GB2394385A - Provision of services via a mobile telecommunications network - Google Patents

Provision of services via a mobile telecommunications network Download PDF

Info

Publication number
GB2394385A
GB2394385A GB0223992A GB0223992A GB2394385A GB 2394385 A GB2394385 A GB 2394385A GB 0223992 A GB0223992 A GB 0223992A GB 0223992 A GB0223992 A GB 0223992A GB 2394385 A GB2394385 A GB 2394385A
Authority
GB
United Kingdom
Prior art keywords
user
request
network
service provider
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0223992A
Other versions
GB2394385B (en
GB0223992D0 (en
Inventor
Mark Andrew Brookes
Andrew Mark Fellows
Jose Manuel Rodriguez-Reyes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vodafone Group PLC
Original Assignee
Vodafone Group PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vodafone Group PLC filed Critical Vodafone Group PLC
Priority to GB0223992A priority Critical patent/GB2394385B/en
Publication of GB0223992D0 publication Critical patent/GB0223992D0/en
Priority to AT03254982T priority patent/ATE501579T1/en
Priority to DE60336290T priority patent/DE60336290D1/en
Priority to EP03254982A priority patent/EP1411702B1/en
Publication of GB2394385A publication Critical patent/GB2394385A/en
Application granted granted Critical
Publication of GB2394385B publication Critical patent/GB2394385B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04Q7/22
    • H04Q7/221
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13097Numbering, addressing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13098Mobile subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13213Counting, timing circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13339Ciphering, encryption, security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13376Information service, downloading of information, 0800/0900 services

Abstract

When a user makes a location specific request to a service provider, the user's request is intercepted by the network which generates a "user tag". The network stores user information in the tag, encodes it and transmits it to the service provider in a form which the service provider is unable to obtain the users identity. All of the data exchanges between the user and the service provider are routed through the network, using the user tag to identify the user. In this way, information identifying the user is never provided to the service provider who cannot therefore directly access the user. The user tag may have a predetermined short lifetime to provide further security. The lifetime of the user tag is extended if the user makes further requests relating to the same service, so that all requests relating to a service are dealt with by using one user tag.

Description

PROVISION OF SERVICES VIA A MOBILE TELECOMMIJNlCATIONS NETWORK;
The invention relates to a system, telecommunications network and method by which a service provider provides a service to a user in a mobile telecommunications network in response to a request for the service by that user, in which the network generates a request ID in response to the user request, the network transmits the request ID to the service provider, and the service provider provides the service to the user via the network and using the request ID.
Systems, networks and methods according to the invention, to be described in more detail below by way of example only, enable application service providers to provide services to users in a mobile telecommunications network such as a cellular telephone network.
According to a first aspect of the invention, there is provided a system for allowing communication between the user of a telecommunications network and a service provider, including means for receiving a request from the user for a service from the service provider; means for generating a service request ID which identifies the user to the network for a selected time period but provides no information to the service provider which allows the service provider to directly access the user; and means for extending the selected time period in response to a further request relating to the service from the user.
According to a second aspect of the invention, there is provided a telecommunications apparatus including a mobile telecommunications networl;.
at least one service provider and a system as defined in the preceding paragraph. According to a third aspect of the invention, there is provided a method by which a service provider provides a service to a user in a telecommunications network in response to a request for the service by that user, in which the network generates a request ID in response to the user request, the network transmits the request ID to the service provider, and the service provider provides the service to the user via the network and using the request ID, the request ID including identity information which identifies the user to the network for a selected period of time but providing no information to the service provider which enables the service provider to directly access the user, and extending the selected time period in response to a further request relating to the service from the user.
Systems, networks and methods according to the invention for providing services to users in a cellular telephone network will now be described by way of example only and with reference to the accompanying diagrammatic drawings in which: Figure I shows such a network; Figure 2 shows different methods of providing service request lDs; and Figure 3 is a flow chart showing operations taking place in the network.
Figure I shows a cellular telecommunications network n in which are located users having respective mobile telephone handsets or mobile stations MSI, MS2, MS3, MS4... The network n may be a GSM or 3G (Third Generation) network or similar network.
Figure 1 also shows a number of application service providers ASP1, ASP2, ASPS, ASP4, ASP5.... The application service providers provide various services to users in the network n. The services offered by the ASPs may be of various types. For example, they may be of the "subscription" or "non-
subscription" type. A subscription-type service might be, for example, a traffic information service to which a particular user subscribes, paying an annual or monthly subscription fee, automatically being provided with periodic or irregular information concerning road traffic conditions relevant to the location of the user's vehicle at any time. Other examples of subscription-type services are the provision of news information, sports information, financial information and weather information Subscription-type services therefore provide services on an on-going basis to subscribing users.
A non-subscription-type service provides a single service to a user, normally on a commercial basis and for a single payment. Such a service may in particular be dependent on the user's current location. One example of such a non-
subscription-type service is a service provided by (or on behalf of) a chain of fast food (e.g. pizza) outlets distributed geographically over all or part of the area covered by the network n. Using this service, a user, in response to a specific real time request, can be provided by the relevant ASP (e.g. ASP1) with directions to or the address of the outlet nearest to the user's current location. For the provision of this information, ASPI will make a (normally small) charge. The charge could be debited directly to the user. Instead, in a case where ASP1 is providing the service for the chain of pizza outlets, the
charge might be debited to that chain in the form of an "introduction fee" for
introducing that user to the particular outlet. Such charges may be debited by the network on behalf of the ASP.
The system and method to be described in more detail below are particularly concerned with non-subscription-type services - such as the example given above where a user in the network n wishes to ask ASP I for directions to or the location of the nearest pizza outlet. Obviously, though, the system and method can provide other non-subscription-type services.
The system and method to be described are intended to deal with certain problems or potential problems: (a) ASP1 needs to know the location of the user, in order to be able to accede to the user's request for directions to or the location of the nearest pizza outlet. The operator of the network n has this information - but it of course has value or potential value and the network operator will therefore not wish to disclose it freely to ASP 1.
(b) If the system and method are arranged so that the user makes a telephone call direct to ASP1, the user's CLI (calling line identifier, or telephone number) will normally be disclosed to ASPI. ASPI can then correspond directly with the user and obtain the user's location. The valuable information, concerning user's telephone number and location, as known to the network operator, will then have been directly and freely disclosed to ASP1 without recompense to the network operator (apart, of course, *om the cost of the telephone call).
(c) If the user's telephone number becomes disclosed to ASPl, the ASP will be able to use this information in future to make direct calls to the user, offering the pizza service (or other services), thus detrimentally by-passing the network operator.
(d) It is of major importance that the network operator (and other parties in the system) respect data protection and privacy laws and regulations. Thus, these may be breached sending of by unsolicited advertising calls or other "spam" to the user (e.g. by the ASP if the ASP gains knowledge of the user's telephone number) or by disclosure of the user's identity, or identity
combined with location, of the user. Mere disclosure to the ASP
of the user's location, without identifying the user in a manner enabling the ASP to make direct access to the user, will not breach such laws or regulations.
Figure 2A shows a prior scheme where a user is given a fixed ID or "User Tag" that never expires (or expires after a very long period of time). When a user of the mobile network wishes to subscribe to a service provided by an ASP, an appropriate request is passed from the user's mobile terminal to the network.
The network generates an appropriate ID (ID-1) which includes information relating to the user and the service to which the user wishes to subscribe. This information is encoded or encrypted in the user ID such that the information relating to the identity of the user is not accessible by the ASP, although the ID can be distinguished by the ASP from other user IDs relating to other user requests. The user ID is, however, accessible and understandable to the network. When an appropriate ID is generated, this ID can be used to access services for the user provided by the ASP for an indefinite (or very long) period
as) of time. The ID is the same for all requests for service irrespective of the number of requests from the user. Such an ID may be used for subscription-
type services described above. The disadvantage of such an arrangement is that, because the ID does not change, should the ID become known to an unauthorised party, the unauthorised party will be able to access the user and also services, possibly at the user's expense, at least until the unauthorised access is detected, "hereafter the ID could be cancelled.
Figure 2B shows an alternative arrangement where a user is provided with a fixed ID (ID-1, ID-2) which expires after a limited, pre-determined time period.
Such an arrangement is more secure than the arrangement of Figure 2A because, even if the user's ID becomes known to an unauthorized party, the ID will only allow access to the user and to services for a limited time period. A disadvantage of this system is that, if a user requires a succession of accesses to an ASP relating to a single service, the ID may expire while the successive accesses are being made. The requirement to generate a new ID, following expiry of the previous ID, creates an additional system overhead, possibly slowing the communication between the user and the ASP. Also, the creation of a new user ID may result in complications when it is required to bill the user for use of the service. Typically, a succession of communications relating to the provision of a single service would result in the user paying a single charge. A convenient way of recording that a charge should be made to the user is to generate a charge on the user's account on issuance of an ID. However, on issuance of a second ID (1D-2) relating to a succession of communications relating to a single service, generation of a charge on the user's account must be inhibited. Treating the first (ID-I) issued and subsequently issued (1D-2) IDs in a different manner for charging purposes is inconvenient and adds to complexity of the mobile network and accounting systems.
Further, because in Figure 2B the user ID expires after a fixed period of times such expiry could occur after sending of a communication requesting a reply but before the reply has been transmitted. In this event, no reply will be received because the reply will be encoded based on an expired user ID, and it will no longer be possible to forward the reply to the appropriate user or ASP, as no data will be available linking the ID to any particular user, as this will be deleted from the database of valid IDs following expiry of the ID.
A further arrangement is shown in Figure 2C (which is described in WO-A-
02/065804), where a "session"-based ID is issued when a request for a new service is made by a user.
A series of communications between a user and an ASP relating to a particular service are referred to as a "session". Such communications could, in the case of the pizza outlet example, include: (a) User request for the address of the nearest pizza outlet; ASP provides user with a list of nearby pizza outlets.
(c) User selects the pizza outlet of his choice and sends this to the ASP.
(a) ASP provides the user with directions to the pizza outlet using the user's location information.
Further communications relating to this service may follow, for example, to provide a picture of the pizza outlet (in the form of an MMS, for example), a food menu, etc.
For each of these communications between the user and the ASP, a multiplicity of data exchanges between the user's mobile terminal and the ASP may be required. All these communications between the user and the ASP will be iota the network and will use the current user ID.
Such a session-based ID automatically expires after the earliest of: (i) a request for a further service is issued by the user or (ii) a predetermined time period has expired (which is relatively short - for example about 30 minutes - but sufficient such that inaction for this time would generally indicate that the session was finished).
Such an arrangement is advantageous in that it should not be necessary to change the user's ID during a session relating to a single service (ID-1, ID-2).
However, if the user requests two services in quick succession (ID-3, ID4), a response to the first request for service (ID-3) may be undeliverable as the user ID associated therewith will have been caused to expire by the second request for a service (1D-4).
One solution to this problem would be to allow the user to have more than one ID valid at a given time. If communications relating to a first session were not completed, the generation of a second user ID would allow a second series of communications relating to another session to begin and run in parallel to the first session. However, allowing a user to have more than one "live" ID at any given time significantly increases system overheads and increases the complexity of the billing process.
Figure 2D shows an improved arrangement in accordance with an embodiment of the present invention. In Figure the 2D arrangement, each ID will initially be set to expire after a predetermined time period x (for example, 30 minutes).
When the user makes a request relating to a particular service, a check is made to determine whether the user already has a "live" ID relating to this service. In Figure 2D in response to the first request to check for existing "live" IDs produces a negative result, and a new ID (ID-1) is created. The same situation occurs on creation of the second and third IDs (lD-2, ID-3). However, when a further request for a service which is already being provided in association with ID-3 is made, the check by the system for a valid "live" ID relating to the service produces a positive result. In contrast to the arrangement described in relation to Figure 2C, a new ID (which would be ID-4) is not created, but rather the period for which TD-3 is valid is extended by a pre-determined amount y.
The total validity period is x + y.
Repeated requests for service while ID-3 is valid will result in ID-3 being repeatedly extended by period y. It is intended that the user ID is valid until all data exchanges relating to a session or service have been completed, "hereafter the user ID expires - rendering it useless of subsequently obtained by an unauthorized party.
The system and method will now be described in more detail with reference to Figure 3 which represents a flow chart of the operations taking place.
At A, a user initiates a request to ASP I for (in this example) the address of the nearest pizza outlet. At step B. this request is received by the network n. It is not transmitted directly to ASPI but recognized as being intended for ASPI.
At step C the network consults a database of user tags that it maintains. The database lists all user tags, the status of the user tags ("live", expired, etc.) and the service for which the user tag is effective. By consulting the database the network is able to determine whether the user already has a user tag issued to them. If there is no user tag control is passed to Step D, where a new user tag is generated. The user tag comprises at least four components: (i) an identification of the user (for example, the mobile terminal's MSISDN, a username and password or any other identifier); (ii) an identification of the ASP which is to be involved in the transaction (ASP I in this case); (iii) the time and date of the user's request; and (iv) information relating to the actual connection (mode, format etc.). In connection with (iv), a "session" between a user and ASP may consist of many components. There could be several layers of activity going on in one session, which all may require different billing/auditing. Hence the specifics of the connection will identify the unique aspects of the session. It is an important feature of the user tag that it is encoded or encrypted in a suitable way (discussed below in more detail) so that the information which it contains is not accessible by the ASP though it can be distinguished by the ASP from user tags relating to other user requests; thus for example, the user tag may comprise a multi-digit number or have alphanumeric or any other suitable form. The information which it contains or represents remains accessible by the network operator. At Step E the new user tag is logged in the database.
If, at Step C, it is detennined that the user already has a user tag in the database, the validity of this tag in relation to the user request received at Step B is determined, at Step F. For example, the status of the user tag is checked in
the database. If the user tag in the database has expired or if it is for a different service, the user tag is determined not to be valid for this seivice and the user tag may be removed from the database at Step G. if appropriate. After removal of the user tag from the database at Step G. control passes to Step D where a new user tag is set up, which is logged in the database as appropriate, at Step E. However, if the user tag is determined to be valid, at Step F. control passes to Step H. where the expiry conditions are refieshed. That is, the time that the user tag expires is extended by, for example, a pre-deterrnined time period in order allow the request for service received at Step B to be dealt with. That the user tag will be reused (Step 1) and has had its expiry conditions refreshed is noted in the database at Step E. At step J. the network passes the user tag to ASP I which recognises it as representing a request fiom a user for the address of the user's nearest pizza outlet. ASP1 does not of course receive any information about the user or the user's location (except that it is implicit that the user is within the area covered by the network n).
If ASP l's system is currently operative, the ASP will at step K request information about the user's location from the network n, using the user tag as a means of r elating this request to the particular user.
At step L, the network responds to this request by providing the location of the user to ASP 1 - that is, by defining the geographical area in which the user is currently present. The network knows which user is concerned because it derives this information from the user tag. This is the only information which the network will provide; no information identifying the user or the user's telephone number is provided.
At step M, ASP 1 responds to receipt of the information about the user's location by generating the requested information (the address of the nearest pizza outlet). Alternatively, it may be that there is no pizza outlet within reasonable distance of the user's location, and information to that effect will instead be generated. At step N. the ASP passes this information back to the network n. At step 0, the network transmits this information to the user. Thus, ASP 1 has no direct communication with the user and does not need to know the user's telephone number (or identity).
At step P the user then acts in accordance with the address/directions provided.
At step Q. ASP I then requests the network operator to levy a charge against the user, for the provision of the service. ASP 1 will again use the user tag during this process so that the network operator can identify the user and levy the charge accordingly (step R). The charge can be levied by debiting the user's call charge log (if the user is a contract customer) or placing a debit against the user's pre-paid credit if the user is a pre-pay customer.
Figure 3 describes how the address of a pizza restaurant is transmitted to a user in response to a request from the user. In addition to simply transmitting the request, further information may be provided which relates to the same service.
For example, on requesting the address of the nearest pizza outlet, the user could be provided with a list of nearby pizza outlets. The user then selects the pizza outlet of his choice. This selection is communicated to the relevant ASP, again using the same user tag as with the original request. When the request from the user is received the check performed at Step C of Figure 3 will identify that there is a user tag in the database. The check at Step F will reveal that the user tag is valid for this service. At Step G. the expiry time of the user
tag will be extended. The user's selection of pizza outlet will be communicated using the user tag, to the ASP. The ASP will then, for example, provide the user, using the user tag, with directions to the pizza outlet using the user's location information. Further communications relating to this service may follow, for example, to provide a. picture of the pizza outlet (in the form of an MMS, for example), a food menu, etc. Each time a user request relating to the service is received by the network, it is identified that there is a valid live user tag relating to the service, and the expiry time of the user tag is extended. This allows all the communications relating to the service to be performed using a single user tag. A single charge is levied by the network relating to the service.
I he user of a single user tag simplifies the levying of the single charge.
After a pre-determined period of non-use of the user tag, the user tag will expire, and a new user tag will be generated for the user for subsequent service requests. Renewal of the user tag protects the privacy of the user.
The user tag can be protected in any suitable way. For example, it could be produced in the form of a random multi-digit number which is stored by the network operator in a database in association with the specific four components of the user tag. Instead, the user tag could be generated by the network operator and then encrypted using the network operator's public key in a public/private key system. Other suitable methods of coding or encrypting or otherwise protecting the information in the user tag can be used.
The user tag can be used to perform an auditing function. The network operator will have a complete record of the transactions and services requested and delivered. This is clearly relevant to billing but can also be used for marketing and data analysis purposes (e.g. which is the most popular ASP etc.).
It is important to note that the system described is not restricted to location-
dependent services. For example, a user could order a ring tone from an ASP.
The ASP provider can then deliver the ring tone directly to the user's mobile without needing to know the mobile number (by using the user tag in the manner explained). In addition, information not related to location can be delivered directly to a user using the user tag in the manner explained (e.g. share prices).

Claims (24)

1. A system for allowing communication between the user of a telecommunications network and a service provider, including means for receiving a request from the user for a service from the service provider; means for generating a service request ID which identifies the user to the network for a selected time period but provides no information to the service provider which allows the service provider to directly access the user; and means for extending the selected time period in response to a further request relating to the service from the user.
2. A system according to claim 1, wherein the extending means only extends the selected time period if the selected time period is determined not to have expired.
3. A system according to claim 1 or 2, wherein the provision of the service by the service provider requires that the service provider has location information specifying the location of the user, and in which the service provider uses the request ID to obtain that location information from the network.
4. A system according to claim 3, wherein the service provider transmits the request ID to the network and the network uses the request ID and the identity information therein to derive the location information and transmits that information to the service provider in association with the request ID.
5. A system according to any one of claims I to 4, wherein the service provider uses the request ID to request generation of charging information by the network for the provision of the service.
6. A system according to claim 5, wherein the network uses the request ID to identify the user in relation to which the charge is to be generated.
7. A system according to any one of claims l to 6, wherein the request ID is initially effective for the service provider for a predetermined length of time.
8. A system according to any one of claims l to 7, wherein the request ID identifies the service provider and the time of the request to the network.
9. A system according to any one of claims l to 8, wherein the request ID identifies a position in a database from which the network can exb act the identity information.
10. A system according to any one of claims l to 9, wherein the request ID is encrypted before receipt by the service provider.
ll. A system according to any preceding claim, wherein the telecommunications network is a cellular telecommunications system.
12. Telecommunications apparatus including a mobile telecommunications network, at least one service provider and a system according to any one of claims l to 11.
13. A method by which a service provider provides a service to a user in a telecommunications network in response to a request for the service by that user, in which the network generates a request ID in response to the user request, the network transmits the request ID to the service provider, and the service provider provides the service to the user via the network and using the
request ID, the request ID including identity information which identifies the user to the network for a selected period of time but providing no information to the service provider which enables the service provider to directly access the user, and extending the selected time period in response to a further request relating to the service from the user.
14. A method according to claim 13, wherein the selected time period is only extended if the selected time period is determined not to have expired.
15. A method according to claim 13 or 14, wherein the provision of the service by the service provider requires that the service provider has location information specifying the location of the user, and in which the service provider uses the request ID to obtain that location information from the network.
16. A method according to claim 15, wherein the service provider transmits the request ID to the network and the network uses the request ID and the identity information therein to derive the location information and transmits that information to the service provider in association with the request ID.
17. A method according to any one of claims 13 to 16, wherein the service provider uses the request ID to request generation of charging information by the network for the provision of the service.
18. A method according to claim 17, wherein the network uses the request ID to identify the user in relation to which the charge is to be generated.
19. A method according to any one of claims 13 to 18, wherein the request ID is initially effective for the service provider for a predetermined length of lime.
20. A method according to any one of claims 13 to 19, wherein the request ID identifies the service provider and the time of the request to the network.
21. A method according to any one of claims 13 to 20, wherein the request ID identifies a position in a database from which the network can extract the identity information.
22. A method according to any one of claims 13 to 21, wherein the request ID is encrypted before receipt by the service provider.
23. A method according to any one of claims 13 to 22, wherein the telecommunications network is a cellular telecommunications system.
24. A system, apparatus or method substantially as hereinbefore described with reference to and/or substantially as illustrated in any one of or any combination of Figures I, 2D and 3 of the accompanying drawings.
GB0223992A 2002-10-15 2002-10-15 Provision of services via a mobile telecommunications network Expired - Fee Related GB2394385B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
GB0223992A GB2394385B (en) 2002-10-15 2002-10-15 Provision of services via a mobile telecommunications network
AT03254982T ATE501579T1 (en) 2002-10-15 2003-08-12 PROVISION OF SERVICES THROUGH A MOBILE TELECOMMUNICATIONS NETWORK
DE60336290T DE60336290D1 (en) 2002-10-15 2003-08-12 Providing services via a mobile telecommunication network
EP03254982A EP1411702B1 (en) 2002-10-15 2003-08-12 Provisions of services via a mobile telecommunications network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0223992A GB2394385B (en) 2002-10-15 2002-10-15 Provision of services via a mobile telecommunications network

Publications (3)

Publication Number Publication Date
GB0223992D0 GB0223992D0 (en) 2002-11-20
GB2394385A true GB2394385A (en) 2004-04-21
GB2394385B GB2394385B (en) 2006-05-10

Family

ID=9945966

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0223992A Expired - Fee Related GB2394385B (en) 2002-10-15 2002-10-15 Provision of services via a mobile telecommunications network

Country Status (4)

Country Link
EP (1) EP1411702B1 (en)
AT (1) ATE501579T1 (en)
DE (1) DE60336290D1 (en)
GB (1) GB2394385B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2536067A (en) * 2015-03-17 2016-09-07 Openwave Mobility Inc Identity management

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006104433A1 (en) * 2005-04-01 2006-10-05 Telefonaktiebolaget Lm Ericsson (Publ) Multi-operator telecommunication distribution of service content

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000079811A1 (en) * 1999-06-18 2000-12-28 Swisscom Mobile Ag Method and system for offering mobile subscribers anonymous, location-based services
WO2001028273A1 (en) * 1999-10-11 2001-04-19 Sonera Oyj A method and system for protecting a user identifier
WO2002047349A2 (en) * 2000-12-08 2002-06-13 Telefonaktiebolaget L M Ericsson (Publ) Secure location-based services system and method
GB2372175A (en) * 2001-02-13 2002-08-14 Vodafone Ltd Provision of services to a mobile phone user without disclosing the user's identity to the service provider

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19638072A1 (en) * 1996-09-18 1998-03-19 Deutsche Telekom Mobil Method and device for anonymizing telecommunications processes and relationships in telematics applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000079811A1 (en) * 1999-06-18 2000-12-28 Swisscom Mobile Ag Method and system for offering mobile subscribers anonymous, location-based services
WO2001028273A1 (en) * 1999-10-11 2001-04-19 Sonera Oyj A method and system for protecting a user identifier
WO2002047349A2 (en) * 2000-12-08 2002-06-13 Telefonaktiebolaget L M Ericsson (Publ) Secure location-based services system and method
GB2372175A (en) * 2001-02-13 2002-08-14 Vodafone Ltd Provision of services to a mobile phone user without disclosing the user's identity to the service provider

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2536067A (en) * 2015-03-17 2016-09-07 Openwave Mobility Inc Identity management
GB2536067B (en) * 2015-03-17 2017-02-22 Openwave Mobility Inc Identity management
US10440022B2 (en) 2015-03-17 2019-10-08 Openwave Mobility Inc. Identity management

Also Published As

Publication number Publication date
DE60336290D1 (en) 2011-04-21
ATE501579T1 (en) 2011-03-15
EP1411702B1 (en) 2011-03-09
GB2394385B (en) 2006-05-10
GB0223992D0 (en) 2002-11-20
EP1411702A3 (en) 2007-11-07
EP1411702A2 (en) 2004-04-21

Similar Documents

Publication Publication Date Title
EP1360869B1 (en) Provision of location dependent services without revealing the user identity via a mobile telecommunications network
JP4679056B2 (en) Method and system for conducting financial transactions in a mobile communication system
US7565142B2 (en) Method and apparatus for secure immediate wireless access in a telecommunications network
US6963740B1 (en) Secure enterprise communication system utilizing enterprise-specific security/trust token-enabled wireless communication devices
JP2009515403A (en) Remote activation of user accounts in telecommunications networks
US20090008445A1 (en) Virtual membership card system and providing method, and virtual membership card reading method
JP5451739B2 (en) Telecommunications network
US20110268278A1 (en) Systems, Devices and Methods for Providing Access to a Distributed Network
JP2005500770A (en) Transaction processing
WO2001031966A1 (en) Method and arrangement relating to positioning
RU2165679C1 (en) Telecommunication-network pay-service system (alternatives)
JP4073030B2 (en) Public wireless LAN system, temporary use service providing method, temporary use right issuing server, public wireless LAN connection device, and portable terminal
EP1411702B1 (en) Provisions of services via a mobile telecommunications network
KR101008834B1 (en) Mobile Communication Service System that SIM is Produced and Controlled by Remoteness And Service Method thereof
US20030125012A1 (en) Micro-credit certificate for access to services on heterogeneous access networks
US20190281040A1 (en) Msisdn request handling for identity fraud management
CN107295495B (en) Method, device and communication system for ordering business of main card and auxiliary card
KR20030005200A (en) Payment system
WO2003030571A1 (en) Method and system for delivering confidential information
KR100803103B1 (en) Phone Number Lease Method and Phone Number Lease System
KR100364760B1 (en) anonymous mobile communication service method
US20200314605A1 (en) Assistance to mobile operators in the provision of data services in the visited mobile network
KR20210133672A (en) Apparatus and method for maintaining a supplementary service even when the number of mobile communication subscribers moves
RU2367106C2 (en) System, meant for using mobile telephone network within preset relations between network operator and subscriber
EP1469689A2 (en) Providing location dependent services in a mobile telecommunications network

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20161015