GB2456754A - A method of enabling a secondary user to control communication between a primary user and a third party - Google Patents
A method of enabling a secondary user to control communication between a primary user and a third party Download PDFInfo
- Publication number
- GB2456754A GB2456754A GB0800248A GB0800248A GB2456754A GB 2456754 A GB2456754 A GB 2456754A GB 0800248 A GB0800248 A GB 0800248A GB 0800248 A GB0800248 A GB 0800248A GB 2456754 A GB2456754 A GB 2456754A
- Authority
- GB
- United Kingdom
- Prior art keywords
- party
- communication event
- user
- communication
- routing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The mobile phone network comprises means for routing communication events between the primary user and the third party. The router receives the communication event and identifies the third party associated with it. It is then determined whether the communication event ought to proceed based on preferences specified by a secondary user and the communication event is terminated, stored, or routed accordingly.
Description
Mobile Telephone Network and Method of Operation Thereof The present invention relates to mobile phones and operation thereof. In particular, the use of mobile phones by children or other vulnerable users.
Parents would often like their children to be able to communicate with them and, therefore, often permit the child to have a mobile phone with this, in particular, in mind. However, conventional telephones and SIM cards enable the child to phone anybody (apart from, perhaps, abroad) and, more worryingly, anybody can not only telephone the child but can also send text messages, images and even video clips to the child.
One company (Omego) has developed a mobile hand set that allows parental control of call functionality. However, there are a number of disadvantages associated with this product. The known handset is aimed at young children and is designed accordingly as a toy. The child to whom this handset would appeal is unlikely to be in danger of abusive or potentially dangerous phone calls in the same way as an older child might. An older child is unlikely to want to use the toy type mobile phone. Further, the known handset operates with a normal SIM card on a standard network and an older child is likely to simply move the SIM card to another mobile phone hand set not having the same restrictions as the known device.
Parental control on the known device is provided within the functionality of the handset. The parent sets up the phone with a predetermined list of telephone numbers to which and from which calls may be made and accepted.
It is desirable to provide a mobile phone that can be used by a child having a more rigorous level of parental control.
According to a first aspect, the present invention provides a method of operation of a mobile phone network, for enabling a secondary user to control communication events between a primary user and a third party, the mobile phone network comprising routing means for routing communication events between the primary user and the third party, the method comprising the steps of: receiving a communication event between a primary user and a third party; identifying the third party associated with the communication event; determining whether the communication event ought to proceed based on preferences specified by a secondary user; and routing the communication event dependent on an outcome of the determining step.
By providing a controlling mechanism at network level a mobile phone can be provided to a child so that the SIM in the phone can be moved to an alternative handset whilst retaining protective functionality. In this way circumnavigation of the controlling mechanism can be avoided. Consequently, it the child wishes to take advantage of the parent paying the telephone charges, the parent can be assured that the child's use of the telephone is restricted to acceptable third parties and that the child cannot be contacted by unknown or unacceptable and potentially unidentifiable third parties.
The preferences set by the secondary user may comprise a list of permitted third parties, if so, the determining step may comprise the step of comparing the identified third party with said list.
The routing step may comprise an action in the group of terminating the communication event; permitting the communication event to proceed; storing the communication event; and diverting the communication event to the secondary user. The action performed by the routing step may be determined based on the preferences specified by the secondary user.
The method may comprise the step of alerting the secondary user of a status of the communication event.
The communication event may be one of the group of a telephone call, a text message, a photographic image, a video clip and an e-mail.
According to a second aspect, the present invention provides a mobile phone network, for controlling communication events between a primary user and a third party, the network comprising routing means for routing communication events between the primary user and the third party, wherein the routing means is configured to: receive a communication event; ascertain whether the communication event proceeds based on preference data supplied to the network by a secondary user; and route the communication accordingly.
The mobile phone network may comprise a control portal, e.g. a web based control portal, which is configured to receive preference data from a secondary user.
Preferred features of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which; Figure 1 illustrates a flow diagram representing a mobile phone network; and Figure 2 shows more detail of a control portal of Figure 1.
A user is provided with a handset 5 which has a SIM card associated with a particular mobile phone network 1 0. The network 10 is an intelligent telecoms switching network comprising a routing device 15. The routing device 15 comprises information pertinent to the user such as phone numbers and/or e-mail addresses of third parties appropriate for the user to be in contact with.
Decisions relating to the user's incoming and outgoing phone calls, text messages and images can be made based upon this information. The information maintained within routing device 15 can be amended by a secondary user of the device, say a parent or other authoritative figure, using a web based control portal 20. A third party handset 25 is also represented in Figure 1.
In operation, when making an outbound call, the user dials a third party number.
This dialling information is transferred to the routing device 15 which checks the dialled number against the predetermined permitted' third party telephone numbers. If the dialled number is listed then the call is routed to the third party.
If the dialled number is not listed then the call is not permitted and is rejected.
When a short message service (SMS) text message, a photo, video clip, or other data, such as an e-mail, is sent from the handset 5 the routing device 15 performs a check on the recipient telephone number/e-mail address. If this information corresponds to a permitted telephone number/e-mail address then the data is transferred to the third party. If the telephone number/e-mail address is not listed then the data transfer is rejected.
For inbound phone calls, the incoming call is received by the routing device 15 and the third party telephone number is checked against the permitted third party telephone numbers, If the third party number is on the list then the call is routed to the user 5. If, however, the third party telephone number is not on the list (including withheld or international numbers) then the call is not routed through to the user handset 5. Under these circumstances, a rejection message may be played to the third party caller and/or the call may be diverted to a parent's mobile and/or a voice mail may be saved for parental review. In any event, a text message may be sent to the parent's mobile alerting them of the disallowed call attempt.
When an inbound text message/photo/video clip/data is received by the routing device 15 from a third party handset 25, the routing device 15 checks the telephone number/e-mail address of the third party sender against the permitted telephone numbers/e-mail addresses. If the telephone number/e-mail address is listed then the file transfer is allowed. If the telephone number/e-mail address is not on the list or the telephone number is unavailable or international then the file is not permitted to be transferred to the users handset 5. In any event, the file is stored by the routing device 1 5 for subsequent parental review through the control portal 20 and a text message is sent to a parent's mobile phone to alert the parent of the disallowed file transmission attempt.
Figure 2 illustrates the control portal 20 shown in Figure 1 in more detail. The intelligent network 10 is linked to a web server 30 which, in turn, can be accessed from a computer 35 of the parent. Using this control portal 20, the parent, or other secondary user, may add or delete telephone numbers and e-mail addresses of permitted third parties, who may call, send text messages, photos, videos or e-mails to the user handset 5 for the child. The same telephone numbers may be used for inbound calls, ie those from which data and calls may be received by the child as for outbound calls, ie those to which data and messages may be sent by the child. Alternatively the inbound list may be different from the outbound list if necessary. Furthermore, preferences that control the actions when a call is to be rejected can be set using the control portal 20. For example, these preferences can stipulate whether a call should be diverted to the parent's mobile phone, to a voice mail service or simply be rejected and a message issued to the third party and/or the parent.
The above description discusses the main user of the phone being a child over which the parent would like to exert some protective control in their communications with third parties. However, the user may be a different type of vulnerable user such as an elderly person who may easily be confused. In these circumstances, it is desirable to have a mobile phone system which provides the elderly user with access to the telephone numbers of their carers or members of their family but which prevents other third parties, such as junk calls', from disturbing the user. The secondary user, in this case, may be the same person as the primary user so that they can control their own numbers and deny access to anybody who they do not wish to receive data or phone calls from.
The intelligent network 10 can also be used to provide a panic or emergency mode for the user. The handset 5 may be configured to have a particularly prominent button which causes, upon depression thereof, a signal to be sent to the router 15. Upon receipt of such a signal, the router 15 may automatically send a text message to the parent, or other secondary user, alerting them of a state of distress of the primary user. Information relating to the location of the user's handset 5 when the emergency button was activated may also be acquired form the network 10 and contained within the text message.
Alternatively, the emergency mode may be activated by using a particular speed dial number pre-programmed into the handset 5 or by entering a particular sequence of buttons on the handset.
In summary a child user retains the ability to change handsets at will by transferring the SIM card and also retains the benefit of having the parent paying the charges, whilst the parent retains the protective functionality. An alternative user has the assurance of having a mobile phone to stay in contact with particular parties (or indeed any party if they so wish) whilst retaining the ability to restrict parties that can contact them in return.
Claims (8)
1. A method of operation of a mobile phone network, for enabling a secondary user to control communication events between a primary user and a third party, the mobile phone network comprising routing means for routing communication events between the primary user and the third party, the method comprising the steps of: receiving a communication event between a primary user and a third party; identifying the third party associated with the communication event; determining whether the communication event ought to proceed based on preferences specified by a secondary user; and routing the communication event dependent on an outcome of the determining step.
2. A method according to Claim 1, wherein the preferences set by the secondary user comprises a list of permitted third parties and the determining step comprises the step of comparing the identified third party with said list.
3. A method according to Claim 1 or Claim 2, wherein the routing step comprises an action in the group of: terminating the communication event; permitting the communication event to proceed; storing the communication event; and diverting the communication event to the secondary user.
4. A method according to Claim 3, wherein the action performed by the routing step is determined based on the preferences specified by the secondary user.
5. A method according to any preceding claim, wherein the method comprises the step of alerting the secondary user of a status of the communication event.
6. A method according to any preceding claim, wherein the communication event is one of the group of a telephone call, a text message, a photographic image, a video clip and an e-mail.
7. A mobile phone network, for controlling communication events between a primary user and a third party, the network comprising routing means for routing communication events between the primary user and the third party, wherein the routing means is configured to: receive a communication event; ascertain whether the communication event proceeds based on preference data supplied to the network by a secondary user; and route the communication accordingly.
8. A mobile phone network according to Claim 7, comprising a control portal configured to receive preference data from a secondary user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0800248A GB2456754A (en) | 2008-01-08 | 2008-01-08 | A method of enabling a secondary user to control communication between a primary user and a third party |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0800248A GB2456754A (en) | 2008-01-08 | 2008-01-08 | A method of enabling a secondary user to control communication between a primary user and a third party |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0800248D0 GB0800248D0 (en) | 2008-02-13 |
GB2456754A true GB2456754A (en) | 2009-07-29 |
Family
ID=39111233
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0800248A Withdrawn GB2456754A (en) | 2008-01-08 | 2008-01-08 | A method of enabling a secondary user to control communication between a primary user and a third party |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2456754A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8406740B2 (en) | 2010-01-08 | 2013-03-26 | Kohorts It Services, Llc | Computerized system and method of recording communications between parties using telecommunications devices |
WO2013114092A3 (en) * | 2012-02-01 | 2013-10-17 | Bemilo Limited | Access control for telecommunications |
US8699998B2 (en) | 2011-08-10 | 2014-04-15 | Qualcomm Incorporated | Controlling text messages on a mobile device |
RU2567860C1 (en) * | 2011-10-12 | 2015-11-10 | Уолд Эмердженси Нетворк - Невада, Лтд. | Controlled recorded three-way calls |
US9270814B2 (en) | 2011-06-30 | 2016-02-23 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US9313323B2 (en) | 2011-05-31 | 2016-04-12 | World Emergency Network—Nevada, Ltd. | Mobile phone as a one-way recorded transmitter over a cellular network |
US9838392B2 (en) | 2011-02-28 | 2017-12-05 | Nokia Technologies Oy | Method and apparatus for providing proxy-based access controls |
US9998603B2 (en) | 2011-06-30 | 2018-06-12 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US10154019B2 (en) | 2012-06-25 | 2018-12-11 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US10311246B1 (en) * | 2015-11-20 | 2019-06-04 | Sprint Communications Company L.P. | System and method for secure USIM wireless network access |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
US10645213B1 (en) | 2016-03-30 | 2020-05-05 | World Emergency Network—Nevada Ltd. | Virtual numbers for intelligence operations |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6246756B1 (en) * | 1999-03-17 | 2001-06-12 | Advanced Micro Devices, Inc. | Method and system to meter and control usage of telephone systems |
US20040166878A1 (en) * | 2003-02-25 | 2004-08-26 | Boston Communications Group, Inc. | Method and system for providing supervisory control over wireless phone usage |
WO2005031544A2 (en) * | 2003-09-26 | 2005-04-07 | Disney Enterprises, Inc. | Cell phone parental control |
EP1701526A1 (en) * | 2005-03-10 | 2006-09-13 | AT&T Corp. | Monitoring mobile phone communications |
GB2425686A (en) * | 2005-04-29 | 2006-11-01 | Motorola Inc | Notifying communication initialisation involving a first subscriber to a second subscriber |
US20060293057A1 (en) * | 2005-06-24 | 2006-12-28 | Mazerski Thomas M | System and method for secure web-based mobile phone parental controls |
EP1835691A1 (en) * | 2006-03-13 | 2007-09-19 | Hewlett-Packard Development Company, L.P. | Communication System and Method |
-
2008
- 2008-01-08 GB GB0800248A patent/GB2456754A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6246756B1 (en) * | 1999-03-17 | 2001-06-12 | Advanced Micro Devices, Inc. | Method and system to meter and control usage of telephone systems |
US20040166878A1 (en) * | 2003-02-25 | 2004-08-26 | Boston Communications Group, Inc. | Method and system for providing supervisory control over wireless phone usage |
WO2005031544A2 (en) * | 2003-09-26 | 2005-04-07 | Disney Enterprises, Inc. | Cell phone parental control |
EP1701526A1 (en) * | 2005-03-10 | 2006-09-13 | AT&T Corp. | Monitoring mobile phone communications |
GB2425686A (en) * | 2005-04-29 | 2006-11-01 | Motorola Inc | Notifying communication initialisation involving a first subscriber to a second subscriber |
US20060293057A1 (en) * | 2005-06-24 | 2006-12-28 | Mazerski Thomas M | System and method for secure web-based mobile phone parental controls |
EP1835691A1 (en) * | 2006-03-13 | 2007-09-19 | Hewlett-Packard Development Company, L.P. | Communication System and Method |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8406740B2 (en) | 2010-01-08 | 2013-03-26 | Kohorts It Services, Llc | Computerized system and method of recording communications between parties using telecommunications devices |
US9838392B2 (en) | 2011-02-28 | 2017-12-05 | Nokia Technologies Oy | Method and apparatus for providing proxy-based access controls |
US10187518B2 (en) | 2011-05-31 | 2019-01-22 | World Emergency Network—Nevada, Ltd. | Mobile phone as a one-way recorded transmitter over a cellular network |
US9313323B2 (en) | 2011-05-31 | 2016-04-12 | World Emergency Network—Nevada, Ltd. | Mobile phone as a one-way recorded transmitter over a cellular network |
US9674339B2 (en) | 2011-05-31 | 2017-06-06 | World Emergency Network—Nevada, Ltd. | Mobile phone as a one-way recorded transmitter over a cellular network |
US10944860B2 (en) | 2011-05-31 | 2021-03-09 | World Emergency Network-Nevada, Ltd. | Mobile phone as a one-way recorded transmitter over a cellular network |
US10547740B2 (en) | 2011-06-30 | 2020-01-28 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US10218838B2 (en) | 2011-06-30 | 2019-02-26 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US9270814B2 (en) | 2011-06-30 | 2016-02-23 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US9736296B2 (en) | 2011-06-30 | 2017-08-15 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US9998603B2 (en) | 2011-06-30 | 2018-06-12 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US10887456B2 (en) | 2011-06-30 | 2021-01-05 | World Emergency Network—Nevada, Ltd. | Attaching multiple phone lines to a single mobile or landline phone |
US8699998B2 (en) | 2011-08-10 | 2014-04-15 | Qualcomm Incorporated | Controlling text messages on a mobile device |
US10999735B2 (en) | 2011-10-12 | 2021-05-04 | Callyo 2009 Corp | Controlled recorded 3-way calling |
US10375233B2 (en) | 2011-10-12 | 2019-08-06 | World Emergency Network—Nevada, Ltd. | Controlled recorded 3-way calling |
US10547737B2 (en) | 2011-10-12 | 2020-01-28 | World Emergency Network—Nevada, Ltd. | Controlled recorded 3-way calling |
RU2567860C1 (en) * | 2011-10-12 | 2015-11-10 | Уолд Эмердженси Нетворк - Невада, Лтд. | Controlled recorded three-way calls |
US9253311B2 (en) | 2011-10-12 | 2016-02-02 | World Emergency Network—Nevada Ltd. | Controlled recorded 3-way calling |
WO2013114092A3 (en) * | 2012-02-01 | 2013-10-17 | Bemilo Limited | Access control for telecommunications |
US10154019B2 (en) | 2012-06-25 | 2018-12-11 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US10311246B1 (en) * | 2015-11-20 | 2019-06-04 | Sprint Communications Company L.P. | System and method for secure USIM wireless network access |
US10645213B1 (en) | 2016-03-30 | 2020-05-05 | World Emergency Network—Nevada Ltd. | Virtual numbers for intelligence operations |
US10887453B2 (en) | 2016-03-30 | 2021-01-05 | World Emergency Network—Nevada, Ltd. | Virtual numbers for intelligence operations |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
Also Published As
Publication number | Publication date |
---|---|
GB0800248D0 (en) | 2008-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2456754A (en) | A method of enabling a secondary user to control communication between a primary user and a third party | |
US8204491B2 (en) | Method and device for restricted access contact information datum | |
US8351590B2 (en) | Selective call reject feature for a telephone | |
JP5351787B2 (en) | Communication processing system and program | |
US8442195B2 (en) | Method for controlling process of establishing call | |
JP4322299B2 (en) | How incoming calls are handled | |
US20070143422A1 (en) | Phonebook use to filter unwanted telecommunications calls and messages | |
US8483367B1 (en) | Messaging in a hosted private branch exchange | |
WO2007099591A1 (en) | Identifier change notifying method, identifier change notifying program, and identifier change notifying device | |
US9113336B2 (en) | Software application for intercepting phone call and text messages from specific contacts | |
JP4203738B2 (en) | Mobile phone with email and schedule function | |
JP2016103800A (en) | Troublesome telephone repulsion system | |
CN101472253A (en) | Incoming call guard management method | |
KR100829156B1 (en) | The apparatus and method of a telephone call interception receive mobile phone | |
JP6584993B2 (en) | Call processing system and call processing method | |
JP2007036391A (en) | Voice communication terminal, arrival signal control method, and origination control method | |
JP2007110213A (en) | Portable telephone, user information management device, and system/method/program for preventing incoming of one-ring call telephone | |
JP4375317B2 (en) | Telephone equipment | |
JP4286670B2 (en) | Portable terminal system | |
US8001196B2 (en) | System for performing notification in response to subsequent reception in accordance with originator of previous reception | |
KR100805739B1 (en) | Call setup controlling method | |
KR100498324B1 (en) | Method for reject incomming call | |
KR100631682B1 (en) | Rejection of mobile communication terminal and its pseudo transmission method | |
JP2019087933A (en) | Telephone | |
KR20050026448A (en) | Method gruping spam message in mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |