is, how it can get there and how much time it is likely to be in Will claim.
  • the first person can also be informed of the height of the finder's pay even before the final return of the item, for example from the parcel station.
  • the system is preferably configured to guarantee the payment of the finder's reward.
  • the payout of the finder's pay can be made via a neutral body belonging to the system. This body can already have an optional access to the amount of the finder's reward insured by the second person from a bank account, for example by receiving a debit order, by depositing credit card data or by previously depositing the finder's reward on a designated credit account of the second person second person. It is understood that the aforementioned conditions need not all be realized and can be combined with each other.
  • the database may be available to the second person to retrieve information stored therein, to supplement new information, or to modify existing information.
  • the database is preferably designed to store at least two telephone numbers for each code.
  • the system may be configured so that the call setup module first dials the first stored telephone number and, if not connected to a human, subsequently dials the second stored telephone number. This increases the likelihood that the first person, e.g. the finder of an object, with a second person, e.g. the owner of the property or a deputy of the owner, and a lost object can be quickly returned to the owner due to the conversation.
  • the system can also be self-learning. For example, if it finds that there is usually no conversation with a human being under a first stored telephone number, the call setup module will recognize this and will first dial the second telephone number in the future.
  • the system can be self-learning not only in terms of dialing telephone numbers, but also in terms of all other area where several options are available. This possibility will be referred to below in detail.
  • the system according to the invention can also be configured in such a way that the connection setup module immediately establishes individual connections to several or all telephone numbers. It can then be configured, for example, so that all established connections are interconnected to a conference call and the conference participants are given the opportunity to decide themselves on the further course of action (eg conference with the Finder, only one or a limited number of people speaks with the Finder) Inventors, mailbox should be activated). Alternatively, it is possible that the connection is terminated when a first connection has been established. It is also possible that after successful establishment with a subscriber the connection establishment is set to all remaining telephone numbers with the exception of certain telephone numbers, e.g.
  • the first person (Finder) can be connected, at least in the short term, to a second person representative (e.g., a company IT department).
  • a second person representative e.g., a company IT department.
  • the call setup module continues to attempt to establish a connection with the second person (owner). If such a connection should still be established during the conversation between the first person and the second person's representative, the second person may be present as a conference participant
  • connection setup module of the system according to the invention in practical embodiments also initiate several connections at the same time and according to certain predetermined conditions. or self-learning criteria. As a result, the time for establishing a telephone connection between a first and a second person or a second person representative can be further minimized.
  • the database is linked to the communication module in such a way that certain background information specified by the second person and stored in the database prior to the coupling of the first
  • Telephone connection and the second telephone connection or before the connection of the first person with a mailbox to the first person to be transmitted may be, for example to trade a fixed finder's pay that the first person should receive when a particular lost item returns to the owner.
  • the finder's fee can also be defined as a function of a daily value (eg 10% of the daily value) or as a function of other parameters, provided the system has access to these parameters, eg via the Internet.
  • the second person can also record an individual message which is first transmitted to the first person. Through these measures, the first person can receive additional motivation to actually transfer a found object back to the owner.
  • the system can also be adaptive in this aspect. For example, it can suggest the amount of a finder's reward for certain products by averaging the same or similar products contained in the system's database or external databases.
  • the system may use the learning capability described in connection with claim 8 to advance information to the first person. For example, if the system detects that a second person is unavailable at certain times of the day due to a large number of calls, the system can automatically inform the first person that they are trying to connect to one or more second-person representatives (eg IT staff). Department of a company).
  • second-person representatives eg IT staff). Department of a company
  • the database is designed to use telephone numbers, background information and other data depending on certain parameters and, for example, stored by the second person as parameter times of day for certain telephone numbers, the customer acceptance of the system can be increased further, because thereby the probability increases the average time required to set up a telephone connection.
  • the latter comprises a reporting module which can be configured by the second person and which is designed to send messages to predefined recipients in preconfigured cases.
  • a reporting module for example, insurance companies, the police, a company or other recipients can be automatically informed by e-mail, text message or in any other form about the loss of certain items.
  • information can be transmitted to third parties with virtually no loss of time, ensuring that deadlines are safely observed and the second person is spared the need to monitor and make appropriate deadlines themselves.
  • the reporting module when the system according to the invention is used for the protection of company property, it is advantageous to use the reporting module to inform the competent body for the respective item in order to initiate any necessary security measures immediately.
  • the information that the phone has been lost can be communicated to the IT department of the company via the reporting module as soon as a finder enters the code into the system.
  • the IT department can then lock the mobile phone or even cause the deletion of all data on the mobile phone.
  • the system according to the invention is equipped with a self-protection system by means of which the caller numbers of incoming callers and / or the input of the codes are monitored and which, when certain events occur, access the system via specific telephone numbers and / or when certain codes are entered in derogation.
  • the events can be preconfigured or self-learning by the system.
  • a self-protection system based on preconfigured events can prevent the system from being called by a number more than three times within five minutes. If this event occurs, access to the system can be blocked by this number for a specified period of time or permanently.
  • the system may be self-learning. For example, with a self-learning self-defense system, the system can analyze caller behavior patterns and identify patterns of callers wishing to harm the system. For example, if the system detects that calls arrive at the system at precisely defined times, causing unnecessary harm to the system or unnecessarily burdening the system without passing information to the system, the system will automatically detect and stop calling at that time.
  • the system can save this pattern as a "pest pattern" and block future calls of the same pattern from the second call.
  • detected patterns are reported to an administrator of the system, so that it is aware of newly recognized patterns and has the ability to disable detected patterns or to manually add more patterns.
  • the self-protection system increases the stability and performance of the system of the invention.
  • the database and the telephony modules are based on the same programming language. As kgiemodule here are at least the call acceptance module and the connection setup module understood. It is also possible to create all other modules and the Internet-based user interface based on the same programming language.
  • the invention is supplemented by a computer program product for execution on a communication device, in particular a mobile telephone.
  • the computer program product comprises an input module and a transmission module, which is automatically prompted for the start of the computer program product to enter a code and then due to the input of a code - without further input is required - automatically from the communication device a) a telephone or data connection, in particular a computer-based system according to the invention is constructed, the code is transmitted to the system and based on the code attempts to establish a telephone connection to a second communication device and / or b) a message comprising the code and an identification of the communication device of the communication device to a system, in particular according to one of claims 1 to 14, is transmitted, which is adapted to transmit the code and the identification identifier to a second communication device or to deposit in a database.
  • the computer program product according to the invention is an application which makes it possible to make the use of a system according to the invention virtually universally available and, in particular, usable by anyone. Due to the mere input of a code into a communication device, for example a mobile telephone, a public user terminal, a PC that can be telephoned, etc., the application can be used to establish a connection to the system according to the invention. ches then in turn tries to establish a telephone connection to a second telecommunication device.
  • a message e.g. an e-mail or an SMS, comprising the code and an identifier of the communication device are transmitted to a system according to the invention.
  • the identification code is preferably the telephone number of the communication device.
  • the application makes it possible to use a system according to the invention, in particular as a finder of an object, in a simple manner which can be carried out by anyone.
  • the communication device it is also possible for the communication device to transmit current GPS data of the communication device instead of a telephone number or in addition to a telephone number.
  • the input of the code can be done by reading the found object, whereby the risk for incorrect entries and even the possibility exists of applying the code to an object in a form that is not readable by humans, for example as a 2D code, as an RFID chip or in any other way
  • the reading of a code by means of one of the above-mentioned devices then, for example, by placing the article in the vicinity of the reading device, if necessary in a specific orientation, the abovementioned events a) and / or b) are then triggered on the basis of the mere reading out of the code especially then
  • the communication device is part of a deposit.
  • a found item from the finder only in one such deposit will be lodged.
  • the deposit then automatically determines the code and, via a system according to the invention, directly informs the owner that his lost item has been found
  • the invention is also reflected in a method according to the invention for automatically establishing a contact between a finder of a coded object and an owner of that object by means of a first communication device suitable for transmitting an identification and a computerized system making contact, the method comprising the steps of: comprising: a) starting a computer program product according to one of claims 15 or 16 on the first communication device, b) inputting the code c) on the basis of the input of the code, a connection to the computerized system is established automatically, d) the code is transmitted by the first communication device e) the system verifies the code; f) after positive verification of the code, the system establishes a connection to a second communication device or stores the code and the identification in a database when a connection to the second communication device is not possible or not desired by the owner.
  • FIG. Figure 1 shows the interaction of a first person, a simple embodiment of the system according to the invention and a second person using a situated between a connection to the second communication device is not possible or not desired by
  • the figure is divided into three areas separated by dashed vertical lines.
  • To the left of the first dashed line are entered procedures relating to the first person, actions of the system according to the invention are entered between the first and second dashed lines.
  • To the right of the second dashed line are registered actions concerning the second person.
  • a lost item is found by a first person, it will be able to call the system telephone number indicated on the item. If the first person does so, the system picks up the call and thus establishes a first telephone connection between the first person and the system. The system then prompts the first person to provide a code. When the first person enters a code, the system tries to identify and verify the code.
  • Entering the code can be done for example by using a telephone keypad or by voice input. If the code is invalid, the first person may be asked to enter the code one or more times. If then still no valid code is entered, that ends System automatically the first telephone connection, and the process is complete.
  • the first telephone connection is "parked" and the first person is notified that an attempt is being made to set up a telephone connection with the second person
  • the first person may also be informed in advance of certain things that motivate the first person to maintain the telephone connection with the system, for example, the system may inform the first person that the second person will find a finder's reward for the lost item Alternatively or in addition, the system may send a message selected by the second person or recorded in person to the first person.
  • a first telephone number to be dialed is read from the database and a connection setup module attempts a second telephone connection between the system and the second Person to build.
  • the second telephone connection is initially completely independent of the first telephone connection between the system and the first person. If the communication device belonging to the first telephone number can be reached, a second telephone connection is established between the system and the accessible communication device. Subsequently, the system's human-machine filter becomes active and determines whether the second telephone connection with a human or machine, such as a mailbox, has come about. This can be done, for example, by requiring the system to enter a particular key or to play a particular word. If the man-machine filter comes to the conclusion that the When the machine is connected to a machine, the system connects the first person to an intrinsic mailbox. The system also works if the communication device belonging to the call number determined from the database has not reached it.
  • the control module of the system is active.
  • the control module allows the second person to determine whether to establish a telephone connection between the first person and the second person by coupling the first and second telephone calls by means of the pairing module or to connect the first person to an intrinsic mailbox. This decision can also be made based on a specific number entered by the second person. If the second person decides that the first telephone connection and the second telephone connection should be coupled to one another with the aid of the coupling module in such a way that a conversation between the first person and the second person takes place, the system establishes this connection.
  • a warning may warn of the disclosure of personal data.
  • the second person may then optionally still have the opportunity to dispense with a coupling of the first and second telephone connection. These possibilities are shown in FIG. 1 by dashed lines. If the second person has finally decided to pair the first and second telephone connections, the first person is notified that a connection is being established with the second person. The first and the second person have then after coupling the telephone connection the possibility to speak with each other. If the second person has decided against pairing the telephone connection, the first person has the option of leaving a message on the system internal mailbox.
  • This data is, in particular, the telephone number of the first person, which enables the second person to contact the first person independently at a later time. If the first person left a mailbox message, this message is stored in the database.
  • the second person can at any time access the data and / or messages stored in the database.
  • the combination of the software Asterisk with the programming language Python is particularly suitable.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne un système assisté par ordinateur qui aide le propriétaire d'un objet à retrouver ce dernier aussi rapidement que possible en cas de perte. L'objectif de l'invention est de proposer un système qui permet de retrouver des objets et au moyen duquel des objets perdus peuvent être retrouvés aussi rapidement et sûrement que possible. Cet objectif est atteint en particulier grâce à un système assisté par ordinateur qui présente les caractéristiques de la revendication 1.
EP10757755A 2009-09-18 2010-09-17 Système assisté par ordinateur pour retrouver des objets Withdrawn EP2478474A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE200910029616 DE102009029616A1 (de) 2009-09-18 2009-09-18 Computergestütztes System zum Wiederfinden von Gegenständen
PCT/EP2010/063674 WO2011033048A1 (fr) 2009-09-18 2010-09-17 Système assisté par ordinateur pour retrouver des objets

Publications (1)

Publication Number Publication Date
EP2478474A1 true EP2478474A1 (fr) 2012-07-25

Family

ID=41606305

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10757755A Withdrawn EP2478474A1 (fr) 2009-09-18 2010-09-17 Système assisté par ordinateur pour retrouver des objets

Country Status (3)

Country Link
EP (1) EP2478474A1 (fr)
DE (1) DE102009029616A1 (fr)
WO (1) WO2011033048A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10311704B1 (en) 2018-03-29 2019-06-04 Futurewei Technologies, Inc. Passenger-related item loss mitigation

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5036610A (en) 1988-09-23 1991-08-06 Van Kirk Fehr Pet locator system and method
US6064307A (en) 1996-04-02 2000-05-16 John P. Herres, Jr. Method for relating information about an article to a finder of the article
US5912956A (en) * 1997-02-20 1999-06-15 Talk Time, Inc. System and method for anonymously establishing telephonic connections
US6263280B1 (en) 1998-11-24 2001-07-17 Ralph J. Stingone, Jr. Global locating and tracking method and system
GB2370656A (en) 2000-08-19 2002-07-03 Ik Com Ltd Lost property system and method
FR2819334A1 (fr) 2001-01-10 2002-07-12 Herve Seval Systeme permettant de retrouver un objet egare tel qu'un porte-cles
US6546088B2 (en) 2001-05-29 2003-04-08 Thomas Campbell Method and system for retrieval of lost goods
US20030088519A1 (en) 2001-11-07 2003-05-08 Woodson Shelly L. Email pet registration
NL1023564C2 (nl) 2003-05-28 2004-11-30 Findings Systems V O F Systeem en drager voor het terugvoeren van een verloren gegane entiteit.
US20070280461A1 (en) * 2006-06-06 2007-12-06 Qiang Du Method and system for making anonymous phone calls

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2011033048A1 *

Also Published As

Publication number Publication date
DE102009029616A1 (de) 2010-03-04
WO2011033048A1 (fr) 2011-03-24

Similar Documents

Publication Publication Date Title
DE69720912T2 (de) System und Verfahren zum Abrufen von Daten aus einer Datenbank
DE20321909U1 (de) Buchungssystem
WO2009003605A2 (fr) Carte prépayée ou de crédit virtuelle et procédé ainsi que système de fourniture de celle-ci et de gestion de paiement électronique
DE10310527A1 (de) Verfahren und System zum Initiieren und/oder Durchführen einer mit mindestens zwei korrespondierenden Willenserklärungen in Beziehung stehenden Transaktion
EP2982100B1 (fr) Procédé d'établissement d'une liaison de rappel de télécommunication
DE102008011192A1 (de) Verfahren und Diensterechner sowie System zur Transaktion eines Geldbetrages
EP1180751A1 (fr) Procédé et dispositif pour la transmission d'une somme d'argent électronique depuis une mémoire de crédit
EP0817458A2 (fr) Dispositif permettant l'optimisation du coût de télécommunication
DE10328884A1 (de) Verfahren und Vorrichtung zur Implementierung einer Callback-Funktionalität
EP1763949B1 (fr) Procede d'interrogations a distance d'informations memorisees dans un dispositif de telecommunication, et dispositif de telecommunication a fonctionnalite d'interrogations a distance d'informations memorisees
EP2478474A1 (fr) Système assisté par ordinateur pour retrouver des objets
EP0876038A2 (fr) Méthode de détermination d'une identification nominale pour un abonné de télécommunication
DE60026316T2 (de) System und verfahren zur bearbeitung von fernsprechanrufen
DE3531173C2 (fr)
DE10122727A1 (de) Nutzung von Mobiltelefonen und anderen Kommunikationsgeräten mit Rufnummernübermittlung für Personalzeiterfassung, Betriebsdatenerfassung, Personalinformation und Zutrittskontrolle
WO2002013147A2 (fr) Procede de controle de processus de paiement par carte de credit
DE4323847C1 (de) Verfahren zur Fernabfrage einer Zugangsberechtigung für eine Teilnehmereinrichtung
DE10254620B4 (de) Mehrfachregistrierung in Telefonsystemen
DE102008032360A1 (de) Verfahren und System zur Durchführung einer Kommunikation
EP2299394A1 (fr) Méthode de traitement de remises
AT503586B1 (de) Stimuliertes senden von information seitens eines telefon-endgerätes
EP1421771B1 (fr) Procede pour etablir une liaison de telecommunication entre deux personnes
EP0834230B1 (fr) Procede et dispositif de commande pour un service de prelevement de donnees
EP1370102A1 (fr) Procédé et système d'acheminement de communication
EP1933265B1 (fr) Procédé dans un réseau de communication destiné au chargement d'un groupe d'abonnés en vue d'un évènement

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120417

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20130304

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20130716