GB2305090A - Universal directory for determining addresses and accurately routing messages - Google Patents

Universal directory for determining addresses and accurately routing messages Download PDF

Info

Publication number
GB2305090A
GB2305090A GB9618151A GB9618151A GB2305090A GB 2305090 A GB2305090 A GB 2305090A GB 9618151 A GB9618151 A GB 9618151A GB 9618151 A GB9618151 A GB 9618151A GB 2305090 A GB2305090 A GB 2305090A
Authority
GB
United Kingdom
Prior art keywords
information
receiving
media
address
receiver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9618151A
Other versions
GB9618151D0 (en
GB2305090B (en
Inventor
Ronald P Sansone
Eric W Malmborg
Michael B Cooper
Paul D Greene
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pitney Bowes Inc
Original Assignee
Pitney Bowes Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pitney Bowes Inc filed Critical Pitney Bowes Inc
Publication of GB9618151D0 publication Critical patent/GB9618151D0/en
Publication of GB2305090A publication Critical patent/GB2305090A/en
Application granted granted Critical
Publication of GB2305090B publication Critical patent/GB2305090B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/53Centralised arrangements for recording incoming messages, i.e. mailbox systems
    • H04M3/5307Centralised arrangements for recording incoming messages, i.e. mailbox systems for recording messages comprising any combination of audio and non-audio components
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
    • H04M3/4931Directory assistance systems

Abstract

This invention provides a secured method for finding the receiver of a message and a secured method for requesting from a receiver of multi media data, the media in which the receiver would like specified data transmitted. The media means the type of data or message and the carrier associated with that message. All the needed information would be in the Controlled Data Access Management (CDAM) (23). The CDAM is a server (23) that provides controlled access to users of the server. The CDAM server (23) consists of a computer that accesses a universal destination catalog that maintains the encrypted name, destination(s).

Description

Universal Directory For Determining Addresses And Accurately Routing Messaaes The invention relates generally to the field of controlled information transmission systems and more particularly to controlled information distribution systems.
From the dawn of civilization people have directly transmitted information from one person to another. Information was first transmitted by speech and later by the written word. Writings enabled people to transmit information by messengers from a location in which the sender of the writing was present to another location where the receiver was present. In time, postal services were developed in which a person would deliver a letter to the post office in one city and an agent of the post office would deliver that letter to a post office in another city, where the letter would be picked up by the person to whom the letter was sent. Ever since the numeric codification of streets and buildings received general acceptance, an individuals' name and their household postal addresses have been linked.
With the advent of general local and then national telephone service, a second numbering system was developed based on the location of the telephone, that was assigned to a particular individual. This second number was tied by tradition to the individuals numeric household address.
Cellular telephone services have been developed in which the cellular telephone can be moved from one location to another. The cellular telephone is assigned a numeric identification number. When the cellular telephone is in the roaming mode i.e., being moved from one location to another the cellular telephone network needs a little help from the user of the cellular telephone to establish the location of the cellular telephone.
Facsimile machines, that utilize the telephone network, have been developed to transmit information from one facsimile machine to another.
Computers that utilize modems and the telephone network have been developed to transmit information from one computer to another. Currently, information may also be transmitted from one location to another by a smart telephone, i.e., a telephone having a screen and a keyboard and information may also be transmitted by cable television i.e., invoices.
Currently, individuals are receiving information by mail, telephone, cellular telephone, facsimile machine, computer, and cable television. A disadvantage of the prior art is that the recipient of the information usually does not have anything to say regarding the mode of transmission in which the recipient will receive specified information. Thus, certain information which the recipient considers private or privileged information may be transmitted by a media that is not private i.e., facsimile, etc.
Another disadvantage of the prior art is that the format of the information transmitted by the sender is not necessarily the format desired by the receiver of the information. For instance, the receiver may want information transmitted verbally by telephone in a specified format that is used by the receiver's personal computer.
Currently, if senders of information allowed their receivers to specify the mode of transmission in which they would like to have their information transmitted, every sender of information would have to request the preferred mode of transmission from every receiver. Thus, every receiver would have to submit individual selection to each sender i.e., electric company, phone company, cable company, mortgage company, book club, etc. Hence, numerous communications would be required causing each sender of information to be overwhelmed with many requests.
An object of the invention is to provide a secured method for finding the receiver of a message and a secured method for requesting from a receiver of multi media data, the media in which the receiver would like specified data transmitted. The media means the type of data or message and the carrier associated with that message i.e., letter mail might be the United States Postal Service, electronic mail might be America On Line and the telephone company, etc.
All the needed information would be in the Controlled Data Access Management (CDAM). The CDAM is a server that provides controlled access to users of the server. The CDAM server consists of a computer that accesses an internal universal destination catalog that maintains the encrypted name, destination(s) i.e., addresses, telephone number, etc., delivery preferences and demographics of receivers who supplied information regarding their preferences.
For a better understanding of the invention, and to show how the same may be carried into effect, reference will now be made, by way of example, to the accompanying drawings, in which: Fig. 1 is a drawing of a multi media message routing system; Fig. is a flow chart of the Finalist and CROSSCHECK software linkages; Fig. 3 is a flow chart of the Look Up Address and Name Data subroutine, block 46 of Fig. 2; Fig. 4 is a flow chart that describes how to build the database; and Fig. 5 is a flow chart of the Audit database inquiry.
Referring now to the drawings in detail, and more particularly to Fig. 1, the reference character 11 represents the world of recipients or everyone who is currently receiving mail or telephone service, etc. Recipients do not currently select the media in which they receive information. Recipients or people who elect to select the media in which they want to receive specified information supply their name, destination(s), delivery preferences and demographics to a central data collection station 12. The information received by station 12 may have been transmitted by Facsimile server 13, electronic mail server 14, internal mail server 15, voice mail server 16, mail by phone server 17, EDI server 18 (Electronic Data Interface), conventional mail 19, or any other method known in the art to transmit information.
Station 12 transmits the destination and delivery preferences of the people or recipients who supplied information to external database 20. The information contained in database 20 is transmitted to file encryptor 21.
Encryptor 21 encrypts the information received by database 20. Encryptor 21 can be any one of a large number of encrypting devices including those devices which use the Data Encryption Standards described in FIPS PUB 46, dated Jan, 15,1977 and published by the United States Department Of Commerce, National Bureau of Standards, herein incorporated by reference.
In addition, a standard encryption scheme, such as the RSA encryption technique, can also be used for encryptor 21. It will be obvious to one skilled in the art that different public and private encryption keys may be utilized. The information encrypted by encryptor 21 is distributed to universal destination catalog 22. Catalog 22 stores the encrypted name, destination(s), i.e., addresses, telephone numbers, etc., delivery preferences and demographics of the people and recipients who supplied the information. The information contained in catalog 22 may be written on a CD or any other media known in the art.
The information contained in catalog 22 is accessed by Controlled Data Access Management (CDAM) server 23. Server 23 is coupled to meter-link 24 and meter-link 24 is coupled to access by phone center 25. Center 25 is a billing and payment center that is in communication from time to time with CDAM server 23. Server 23 decrypts the information specified by center 25 when proper payment is recorded i.e., the correct physical address for the recipient is obtained. Server 23 is a server that consists of a computer that accesses a universal destination catalog that maintains the encrypted name, destination(s) i.e., addresses, telephone number, etc., delivery preferences and demographics of receivers who supplied information regarding their preferences.
The output of server 23 is coupled to CDAM methods 26. CDAM methods 26 are public software processes contained within a computer, that enable access to CDAM server 23. A flow chart of the public software process is described in the description of Fig. 2. The output of methods 26 is coupled to Customer Mail application 28. Customer mail application 28 assembles each data field associated with a mailpiece, wherein the address field contains the address of the recipient. FINALIST and CROSSCHECK are applications programs 27. FINALIST looks for, finds, makes a copy of each and every and all address fields for each mailpiece to be created and CROSSCHECK receives each address field and validates the address field against the United States Postal Service Database. In the event CROSSCHECK finds the address to be valid, CROSSCHECK moves on to the next address.In the event the address is not valid, then and in that event the address is sent to CDAM server 23 to be looked up. FINALIST receives each address field and validates the address field against the United States Postal Service Database.
CROSSCHECK and FINALIST are programs licensed by Pitney Bowes Software Systems 4343 Commerce CT, Suite 500, Lisle, Illinois 60532-3618.
The output of mail application 28 is transmitted to generator 29.
Generator 29 transmits the message and the correct physical address to router 30. Router 30 is a communications type of computer that requests from CDAM server 23 via CDAM methods 26 the media in which the recipient prefers to receive the specified type of data. Router 30 is the FaxGate, manufactured by Teubner and Associates of P.O. Box 1994 Stillwater, Oklahoma 74076. Router 30 may also be the Dazel, manufactured by the Dazel Corporation of 6034 West Courtyard Drive, Suite 210, Austin Texas 78730.
Router 30 receives from CDAM Server 23 via CDAM methods 26 the carrier and format of the message or data. CDAM server 23 is the HP 9880 manufactured by Hewlett Packard and the CDAM methods shown in block 26 is described in boxes 41, 43, 44, 62, 63 and 64 of Fig. 2. Thereupon, router 30 transmits the physical address and message or information to the selected destination. The selected destination may be facsimile driver 31, or electronic mail driver 32, or internal mail driver 33, or voice driver 34, or mail by phone driver 35, or EDI driver 36, or printer 37, or enterprise digital warehouse 38.
Facsimile driver 31, electronic mail driver 32, internal mail driver 33, voice driver 34, mail by phone driver 35, EDI driver 36, and printer 37 are respectively coupled to facsimile server 13, electronic mail server 14, internal mail server 15, voice mail server 16, mail by phone server 17, EDI server 18 and mailroom 19.
Facsimile server 13, electronic mail server 14, internal mail server 15, voice mail server 16, mail by phone server 17, EDI server 18 and mailroom 19 are each individually coupled to the world of recipients by different communication links that are known in the art.
Fig. 2 is a flow chart of the Finalist and CROSSCHECK software linkages. When the Finalist Program rejects a name in block 40, this rejection goes to the isolated data paramaterized in block 41. Block 41 isolates the data in the form of parameters. The next step is performed in block 43 i.e., to initialize the CPI-C (Common Program Interface - communication). CPI-C is a program sold by international Business Machine of Armonk, New York.
At this juncture CDAM methods 26 are used to call CDAM server 23 in block 44. A CPI-C Housekeeping process is performed in block 45. Block 45 feeds block 46 the Look Up Address and Name Data subroutine which is described in greater detail in the description of Fig. 3. The next thing that happens is that the program proceeds to block 47 Found. If the CDAM found the name, meter-link 24 (Fig. 1) is clicked in block 48, signaling the fact that an address value should be recorded. Likewise, for routing a signal indicating routing value should be recorded in meter-link 24. An invoice may be prepared to charge a customer for the amount of times meter-link 24 was clicked. If the CDAM did not find the name, the answer of block 47 is no. After going to block 48 or block 49 the program proceeds to block 50 Setup return of the results to the caller.The next step is performed in block 51, which is Collect Inquiry Audit Data. Thereupon the CDAM collects the original inquiry and does an audit on the data. At this time the program proceeds to block 52 CPI-C?.
If the answer in block 52 is yes, the program proceeds to block 53 CPI-C return to caller and the found information goes to block 54 retrieve CDAM results. The next step is performed in block 55 terminate CPI-C conversation.
Thereupon, the program proceeds to block 56 Return Results To Finalist. If the answer in block 52 is no, the program proceeds to block 57 RPC return to caller. The program now proceeds to block 58 Retrieve CDAM results. The next step is performed in block 59 terminate RPC conversation. The program goes to block 60 Return results to CROSSCHECK. Thus, If the CPI-C? is yes in block 52, information is returned to the caller and once again you retrieve the CDAM results, terminate the CPI-C conversation and return to the Finalist program. If the CPI-C is no in block 52 the results are returned to the CROSSCHECK program.
When the CROSSCHECK Program rejects a name the program will be at block 61. The next step is to Set isolated properties block 62 and to initialize RPC (Remote Procedure Call) conversation in block 63. The RPC is a UNIX standard. Then the RPC calls the CDAM in block 64 and the RPC housekeeping is performed in block 61 and now the program follows the process hereinbefore described.
Fig. 3 is a flow chart of the Look Up Address and Name Data subroutine, block 46 of Fig. 2. The subroutine starts in block 66 isolate input name line from the other lines. Then, the subroutine builds a table of last names, cities, state, address lines and first names in block 67. Thereupon the program proceeds to block 68 match input, first name to the database, last name, using duplication logic. The duplication logic is used to correct problems where a doctor is named doctor, etc. Then in block 69 the address is chosen based on the closeness of the address line components. The next step is performed in block 70 and indicates a found or not found condition.
Fig. 4 is a flowchart that describes how to build the database. In block 71 a third party extracts the name and address from data from the third party database (external data base 20, Fig. 1). Block 71 assumes that someone has walked in with the data base already available, like TRW. At this time in block 72 the address elements in address line data are isolated. Then in block 73 the structure for each address line is created with the isolated data, and then in block 74 one isolates the name data and the city, state and Zip code. A table containing last name, city, state, address lines, first names is built in block 75.
Then the data is encrypted and stored on the data base in block 76. The contents of block 76 are contained in universal destination catalog 22 (described in the description of Fig. 1) Fig. 5 is a flow chart of the audit database inquiry, that is used to check the reliability of CDAM 26 (described in the description of Fig. 2). This makes the assumption that there is a database and you have acquired, or are going to acquire, an address, name and address and this teaches one how one might process that and also audit what is going on. The first step is file options block 77. The file options are to open an audit file (block 78); Close an audit file (block 79); Switch audit files (block 80) and create new audit file (block 81).
The next step is block 82 view audit file. View audit file is a menu i.e., view entire audit file (block 84) i.e., view number of requests, view number of satisfied request and cost; view by selected ID number (block 85), view by selected date/time (block 86); view selected hits (block 87); and view statistics (block 88) associated with the hits. After blocks 78 to 81 or blocks 84 to 88 are done, one would go block 83 to audit the file.
The above specification describes a new and improved secured method for requesting from a receiver of multi media information, the media in which the receiver would like specified information transmitted. It is realized that the above description may indicate to those skilled in the art additional ways in which the principles of this invention may be used without departing from the spirit. It is, therefore, intended that this invention be limited only by the scope of the appended claims.

Claims (22)

Claims:
1. A secured method for changing the routing of a message, said method including the steps of: receiving the correct name and address of a mail recipient; obtaining the desired media and associated media address in which a recipient would like to receive a message; determining the media in which a recipient desires to receive the message; and routing the message via the desired media.
2. The method claimed in Claim 1, wherein the step of receiving the correct name and address includes the step of obtaining the postal address.
3. The method claimed in Claim 1, wherein the step of receiving the correct name and address includes the step of obtaining the facsimile number.
4. The method claimed in Claim 1, wherein the step of receiving the correct name and address includes the step of obtaining the telephone number.
5. The method claimed in Claim 1, wherein the step of receiving the correct name and address includes the step of obtaining the E-mail address.
6. The method claimed in Claim 1, wherein the step of receiving the correct name and address includes the step of obtaining the EDI address.
7. The method claimed in Claim 1, wherein the step of receiving the correct name and address includes the step of obtaining the local area network address.
8. The method claimed in Claim 1, further including the step of metering the number of times a recipient desires to receive a message on a particular media.
9. The method of Claim 8, further including the step of: billing the metering information.
10. A secured method for finding the receiver of a message and for requesting from a receiver of multi media data, the media in which the receiver would like specified data transmitted, said method including the steps of: receiving the name, destination(s), delivery preferences and demographics of everyone that elects to supply information; storing the information in a controlled access facility; copying the stored information; encrypting one or more copies of the copied information distributing encrypted copies of the information to senders of the information who have contracted to receive the information; installing encrypted copies of the information in a server; accessing the encrypted information to obtain the receivers postal location; accessing the encrypted information to obtain the preferred media in which the receiver would like to receive the data; and routing the data to the receivers specified media location.
11. The method claimed in Claim 10, wherein the routing step includes the steps of: transmitting the data and buffering the data.
12. The method of Claim 10, further including the step of: confirming the receiver location when it appears that the location may be incorrect.
13. The method of Claim 10, further including the step of: metering each time the encrypted information is accessed.
14. The method of Claim 13, further including the step of: billing the metering information.
15. The method claimed in Claim 10, wherein the step of receiving the delivery preference is via mail.
16. The method claimed in Claim 10, wherein the step of receiving the delivery preference is via facsimile.
17. The method claimed in Claim 10, wherein the step of receiving the delivery preference is via telephone.
18. The method claimed in Claim 10, wherein the step of receiving the delivery preference is via E-mail.
19. The method claimed in Claim 10, wherein the step of receiving the delivery preference is via EDI.
20. The method claimed in Claim 1, wherein the step of receiving the delivery preference is via the local area network.
21. A secured method for changing the routing of a message substantially as hereinbefore described with reference to the accompanying drawings.
22. A secured method for finding the receiver of a message and for requesting from a receiver of multi-media data the media in which the receiver would like specified data transmitted substantially as hereinbefore described with reference to the accompanying drawings.
GB9618151A 1995-08-30 1996-08-30 Universal directory for determining addresses and accurately routing messages Expired - Fee Related GB2305090B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US52099995A 1995-08-30 1995-08-30

Publications (3)

Publication Number Publication Date
GB9618151D0 GB9618151D0 (en) 1996-10-09
GB2305090A true GB2305090A (en) 1997-03-26
GB2305090B GB2305090B (en) 1999-11-24

Family

ID=24074923

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9618151A Expired - Fee Related GB2305090B (en) 1995-08-30 1996-08-30 Universal directory for determining addresses and accurately routing messages

Country Status (1)

Country Link
GB (1) GB2305090B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6157924A (en) * 1997-11-07 2000-12-05 Bell & Howell Mail Processing Systems Company Systems, methods, and computer program products for delivering information in a preferred medium
GB2367919A (en) * 2000-10-16 2002-04-17 Scandex Ltd Electronic mail system
WO2003032223A1 (en) * 2001-10-12 2003-04-17 Readsoft Ab A method and system for delivering a message
US7564839B1 (en) 1999-12-30 2009-07-21 At&T Intellectual Property Ii, L.P. Personal control of address assignment and greeting options for multiple BRG ports
US7734908B1 (en) 1999-12-30 2010-06-08 At&T Intellectual Property Ii, L.P. Protected IP telephony calls using encryption
US7760711B1 (en) 1999-12-30 2010-07-20 At&T Intellectual Property Ii, L.P. Method for billing IP broadband subscribers
US8218527B2 (en) 1999-12-30 2012-07-10 At&T Intellectual Property Ii, L.P. Personal IP toll-free number

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4837798A (en) * 1986-06-02 1989-06-06 American Telephone And Telegraph Company Communication system having unified messaging
WO1993007566A1 (en) * 1991-10-04 1993-04-15 Motorola, Inc. Temporary message routing and destination selection
US5283887A (en) * 1990-12-19 1994-02-01 Bull Hn Information Systems Inc. Automatic document format conversion in an electronic mail system based upon user preference
WO1994006236A2 (en) * 1992-08-26 1994-03-17 Bellsouth Corporation Personal number communications system
WO1995012292A1 (en) * 1993-10-26 1995-05-04 Telefonaktiebolaget Lm Ericsson A system and method for routing messages in radio communication systems
WO1995034972A1 (en) * 1994-06-10 1995-12-21 Motorola Inc. Method and apparatus for routing information in a communication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4837798A (en) * 1986-06-02 1989-06-06 American Telephone And Telegraph Company Communication system having unified messaging
US5283887A (en) * 1990-12-19 1994-02-01 Bull Hn Information Systems Inc. Automatic document format conversion in an electronic mail system based upon user preference
WO1993007566A1 (en) * 1991-10-04 1993-04-15 Motorola, Inc. Temporary message routing and destination selection
WO1994006236A2 (en) * 1992-08-26 1994-03-17 Bellsouth Corporation Personal number communications system
WO1995012292A1 (en) * 1993-10-26 1995-05-04 Telefonaktiebolaget Lm Ericsson A system and method for routing messages in radio communication systems
WO1995034972A1 (en) * 1994-06-10 1995-12-21 Motorola Inc. Method and apparatus for routing information in a communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
AU 94/81845 A *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6157924A (en) * 1997-11-07 2000-12-05 Bell & Howell Mail Processing Systems Company Systems, methods, and computer program products for delivering information in a preferred medium
US6701315B1 (en) 1997-11-07 2004-03-02 Bell & Howell Mail And Messaging Technologies Company Systems, methods, and computer program products for delivering information in a preferred medium
US7564839B1 (en) 1999-12-30 2009-07-21 At&T Intellectual Property Ii, L.P. Personal control of address assignment and greeting options for multiple BRG ports
US7734908B1 (en) 1999-12-30 2010-06-08 At&T Intellectual Property Ii, L.P. Protected IP telephony calls using encryption
US7760711B1 (en) 1999-12-30 2010-07-20 At&T Intellectual Property Ii, L.P. Method for billing IP broadband subscribers
US8218527B2 (en) 1999-12-30 2012-07-10 At&T Intellectual Property Ii, L.P. Personal IP toll-free number
US8711735B2 (en) 1999-12-30 2014-04-29 At&T Intellectual Property, Ii, L.P. Personal IP toll-free number
US9167097B2 (en) 1999-12-30 2015-10-20 Shoretel, Inc. Responding to a call with a prompt and routing the call to a phone selected in response to the prompt
GB2367919A (en) * 2000-10-16 2002-04-17 Scandex Ltd Electronic mail system
GB2367919B (en) * 2000-10-16 2003-11-19 Scandex Ltd Electrionic Mail system and method
WO2003032223A1 (en) * 2001-10-12 2003-04-17 Readsoft Ab A method and system for delivering a message
US7487157B2 (en) 2001-10-12 2009-02-03 Lars Appelstal Method and system for delivering a message

Also Published As

Publication number Publication date
GB9618151D0 (en) 1996-10-09
GB2305090B (en) 1999-11-24

Similar Documents

Publication Publication Date Title
US9571438B2 (en) Enhanced services electronic mail
CN1254041C (en) Method and system for providing object to user of telecommunication network
USRE43284E1 (en) Method of triggering a transfer of data stored in a database
US20070011158A1 (en) Personal information database with context-driven information retrieval
US6690773B1 (en) Recipient control over aspects of incoming messages
US20060167908A1 (en) Methods and systems for creating and operating hierarchical levels of administrators to facilitate the production and distribution of content
US20020007421A1 (en) Universal address system
US20020126848A1 (en) Protected communication system
GB2305090A (en) Universal directory for determining addresses and accurately routing messages
KR20010084364A (en) Internet personal identification managing method and system
US8774783B2 (en) System and method for enhanced UAProfile management
US20100088401A1 (en) Method of transferring data being stored in a database
CN1941778B (en) Third party access gateway for telecommunications services
US7203295B2 (en) Virtual telecommunication messaging service system and method
CA2550637A1 (en) Methods and systems for facilitating the production and distribution of content
US7054869B1 (en) Methods and systems for facilitating the production and distribution of content
JP3652230B2 (en) Report management apparatus and method
KR20020016485A (en) One password system for internet
EP1172976A1 (en) Method of transferring data being stored in a database
JP2001211161A (en) Content distributing method, computer and device for content distribution system, and control method thereof
MXPA00003273A (en) Information distribution system
JP2003228531A (en) Domain name search and data transmission/reception system

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20090830