GB2456754A - A method of enabling a secondary user to control communication between a primary user and a third party - Google Patents

A method of enabling a secondary user to control communication between a primary user and a third party Download PDF

Info

Publication number
GB2456754A
GB2456754A GB0800248A GB0800248A GB2456754A GB 2456754 A GB2456754 A GB 2456754A GB 0800248 A GB0800248 A GB 0800248A GB 0800248 A GB0800248 A GB 0800248A GB 2456754 A GB2456754 A GB 2456754A
Authority
GB
United Kingdom
Prior art keywords
party
communication event
user
communication
routing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0800248A
Other versions
GB0800248D0 (en
Inventor
Matthew Dominic Langley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0800248A priority Critical patent/GB2456754A/en
Publication of GB0800248D0 publication Critical patent/GB0800248D0/en
Publication of GB2456754A publication Critical patent/GB2456754A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The mobile phone network comprises means for routing communication events between the primary user and the third party. The router receives the communication event and identifies the third party associated with it. It is then determined whether the communication event ought to proceed based on preferences specified by a secondary user and the communication event is terminated, stored, or routed accordingly.

Description

Mobile Telephone Network and Method of Operation Thereof The present invention relates to mobile phones and operation thereof. In particular, the use of mobile phones by children or other vulnerable users.
Parents would often like their children to be able to communicate with them and, therefore, often permit the child to have a mobile phone with this, in particular, in mind. However, conventional telephones and SIM cards enable the child to phone anybody (apart from, perhaps, abroad) and, more worryingly, anybody can not only telephone the child but can also send text messages, images and even video clips to the child.
One company (Omego) has developed a mobile hand set that allows parental control of call functionality. However, there are a number of disadvantages associated with this product. The known handset is aimed at young children and is designed accordingly as a toy. The child to whom this handset would appeal is unlikely to be in danger of abusive or potentially dangerous phone calls in the same way as an older child might. An older child is unlikely to want to use the toy type mobile phone. Further, the known handset operates with a normal SIM card on a standard network and an older child is likely to simply move the SIM card to another mobile phone hand set not having the same restrictions as the known device.
Parental control on the known device is provided within the functionality of the handset. The parent sets up the phone with a predetermined list of telephone numbers to which and from which calls may be made and accepted.
It is desirable to provide a mobile phone that can be used by a child having a more rigorous level of parental control.
According to a first aspect, the present invention provides a method of operation of a mobile phone network, for enabling a secondary user to control communication events between a primary user and a third party, the mobile phone network comprising routing means for routing communication events between the primary user and the third party, the method comprising the steps of: receiving a communication event between a primary user and a third party; identifying the third party associated with the communication event; determining whether the communication event ought to proceed based on preferences specified by a secondary user; and routing the communication event dependent on an outcome of the determining step.
By providing a controlling mechanism at network level a mobile phone can be provided to a child so that the SIM in the phone can be moved to an alternative handset whilst retaining protective functionality. In this way circumnavigation of the controlling mechanism can be avoided. Consequently, it the child wishes to take advantage of the parent paying the telephone charges, the parent can be assured that the child's use of the telephone is restricted to acceptable third parties and that the child cannot be contacted by unknown or unacceptable and potentially unidentifiable third parties.
The preferences set by the secondary user may comprise a list of permitted third parties, if so, the determining step may comprise the step of comparing the identified third party with said list.
The routing step may comprise an action in the group of terminating the communication event; permitting the communication event to proceed; storing the communication event; and diverting the communication event to the secondary user. The action performed by the routing step may be determined based on the preferences specified by the secondary user.
The method may comprise the step of alerting the secondary user of a status of the communication event.
The communication event may be one of the group of a telephone call, a text message, a photographic image, a video clip and an e-mail.
According to a second aspect, the present invention provides a mobile phone network, for controlling communication events between a primary user and a third party, the network comprising routing means for routing communication events between the primary user and the third party, wherein the routing means is configured to: receive a communication event; ascertain whether the communication event proceeds based on preference data supplied to the network by a secondary user; and route the communication accordingly.
The mobile phone network may comprise a control portal, e.g. a web based control portal, which is configured to receive preference data from a secondary user.
Preferred features of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which; Figure 1 illustrates a flow diagram representing a mobile phone network; and Figure 2 shows more detail of a control portal of Figure 1.
A user is provided with a handset 5 which has a SIM card associated with a particular mobile phone network 1 0. The network 10 is an intelligent telecoms switching network comprising a routing device 15. The routing device 15 comprises information pertinent to the user such as phone numbers and/or e-mail addresses of third parties appropriate for the user to be in contact with.
Decisions relating to the user's incoming and outgoing phone calls, text messages and images can be made based upon this information. The information maintained within routing device 15 can be amended by a secondary user of the device, say a parent or other authoritative figure, using a web based control portal 20. A third party handset 25 is also represented in Figure 1.
In operation, when making an outbound call, the user dials a third party number.
This dialling information is transferred to the routing device 15 which checks the dialled number against the predetermined permitted' third party telephone numbers. If the dialled number is listed then the call is routed to the third party.
If the dialled number is not listed then the call is not permitted and is rejected.
When a short message service (SMS) text message, a photo, video clip, or other data, such as an e-mail, is sent from the handset 5 the routing device 15 performs a check on the recipient telephone number/e-mail address. If this information corresponds to a permitted telephone number/e-mail address then the data is transferred to the third party. If the telephone number/e-mail address is not listed then the data transfer is rejected.
For inbound phone calls, the incoming call is received by the routing device 15 and the third party telephone number is checked against the permitted third party telephone numbers, If the third party number is on the list then the call is routed to the user 5. If, however, the third party telephone number is not on the list (including withheld or international numbers) then the call is not routed through to the user handset 5. Under these circumstances, a rejection message may be played to the third party caller and/or the call may be diverted to a parent's mobile and/or a voice mail may be saved for parental review. In any event, a text message may be sent to the parent's mobile alerting them of the disallowed call attempt.
When an inbound text message/photo/video clip/data is received by the routing device 15 from a third party handset 25, the routing device 15 checks the telephone number/e-mail address of the third party sender against the permitted telephone numbers/e-mail addresses. If the telephone number/e-mail address is listed then the file transfer is allowed. If the telephone number/e-mail address is not on the list or the telephone number is unavailable or international then the file is not permitted to be transferred to the users handset 5. In any event, the file is stored by the routing device 1 5 for subsequent parental review through the control portal 20 and a text message is sent to a parent's mobile phone to alert the parent of the disallowed file transmission attempt.
Figure 2 illustrates the control portal 20 shown in Figure 1 in more detail. The intelligent network 10 is linked to a web server 30 which, in turn, can be accessed from a computer 35 of the parent. Using this control portal 20, the parent, or other secondary user, may add or delete telephone numbers and e-mail addresses of permitted third parties, who may call, send text messages, photos, videos or e-mails to the user handset 5 for the child. The same telephone numbers may be used for inbound calls, ie those from which data and calls may be received by the child as for outbound calls, ie those to which data and messages may be sent by the child. Alternatively the inbound list may be different from the outbound list if necessary. Furthermore, preferences that control the actions when a call is to be rejected can be set using the control portal 20. For example, these preferences can stipulate whether a call should be diverted to the parent's mobile phone, to a voice mail service or simply be rejected and a message issued to the third party and/or the parent.
The above description discusses the main user of the phone being a child over which the parent would like to exert some protective control in their communications with third parties. However, the user may be a different type of vulnerable user such as an elderly person who may easily be confused. In these circumstances, it is desirable to have a mobile phone system which provides the elderly user with access to the telephone numbers of their carers or members of their family but which prevents other third parties, such as junk calls', from disturbing the user. The secondary user, in this case, may be the same person as the primary user so that they can control their own numbers and deny access to anybody who they do not wish to receive data or phone calls from.
The intelligent network 10 can also be used to provide a panic or emergency mode for the user. The handset 5 may be configured to have a particularly prominent button which causes, upon depression thereof, a signal to be sent to the router 15. Upon receipt of such a signal, the router 15 may automatically send a text message to the parent, or other secondary user, alerting them of a state of distress of the primary user. Information relating to the location of the user's handset 5 when the emergency button was activated may also be acquired form the network 10 and contained within the text message.
Alternatively, the emergency mode may be activated by using a particular speed dial number pre-programmed into the handset 5 or by entering a particular sequence of buttons on the handset.
In summary a child user retains the ability to change handsets at will by transferring the SIM card and also retains the benefit of having the parent paying the charges, whilst the parent retains the protective functionality. An alternative user has the assurance of having a mobile phone to stay in contact with particular parties (or indeed any party if they so wish) whilst retaining the ability to restrict parties that can contact them in return.

Claims (8)

1. A method of operation of a mobile phone network, for enabling a secondary user to control communication events between a primary user and a third party, the mobile phone network comprising routing means for routing communication events between the primary user and the third party, the method comprising the steps of: receiving a communication event between a primary user and a third party; identifying the third party associated with the communication event; determining whether the communication event ought to proceed based on preferences specified by a secondary user; and routing the communication event dependent on an outcome of the determining step.
2. A method according to Claim 1, wherein the preferences set by the secondary user comprises a list of permitted third parties and the determining step comprises the step of comparing the identified third party with said list.
3. A method according to Claim 1 or Claim 2, wherein the routing step comprises an action in the group of: terminating the communication event; permitting the communication event to proceed; storing the communication event; and diverting the communication event to the secondary user.
4. A method according to Claim 3, wherein the action performed by the routing step is determined based on the preferences specified by the secondary user.
5. A method according to any preceding claim, wherein the method comprises the step of alerting the secondary user of a status of the communication event.
6. A method according to any preceding claim, wherein the communication event is one of the group of a telephone call, a text message, a photographic image, a video clip and an e-mail.
7. A mobile phone network, for controlling communication events between a primary user and a third party, the network comprising routing means for routing communication events between the primary user and the third party, wherein the routing means is configured to: receive a communication event; ascertain whether the communication event proceeds based on preference data supplied to the network by a secondary user; and route the communication accordingly.
8. A mobile phone network according to Claim 7, comprising a control portal configured to receive preference data from a secondary user.
GB0800248A 2008-01-08 2008-01-08 A method of enabling a secondary user to control communication between a primary user and a third party Withdrawn GB2456754A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0800248A GB2456754A (en) 2008-01-08 2008-01-08 A method of enabling a secondary user to control communication between a primary user and a third party

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0800248A GB2456754A (en) 2008-01-08 2008-01-08 A method of enabling a secondary user to control communication between a primary user and a third party

Publications (2)

Publication Number Publication Date
GB0800248D0 GB0800248D0 (en) 2008-02-13
GB2456754A true GB2456754A (en) 2009-07-29

Family

ID=39111233

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0800248A Withdrawn GB2456754A (en) 2008-01-08 2008-01-08 A method of enabling a secondary user to control communication between a primary user and a third party

Country Status (1)

Country Link
GB (1) GB2456754A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8406740B2 (en) 2010-01-08 2013-03-26 Kohorts It Services, Llc Computerized system and method of recording communications between parties using telecommunications devices
WO2013114092A3 (en) * 2012-02-01 2013-10-17 Bemilo Limited Access control for telecommunications
US8699998B2 (en) 2011-08-10 2014-04-15 Qualcomm Incorporated Controlling text messages on a mobile device
RU2567860C1 (en) * 2011-10-12 2015-11-10 Уолд Эмердженси Нетворк - Невада, Лтд. Controlled recorded three-way calls
US9270814B2 (en) 2011-06-30 2016-02-23 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US9313323B2 (en) 2011-05-31 2016-04-12 World Emergency Network—Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
US9838392B2 (en) 2011-02-28 2017-12-05 Nokia Technologies Oy Method and apparatus for providing proxy-based access controls
US9998603B2 (en) 2011-06-30 2018-06-12 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10154019B2 (en) 2012-06-25 2018-12-11 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
US10282719B1 (en) 2015-11-12 2019-05-07 Sprint Communications Company L.P. Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit
US10311246B1 (en) * 2015-11-20 2019-06-04 Sprint Communications Company L.P. System and method for secure USIM wireless network access
US10499249B1 (en) 2017-07-11 2019-12-03 Sprint Communications Company L.P. Data link layer trust signaling in communication network
US10645213B1 (en) 2016-03-30 2020-05-05 World Emergency Network—Nevada Ltd. Virtual numbers for intelligence operations

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6246756B1 (en) * 1999-03-17 2001-06-12 Advanced Micro Devices, Inc. Method and system to meter and control usage of telephone systems
US20040166878A1 (en) * 2003-02-25 2004-08-26 Boston Communications Group, Inc. Method and system for providing supervisory control over wireless phone usage
WO2005031544A2 (en) * 2003-09-26 2005-04-07 Disney Enterprises, Inc. Cell phone parental control
EP1701526A1 (en) * 2005-03-10 2006-09-13 AT&T Corp. Monitoring mobile phone communications
GB2425686A (en) * 2005-04-29 2006-11-01 Motorola Inc Notifying communication initialisation involving a first subscriber to a second subscriber
US20060293057A1 (en) * 2005-06-24 2006-12-28 Mazerski Thomas M System and method for secure web-based mobile phone parental controls
EP1835691A1 (en) * 2006-03-13 2007-09-19 Hewlett-Packard Development Company, L.P. Communication System and Method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6246756B1 (en) * 1999-03-17 2001-06-12 Advanced Micro Devices, Inc. Method and system to meter and control usage of telephone systems
US20040166878A1 (en) * 2003-02-25 2004-08-26 Boston Communications Group, Inc. Method and system for providing supervisory control over wireless phone usage
WO2005031544A2 (en) * 2003-09-26 2005-04-07 Disney Enterprises, Inc. Cell phone parental control
EP1701526A1 (en) * 2005-03-10 2006-09-13 AT&T Corp. Monitoring mobile phone communications
GB2425686A (en) * 2005-04-29 2006-11-01 Motorola Inc Notifying communication initialisation involving a first subscriber to a second subscriber
US20060293057A1 (en) * 2005-06-24 2006-12-28 Mazerski Thomas M System and method for secure web-based mobile phone parental controls
EP1835691A1 (en) * 2006-03-13 2007-09-19 Hewlett-Packard Development Company, L.P. Communication System and Method

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8406740B2 (en) 2010-01-08 2013-03-26 Kohorts It Services, Llc Computerized system and method of recording communications between parties using telecommunications devices
US9838392B2 (en) 2011-02-28 2017-12-05 Nokia Technologies Oy Method and apparatus for providing proxy-based access controls
US10187518B2 (en) 2011-05-31 2019-01-22 World Emergency Network—Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
US9313323B2 (en) 2011-05-31 2016-04-12 World Emergency Network—Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
US9674339B2 (en) 2011-05-31 2017-06-06 World Emergency Network—Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
US10944860B2 (en) 2011-05-31 2021-03-09 World Emergency Network-Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
US10547740B2 (en) 2011-06-30 2020-01-28 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10218838B2 (en) 2011-06-30 2019-02-26 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US9270814B2 (en) 2011-06-30 2016-02-23 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US9736296B2 (en) 2011-06-30 2017-08-15 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US9998603B2 (en) 2011-06-30 2018-06-12 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10887456B2 (en) 2011-06-30 2021-01-05 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US8699998B2 (en) 2011-08-10 2014-04-15 Qualcomm Incorporated Controlling text messages on a mobile device
US10999735B2 (en) 2011-10-12 2021-05-04 Callyo 2009 Corp Controlled recorded 3-way calling
US10375233B2 (en) 2011-10-12 2019-08-06 World Emergency Network—Nevada, Ltd. Controlled recorded 3-way calling
US10547737B2 (en) 2011-10-12 2020-01-28 World Emergency Network—Nevada, Ltd. Controlled recorded 3-way calling
RU2567860C1 (en) * 2011-10-12 2015-11-10 Уолд Эмердженси Нетворк - Невада, Лтд. Controlled recorded three-way calls
US9253311B2 (en) 2011-10-12 2016-02-02 World Emergency Network—Nevada Ltd. Controlled recorded 3-way calling
WO2013114092A3 (en) * 2012-02-01 2013-10-17 Bemilo Limited Access control for telecommunications
US10154019B2 (en) 2012-06-25 2018-12-11 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
US10282719B1 (en) 2015-11-12 2019-05-07 Sprint Communications Company L.P. Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit
US10311246B1 (en) * 2015-11-20 2019-06-04 Sprint Communications Company L.P. System and method for secure USIM wireless network access
US10645213B1 (en) 2016-03-30 2020-05-05 World Emergency Network—Nevada Ltd. Virtual numbers for intelligence operations
US10887453B2 (en) 2016-03-30 2021-01-05 World Emergency Network—Nevada, Ltd. Virtual numbers for intelligence operations
US10499249B1 (en) 2017-07-11 2019-12-03 Sprint Communications Company L.P. Data link layer trust signaling in communication network

Also Published As

Publication number Publication date
GB0800248D0 (en) 2008-02-13

Similar Documents

Publication Publication Date Title
GB2456754A (en) A method of enabling a secondary user to control communication between a primary user and a third party
US8204491B2 (en) Method and device for restricted access contact information datum
US8351590B2 (en) Selective call reject feature for a telephone
JP5351787B2 (en) Communication processing system and program
US8442195B2 (en) Method for controlling process of establishing call
JP4322299B2 (en) How incoming calls are handled
US20070143422A1 (en) Phonebook use to filter unwanted telecommunications calls and messages
US8483367B1 (en) Messaging in a hosted private branch exchange
WO2007099591A1 (en) Identifier change notifying method, identifier change notifying program, and identifier change notifying device
US9113336B2 (en) Software application for intercepting phone call and text messages from specific contacts
JP4203738B2 (en) Mobile phone with email and schedule function
JP2016103800A (en) Troublesome telephone repulsion system
CN101472253A (en) Incoming call guard management method
KR100829156B1 (en) The apparatus and method of a telephone call interception receive mobile phone
JP6584993B2 (en) Call processing system and call processing method
JP2007036391A (en) Voice communication terminal, arrival signal control method, and origination control method
JP2007110213A (en) Portable telephone, user information management device, and system/method/program for preventing incoming of one-ring call telephone
JP4375317B2 (en) Telephone equipment
JP4286670B2 (en) Portable terminal system
US8001196B2 (en) System for performing notification in response to subsequent reception in accordance with originator of previous reception
KR100805739B1 (en) Call setup controlling method
KR100498324B1 (en) Method for reject incomming call
KR100631682B1 (en) Rejection of mobile communication terminal and its pseudo transmission method
JP2019087933A (en) Telephone
KR20050026448A (en) Method gruping spam message in mobile phone

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)