JPWO2004070614A1 - Communication method and communication system led by called party - Google Patents

Communication method and communication system led by called party Download PDF

Info

Publication number
JPWO2004070614A1
JPWO2004070614A1 JP2005504876A JP2005504876A JPWO2004070614A1 JP WO2004070614 A1 JPWO2004070614 A1 JP WO2004070614A1 JP 2005504876 A JP2005504876 A JP 2005504876A JP 2005504876 A JP2005504876 A JP 2005504876A JP WO2004070614 A1 JPWO2004070614 A1 JP WO2004070614A1
Authority
JP
Japan
Prior art keywords
communication
rule
party
caller
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2005504876A
Other languages
Japanese (ja)
Inventor
馮 光
光 馮
Original Assignee
馮 光
光 馮
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to JP2003070953 priority Critical
Priority to JP2003070953 priority
Priority to JPPCT/JP03/12014 priority
Priority to PCT/JP2003/012014 priority patent/WO2004082251A1/en
Application filed by 馮 光, 光 馮 filed Critical 馮 光
Priority to PCT/JP2004/001182 priority patent/WO2004070614A1/en
Priority claimed from JP2004230357A external-priority patent/JP2006215590A/en
Publication of JPWO2004070614A1 publication Critical patent/JPWO2004070614A1/en
Granted legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/22Automatic class or number identification arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier

Abstract

Communication method / system. In response to the increasing use of communication networks and cost reduction, the system that addresses the problem of increasing the number of unfavorable communication by recipients and automatically establishes only communication that benefits both parties is presented. A method and system for extracting the potential utility value of a communication device by providing automatic identification of a known sender, registration / identification by automatic reply of a new sender, and providing different treatments for each identified sender. Realize better anonymous communication by reducing unnecessary communication volume due to a large amount of junk mail flowing through the public network, saving time for manual judgment and deletion processing, and reducing social burdens such as the development and enforcement of laws. The existing functions of communication devices and communication accessory devices can be applied to custody, crime prevention, emergency communication, and vehicle driving guidance functions.

Description

    The present invention relates to communication using electronic devices on a communication network, and more particularly to securing communication security in connection with the stage of establishing a communication connection. The present invention relates to the integration of communication and remote control functions that determine all operations according to the intention of the party that controls the callee or callee communication facility.

Telecommunications has become widespread. Various information technology services utilizing the Internet have rapidly spread to the general public, high-speed and large-capacity always-on communication has become widespread in ordinary households, and caller ID notification has become common. The caller now takes the initiative in communication.
However, it can be infected just by looking at the screen of the incoming mail, unsolicited communications that are against the will of the callee, fraud that misrepresents the caller's identity, emails that adversely affect youth, frequent "attack" of mass emails Serious damage has occurred, such as a situation where a telecommunications carrier's network has failed due to a virus, a “one cut” incomplete call, and the telephone line has been paralyzed extensively over a long period of time. In addition, negative problems such as paralysis of communication infrastructure and deterioration of functions, the fall of normal communication, etc. have also emerged. It triggers the above illegal or legitimate acts due to the weakness of the existing public communication system.
Conventional nuisance communication prevention techniques are classified into each alert level. However, there is nothing that can cope with various situations simultaneously. For example, “designation rejection” rejects reception of a designated partner, but there is a problem that it is not possible to designate all unspecified many partners. In “designated reception”, data is received only from a designated partner, but it becomes “isolation principle” (see, for example, Patent Document 1, Non-Patent Documents 1 and 2).
With the method of Patent Document 6, the convenience when registering / cancelling the rejection number can be improved. Receiving is rejected according to the receiving conditions specified by the receiver, and the e-mail sender determines whether or not the e-mail can be transferred. However, it is difficult to determine the condition itself, and there is a problem that it cannot be specified (for example, patent document) 2 and 3). There is also a method in which unopened mail is recorded in the received spam mail and the sender is charged reversely (see, for example, Patent Document 4). Some extract the sender's identification information from the incoming e-mail (see, for example, Patent Document 5).
However, these technologies (a) how to respond after at least one nuisance communication occurs (see, for example, Patent Document 6), and legal regulations such as the opt-out method are all Forced to respond to the caller, especially in the case of email. The reasons are: The number of callers is huge. Sending only one time is annoying, and it is not realistic to reply one by one. Even if refusal registration is made, the number of storage areas that can be registered is limited and cannot be increased indefinitely. The above laws and regulations cannot be resolved, for example, how to regulate the content of foreign language transmissions, the existence of countries where there is no legal system for outgoing regulations, and prosecution of violators if the sender is an individual rather than an organization. Not realistic. 2. Cannot cope with one-off spam communication. 3. It cannot deal with criminal acts such as “Ole scam” and the problem that home phone calls are used by criminals.
(B) Perfect reception conditions cannot be set. The “designated reception” technique has the potential to prevent important communications from being received. Strict laws and regulations, and the opt-in method that allows transmission only to registrants hinders freedom of expression and freedom of business. As a concept of spam mail, there is no common standard that cannot be determined without considering the subjective factors of individual callees as to what kind of mail hits the spam mail. A technique such as filtering using a known spam mail sender database cannot reflect the subjectivity of the called party at all, and there is a limit that can clearly cope with the situation where the sender address is constantly changing.
(C) In general, conventional communication systems are premised on the concept that communicating parties know each other's identities. For example, a personal phone number plays the role of personal identity. For this reason, if a phone number is easily disclosed to an unknown party, there will be some danger. On the other hand, if you need anonymous communication to the beginning or the end of activities such as personal-to-individual, personal-to-company transactions, companionships, job hunting, etc. on the network, once you invite the other party, your email address or phone number will be your partner Therefore, when you want to catch yourself, you can't easily break the relationship with the other party. Patent Document 10 discloses a method of establishing a communication channel that requires two steps for anonymous communication and removes both pieces of identity information from communication contents through a dedicated anonymous communication center.
(D) With the advancement of technology, small-sized mobile communication devices have become multifunctional. Utilization of attached functions such as cameras attached to communication equipment, attached position information devices, children, elderly people with blur, and unattended can be safely used as communication means and for custody. For example, for use of position information, there is a control means for setting a travel route, but the calculation amount is large and is not suitable for a small device such as a mobile phone (see, for example, Patent Documents 7 and 8). Although there is a mobile phone provided with means for receiving radio waves from a GPS satellite, there is no means for preventing unwanted communication (see, for example, Patent Document 9).
JP-A-5-14488 (Claim 1, FIGS. 1-4) JP 2002-344524 A (Claims 1-15, FIGS. 1-19) JP 2000-10880 (Claims 1-5, FIGS. 1-18) Japanese Patent No. 3283873 (Claims 1-2, 1-3) Japanese Patent No. 3003640 (Claims 1-2, 1-2) Japanese Patent Laid-Open No. 2002-290656 (full text, Fig. 1-3) Japanese Patent No. 3460033 (Claim 1-2, FIG. 1-2) Japanese Patent Publication No. 6-60821 (Claim 1-2, FIG. 1) Japanese Patent No. 3039536 (full text, Fig. 1-7) US Pat. No. 5,884,270 (full text, FIGS. 1-9) US Pat. No. 6,070,149 (full text) Study Group on How to Deal with Spam Mail, "Interim Report", [online], January 24, 2002, Ministry of Internal Affairs and Communications, p. 10, [Search January 9, 2004], Internet <URL: http: // www. soumu. go. jp / s-news / 2002 / 020124_4. html> Study Group on How to Deal with Spam, "Report", [online], October 7, 2002, Ministry of Internal Affairs and Communications, p. 3-5 [Search January 9, 2004], Internet <URL: http: // www. soumu. go. jp / s-news / 2002 / 021007_1. html> Mias (J. Myers), "RFC 1939, POP3 (Post Office Protocol-Version 3)", [online], May 1996, IAB (Internet Architecture Board) standard recommendation document RFC (Request for Comments), p. 11 [Search January 12, 2004], Internet <URL: (ftp://ftp.rfc-editor.org/in-notes/rfc1939.txt) J. Klensin, "RFC2821, (Simple Mail Transfer Protocol)", [online], April 2001, IAB (Internet Architecture Board) standard recommendation document RFC (Request for Comments), p. 32, [searched on January 14, 2004], Internet <URL: (ftp://ftp.rfc-editor.org/in-notes/rfc2821.txt) P. Resnick, "RFC2822, (Internet Message Format)", [online], April 2001, IAB (Internet Architecture Board) standard recommendation document RFC (Request for Comments), p. 26 [Search January 20, 2004], Internet <URL: (ftp://ftp.rfc-editor.org/in-notes/rfc2822.txt)

    These are all intended to prevent the party's intention to use the receiving side communication machine for communication, that is, to prevent inconvenience from the caller, and to give the caller the right to control part or all of the callee communication machine. It is about the will expressed in one direction. The problem with the prior art is that this will not be satisfied. It is an object of the present invention to solve this problem and satisfy the intention of the parties concerned. Specifically, it is an object of the present invention to efficiently use communication resources with peace of mind as intended by the parties concerned. Communication, function to control communication devices, eliminate nuisance communication without compromising conventional communication functions in a normally open manner, reduce unnecessary communication volume, supervision, emergency communication, anonymous communication, efficient mobile equipment It is an object of the present invention to utilize an accessory device of a communication device such as a location information service.

In order to solve the above-mentioned problems, the present invention is to respond to communication requests of individual callers after the intention of the callee determines all operations of the communication device and identifies the caller or caller group. A plurality of treatment methods, and when receiving the communication request, select one of the plurality of treatment methods and treat the communication request; the treatment method is referred to as “treatment” by the parties It means a method for taking a specific action for a communication request of a specific caller to be determined.
Conventional communication is usually led by a caller. For example, when a call is made to the other party, it is considered that the other party receives the call. Since the response method is also simple, there is no need to describe it in special terms. The present invention has a variety of response methods, and there is no appropriate technical term to express briefly. Therefore, the term “treatment” is used to express the relationship between the parties.
Reception refusal treatment is an expression of intention to completely reject the caller, communication permission treatment is a conventional communication need, control permission treatment is a potential need, an expression of intention to give the caller control of the communication device is there.
The idea of the invention begins after all callers have received prior permission. When an unknown caller makes a call without permission, first the name of the caller is asked, the caller's identity is judged, and whether or not to communicate is determined. This is called application acceptance. This flow can be compared to an example of a receptionist or secretary. Instruct the secretary in advance to the prescribed rules. When the instructor comes to the instructor, the instructor will handle the instructed treatment. Decide whether or not to allow visitors based on the rules taught by your boss. For example, if the boss is interested in the visitor's requirements, let the boss pass. If it turns out that it is an old acquaintance of the boss, let it pass. A clever secretary can remember the visitor and immediately decide whether to treat the second visitor kindly or pay in front of the gate.
If the supervisor comes, follow the order. This is because the boss has control. This is like a remote control of a communication machine.
In the present invention, the party issues an instruction to the electronic secretary who realizes the secretary role in advance, and the electronic secretary processes the communication request according to the instruction content of the party. A first rule consisting of a caller ID and a treatment to be given is taught to the electronic secretary, and a communication request is first dealt with based on the first rule. If the second rule consisting of a question, correct answer, and treatment is taught to the electronic secretary and the treatment method is not known by the first rule, the sender is asked a question, and the correct answer is obtained based on the second rule. Then, the ID and treatment of the caller are stored as the first rule. Also, the electronic secretary is instructed how to deal with the caller who did not get the correct answer.
The second rule can include the personal information of the parties. For example, if it is specified as a rule that the name of the party is known, the caller who does not know the name of the called party can be rejected. You can also identify family members and relatives with secret words and passwords. In the case of telephone communication, voice recognition and voiceprint recognition can also be used.

Action

As described above, all communication is a permission system with a plurality of treatments, and a means for obtaining permission according to the intention of the callee is provided to a caller without permission. Provide a means to automatically give permission by automatically presenting the questions of the callee and scoring the answers automatically.
Based on the treatment given to the caller, whether or not the communication by the caller ID is determined is determined. Claim 2 provides a means for giving a more convenient permission, and all concerned parties who have contacted the receiver even once are in the first rule. By automatically determining the number of real parties that are automatically stored and issue a communication request for the first time (permitted), communication is automatically initiated to realize call-initiated communication.
When there is a mistake in automatic determination or when it is desired to cancel the communication relationship, the recipient can arbitrarily revoke the given communication permission.
Compared with the prior art (for example, see Patent Document 6) that selects an incoming call by designation rejection or designation reception, the present invention provides designation rejection, designation reception, designation acceptance, designation control 1, designation control 2, and so on. Realize the coexistence of countless functions. Therefore, the present invention is different in quality from these prior arts. From another point of view, the setting information list such as designation rejection of the prior art can be set only on the called side, and the present invention automatically sets the setting information also by the operation on the caller side, and also according to the intention of the callee side. The setting information list is automatically increased and completed.
What is the difficulty of preventing unwanted communications? It cannot be solved without finding the answer. This invention does not present the answer. The true answer is known only to the recipient. The present invention merely provides a method for realizing an electronic secretary capable of understanding the true answer.

The invention's effect

(A) Prevention of spam mail and spam calls. The greatest feature of the present invention is that annoying communication is prevented without being allowed to occur logically once before it occurs. 1. Communication is not allowed unless the pair of caller ID and callee ID matches. Even if the sender ID can be forged, it cannot be matched with the receiver ID pair. If caller ID cannot be forged, such as caller ID notification, an unknown number of applications will be given a limited number of applications, and then unconditionally rejected to prevent programs from attempting automatic nuisance communications. it can. 2. For those who want to make a one-off call, the application procedure starts automatically and the sender is charged for the communication fee, so sanctions can be imposed. 3. Because it is automatically confirmed according to the procedure decided for the other party who was not registered, it can cope with "ole scam" where the elderly are inadvertently deceived.
(B) At the same time, in the case of a partner who answers the callee's question accurately, for example, when the callee's name can be answered, the communication function is not substantially impaired in a normally open manner similar to the conventional case. The caller's freedom is not restricted. If you want to sell or advertise things, you only benefit if both parties are interested. The present invention is provided with means for preliminarily expressing interest on the receiving side, and does not reject communications that benefit both parties.
(C) When the present invention is operated on the receiving server, it can be prevented at the time of sending a nuisance communication request. It is possible to reduce the amount of communication by using a large amount of wasted mail on the public network, effectively use the facilities, and save the nuisance communication compensation fee of the communication company. Even if it is not operated on the receiving server, it is possible to reduce the social burden for changing communication contracts and implementing laws, and to manually judge junk mail and save time for deletion. By eliminating nuisance communication, the use of communication means will eventually increase.
(D) Simple anonymous communication, one-way communication allowing only one side to transmit is possible. You will be able to carry out companionship and job hunting activities more securely and comfortably via the public communication network.
(E) The other party is automatically identified according to the subjective consciousness of each party, and even if the other party obtains an unauthorized communication permission due to an automatic processing problem, the permission can be revoked.
(F) The communication device and the communication accessory device can be used efficiently and safely as the intention of the ruler of the receiving communication machine. Integration of custody, crime prevention, emergency communication, and vehicle driving guidance functions can be realized. This creates new uses and new needs.
The term "treatment" used in the present specification means a method for performing a specific action for a communication request of a specific caller determined by a party, and "rule" is a search condition for a processing object. This means the knowledge used to control the process, expressed as a pair of action definition information when the search condition is satisfied, and “first rule” relates to the caller ID (caller ID) It is a rule having a condition part having an application condition and an execution part for instructing execution of an action corresponding to treatment, and "when the communication request from the caller is actually received, if the communication request is detected from the communication request""If the caller ID (hereinafter referred to as" actual caller ID ") matches the caller ID of the condition part, the communication request is treated based on the treatment". The rule set is the first rule set. In this specification, creating the first rule and adding it to the first rule set gives treatment to the caller. “Second rule” is an application condition regarding the expected application contents. And an execution unit for instructing the execution of an action corresponding to the treatment, "If the expected application content is detected from the communication request, the communication request is treated based on the treatment. "Third rule" is a rule having a condition part having an application condition regarding a caller ID and a reception time, and an execution part instructing execution of an action corresponding to treatment "If the factual caller ID detected from the communication request matches the caller ID of the condition part and a predetermined time has not passed since the reception time, based on the treatment Above "Fourth rule" is a question to be presented to the caller, a condition part having an application condition relating to the correct answer of the question, an action execution part relating to scoring "If the answer of the question from the caller is correct, the score is counted and the total score is totaled.""Fifthrule" Is a rule having a condition part having an application condition related to the callee ID and the call origination time, and an execution part for instructing the execution of the action corresponding to the treatment, and “if the destination ID (the callee ID) is a condition part "If the predetermined time has not elapsed since the call origination time, the call request is treated based on the treatment", ”Request to start communication Means “selected from the group consisting of a party and a facility,” “Treatment information” is information on the recipient ID and the first rule set, provided that there is only one recipient ID, Means “first rule set”. “ID” means an identifier provided to a party using the communication service by the provider of the communication service, and a plurality of identifiers can be provided to one party.・ "Communication permission" means that the communication request is transmitted to the called party. The electronic secretary judges that the communication can be permitted, transmits the communication request to the called party, and receives the communication request of the conventional communication means. It is possible to make a final decision as to whether or not the recipient communicates. ・ "Receiving client" means a device that can collect the recipient's mail stored on the server. Cell phone to receive And a host that intends to use a service compliant with POP3 (Post Office Protocol-Version 3) specified in RFC (Request for Comments) issued by IAB (Internet Architecture Board). “Transmission client” means a device that transmits mail, for example, a client terminal that transmits mail, an ISP server that transmits mail, and “server” means a service provider side, and is a telephone exchange "Receiving server" means a device that provides a service for receiving and storing e-mails and delivering the stored e-mails to the called party when accessed by the called party. For example, a mobile phone company Mail center and PO 3 The host that provides the service is applicable, “Communication” means transmitting information and control signals, “Mail” means e-mail, and “Control permission” is communication This means that the request is permitted and the caller has control over the callee side communication device, and the caller is allowed to communicate without the callee's intervention. Means disclosing information including its own ID (identifier), allowing the caller to apply for communication permission, and applying for communication permission to the party before the caller issues a communication request; “Identity registration” identifies a party who uses a communication service by ID, and the provider of the communication service provides the ID to the party, and includes a group consisting of a provider of the communication service and a third party. What is selected is the identity verification information of the party. "Allow hearing" means that the caller gets a voice signal acquired by the transmitter of the communication device on the called party side, and "Allow monitoring" means that the caller receives an incoming call This means that the image signal acquired by the imaging device installed on the receiver side is acquired through the communication device on the receiver side. ・ "Position acquisition permission" is sent to the receiver side through the communication device on the receiver side. This means that the location information acquired by the installed location acquisition means is acquired. ・ "Alert call permission" means that the caller is allowed to output information through the communication device on the receiver's side to call the receiver's attention. Meaning ・ "Information transfer permission" means that the caller is allowed to transfer information to the communication device on the called party side. "First expectation" means that the electronic secretary applies the first and second rule sets. If treatment cannot be determined by , Meaning a pre-set method, “Subject” means an information field (Informational Fields) that has a purpose of information that is recommended by a person included in the mail header, and “Sender Electronic” “Mail address” means the destination email address that includes the reply destination email address specified by the caller himself and sends the email to the caller. • “Treatment application” means applying for communication permission. Sending action is also considered as a form of treatment application. ・ "Treatment relationship" is a relationship that both parties establish by treatment given to each other. ・ "Treatment set" means a set of treatments,・ “Application content” means the content of application for permission of communication. ・ “Expected application content” means the application content expected by the receiving party. When asking the name of the trusting party, the exact name is the expected application content, that is, the application content that the correct answer of the question is expected, or it can be specified as a topic of interest, keywords, or expected application content .
Conceptual explanation of mail-related terms: In general, the flow of mail transmission is as follows: sender terminal (sending client) to sending mail server (receiving server), sending mail server (sending client) to receiving server, receiving server to called party terminal (receiving client ). The sending mail server has two roles of receiving server and sending client.
Hereinafter, embodiments of the present invention will be described with reference to the drawings.
FIG. 1 is a diagram showing a schematic configuration example of an embodiment of the inventions according to claims 50 to 98, 102, and 104 using the methods of claims 1 to 49, 101, and 103. The party terminal 101 performs communication on the network 104 via the electronic secretary 102, and the inventions according to claims 26 and 75 transmit the electronic secretary via the electronic secretary. All incoming calls go through the electronic secretary. The electronic secretary may be incorporated on the party terminal side or the server side providing the communication service, and in the case of telephone communication, may be incorporated on the telephone side or the exchange side. When it is incorporated on the server side, it is connected to the party terminal through the communication channel. The instruction file 103 may be incorporated in the electronic secretary or independent of the electronic secretary. The party may input data directly into the instruction file (not shown in the figure). The instruction file is stored in the data storage device. As long as the storage device is obtained by achieving the object of the present invention, for example, an optical storage medium can be adopted in addition to an electronic memory circuit such as a magnetic storage device, a RAM, and a ROM. The preferred implementation of the instruction file is a database that organizes and integrates interrelated data, including multimedia information, and is easy to search.
FIG. 2B shows an embodiment in which the instruction file is embodied in a database. It is a layout diagram of a record showing the contents of a data database (hereinafter referred to as R1DB) that records a first rule set relating to a caller and treatment.
The table contains all the data in the database. A table is a collection of columns. Data is organized in row and column format. Each row represents a record and each column represents a field of that record.
The record layout is composed of information organized by "field name" (left side of the table shown in the figure) and "field feature" (right side of the table shown in the figure). A line matches each field. The primary key is a column containing a value that uniquely identifies each row of the table. The foreign key is a column for setting a link between data in two tables.
R1DB has fields for a caller ID and a treatment ID.
FIG. 2A is a record layout diagram showing the contents of a data database (hereinafter referred to as TDB) in which one embodiment of a treatment set is recorded. The specific realization of each treatment differs depending on the device of the party, and the total number of treatment types that can be realized differs depending on the device of the party. The treatment set can be expanded and simplified according to the individual needs of the parties concerned.
FIG. 2C is a record layout diagram showing the contents of a data database (hereinafter referred to as GDB) in which one example of the presentation information is recorded. When the presentation information includes a question to be presented to the caller, it may be in the format shown in FIG. 2F.
FIG. 2D is a record layout diagram showing the contents of a data database (hereinafter referred to as R2DB) that records an example of the second rule set relating to expected application contents and treatment.
FIG. 2E is a record layout diagram showing the contents of a data database (hereinafter referred to as R3DB) that records an example of the third rule set relating to the sender, reception time, and treatment.
FIG. 2F is a record layout diagram showing the contents of a data database (hereinafter referred to as R4DB) that records an example of the fourth rule set relating to the question presented to the caller, the correct answer of the question, and the score. The question and the presentation information stored in the GDB include information selected from the group consisting of text, sound, and images.
FIG. 2G is a record layout diagram showing the contents of a data database (hereinafter referred to as R5DB) that records one embodiment of the fifth rule set relating to the callee ID, call origination time, and treatment.
FIG. 2H is a record layout diagram showing the contents of a data database (hereinafter referred to as TRDB) in which one embodiment of the treatment relationship master is recorded.
FIG. 3A is a record layout diagram showing the contents of a party data database (hereinafter referred to as PDDB) of one embodiment relating to party data.
FIG. 3B is a record layout diagram showing the contents of a confirmation data database (hereinafter referred to as VDB) of one embodiment relating to data for recording confirmation requests.
FIG. 3C is a record layout diagram showing the contents of a verifier data database (hereinafter referred to as VRDB) of one embodiment relating to data for recording the verifier information.
FIG. 4 is a flow chart of one embodiment of the invention of claim 1. When the caller's communication request is received, the caller's ID, ie, the fact caller ID is detected from the communication request (401), the instruction file is read (402), and the first rule set application procedure is followed. Apply one rule set. That is, for all the rules in the first rule set relating to the caller ID and treatment, find the rule for which the applicable condition is established, and search the R1DB with the condition that the caller ID and the fact caller ID match. (403) It is judged whether or not it is found (404), and when the record is detected, that is, when a rule satisfying the applicable condition is found, the treatment given to the sender is extracted from the treatment ID field. it can. Then, the rule execution unit is executed (406). If not found, the presentation information is presented to the sender, and the communication request is processed based on the application acceptance treatment (405).
Acceptance of application means that the caller permits the callee to act to communicate with the callee, and the action can convey the communication request including the caller ID to the callee, and After the presentation information is presented to the caller, the caller's response is received, and before the response is determined to be correct, the caller's original communication purpose cannot be achieved. The term “communication requirement” refers to communication that establishes a communication connection between a caller and the electronic secretary and achieves communication with a callee that reaches the electronic secretary before achieving the original communication purpose of the caller. Means content. For example, in the case of telephone communication, the caller's name, phone number, and message are recorded and communicated to the receiver, and the electronic secretary sends out voice guidance and receives the caller's reply, but the reply is judged to be correct. Do not allow conversations with recipients before Repeated questions and answers are possible. Immediate judgment and judgment after the callee are possible. Replies can be received by dialing number or voice identification.
For the purposes of this invention, the term “application acceptance” refers to any interaction that facilitates an ongoing cycle of receiving guidance messages and receiving responses.
In the case of e-mail communication, the e-mail address, subject, etc. are received, but the contents are not handed to the recipient before the contents are judged to be correct, and the e-secretary returns the presented information, and the sender responds according to the presented information. Do not hand it over to the recipient before the content is correct.
The recipient can freely determine the presentation information. For example, the caller can be asked for personal information such as the name of the callee.
Some conventional telephone technologies have a function of being able to stay away. In the present invention, it is different from confirming the other party only when the caller is not known, enabling communication if the caller is confirmed, and calling or refusing when the caller is known.
There are images such as deformed characters that are difficult to recognize with a machine and are displayed to the other party, and an email is received or an account is acquired based on the result of determining whether the other party is a human or a machine. The personal information of the recipient of the present invention is also accurately answered, and the other party can be judged as a related person.
FIG. 5 is a flowchart of an embodiment of the invention of claim 2. ID is detected (501), the instruction file is read (502), the first rule set is applied (503), the result is judged (504), and the application acceptance is the second rule set relating to the expected application contents and treatment The rule for which the applicable condition is satisfied is found for all the rules in (505), and it is determined whether or not the rule is found (506). If it is not found, the predetermined treatment method, that is, the first expected treatment is used. Treat based on. For example, after the presentation information is presented to the sender, reception is refused. Or it refuses reception without presenting guidance. It is desirable to decide by the parties. It is desirable to select the initial treatment from the treatment set excluding the application acceptance treatment (507). Use whether or not to execute the application acceptance treatment when no rule that satisfies the conditions of application of the first rule set is found. Can be selected.
When a rule for which the application condition is satisfied is found, the communication request is processed based on the given treatment, that is, the treatment described in the execution part of the rule (508). The treatment includes communication permission and reception refusal, such as partially permitting communication, recording the caller's requirements, and so on. It is possible to specify according to the intention of the person. For example, if the communication facility has only a basic communication function, the communication contents are passed so that the implementation of the electronic secretary's communication permission treatment does not simply interfere, and if the communication is not permitted, all communication contents are simply blocked. The communication equipment incorporating the inventions according to claims 33 and 82 includes a basic communication function and a function for controlling. After instructing the communication facility to perform control permission treatment of the electronic secretary, the communication contents including the command of the caller are passed. Furthermore, various controlled states such as claims 34, 35, 39, 47, 48, 83, 84, 88, 96, 97 can be realized.
FIG. 6 is a flowchart of an embodiment of the method according to claim 3. The communication is electronic mail communication. The sender's mail address is detected (601), the instruction file is read (602), the first rule set is applied (603), the result is judged (604), the second rule set is applied (605), The result is judged (606), and the presentation information includes a description of the condition for receiving the mail, and the treatment of the communication permission is to receive the mail. That is, the electronic secretary passes the mail, and the recipient receives the mail. The reception refusal treatment does not receive mail (608), and presenting the presentation information to the sender is returning the presentation information to the sender (607).
FIG. 7 is a diagram showing a configuration of an embodiment of the system according to claim 53 using the method according to claim 4. The electronic secretary and instruction files R1DB, GDB, R2DB are incorporated in the receiving client side user terminal 701. Reference numeral 702 denotes an ISP (Internet Service Provider) receiving server.
FIG. 8 is a flowchart of an embodiment of the method according to claim 4. A method for applying for communication permission to be presented to the caller is to describe the application contents in the subject line of the email. The presentation information includes at least a content that prompts the application subject to be described in the subject of the email. For example, a question is presented and the answer is prompted to be written in the subject. Then, it logs in to the receiving server (801), and detects the sender's ID, that is, the sender's mail address from the header of the mail (802). For example, a command “TOP10” described in POP3 (Non-patent Document 3), which is a general mail reception protocol, is sent, and the header of the first mail is received from the POP3 server and analyzed to thereby send the sender's e-mail address. Can be detected. Then, the instruction file is read (803), the first rule set is applied in the first rule set application procedure (804, 805, 809), and a rule satisfying the application condition is not found from the first rule set. The second rule set is applied in the following example procedure (806, 807). First, the correct contents are extracted one by one for all the records in R4DB (see FIG. 2F), and based on the extracted contents, the corresponding contents are searched from the subject included in the header of the mail and scored. . Then, for all records in R2DB, a record that matches the score value is detected, and when it is detected, that is, when a rule that satisfies the application condition is found, the treatment ID can be extracted from the field of the treatment ID. . Then, the rule execution unit is executed (809). The initial treatment is processed (808).
There is also an invention for extracting sender identification information from an incoming e-mail (Patent Document 5). The present invention is different in that the caller ID is extracted from the header of the arrived electronic mail. The present invention can achieve the object without opening the mail body. Therefore, in comparison with the above-described invention in which the main body of the mail is opened, the communication amount of the billing part of communication with the server such as a mobile phone can be greatly reduced.
FIG. 9 is a diagram showing a configuration of an embodiment of the system according to claims 54 and 55 using the method according to claims 5 and 6. An electronic secretary and instruction files R1DB, GDB, and R2DB are incorporated on the receiving server 901 side. Reference numeral 902 indicates a receiving client. Reference numeral 903 denotes a mail transmission client.
FIG. 10 is a flowchart of an embodiment of the method according to claim 5. The method for applying for communication permission presented to the caller is to describe the application contents in the subject line of the email. The presentation information includes at least the content prompting the application content to be described in the subject of the email, received up to the envelope (envelope) (1001), detects the sender's email address, reads the instruction file (1002) ), The first rule set is applied in the first rule set application procedure (1003, 1004, 1009). If no rule satisfying the application condition is found from the first rule set, a header including the subject of the mail is received in order to receive the subject of the mail (1005), and the second rule set application procedure The second rule set is applied at (1006, 1007, 1009). The initial treatment is processed (1008).
FIG. 11 is a partial flowchart of the early determination process of an embodiment of the method according to claim 6. The early determination means to determine and execute to reject the reception of the mail before the reception of the mail body is completed. The present invention can determine to reject the reception of the mail body by judging the subject content of the mail. However, prior art SMTP compliant mail senders send a mail envelope, but before sending the content, there is a step to check if it is authorized, but once the mail content has been sent, before sending the body, There is no step to check if it is authorized (see Non-Patent Document 4). Therefore, a sending client that has been forcibly canceled (ie, early decision) by closing the communication channel during content transmission will have a mail sender implemented to ignore the error code returned when it is terminated and resend. May exist. The present invention can realize early determination that can prevent generation of wasteful communication even when receiving from such a prior art sender.
The early determination process starts when a rule that satisfies the application condition of the step of applying the first rule set of claim 5 (FIG. 10 (1004)) is not found. The third rule set is applied in the next third rule set application procedure. That is, the R3DB is searched based on the condition that the caller ID (the mail address of the caller in this embodiment) matches and the predetermined time has not passed from the reception time to the search time (1101), When the result is judged (1102) and the rule in which the record is detected, that is, the applicable condition is found, the treatment can be extracted from the treatment ID field. Then, the rule execution unit is executed (1110). If a rule that satisfies the application condition is not found, the header including the subject of the mail is received (1103), and the second rule set is applied in the second rule set application procedure (1104, 1105, 1112). The initial expected treatment is processed (1106). However, if the treatment and initial expected treatment of the second rule set execution unit include reception refusal (decision: 1107), the third rule is determined based on the fact sender ID, reception time, and reception refusal treatment. In addition to the third rule set (1108), the communication request is processed based on the treatment, and the reception refusal during the treatment is merely a temporary error state returned to the transmission client, and then the communication is forcibly stopped ( 1109), if not, the communication request is processed based on the given treatment (1112). The purpose of the execution of the third rule is to stop a prior art SMTP compliant sender before the reception of the header: a step in which the prior art can be officially stopped. Since it only needs to be executed once, when the execution part of the third rule is executed, the corresponding rule is deleted (1111).
FIG. 12 is a flowchart of an embodiment of the method according to claim 7. A method for applying for communication permission to be presented to the caller is to describe the application contents in an email. The presentation information includes at least the content that prompts the email to describe the application content, received to the envelope (envelope) (1201), detects the sender's email address, reads the instruction file (1202), The first rule set is applied in the first rule set application procedure (1203, 1204, 1209). If no rule satisfying the application condition is found from the first rule set, the content is received (1205), and the second rule set is applied in the second rule set application procedure (1206, 1207, 1209). . The initial treatment is processed (1208).
FIG. 13 is a flowchart of an embodiment of the method according to claims 8, 11, 13, 25, 101 used by the system according to claims 57, 60, 62, 74, 102. ID is detected (1301), the instruction file is read (1302), the first rule set is applied (1303), the result is determined (1304), the second rule set is applied (1305), and the result is determined ( 1306), the first expected treatment is processed (1307). The difference between claim 2 and FIG. 5 is that when a second rule that satisfies the applicable condition is found, claims 101 and 102 further determine the storage condition (1310), and the condition is satisfied The electronic secretary is to give the caller the treatment of the execution part of the second rule found. That is, based on the caller ID and the treatment, a first rule is created, added to the first rule set (1309), and a communication request is processed based on the treatment (1308). Usually, one of the storage conditions is that the treatment of the execution part of the found second rule is not acceptance of the application. Storage conditions can be specified or changed by the parties.
This process is called automatic screening. For example, if you correctly answer a question specified by the recipient, all the parties who contacted the recipient once will be automatically stored in the first rule. Not. Application acceptance treatment is usually not given to a specific partner. This is useful as a record of communication with the other party when the person who gave the communication permission treatment is demoted and given the application acceptance treatment.
Step 1307 takes action based on the initial expectation. The initial expectation in this example is to refuse reception after presenting presentation information to the sender. When the caller is unknown, it is necessary to present the presentation information in order to make the caller apply for communication permission. If the presentation information is not presented in the exchange of application acceptance, it can be presented in this step. It is also possible not to present at the will of the parties.
FIG. 14 is a flowchart of a portion of an embodiment of the method of claim 9 utilized by the system of claim 58. This part of the processing is included in the first expected processing block (FIG. 5 (507)). That is, when treatment is not determined by the first and second rules, the third rule set is applied in the third rule set application procedure (1401, 1402, 1405). When applied, the corresponding rule is deleted from the third rule set (1406), the first rule is created based on the caller ID and predetermined treatment, and added to the first rule set (1407). If a rule for which the application condition is satisfied is not found, a third rule is created based on the caller ID, the reception time, and predetermined treatment, and added to the third rule set (1403). The original initial expectation of claim 2 is executed (1404).
When the caller is unknown, the present invention automatically replies to the caller and confirms the identity of the caller. However, the reply address of most spam mails is currently forged. Auto-reply can create new spam emails. When the second mail is received from the return address, the present invention does not include information capable of confirming the predetermined identity, and if the party designates the predetermined treatment, for example, refusing reception, Ignore the address and give a reception rejection treatment, and then reject the reception without an automatic reply.
In the case of a nuisance call, the present invention can prevent an attack by repeated application. The idea of claim 9 provides a partner with a limited number of application opportunities and supports repeated application by a machine or the like. This can be realized by putting the number of times in the execution condition or giving a limited number of application treatments.
FIG. 15 is a diagram showing a configuration of an embodiment of the system according to claims 59 and 61 using the method according to claims 10 and 12. Electronic secretaries and instruction files R1DB, GDB, and R2DB are incorporated in the party terminal side 1501. Means to communicate through real-time interaction. The party terminal 1502 having the control right can communicate with the called party terminal 1501 without intervention of the called party, and can send a control command 1510 to the terminal 1501. The party terminal 1503 to which the communication permission treatment is given can perform normal two-way communication 1520 with the terminal 1501. In the method of claim 16 described later, communication and control can coexist.
FIG. 16 is a flowchart of an embodiment of the method according to claim 10. ID is detected (1601), the instruction file is read (1602), the first rule set is applied to determine the result (1603, 1604), and if no rule that satisfies the condition is found, the presentation information is transmitted. After receiving the caller's response (1605), the second rule set is applied to determine the result (1606, 1607), and the communication request is treated based on the initial expected treatment or the given treatment according to the result. (1608, 1609).
FIG. 17 is a partial flowchart of an embodiment of the method according to claims 16, 23, 24. This part of the process exemplifies a procedure for repeatedly presenting guidance messages, receiving responses, and determining the accuracy of responses. This corresponds to a processing block (FIG. 16 (1605)) of “presenting presentation information to the caller and receiving the caller's response” in claim 10. It judges whether the processing of the rule data record is completed from the R4DB (1701), extracts (1702), presents the question to the caller, and receives the answer of the caller (1704). A question may have multiple correct answers. For example, when confirming an identification number, there are a plurality of identification numbers. In this embodiment, the mechanism for confirming a plurality of correct answers (1705) does not ask the same question, and verifies whether the answer received at the previous question is the next correct answer. Judgment is made by adding a question presentation unnecessary sign to R4DB or by leaving the question field blank (1703). There are cases where it is not necessary to present all questions. For example, there is a case where the other party's identity can be determined by the first question. In this embodiment, when the total score (1706) exceeds a predetermined score, the question and answer is terminated early (1707). The system according to claims 65, 72, and 73 using the method according to claims 16, 23, and 24 includes means for receiving a caller's reaction according to the type of the presented information. For example, when an answer is obtained by pressing a telephone dial number, a means for recognizing the pressed number is provided.
In the case of a telephone, the caller is identified by the calling telephone number. In the present invention, a caller can be identified by an identification number or a password issued by a party. Communication is possible from an unspecified calling terminal using the identification number.
FIG. 18 is a diagram showing the configuration of an embodiment of the system according to claim 66 using the method according to claim 17. The electronic secretary and the instruction file are incorporated on the communication service providing server 1801 side. Each party has an instruction file and can be used by a plurality of parties. The party having the right of use inputs data to construct his / her instruction file from any terminal 1803 or telephone (1820). A communication request or control command of the caller terminal 1802 is sent via the electronic secretary server (1810).
FIG. 19 is a diagram showing a configuration of an embodiment of a system according to claim 71 using the method according to claim 22. The electronic secretary has means (1930) for accessing the instruction file through the network, and one party uses a plurality of electronic secretaries (1901, 1904). The plurality of electronic secretaries access one instruction file 103. Reference numeral 1940 indicates mail via the server 1904.
FIG. 20 is a flowchart of the outgoing call processing part of one embodiment of the method of claim 26 used by the system of claim 75. For all the rules in the fifth rule set relating to the destination callee ID, call origination time, and treatment, find a rule that satisfies the applicable condition, determine the result (2001, 2002), and satisfy the applicable condition. If a rule is found, the outgoing call request is processed based on the given treatment (2004). If the rule is not found, a communication request is sent to the called party and treatment is received (2003). In the case of the electronic secretary of the present invention, the incoming party determines the treatment received by a predetermined return code and communicates (2005, 2006). In the case where the incoming party uses the prior art, for example, in the case of a conventional mail receiving server, it is desirable to consider the reception refusal when a permanent error code is received. If the received treatment is “cannot communicate immediately”, a fifth rule is created based on the recipient ID, the calling time, and the treatment, and added to the fifth rule set (2007). The main object of the present invention is to prevent unwanted communication at the source. Preferably, the server is operated as shown in FIGS. The party does not enter data into R5DB. When the treatment given to the other party is reception refusal, repeated transmission is prevented within a predetermined time. It is desirable to set the predetermined time by a server administrator. For example, if a treatment such as “Please try again after one hour” is given, it can be performed on the transmission server side. If R5DB is not cleared, the number of R5DB records of the sender of mass nuisance communication increases indiscriminately. Depending on the number of R5DB records, the server administrator can perform management such as reducing the transmission efficiency of the caller or giving a warning.
FIG. 21 is a diagram showing a configuration of an embodiment of the system according to claims 80, 81, and 98 using the method according to claims 31, 32, and 49. FIG. 22 is a partial flowchart of the processing of the first party in an embodiment of the method according to claims 31, 32, and 49. FIG. 23 is a partial flowchart of the processing of the second party in an embodiment of the method according to claims 31 and 49. FIG. 24 is a flowchart of the server search, data transmission, and treatment exchange processing portion of an embodiment of the method according to claims 31, 32, and 49. The present invention can be used simultaneously by two or more parties. In the claims and the following description, the treatment given to the data disclosure partner by the first party is input to the PDDB, the proxy authorization treatment is given to the server (2202), and the second party sends a search request to the server ( 2302).
See Example 4 for another example of party data in addition to the PDDB.
The parties 2101 and 2102 input the first and second data, at least one party rule for disclosing the data, and the server 2103 to give the server permission for communication (2110, 2111, 2201, 2301). ). The server receives the party data and party rules and stores them in the PDDB (2401). The party rules include information about the profiles of candidates who disclose information, not disclosed, whether confirmation is required before information is disclosed, and what information is disclosed to which candidates. Save to authorization profile. The second party sends a search request containing the search criteria (2112, 2302), and the server receives it and searches the PDDB (2402). A search result such as the number of records satisfying the criteria is sent to the second party (2303, 2403). If the first data satisfies the search criteria (2404), if there is the first data that satisfies the search criteria, determine whether the first party rule is satisfied (2405), if satisfied , Send the first data to the second party (2113, 2303, 2406). When the first party gives the server a proxy permission treatment and the treatment given to the second party to be disclosed the first data is input to the PDDB, the server performs the operation of the first party, The second party is given a treatment to be given to the disclosed subject included in the first data (2113, 2407). It is determined whether the second party rule is satisfied (2408), and if it is satisfied, the second data of the second party is sent to the first party (2114, 2203, 2409). In the case of claim 31, there is no processing for performing an operation for giving treatment.
The party's rules can include a confirmation of the identity as a prerequisite before disclosing information. It is possible to specify in the party rule on condition that the information about the party has been confirmed.
It is possible to ask the server to confirm information about the party. Information regarding the confirmation is stored in the confirmation database VDB, and the verifier information is stored in the verifier data database VRDB.
When the instruction file of the party is stored in a server in the network, the server logs in to the server based on the access permission information (ID, password) and inputs data to the instruction file. The proxy permission is entered into the instruction file based on the access permission information input from the client.
When the instruction file is stored locally, the proxy permission is implemented by giving the server information transfer permission treatment described in claim 33 and inputting the information into the local instruction file.
The present invention simply realizes anonymous communication and easy data exchange.
The server processes the search request, determines whether the first data meets the search criteria, and whether the first (second) party rule that discloses the first (second) data is satisfied The implementation of the process to be determined is known from Japanese Patent Application Laid-Open No. 2004-151867. There are many search techniques that can be used, including keywords, fuzzy logic and natural language search tools.
According to the present invention, since the called party holds the key to success or failure of communication, the connection between the party ID such as a telephone number and the identity can be disconnected. Connect only to personal phones and other people who can easily trust e-mail. An effect similar to that of a private network in a public network can be obtained. In the present invention, even with a public network communication ID that is known to the other party, the other party's communication can be refused later. Therefore, unless an identity is publicized, anonymity is maintained and an ordinary number is used simply. Anonymous communication that can use all communication functions can be realized. For example, the present invention does not require a dedicated central controller to remove identities from communication content. There is no need to create a special communication channel.
Using the method of claim 29, the identity verification information of the parties is stored on the server. A communication service provider or a third party who manages the server has a legal information protection obligation. In the case of damage caused by illegal acts, the other party's background can be checked by legal means, so communication can be made with peace of mind.
The communication relationship can be cut off by resetting the treatment to the other party. If necessary, an additional ID is used and a telephone number dedicated to anonymous communication is newly contracted separately from the telephone number for normal use. For example, NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION can use an additional number service in addition to the original subscriber line number, and can also use the additional number as a caller number. In the case of mail, a new address can be used as an additional ID. When the need for anonymous communication is eliminated, if it is burdensome to set the treatment as reception refusal, the additional ID contract may be abolished.
The concept of normal language treatment is exchange. The term treatment of the present invention is also related to exchange, but “treatment exchange” is not necessarily exchange at the same time. In the present invention, only one side can give communication permission, and only the other side can communicate.
FIG. 25 is a flowchart of an embodiment of the method as claimed in claim 33. Control permission treatment was added to claim 1.
FIG. 26 is a diagram showing a configuration of an embodiment of the system according to claims 82 and 84 using the method according to claims 33 and 35. The party who controls terminal A2601 gave information transfer permission treatment to terminal C2603. When the information is transferred from the terminal C to the terminal A, the data is written in the storage device 13 of the terminal A (2610), and the warning permission treatment is given, the information is output to the display unit 18 through the terminal A, and the speaker 17 receives the voice. It is possible to call attention of a nearby party. Terminal B 2602 and terminal A perform normal bidirectional communication (2620).
27 is a conceptual diagram showing the configuration of an embodiment of the system described in claims 88, 89, 90, 91, 92, 93 using the method described in claims 39, 40, 41, 42, 43, 44. . The means shown are provided when necessary and are not meant to be all at the same time. According to the method of claim 39, the ruler of the mobile device 2701 gives the location acquisition permission treatment to the caller of the terminal A2702. A location information acquisition command 2711 is issued from the terminal A, and the mobile device acquires the location information by the installed location acquisition means according to the command, and transfers the acquired location information to the terminal A (2712). The method according to claim 40, wherein the position information is provided based on a GPS position signal received from a GPS satellite 2704, position information converted from the received GPS position signal, and position information of a base station 2705 of a PHS terminal. This includes information selected from the group consisting of the current location information and the mobile terminal location information provided based on the location information of the mobile phone base station 2706 (hereinafter referred to as “specific location”). In the method of claim 41, when a communication request is issued to the terminal A having an ID registered in advance, the position information is detected and transferred to the terminal A (2714). The method according to claim 42 further transfers objective information to the terminal A, and further gives the terminal A treatment of (a) permission to transfer information and (b) permission to call attention, and the terminal A moves. The information is transferred to the aircraft, the information is output to the information display means of the mobile device, and the attention of the nearby party is alerted through the alerting means of the mobile device (2715). Calling the attention includes causing the mobile device to generate what is selected from the group consisting of voice, light, and vibration. 45. The method of claim 43, wherein the destination information includes arrival destination information, and the information to be transferred to the mobile device is selected from the group consisting of map information, recommended route, current route, forward traffic jam information, and detour information. Including things. The method according to claim 44, wherein the position information includes a specific position. Terminal B 2703 and the mobile device perform normal two-way communication (2713).
FIG. 28 is a flowchart of an embodiment of the method according to claim 43. The purpose of this example is to efficiently provide a vehicle travel guidance function to a mobile terminal having a position information acquisition function, such as a mobile phone. When a communication request is issued to the server terminal of the fixed machine having a pre-registered ID, the current location and destination information of the mobile device is transmitted to the server, and the server receives it (2801). When the server searches for a recommended route and transmits it to the mobile device (2802), searches for traffic jam information of the recommended route at a predetermined interval (2803), determines whether a traffic jam occurs (2804), and occurs The server to which the position acquisition permission treatment is given acquires the current position of the mobile device, confirms the travel route (2805), and searches for a detour including a traffic jam before the travel route (2806). 2807) If the detour exists, the server given the information transfer permission and the alert permission treatment transfers the detour information to the mobile device, and then informs the driver by voice (2808).
The route search requires a lot of calculation amount and calculation speed. Retrieving dynamic road traffic information from a mobile device is inefficient. The present invention leaves an operation that cannot be performed by an inexpensive portable mobile terminal to the server, and communicates with the mobile device only when there is a traffic jam that may be involved, and notifies detour information. By giving control permission treatment to the server, an operation performed by the called driver himself is not necessary. The route search and the detour search are known from Patent Documents 7 and 8.
FIG. 29 is a conceptual diagram showing a configuration of an embodiment of the system according to claims 94, 95, 96, 97 using the method according to claims 45, 46, 47, 48. According to the method of claim 45, when the mobile device 2701 detects a change in position, the mobile device 2701 transfers the changed position information to a terminal A 2702 having an ID registered in advance (2911). Terminal A gives the mobile device permission for information transfer and alerting. In the method according to claims 46, 47 and 48, the control permission includes a hearing permission. It is assumed that the ruler of the mobile device has given permission to observe and monitor to the caller of terminal A. A communication request, a hearing command, and a monitoring command are issued from the terminal A (2921). In accordance with the command, the mobile device sends the audio signal acquired by the installed transmitter and the image signal acquired by the imaging device to the terminal A (2922). This example can be used for a mobile device to guard a child. For example, parents can check where their children are and listen to their children's activities such as playing in the park or going to school. The position information changed when the child is in school or moving is automatically transferred to the parent terminal A. The mobile device preferably uses PHS, and information transfer is performed by mail which is packet communication. Terminal A preferably uses a personal computer that is always connected to the Internet via an ADSL line or the like, and displays the location of the child carrying the mobile device on the map in real time. Can also be used for car crime prevention. If there is an unscheduled vehicle move, the owner will be warned and tracked. When high position accuracy is required such as taxi or transportation work, it is desirable to use GPS position acquisition means.
Patent Document 9 discloses an image display unit that adds position information of a mobile device to map data and displays it on an image. The mobile device of Patent Document 9 cannot refuse to send a nuisance. The present invention is different from the present invention in that annoying communication can be prevented, especially in the case of children, communication permission only for relatives can be set, safety can be improved, and a multi-function terminal can be realized.
FIG. 30 is a diagram showing a configuration of an embodiment of the system according to the 100th aspect. An e-mail 3003 stored in the storage device 13 of the transmission client 3001 is transmitted to the reception server 3002. See the prior art SMTP (Non-Patent Document 4, Non-Patent Document 5) for an example of the configuration of the e-mail 3003. FIG. 31 is a flow chart of one embodiment of a method according to claim 99 utilized by a system according to claim 100. Session initialization, transmission client initialization (3101). Envelope transmission is performed by issuing an SMTP compliant command: MAIL command, RCPT command (3102), and the sender and recipient mail addresses are transmitted to the receiving server to check whether the envelope has been accepted (3103). The processing so far is the same as SMTP. Since the authorization to send the body is determined by the information contained in the header, the information field contained in the header is transmitted (3104), and the information field contains information that allows the recipient to judge the specified reception condition and is authorized. Is checked (3105). The present invention refers to this step as an “INFO command”. Based on the received envelope and the information field, the receiving server can check whether or not to permit transmission of the next body by collating with a receiving condition designated by the callee. If authorized, a conventional DATA command is issued and the content is transmitted (3106). If it is authorized and accepted, the normal mail transmission process and the transmitted mail are deleted from the storage device 13 (3107, 3109). If not authorized, an error is processed (3108).
In the prior art SMTP, after authorizing the envelope, the content is transmitted as one block and the authorization is checked. If only the mail transfer protocol level command is used, the reception of the content cannot be refused unless the entire content has been received. For this reason, even if it can be determined that the reception should be rejected based on the content of the content, useless communication has already occurred. On the other hand, information fields such as a subject (Subject), a comment (Comments), and a keyword (Keywords) having a purpose of having information content recommended by a person in the content specification (Non-Patent Document 5) that has already been widely used Can describe information that can determine the specified reception condition. Even existing mail communication software has means for writing information in the field. When the caller does not know the reception condition of the callee for the first time, the receiving server transmits the caller's reception condition to the caller by the automatic reply means. In addition, the sender's mail address that satisfies the reception condition is recorded only once, and the second and subsequent transmissions are those that satisfy the previous reception condition as judged from the sender address included in the envelope. If so, pass the content without checking the information field. As described above, the reception server can determine whether to authorize transmission of the body based on the received envelope and the information received before receiving the body.
It is desirable to separate the information field from the header and send it before the content as a body sending authorization standard. However, in order to make the best use of existing communication software, the information field is extracted from the header and sent first. If approved, the content may be transmitted without changing the conventional content, that is, by a DATA command for transmitting the conventional content (3106). Alternatively, the header may be sent first, and if approved, the body may be sent.
As described above, the present invention uses an already widely accepted subject field to construct an efficient mail communication system that can prevent spam mail communication.
The inventions according to claims 99 and 100 relate to the transmission client. The invention described in claims 5 and 54 is an invention related to the receiving server. These can be used simultaneously.

    FIG. 1 is a diagram showing a basic schematic configuration example of the present invention, FIG. 2 is a layout diagram for embodying an instruction file in a database, and FIG. 3 is a layout diagram of records relating to party data, confirmation request data, and verifier information. 4 is a flowchart of claim 1, FIG. 5 is a flowchart of claim 2, FIG. 6 is a flowchart of claim 3, and FIG. 7 is a diagram showing a system configuration of claim 53. 8 is a flowchart of claim 4, FIG. 9 is a diagram showing a configuration example of the system of claim 54, FIG. 10 is a flowchart of claim 5, and FIG. 11 is a partial flowchart of early determination processing. 12 is a flowchart of claim 7, FIG. 13 is a flowchart of claim 8, FIG. 14 is a flowchart of claim 9, and FIG. 15 is claim 59. FIG. 16 is a flowchart of claim 10; FIG. 17 is a diagram showing a procedure for receiving a repeated guidance and receiving a response; FIG. 18 is a diagram showing an electronic secretary and an instruction file on the server side. FIG. 19 is a diagram illustrating an example of incorporation, FIG. 19 is a diagram illustrating an example of accessing an instruction file through the network, FIG. 20 is a flowchart of a transmission process part, and FIG. 21 is a diagram illustrating a system configuration of claim 80; 22 is a partial flowchart of the process of the first party, FIG. 23 is a partial flowchart of the process of the second party, FIG. 24 is a flowchart of the treatment exchange process part, and FIG. 25 is a flowchart of claim 33. 26 is a diagram showing the system configuration of claim 82, FIG. 27 is a conceptual diagram showing the configuration of the location information system, and FIG. FIG. 29 is a conceptual diagram showing a configuration of a position change monitoring system, FIG. 30 is a diagram showing a configuration of a mail transmission client, and FIG. 31 is a mail transmission flowchart. FIG. 32 is a block diagram showing the configuration of the automatic answering telephone, FIG. 33 is a diagram showing the contents of the instruction file of the telephone, FIG. 34 is a flowchart of the telephone, and FIG. FIG. 36 is a diagram illustrating an example of automatically giving a treatment that allows a normal call to a number, FIG. 36 is a diagram illustrating a configuration of an answering machine, FIG. 37 is a diagram illustrating contents of an instruction file of the telephone, and FIG. 38 is a mail receiving client. 39 is a block diagram showing the configuration of the system, FIG. 39 is a diagram showing the contents of the instruction file of the system, and FIG. 40 is a schematic flowchart of the reception process. 41 is a diagram showing a question input screen, FIG. 42 is a diagram showing an initial expectation selection screen, FIG. 43 is a block diagram showing an Internet videophone system configuration, and FIG. 44 is an internal configuration. 45 is a flowchart showing the operation of the main program, FIG. 46 is a diagram showing a main menu screen, FIG. 47 is a diagram showing a contact book screen, and FIG. 48 is a member addition screen. FIG. 49 is a diagram showing treatment application processing, FIG. 50 is a diagram showing a personal setting screen, FIG. 51 is a flowchart showing a login processing operation, and FIG. 52 is a friend list editing screen. 53 is a diagram showing a treatment application qualification designation screen, FIG. 54 is a flowchart showing the operation of the videophone communication program, and FIG. Is a diagram showing a middle screen, Figure 56 is a diagram showing a screen in video telephony, FIG. 57 is a diagram showing the flow summary to build treatment relationship.

Explanation of symbols

11, 111, 211 ... Control means 12, 112, 212 ... Input / output control means 13, 14, 114, 214 ... Storage devices 15, 115, 215 ... Communication transfer means 16 ... Keyboard and display unit.
17 …… Microphone, speaker 18 …… Camera, keyboard and display.

    When the present invention is operated on the server side, the effects of preventing annoying communication and reducing the communication amount of the entire network can be obtained simultaneously. When the automatic screening function is used at the same time, the convenience of use on the called side increases. Further, when the control permission function is used at the same time, a multi-function terminal is realized.

Example 1. Automatic answering phone (3201)
FIG. 32 is a block diagram showing the configuration. Reference numeral 17 denotes a microphone and a speaker. 33A-D show TDB, R1DB, R2DB, R4DB). The presentation information is a question presented to the caller. The questions are pre-recorded audio files. In this example, if the question field is blank, the question does not need to be presented, and the predetermined total score for completing the question and answer is 3 (see FIG. 17 (1707)). If the total score is 5 as the storage condition, the caller is automatically given treatment of the second rule execution unit (see FIG. 13 (1310)).
FIG. 34 is a schematic flowchart of the process, and the basic part is the same as in claims 11 and 13. In the present embodiment, the party terminal is a telephone, or the party terminal function is incorporated in a personal computer, or can be realized as an external adapter dedicated to the telephone. For the first time, a question message is sent to the other party who receives a call from a phone number that the recipient does not know, and the other party presses a dial button to answer. Judge treatment and decide treatment.
FIG. 35 is a diagram showing an operation example in which a treatment that allows a normal call to a related party's telephone number is automatically given by automatic examination. According to the present invention, information that only the caller himself / herself can understand is instructed to the electronic secretary using an instruction file. Various functions can be set from the basic nuisance communication prevention function. The instruction file setting in this example can realize the following functions. For each recipient's phone number, designated reception (treatment ID = 4), designation rejection (treatment ID = 1), and unknown recipients need to accept applications. The side is charged a communication fee. As a result, it is possible to give economic sanctions to the caller of an incomplete call (one call) from the machine, and since the caller does not answer correctly, total scoring = 0, treatment ID = 0, reject No number will remain in the reception history. However, the party who gave permission rings the same ringing tone as usual, and is not charged until the receiver receives the call. If you make a mistake in the name of the recipient in the first question, you will be rejected immediately. For other requirements, pressing 4 will send the second question, prompting you to press the dial button 1 for real estate sales, 2 for English conversation, 3 for household goods, and 4 for sports equipment. When each selection is made, the ringtone is automatically sounded according to the score, the sound is recorded without sounding the ringtone, the call is disconnected, the caller ID is not automatically memorized even when the call is made, or the memory is automatically memorized. To do. When the code number 5678 is pressed, the call is automatically connected without ringing. As a result, it is possible to monitor and monitor the home and children. For example, it is possible to select whether the parent calls or listens to the mobile phone for children.
Although the first question in this example is simple, it can be set in a complicated manner according to the actual use situation. For example, if the first name and last name are divided into two questions and presented in order (the correct answer is presented first and then the second is presented) The probability decreases to 1/25.
The number set in the correct answer column can have various functions depending on the device. For example, it can be used as an extension number, and if the guidance question is “Please press the extension number”, the telephone of the other party who knows the number can be received regardless of the calling number.
If treatment is given to the calling number of the other party's home phone, if the same party makes a call from a public phone, you will be asked to enter the other party's home number as a confirmation in the guidance message, and the entered number will be checked against the treatment information. Can be determined.
The specific method for examining a treatment application varies depending on the specific configuration of the party's device. A variety of methods can be employed as long as they are obtained by achieving the purpose of the examination stage of the present invention. For example, it is conceivable to use voice recognition or image recognition.
Some of the automated telephone transactions of existing technology used in banks and the like send voice guidance to the caller, and the caller operates by pressing a dial button to confirm the customer himself / herself by a personal identification number. The present invention is different in that the response method is different for each transmission number and that the caller does not need to register a password in advance.
In this example, the electronic secretary accepts the intention of the party based on the rules and points, but it can also be accepted in natural language. For example, “Receiving a call from someone who knows my name.” The electronic secretary can listen to these requests by a known rule-based technique (for example, see Patent Document 11), allow the user to input missing information, and organize necessary rules.
The electronic secretary of the present invention can be installed on the telephone exchange and related service providing server side by a known technique (for example, see Patent Document 6).
Example 2 Answering Machine (3601)
FIG. 36 is a diagram showing a telephone of an embodiment of the system according to claim 104 using the method according to claim 103. FIGS. 37A to C show a data database (GDB) that records TDB, R1DB, and response guidance (presentation information).
This example illustrates the concept of the present invention, in which all communication is a permission system with a plurality of treatments, and provides a means for giving permission to a partner without permission. In this example, a phone call made by an unknown party is recorded and not received directly. This protects the weak, such as the elderly, from fraud crimes. It is suitable for users who have a limited communication range, except when used for unspecified parties such as business. It is also possible to reject all calls from outsiders who have not registered, and as the usage time accumulates, the treatment setting is completed naturally, and the purpose can be achieved without undue burden on the parties.
The first expected treatment illustrated is staying away, and when the identity can be confirmed by the voice of the other party, a call can be made immediately. It is desirable to devise convenience in operation such that the number of the last party to call can be easily registered with one button. If there is an important customer, you can register the number of the other party in advance. The caller can be identified by a group. For example, it is possible to identify by the area number and give communication permission to the home number. This example is simple and easy to use and has low manufacturing costs. It can be implemented on the external adapter dedicated to the telephone, on the server side that provides the exchange and related services.
Conventionally, when a communication request is made by paying money, it is natural for the receiving side to receive it. However, with the development of communication networks, issuing communication requests is becoming increasingly cost-effective, and as more people are able to access the communication network, there is no reason to receive communication requests from anyone. . It should be possible to at least reject calls from unrelated people. To put it the other way around, except for public services, the person making the call is usually acquainted with the person whom he / she wants to talk in advance, and there are cases where there is a business. Therefore, the communication according to the permission system of the present invention can prevent unwanted communication without sacrificing the conventional communication function.
Example 3 Mail receiving client system
In this embodiment, an electronic secretary is incorporated on the party terminal side. It will be commercialized as a PC (personal computer) application (URL: http://www.netinfotech.co.jp, http://www.Emailship.com) and will be released to the public soon.
FIG. 38 is a block diagram illustrating the configuration of the third embodiment. In this figure, reference numeral 10 denotes an ISP server device. Reference numeral 381 denotes a mail service party terminal. This embodiment is a client of an ISP mail service server. Reference numeral 11 is a control means, which is composed of a CPU and the like, and controls each part, transfers data, performs various calculations, temporarily stores data, and the like. To do. Reference numeral 12 denotes an input / output control means that controls data input from a server connected via a communication line and controls data output to the server. Reference numeral 15 denotes a communication transfer means, which is connected to the ISP. Reference numeral 16 denotes a keyboard and a display unit, and reference numeral 13 denotes a storage device.
First, such a program is used in the control means 11 and includes, for example, a program for setting the number of points given to the display, treatment, initial expected treatment, request confirmation question, correct answer, correct answer, electronic secretary program, etc. The
Next, the storage device 13 stores data such as instruction files. A magnetic storage medium is adopted as the storage device. 39A to 39E show TDB, R1DB, R2DB, R4DB, and GDB. Automatically reply to the caller with questions and presentation information. FIG. 40 is a schematic flowchart of the reception process. The basic parts are the same as those of claims 4 and 8 and FIGS. The control means 11 displays a question input screen as shown in FIG. 41 on the display unit of the terminal 381, and gives the terminal operator the criteria for determining this treatment, that is, the request confirmation question and the points given to the correct answer and the correct answer. , Is prompted (4101). When an e-mail from a sender without permission arrives at the server, presentation information and a question for guiding the permission application are automatically returned to the sender, and the answer to the confirmation question is entered in the subject of the response mail during the application guidance. Many spam emails are automatically sent by machines. For example, if you get a correct answer to a confirmation question such as "How many is a plus?", You know that the caller is a person, not a machine, and that person automatically sends an email to that person. Unlike machines, etc., the recipient can decide whether he or she wants to receive in the future. Of course, there are many machines that can be added up, but it would not be profitable to automatically make a machine that can understand the problem sentence that each person gave.
The present invention can achieve the object without opening the mail body. In particular, the amount of communication in the billing part of the connection with a server such as a mobile phone can be greatly reduced. If a correct answer such as the name of the called party or a keyword of a category of interest is detected from the subject or body of the mail, a predetermined treatment is given. In other words, the permission application procedure is implicitly performed, and convenience can be provided to the caller. When searching from the text, it is desirable to use a form resident on the server side of the present invention.
The control means 11 displays a screen as shown in FIG. 42 on the display unit of the terminal 381 and prompts the terminal operator to select the first expected treatment 4202 from the list 4201. FIG. 39A is a treatment set adopted in this example, and a specific realization of the treatment of the application acceptance type is one treatment of “replying a request confirmation question to the caller and refusing reception”. If necessary, you can add "Reply request confirmation question to caller and receive only subject". A specific realization of the type of treatment that partially permits communication is “Receive a limited size and store it in a temporary folder to notify the callee”. Furthermore, it is a treatment of “storing application contents and notifying the recipient” that is necessary for manual examination. When the final treatment is given by the recipient, the treatment determined by automatic examination can be changed. If received from an unknown e-mail address, a request confirmation question is returned to the sender as an initial expectation, and reception is rejected.
In the initial setting of the product of this embodiment, first, after receiving confirmation from the party, a reception permission treatment (treatment ID = 5) is given to the partner described in the address book of the existing mail software (FIG. 42, 4203), and thereafter You can enter the reception permission / rejection address / domain name individually at any time, and set / change the treatment for each sender. In addition, it is possible to extract the destination address from the mail transmitted by the party and automatically set reception permission treatment. FIG. 39 is an example of the set treatment information, and the following functions can be realized simultaneously. That is, designated reception (treatment ID = 5) and designation refusal (treatment ID = 1) for each address and domain, reject unwanted mail automatically sent by the machine (total scoring = 0, treatment ID = 2) ), Limitedly receiving emails sent by unrelated people (1 + 1 = 2 answered) and waiting for manual treatment review (total scoring = 1, treatment ID = 3), sent by someone who knows the name of the recipient Receive a temporary email and wait for manual treatment review (total scoring = 2, treatment ID = 4), usually receive email sent by a person who knows the recipient's birthday (total scoring> 3, treatment ID) = 5). See Figure 17 for scoring.
In the present embodiment, multilingual correspondence processing of presentation information is performed based on character code information included in mail header information and regional information included in the suffix of the domain name of the sender address.
Example 4 Internet video phone system
In this embodiment, an electronic secretary operated on the server side and a party videophone terminal communicating with the client side via the electronic secretary are completed.
1: FIG. 43 is a block diagram showing the overall configuration. FIG. 44 is a block diagram showing the internal configuration of the first embodiment. In this figure, reference numeral 430 denotes a server, which is connected to the Internet via a route control device and a telephone line. Reference numerals 431 to 434,... Denote various terminals, which are connected to the Internet in the same manner as the server 430. Here, the terminals 431, 432,... Each have an output unit such as a CRT, LCD, speaker, etc., an input unit such as a keyboard, a mouse, a camera, and a microphone, and a function for executing a videophone program.
1-1: Server Configuration Next, a detailed configuration of the server 430 will be described. FIG. 44 is a block diagram showing the configuration of the server 430 and the terminal. In this figure, reference numeral 11 denotes a control means, which is constituted by a CPU or the like, and controls each part, transfers data, performs various calculations, temporarily stores data, and the like. Reference numeral 12 denotes input / output control means for controlling data input from a terminal connected via the Internet and controlling data output to the terminal. Reference numeral 15 denotes a communication transfer means, which is connected to the Internet. Reference numerals 13 to 14 denote storage devices, which store and store the following files, respectively.
First, the main program is stored in the storage device 14. The main program is used in the control means 11, and includes, for example, a program for displaying a treatment application screen on the display unit of the terminal, a treatment examination program for displaying detailed information of the party who sent the treatment application, It consists of the public name of the party who has applied for treatment in the contact book, the status display of the other party, the program for starting the videophone program and displaying the icon transmitted to the other party.
Next, the storage device 13 stores a party master database table and a treatment relationship master database table. In the party master, a party information record is stored. One party information record is composed of party-specific information such as party ID, password, mail address, IP address, self-introduction, etc. (see PDDB for another example of party data). The party ID in this embodiment is automatically given by the control means 11 when newly registering for service participation, but according to claim 14, 28, 29, 37, 63, 77, 78, 86 The identity registration can be performed at this stage. The password, e-mail address, and self-introduction store information transmitted by the parties registered from the terminals 431, 432,. As the IP address, the address of the terminal transmitted when the videophone communication program of the terminals 431, 432,. A treatment information record is stored in the treatment relationship master. One treatment information record is composed of treatment information and treatment application indication information.
The present invention records the treatment given to the other party by R1DB when operating on the client side. When operating on the server side, the treatment-related master TRDB (see FIG. 2H) of this embodiment with high efficiency is desirable. The treatment information includes an ID of the recipient himself / herself, a caller ID given treatment by the recipient, and the given treatment. The treatment information and the treatment application indication information are information input from a user interface of a program for displaying a treatment application screen on the display unit of the terminal, and are information transmitted from the terminals 431, 432,.
2: The operation will be described. Here, the terminals 431, 432,... Are respectively connected to the server 430 for communication, and all function as terminals of videophone parties. For convenience of explanation, it is assumed that the terminal 431 is connected to the server 430. Give an explanation. When the terminal 431 is connected to the server 430, the control means 11 detects this connection via the input / output control means 12, and controls the terminal 431 according to the main program. FIG. 45 is a flowchart showing the operation of the main program.
2-1: Assume that the terminal operator is a new party in order to explain the process of creating the party information record. Describe new registration. In step Sa1 shown in FIG. 45, the control means 11 displays a main menu screen as shown in FIG. 46 on the display unit of the terminal 431, and the terminal operator uses “ The user is prompted to select a desired process from “login” and “new registration”. On the main menu screen, a mouse cursor MC is displayed, and various operations can be performed by clicking a predetermined place. For example, if the mouse cursor MC is positioned and clicked on any of the display areas of the link buttons 4601 and 4602, the processing shown in the display area is performed, and the triangular buttons 22U, 22D, 22L, When the mouse cursor MC is positioned and clicked in the display area 22R, the rectangular display areas determined by the vertices of the triangle are scrolled up, down, left, and right, respectively. Here, after the terminal operator positions the mouse cursor MC in the display area of the link button 4602, the terminal operator performs a click operation (this operation is simply referred to as “click” below) to perform the “new registration” process. select. Then, the control means 11 having detected this advances the procedure to step Sa2 shown in FIG. 45, and at this step, the terminal operator is prompted to input the name, mail address, and password. If it is determined that the input mail address is not used by the party master, the user ID is automatically given by the control means 11 based on the input information, and the user ID is used as the public ID of the party. The next step Sa3 is performed. In step Sa3, the control means 11 controls the terminal 431 to display the contact book screen shown in FIG. In the following steps Sa4 to Sa7, it is possible to return to the contact book screen and the main menu screen at any time by a predetermined operation. Now, in the case of a newly registered party, no one partner is displayed in the contact book on this contact book screen, but for the sake of explanation, explanation will be made using a screen in which several other parties already exist.
First, the addition of a new partner will be described. In order to communicate with a partner, the present invention first applies for treatment to the partner. Adding a new partner is a specific procedure for treatment application. The new partner addition screen specifies the treatment given to the partner at the same time as the application for treatment to the partner. Encourage terminal operators to add members. The terminal operator clicks a link button 4701. Then, the control means 11 performs the process of the next step Sa4. In step Sa4, the control means 11 controls the terminal 431 to display the member addition screen shown in FIG. 48 and prompts the terminal operator to input public ID information.
This shows an example of prior application of claims 14, 27, 38, 63, 76, 87. The public ID is publicly disclosed on the Internet bulletin board or chat on the communication network, or directly taught by the other party. In this member addition screen, input boxes 4801 and 4802 of ID and self-introduction are shown, and “disclosure of email address to this member”, “disclosure of private email address”, “ Check buttons 4803 to 4807 corresponding to “Publish homepage address”, “Publish profile address”, “Publish my status to this member” are displayed, and “Receiving permission” corresponds to receiving permission treatment given to the other party A selection box 4808 to be displayed is displayed, and the terminal operator who is prompted to input and select the terminal operator inputs the other party's public ID in the “identification ID” box and 200, and the self-introduction is “ "...""and input it into the" self-introduction "box, and then click the execution link button 4810.
In the treatment set of this embodiment, there are three types of incoming call permission for a videophone incoming call answering method: “automatic reception rejection”, “inquiry every time”, and “automatic reception”. “Automatic reception” is a control permission treatment. The caller side communication device: instructing the TV phone terminal that the caller has the control right, can communicate with the caller without intervention of the callee. Of course, it is necessary for the terminal to always be able to receive.
For the information disclosure range to the other party, “Publish your email address to this member”, “Publish your private email address”, “Publish your homepage address”, “Publish your profile address”, “Publish your status to this member” “Yes” ”is selectable (4809), there are two types of treatment application,“ application for treatment ”and“ rejection of treatment ”, and the default initial expectation is“ Every time inquiry ”. , “Treatment application permission”. This embodiment does not include a function for changing the initial expected treatment.
With this operation, the procedure performs the next execution process of the treatment application (see FIG. 49). Here, the terminal operator is party a, the party with whom communication is desired is party b, and the public ID of party b is 200. In order to process the treatment application based on the treatment given by the party b to the party a, the control means 11 first searches the already created party master to determine whether the party a already exists in the caller list of the party b. (4901), if it exists, check the treatment that the party b gave to the treatment application to the a (4902). If the given treatment is "reject treatment application", the display unit of the terminal 431 Control to display “Member addition rejected” (Sa8), return the procedure to step Sa3 to display the contact list screen again, and the party a does not exist in the caller list of the party b. If the treatment is not “treatment application refusal”, the predetermined initial expected treatment is given to the party a, and the new treatment information including the IDs of b and a, the initial expected treatment, and the treatment application indication information is provided. Create a code, stored in the treatment relationship master, returns to the People screen.
In step Sa3, the control means 11 controls the terminal 431 to display the contact book screen shown in FIG. Prompt the terminal operator to confirm personal settings. The terminal operator clicks the link button 4702. Then, the control means 11 performs the process of the next step Sa7.
In step Sa7, the control means 11 controls the terminal 431 to display the personal setting screen of the party shown in FIG. 50, displays the public ID 5001 to the terminal operator, and the display area of the public ID is Control is performed to prohibit writing, and control is performed so that personal information 5002 can be changed.
2-2: Login In the case of 2-1, it is assumed that the operator of the terminal 431 is the party a, and the party b has completed the treatment application. Here, it is assumed that an existing party b is operating the terminal 432. For convenience of explanation, the screen displayed on the terminal 431 in the description of 2-1, and FIGS. 46 and 47 are used as the screen displayed on the terminal 432 of the party b here for the description. The following description will be made assuming that the terminal 432 is connected to the server 430. When the terminal 432 is connected to the server 430, the control means 11 detects this connection via the input / output control means 12, and controls the terminal 432 according to the main program. FIG. 51 is a flowchart showing the login processing operation of the main program.
In step Sa1 shown in FIG. 45, the control means 11 displays a main menu screen as shown in FIG. 46 on the display unit of the terminal 432 so that the terminal operator can use the service. , Prompt the user to select a desired process from “login” and “new registration”. Here, the terminal operator inputs a mail address and password in a “mail address” input box 4603 and a “password” input box 4604, performs a click operation on the link button 4601, and selects a “login” process. Then, the control means 11 that has detected this checks by searching the party master that has already been created based on the input mail address and password (FIGS. 51 and 5101). Here, if the control means 11 determines that the e-mail address and password are not correct, the control unit 11 advances the procedure to step Sa7 and performs control for displaying “incorrect e-mail address or password” on the display unit of the terminal 432. After that, the procedure returns to step Sa1 to display the main menu screen again. On the other hand, if the control means 11 determines that the inputted mail address and password are correct, the control means 11 performs the processing of the next step Sa3. In step Sa3, the control means 11 controls the terminal 432 to display the contact book screen shown in FIG. 47, extracts the partner who newly applied for treatment from the treatment relationship master, informs the party b, and The party a who applied for treatment in the contact book of b is displayed in green and the public name souss of the party a (4705), and according to the information disclosure treatment given to the party b by the other party, the state is disclosed with colors and icons. (4706), the mail creation icon is displayed for the person whose mail address is disclosed (4703), the link icon is displayed for the person whose profile address is disclosed (4704), and the detailed information of the partner corresponding to the pencil icon is displayed. To control. When the link button (4707) is clicked, the control means 11 performs the next step Sa5. In step Sa5, the control means 11 controls the terminal 432 to display the friend list item edit screen shown in FIG. 52, performs treatment examination and treatment change on this screen, and sends a treatment application to the party b. The detailed information 5203 of the party a is displayed, and the treatment 5201 to be given to the party a is controlled to be edited. Encourage selection of content. In addition to the screening of the treatment application, the treatment change given to the existing partner is also changed on the friend list item editing screen.
The party b selects each treatment content and clicks a link button 5204. Then, the control means 11 updates the treatment information record based on the selected treatment content and stores it in the treatment relationship master. When the relationship with the partner is cut off, the link button 5202 is clicked to delete the partner. Then, the control means 11 performs the process of step Sa6. In step Sa6, the control means 11 controls the terminal 432 to display the treatment application qualification designation screen shown in FIG. 53, and if "treatment application refusal" is selected as the treatment application qualification 5301, the corresponding party will be included in the future. You can break the contact from. Party b clicks link button update 5302. Then, the control means 11 updates the treatment information record based on the selected treatment content and stores it in the treatment relationship master.
This example illustrates the implementation of the anonymous communication function part of the inventions of claims 31, 32, 49, 80, 81, 98. As long as the parties do not publish their identities themselves, anonymous communication that can use all communication functions can be easily realized using ordinary numbers (IDs) while maintaining anonymity. The server here is not a dedicated central controller that removes identities from the communication content, nor does it require a special communication channel. In order to prevent crime, it is sufficient to register the identity of the ID at the acquisition stage.
2-3: It is assumed that the party a and the party b have established a treatment relationship based on the processing described in 2-1 and 2-2, and the terminal 431 of the party a and the terminal 432 of the party b are connected to the server 430. Suppose that FIG. 54 is a flowchart showing the operation of the videophone communication program. In step Sa3, the control means 11 performs control to display the contact book screen shown in FIG. 47, and the party b clicks the link button “Start program” (4708). Then, the control means 11 starts the videophone communication program with respect to the terminal of the party b, and passes “-” as the start parameter. When the videophone communication program is activated, the IP address of the terminal is transmitted to the server (5401), and it is determined whether the activation parameter is an IP address (5402). If the parameter is not an IP address, The connection waiting screen is displayed and the connection is waited (Sb3: connection waiting screen, FIG. 55). The waiting connection request is checked (5405). The control means 11 updates the information record of the party b based on the IP address information sent from the terminal videophone communication program of the party b, and stores it in the party master. Then, the status display icon of the party b (FIGS. 47 and 4709) is displayed on the camera icon on the contact book screen of the party a. Party a clicks on the camera icon 4709 of party b. Then, the control unit 11 extracts the IP address of the party b from the party master, starts the videophone communication program of the terminal 431 of the party a, passes the IP address as a parameter (5403), and notifies the caller ID. Request the connection to the destination IP address, that is, call the party b, and receive the response of the videophone communication program of the called party b (5404). When the videophone communication program of the called party b receives the connection request, it makes an inquiry to the control means 11 using the caller ID as an inquiry parameter, and the received control means 11 receives the inquiry from the treatment relationship master of the server 430 based on the caller ID. The treatment information is extracted (5406), and the treatment given to the calling party a is returned to the videophone communication program as a result of the inquiry. When the treatment given to the calling party a is “automatic reception” (5407, YES), the electronic secretary instructs the calling party communication device TV phone terminal that the calling party has control right, The videophone communication program of the called party b does not ring the bell, does not go through the display of the input request screen and does not go through the input request, permits the communication request, sends a connection approval response, automatically connects, and acquires it by the camera. When the image signal is acquired by the other party, that is, when the image signal is transmitted and the image signal transmitted by the other party is received at the same time, the image signal is displayed on the screen and the videophone communication screen (Sb2: videophone communication screen, FIG. 56) Let
On the other hand, the videophone communication program of the caller party a receives an approval response, and after 5404 and 5409 steps, displays the received image signal on the videophone communication in-progress screen for communication or monitoring (Sb2). When the treatment given to the calling party a is “inquiry every time” (FIGS. 54, 5408, YES), the videophone communication program of the called party b rings the bell, and the input request screen (Sb4: approval inquiry screen: “party” display the message "Are you sure you want to answer?" and inquire the party b of the called party whether or not to connect. At the same time, the caller's videophone communication program displays the other party's approval waiting screen (Sb1: Waiting for approval screen: "Waiting for approval by other party ..."). When the callee b approves the connection (FIGS. 54, 5410, YES), the videophone communication program displays a videophone communication in-progress screen and responds that the caller party a has accepted the connection, and The videophone communication program executed on the terminal of the caller party a determines this response (5409, YES), displays a videophone communication screen, and communicates. If the called party b does not approve the connection (FIGS. 54, 5410, NO), the videophone communication program is waiting for connection (status display: 5501) and the connection is rejected to the videophone communication program of the calling party a. Then, the videophone communication program running on the terminal of the caller party a causes the response to be judged (5409, NO), and the access display is denied on the terminal display of the party a. 55, 5502, 54, 5411) and the connection result are displayed, and then a connection standby screen is displayed to wait for connection (Sb3: connection standby screen, FIG. 55). When the treatment given to the calling party a is “reception automatic refusal” (FIG. 54, 5408, NO), the same processing is performed as when the called party b does not approve the connection.
3: Outline of Flow Next, FIG. 57 shows the flow of establishing a treatment relationship with the other party through the public ID. In order to receive the provision of the communication service of the present invention, the party a first uses the terminal 5701 to log in to the server 5702 via the Internet, and uses the public ID: 200 disclosed by the other party b. A treatment application that expresses an intention to desire communication to b is made (1). The party a who applies for treatment inputs the public ID: 200 of the called party b (FIG. 48, 4801), and at the same time, the party a himself gives the partner b an “inquiry every time” (4808) treatment. The server stores the treatment “every time inquiry” given to the designated partner b by the party a in the treatment relationship master (5703). If the party a does not exist in the caller list of the party b, the first expected treatment of the party b “reception automatic” "Reject" is given to the party a (5704). In this state, the party b can send and communicate with the party a. Cannot communicate in the reverse direction. The called party takes the initiative. The server informs the party a that the application has been accepted by the party a (3), (4). When the party b logs in to the server using the terminal 5705, the party who newly applied for treatment is extracted from the treatment relationship master and notified to the party b (5) to (8). The party a who has applied for treatment in the book is displayed in green and the public name sous of the party a (4705), and the state is disclosed in color and icon according to the information disclosure treatment given to the party b by the other party (4706) ). FIG. 52 displays the detailed information of the party a who sent the treatment application to the party b. The party b examines the application for treatment, and determines the treatment to be given to the partner a (FIGS. 52 and 5201). The treatment “every inquiry” given to the partner a is replaced with the treatment “automatic reception rejection” stored in the server (10). As a result, the parties a and b can send a connection request to the other party of the videophone.

    As described above, the present invention is suitable for a communication method using an electronic device on a communication network.

Claims (104)

  1. A method for performing communication via an electronic secretary system (hereinafter referred to as “electronic secretary”) that supports communication in a telecommunication network, in which the party issues an instruction to the electronic secretary in advance, and the electronic secretary is in accordance with the contents of the instruction of the party. , Processing the communication request, the method comprising: (a) inputting data to construct an instruction file for directing work to the electronic secretary having: (1) a caller ID (caller ID) ) And a first rule set (hereinafter referred to as “first rule set”) described in rules having a condition part having an application condition and an execution part instructing execution of an action corresponding to treatment The first rule is that “when the communication request from the caller is actually received, the ID of the caller detected from the communication request (hereinafter referred to as“ the fact caller ID ”) is In this specification, the first rule is created and added to the first rule set, indicating that the communication request is treated based on the treatment if it matches the caller ID. And (2) presenting information to be presented to the caller, and (b) performing communication using the electronic secretary capable of performing the following operations: how to. (1) The caller's ID is detected from the communication request from the caller, (2) the instruction file is accessed, and (3) the application condition is satisfied for all the rules in the first rule set. And the execution unit of the rule is executed (hereinafter simply referred to as applying a predetermined set of rules), (4) the presentation information is presented to the sender, In response to the communication request, (i) transmitting the communication request to the called party (hereinafter referred to as “communication permission”), and (ii) rejecting the communication request (hereinafter referred to as “reception refusal”). , (Iii) receiving the communication request (hereinafter referred to as “application acceptance”), and a plurality of treatment methods (hereinafter referred to as “treatment set”). How to treat In this specification, unless otherwise specified, the method of treating is referred to as “treatment”, and a method of performing a specific action for a communication request of a specific caller determined by a party. The term “accepting application” means that the caller allows the caller to express his / her desire to communicate, and that the action is able to convey to the callee at least information for identifying the caller The term “communication request”, which cannot achieve the original communication purpose of the caller before presenting information to the caller, receiving the caller's response, and determining that communication can be permitted based on the response, It means the contents of communication that arrived at the electronic secretary before achieving the original purpose of communication.
  2. 2. The method according to claim 1, wherein the instruction file further includes a condition part having an application condition relating to an expected application content and a rule having an execution part instructing execution of an action corresponding to treatment. The second rule set (hereinafter referred to as “second rule set”) and the second rule are: “If the expected application content is detected from the communication request, the communication request is treated based on the treatment. ”, And the acceptance of the application includes the following operations. (A) detecting the expected application content from the communication request; (b) applying the second rule set;
  3. 3. The method according to claim 2, wherein the communication is an e-mail communication, the caller ID is a caller e-mail address, the presentation information includes a description of a condition for receiving an e-mail, and the communication permission treatment. Is to receive an e-mail, the presenting is to reply to the caller, and when the communication request arrives, the electronic secretary first applies the first rule set, and the application condition is If no established rule is found, an application is accepted, and in the step of accepting the application, when applying the second rule set, a rule for which an application condition is established is not found. If the communication request cannot be determined, the communication request is rejected after the presentation information is presented to the caller.
  4. 4. The method according to claim 3, wherein the presentation information to be presented to the caller makes an application for permission for communication, and the presentation information includes at least content that prompts the application content to be described in the subject of the email, An electronic secretary installed on the receiving client side and rejecting the communication request is to send a delete command to the receiving server to delete the e-mail from the receiving server, and the electronic secretary is the receiving server And receiving the header including the subject of the e-mail, applying the first rule set, and accepting the application (the term used in this specification, “Receive “Client” means a device that can collect the recipient's e-mail stored on the server, and “Receiving server” receives and stores the e-mail. If you want to access, it means a device that provides a service to pass the stored e-mail to the recipient).
  5. 4. The method according to claim 3, wherein the presentation information to be presented to the caller makes an application for permission for communication, and the presentation information includes at least content that prompts the application content to be described in the subject of the email, An electronic secretary is installed on the receiving server side, and rejecting the communication request is notifying the occurrence of an error to the sending client of the e-mail and then canceling the communication, and the electronic secretary transmits the communication request Is received to the envelope (envelope) of the e-mail containing the fact sender ID, the first rule set is applied, and a rule satisfying the application condition is not found. Receiving the subject of the e-mail and accepting the application (the term used in this specification, “sending client” is e-mail It means a device to be sent).
  6. 6. The method according to claim 5, wherein the instruction file is further described by a rule having a condition part having application conditions relating to a caller ID and a reception time, and an execution part instructing execution of an action corresponding to treatment. Third rule set (hereinafter referred to as “third rule set”) and (the third rule is “if the factual caller ID detected from the communication request matches the caller ID in the condition part” And, if the predetermined time has not elapsed since the reception time, this means that the communication request is treated based on the treatment "), and the electronic secretary further includes: (A) create the third rule and add it to the third rule set; (b) apply the third rule set; The third rule If the rule for which the application condition is satisfied is not found, the third rule is created based on the fact sender ID, the reception time, and the reception refusal treatment, and the third rule In addition to the set, after a temporary error state is returned to the e-mail sending client, the communication is forcibly stopped by closing the underlying delivery connection; and (b) the application condition is satisfied. If a rule is found, the notification of a permanent error is notified to the e-mail sending client, and communication is officially stopped, and then the rule is deleted from the third rule set. A method characterized in that
  7. 4. The method according to claim 3, wherein the presentation information presented to the caller makes an application for permission for communication, and the presentation information includes at least content that prompts the electronic mail to describe the application content, Is installed on the receiving server side, and rejecting the communication request means notifying the transmission client of the e-mail that an error has occurred and then canceling the communication, and the electronic secretary receives the communication request. When receiving, up to the envelope (envelope) of the e-mail containing the fact sender ID, applying the first rule set, if a rule that satisfies the application condition is not found, Receiving the content of the e-mail and accepting the application;
  8. 4. The method according to claim 3, wherein when the second rule set is applied, when the second rule that satisfies the application condition is found, the treatment of the execution unit of the found second rule is transmitted. A method characterized by giving to a person.
  9. 3. The method according to claim 2, wherein the instruction file further includes a third rule set, and the electronic secretary can further perform the following operations. (A) creating the third rule and adding it to the third rule set; (b) applying the third rule set;
  10. 3. The method according to claim 2, wherein the communication is telephone communication, the presentation information includes an explanation of conditions for receiving the communication, and when the communication request arrives, the electronic secretary first receives the first information. When a rule set is applied and a rule satisfying the application condition is not found, an application is accepted, and in the step of accepting the application, the presentation information is presented to the sender, and the sender If the second rule set is applied and the rule for which the application condition is satisfied is not found, that is, if treatment cannot be determined, the communication request is recorded and communication is rejected. A method of treating the communication request based on a predetermined treatment method (hereinafter referred to as “first expected treatment”).
  11. 11. The method according to claim 10, wherein when the second rule set is applied, when the second rule that satisfies the application condition is found, the treatment of the execution unit of the found second rule is transmitted. A method characterized by giving to a person.
  12. The method according to claim 10, wherein the treatment set permits the communication request, instructs the caller side communication device that the caller has a control right, and does not require the caller to intervene. A method including communication (hereinafter referred to as “control permission”).
  13. The method according to claim 10, wherein the treatment set includes control permission, and when the second rule set is found when applying the second rule set, the second rule found is found. A method of giving the caller the treatment of the execution part of the rule.
  14. 14. The method of claim 13, wherein the party discloses information including his / her ID (identifier), causes the caller to apply for permission to communicate, and the application includes over the Internet, Before issuing the communication request, applying for communication permission to the party and identifying the party using the communication service by ID, and the provider of the communication service uses the ID of the communication service Providing to a party and registering the identity verification information of the party selected from the group consisting of a provider of the communication service and a third party.
  15. 15. The method according to claim 14, wherein the control permission includes a first control permission and a second control permission, and the first control permission is transmitted to the caller of the communication apparatus on the called party side. The second control permission is transmitted to the caller through a communication device on the callee side by a position acquisition unit installed on the callee side. A method of acquiring position information to be acquired (hereinafter referred to as “position acquisition permission”).
  16. 16. The method according to claim 15, wherein the presentation information further includes a question to be presented to the caller, and the expected application content is an answer to the question that has obtained a predetermined total score, and the indication The file further includes a fourth rule set (hereinafter referred to as a rule) having a rule including the question presented to the caller, a condition part having an application condition related to the correct answer of the question, and an action execution part related to scoring. “The fourth rule set”) (the fourth rule represents “if the answer of the question from the sender is correct, the score is counted and the total score is totaled”) And the electronic secretary is further capable of the following operations. (A) presenting the question to the caller; (b) receiving the caller's answer to the question; (c) applying the fourth set of rules.
  17. 3. The method according to claim 2, wherein the treatment set permits the communication request and instructs the caller side communication device that the caller has a control right, without intervening the caller. A method including communication (hereinafter referred to as “control permission”).
  18. 18. The method according to claim 17, wherein the control permission is to cause the caller to transfer information to a communication apparatus on the called party side (hereinafter referred to as “information transfer permission”).
  19. The method according to claim 17, wherein the control permission is a position acquisition permission.
  20. 18. The method according to claim 17, wherein the control permission is a hearing permission.
  21. 18. The method according to claim 17, wherein the control permission causes the caller to acquire an image signal acquired by an imaging device installed on the callee side through the callee side communication device (hereinafter referred to as “monitoring permission”). ).
  22. 3. The method according to claim 2, wherein the input includes one selected from the group consisting of inputting through a network and performing an input operation from a telephone.
  23. The method according to claim 2, wherein the presentation information further includes a question to be presented to the caller, and the expected application content is an answer to the question that has obtained a predetermined total score, and the indication The file further includes a fourth rule set, and the electronic secretary can further perform the following operations. (A) presenting the question to the caller; (b) receiving the caller's answer to the question; (c) applying the fourth set of rules.
  24. 24. The method of claim 23, wherein the presentation information includes information selected from the group consisting of text, sound, and images, and the answer is selected from the group consisting of numbers, text, sounds, and images. A method comprising the steps of:
  25. 3. The method according to claim 2, wherein when the second rule set is applied, when the second rule that satisfies the application condition is found, the treatment of the execution unit of the found second rule is transmitted. A method characterized by giving to a person.
  26. 3. The method according to claim 2, wherein the instruction file is further described by a rule having a condition part having application conditions relating to a callee ID and a call origination time, and an execution part instructing execution of an action corresponding to treatment. And a fifth rule set (hereinafter referred to as “fifth rule set”) and (the fifth rule is “if the destination ID (the ID of the callee) matches the callee ID in the condition part, and The electronic secretary further includes the following operations: “If the predetermined time has not elapsed since the transmission time, the transaction request is treated based on the treatment”) A method characterized in that (A) applying the fifth rule set; (b) sending a communication request to the called party and receiving treatment; (c) creating the fifth rule and adding it to the fifth rule set.
  27. 3. The method according to claim 2, wherein the party discloses information including his / her ID, causes a caller to apply for communication permission, and the application includes performing through the Internet, and the caller requests the communication request. Before applying for permission to apply to the party for permission to communicate.
  28. 28. The method according to claim 27, wherein a communication service provider provides an ID to a party using the communication service, and the party selected from the group consisting of the communication service provider and a third party. A method characterized by registering the identity verification information.
  29. 3. The method according to claim 2, wherein a communication service provider provides an ID to a party using the communication service, and the party selected from the group consisting of the communication service provider and a third party. A method characterized by registering the identity verification information.
  30. 30. The method of claim 29, wherein the provider provides one or more additional IDs separately from the original ID to the party that has already been provided with the original ID.
  31. 3. The method of claim 2, wherein the first party includes first data that includes its identity and at least one first party rule for disclosing the first data. To the server and give the server permission to communicate; and at least one for the second party to disclose the second data including its ID and the second data. Two second party rules are entered into the server and the server is granted the communication permission treatment; and a search request including at least one search criteria is sent to the server; and both parties are A method of receiving data from the server for performing the following processing. (A) The server processes the search request, determines whether the first data satisfies the search criteria, and if the first data satisfies the search criteria, the following processing (1) If the first party rule disclosing the first data of the first party satisfies the first party rule, the first data of the first party is sent to the second party . (2) If the second party rule disclosing the second data of the second party is satisfied, the second data of the second party is sent to the first party.
  32. 32. The method of claim 31, wherein the treatment set includes having a caller act on behalf of the party and give a treatment to a third party (hereinafter referred to as "proxy authorization"). Gives the proxy permission treatment to the server, and the first data further includes a treatment given to the second party to be disclosed the first data, If the first party rule that discloses the first data is satisfied, the server, as the caller, gives the second party the treatment on behalf of the operation of the first party (hereinafter, “ A method characterized by “exchange treatment”.
  33. The method according to claim 1, wherein the treatment set further permits the communication request, instructs the caller side communication device that the caller has control, and intervenes the caller in the caller. A communication method (hereinafter referred to as “control permission”) without communication.
  34. 34. The method according to claim 33, wherein the control permission is to cause the caller to transfer information to the callee communication device (hereinafter referred to as "information transfer permission").
  35. 35. The method according to claim 34, wherein the control permission includes a second control permission, and the second control permission causes the caller to output information through a callee-side communication device, and allows the callee to pay attention. (Hereinafter referred to as “warning permission”), and calling the attention causes the callee side communication device to generate what is selected from the group consisting of voice, light, and vibration. A method characterized by comprising.
  36. 34. The method of claim 33, wherein accepting the application includes recording information for caller identification.
  37. 34. The method according to claim 33, wherein a communication service provider provides an ID to a party using the communication service, and the communication service provider and the third party are selected from the group consisting of the communication service provider and a third party. A method characterized by registering the identity verification information.
  38. 38. The method of claim 37, wherein the provider provides one or more additional IDs separately from the original ID to the party who has already been provided with the original ID, and the party provides his / her ID. Disclosing information, allowing a caller to apply for communication permission, the application including through the Internet, and applying for communication permission to the party before the caller issues the communication request A method characterized by that.
  39. 34. The method according to claim 33, wherein the control permission allows the caller to acquire position information acquired by position acquisition means installed on the callee side through the callee side communication device (hereinafter referred to as “position acquisition permission”). )).
  40. 40. The method according to claim 39, wherein the location information includes a received GPS (Global Positioning System) location signal, location information converted from the received GPS location signal, a current location information of a PHS (Personal handy phone) terminal, and A method comprising: one selected from a group of mobile terminal location information provided based on mobile phone base station location information (hereinafter referred to as “specific location”).
  41. 40. The method according to claim 39, wherein the callee communication device is a mobile communication device (hereinafter referred to as "mobile device"), and the mobile device issues a communication request to a terminal having a pre-registered ID. And detecting the position information and transferring it to the terminal.
  42. 42. The method according to claim 41, wherein the control permission includes information transfer permission and attention permission, and the mobile device issues a communication request to a terminal having a pre-registered ID. The information is transferred to the terminal, and the terminal is further given (a) information transfer permission and (b) attention calling permission, and calling the attention from sound, light, and vibration. Generating at said mobile station what is selected from the group consisting of:
  43. 43. The method according to claim 42, wherein the destination information includes arrival destination information, and the information transferred to the mobile device is selected from the group consisting of map information, recommended route, forward traffic jam information, and detour information. A method comprising the steps of:
  44. 44. The method of claim 43, wherein the location information includes a specific location.
  45. 42. The method according to claim 41, wherein the mobile device transfers the changed location information to the terminal when it detects a location change.
  46. 46. The method of claim 45, wherein the control permission includes a hearing permission.
  47. 34. The method according to claim 33, wherein the control permission is to cause the caller to acquire an audio signal acquired by a transmitter of a communication apparatus on the called party side (hereinafter referred to as "permission for hearing"). how to.
  48. 34. The method according to claim 33, wherein the control permission causes the caller to acquire an image signal acquired by an imaging device installed on the callee side through the callee side communication device (hereinafter referred to as "monitoring permission"). ).
  49. 34. The method of claim 33, wherein the first party includes first data including its ID and at least one first party rule for disclosing the first data, a server system (hereinafter referred to as a server system). To the server and give the server permission to communicate; and at least one for the second party to disclose the second data including its ID and the second data. Two second party rules are entered into the server and the server is granted the communication permission treatment; and a search request including at least one search criteria is sent to the server; and both parties are A method of receiving data from the server for performing the following processing. (A) The server processes the search request, determines whether the first data satisfies the search criteria, and if the first data satisfies the search criteria, the following processing (1) If the first party rule disclosing the first data of the first party satisfies the first party rule, the first data of the first party is sent to the second party . (2) If the second party rule disclosing the second data of the second party is satisfied, the second data of the second party is sent to the first party.
  50. An electronic secretary system that supports communication in a telecommunications network, comprising: (a) means for detecting an ID of the caller from a communication request from the caller; and (b) access means for accessing an instruction file having: , (1) a first rule set, (2) presentation information to be presented to a caller, and (c) find a rule for which an applicable condition is satisfied for all the rules in the first rule set, Means for executing the rule execution unit; (hereinafter simply referred to as means for applying a set of predetermined rules); (d) means for presenting the presentation information to the sender; and (e) each of the communications In response to the request, (1) transmitting the communication request to the called party (hereinafter referred to as “communication permission”), (2) rejecting the communication request (hereinafter referred to as “reception refusal”), (3) Communication required And a means for treating the communication request by selecting one from the treatment set when receiving the communication request, and Means for permitting communication (hereinafter referred to as “communication permitting means”), means for rejecting reception (hereinafter referred to as “reception refusal means”), means for accepting application (hereinafter referred to as “application accepting means”) And a plurality of means for treating corresponding to the treatment set (hereinafter referred to as "treatment means set").
  51. 51. The system according to claim 50, wherein: (a) having an access means for accessing the instruction file having a second rule set; and (b) the application accepting means: (1) expecting from the communication request A system comprising: means for detecting an application content; and (2) means for applying the second rule set.
  52. 52. The system according to claim 51, wherein the communication is an e-mail communication, the caller ID is a caller e-mail address, the presentation information includes a description of a condition for receiving an e-mail, and the communication permission treatment Is a means for receiving an e-mail, the means for presenting is a means for returning to the caller, and means for receiving the communication request and the first rule set are applied, and an application condition is satisfied. If the rule is not found, the application is accepted, and the application accepting means, when applying the second rule set, finds that the rule satisfying the application condition is not found, that is, the treatment cannot be determined. Means for rejecting the communication request after presenting the presentation information to the caller.
  53. 53. The system according to claim 52, wherein the presentation information presented to the caller makes an application for permission for communication, and the presentation information includes at least content that prompts the application content to be described in the subject of the email, Rejecting the communication request means sending a delete command to the receiving server to delete the e-mail from the receiving server, and logging into the receiving server and receiving the header including the subject of the e-mail. And means for applying the first rule set and receiving an application.
  54. 53. The system according to claim 52, wherein the presentation information presented to the caller makes an application for permission for communication, and the presentation information includes at least content that prompts the application content to be described in the subject of the email, Rejecting the communication request is to stop the communication after notifying the sending client of the e-mail that the error has occurred, and when the communication request arrives, the fact sender ID was first included Receive up to the e-mail envelope (envelope), apply the first rule set, and if a rule that satisfies the applicable conditions is not found, receive the subject of the e-mail and accept the application And means for performing.
  55. 55. The system according to claim 54, wherein the instruction file further includes a third rule set, and further includes: (a) creating the third rule; and the third rule set. (B) applying the third rule set; and a means for stopping the following communication. (A) First, the third rule set is applied, and when the rule for which the application condition is satisfied is not found, the third rule is determined based on the fact sender ID, the reception time, and the reception refusal treatment. Creating, in addition to the third rule set, returning a temporary error state to the e-mail sending client and then forcibly terminating communication by closing the underlying delivery connection; (b) When a rule satisfying the application condition is found, the communication client is officially stopped after notifying the e-mail sending client of the occurrence of a permanent error, and then the corresponding rule is added to the third rule set. Delete from.
  56. 53. The system according to claim 52, wherein the presentation information presented to the caller makes an application for permission for communication, and the presentation information includes at least content that prompts the electronic mail to describe the application content, and the communication request Is to notify the transmission client of the e-mail that an error has occurred and then stop communication, and when the communication request is received, first the electronic device including the fact sender ID is included. Means for receiving up to the mail envelope (envelope), applying the first rule set, and receiving the content of the e-mail and accepting the application when no rule satisfying the application condition is found And a system characterized by comprising:
  57. 53. The system according to claim 52, wherein when the second rule set is applied, when the second rule that satisfies the application condition is found, the treatment of the execution unit of the found second rule is transmitted. A system characterized by having means for giving to a person.
  58. 52. The system according to claim 51, wherein the instruction file further includes a third rule set, and further includes means for performing the following operation. (A) creating the third rule and adding it to the third rule set; (b) applying the third rule set;
  59. 52. The system according to claim 51, wherein said communication is telephone communication, said presentation information includes a description of conditions for receiving said communication, and said means for presenting comprises voice, characters, images, and a mixture thereof. A means for transferring one selected from a group, and means for receiving the communication request, means for applying the first rule set, and a rule for which an application condition is satisfied is not found. Accepting the application, that is, presenting the presentation information to the caller, receiving the caller's reaction, and applying the second rule set, the rule for which the application condition is satisfied is not found, That is, when treatment cannot be determined, the communication request is recorded based on a predetermined treatment method including recording the communication request and refusing communication. System which is characterized.
  60. 60. The system according to claim 59, wherein when the second rule set is applied, when the second rule that satisfies the application condition is found, the treatment of the execution unit of the found second rule is transmitted. And a means for giving to a person.
  61. 60. The system according to claim 59, wherein the treatment set includes control permission, and the treatment means set includes means for performing the control permission (hereinafter referred to as "control permission means"). .
  62. 60. The system according to claim 59, wherein when the treatment set includes control permission, the treatment means set includes control permission means, and the second rule set is applied, a second condition is satisfied. And a means for giving the caller the treatment of the execution unit of the found second rule when the rule is found.
  63. 63. The system of claim 62, wherein said party includes means for disclosing information including its ID (identifier), means for causing a caller to apply for permission to communicate, and said application includes through the Internet, Before the caller issues the communication request, a means for applying communication permission to the party (hereinafter referred to as “preliminary application means”) and a party using the communication service are identified by ID, and the communication service A provider provides an ID to a party who uses the communication service, and a member selected from the group consisting of the provider of the communication service and a third party registers the identity verification information of the party; A system characterized by that.
  64. The system according to claim 63, wherein the control permission includes a first control permission and a second control permission, the first control permission is a hearing permission, and the second control permission is: The caller is caused to acquire position information acquired by a position acquisition unit installed on the callee side through a communication device on the callee side (hereinafter referred to as “location acquisition permission”), and the control permission unit includes: Control permission means and second control permission means, the first control permission means is means for permitting the hearing (hereinafter referred to as “hearing permission means”), and the second control permission means is A system for permitting position acquisition (hereinafter referred to as “position acquisition permission means”).
  65. The system according to claim 64, wherein the presentation information further includes a question to be presented to the caller, and the expected application content is an answer to the question that has obtained a predetermined total score, and the indication The file further includes a fourth rule set, and further includes means for performing the following operations. (A) presenting the question to the caller; (b) receiving the caller's answer to the question; (c) applying the fourth set of rules.
  66. 52. The system according to claim 51, wherein the treatment set permits the communication request, instructs the caller side communication device that the caller has control, and does not require the caller to intervene. Communication system (hereinafter referred to as “control permission”), and the treatment means set includes means for performing the control permission (hereinafter referred to as “control permission means”).
  67. 67. The system according to claim 66, wherein the control permission is to cause the caller to transfer information to the callee communication device (hereinafter referred to as “information transfer permission”), and the control permission means includes the information transfer A system which is a means for performing permission (hereinafter referred to as “information transfer permission means”).
  68. 68. The system according to claim 66, wherein the control permission is a position acquisition permission, and the control permission means is a position acquisition permission means.
  69. The system according to claim 66, wherein the control permission is a hearing permission, and the control permission means is a hearing permission means.
  70. 70. The system according to claim 66, wherein the control permission allows the caller to acquire an image signal acquired by an imaging device installed on the callee side through the callee side communication device (hereinafter referred to as “monitoring permission”). The control permission unit is a unit that performs the monitoring permission.
  71. 52. The system according to claim 51, wherein the access means is means for accessing through a network.
  72. 52. The system according to claim 51, wherein the presentation information further includes a question to be presented to the caller, and the expected application content is an answer to the question that has obtained a predetermined total score, and the indication The file further includes a fourth rule set, and further includes means for performing the following operations. (A) presenting the question to the caller; (b) receiving the caller's answer to the question; (c) applying the fourth set of rules.
  73. The system according to claim 72, wherein the presentation information includes information selected from a group consisting of text, sound, and an image, and the answer is selected from a group consisting of a number, text, sound, and an image. And the means for presenting the presentation information to the sender includes a text output means, a sound file reproduction means, a text-to-speech synthesis means for converting a text string into speech, and an image signal output means. The system for detecting the contents of the application includes a means for recognizing what is selected from the group consisting of a number, text, sound, and an image.
  74. 52. The system according to claim 51, wherein when the second rule set is applied, when a second rule that satisfies the application condition is found, the treatment of the execution unit of the found second rule is transmitted. And a means for giving to a person.
  75. 52. The system of claim 51, wherein the instruction file further includes a fifth rule set, means for applying the fifth rule set, means for sending a communication request to a callee and receiving treatment, Means for creating the fifth rule and adding it to the fifth rule set.
  76. 52. The system according to claim 51, wherein the party discloses information including his / her ID, causes a caller to apply for communication permission, and the application includes through the Internet, wherein the caller requests the communication request. Means for applying to the parties for permission to communicate before issuing the service.
  77. 77. The system of claim 76, wherein a communication service provider provides an ID to a party using the communication service, and the party selected from the group consisting of the communication service provider and a third party. And means for registering the identity confirmation information.
  78. 52. The system according to claim 51, wherein a communication service provider provides an ID to a party using the communication service, and the party selected from the group consisting of the communication service provider and a third party. And means for registering the identity confirmation information.
  79. 79. The system according to claim 78, wherein the provider provides one or more additional IDs (hereinafter referred to as "additional ID providing means") to the party who has already been provided with the original ID, in addition to the original ID. ").
  80. 52. The system of claim 51, wherein the first party includes first data including its ID, and at least one first party rule for disclosing the first data. Means for providing to the server the communication permission treatment; and a second party including at least a second data including its own ID and at least the second data to disclose the second data. Means for inputting a second party rule to the server, providing the server with the communication permission treatment, and transmitting a search request including at least one search criteria to the server; and both Means for receiving data from the server having means for a party to perform the following processing: (A) The server processes the search request, determines whether the first data satisfies the search criteria, and if the first data satisfies the search criteria, the following processing (1) If the first party rule disclosing the first data of the first party satisfies the first party rule, the first data of the first party is sent to the second party . (2) If the second party rule disclosing the second data of the second party is satisfied, the second data of the second party is sent to the first party.
  81. The system according to claim 80, wherein the treatment set includes proxy permission, the treatment means set includes means for performing the proxy permission (hereinafter referred to as "proxy permission means"), and the first party Giving the proxy permission treatment to a server, and the first data further includes a treatment given to the second party to which the first data is disclosed, wherein the first data of the first party If the server satisfies the first party rule that discloses the data of the first party, the server acts as the caller on behalf of the operation of the first party to give the second party the treatment (hereinafter referred to as “treatment exchange”). Means)).
  82. 51. The system according to claim 50, wherein the treatment set further permits the communication request to instruct the callee communication device that the caller has a control right, and intervenes the caller in the caller. Communication system (hereinafter referred to as “control permission”), and the treatment means set includes means for performing the control permission (hereinafter referred to as “control permission means”).
  83. 83. The system according to claim 82, wherein the control permission is to cause the caller to transfer information to the callee communication device (hereinafter referred to as "information transfer permission"), and the control permission means includes the information transfer A system which is a means for performing permission (hereinafter referred to as “information transfer permission means”).
  84. 84. The system of claim 83, wherein the control permission is a second control permission, the second control permission is an alert permission, and the alerting is a voice, light, and Including causing the callee communication device to generate what is selected from the group consisting of vibrations, wherein the control permission means includes a second control permission means, and the second control permission means includes the outgoing call A system that causes a caller to output information through a callee-side communication device to call the callee's attention (hereinafter referred to as “attention call permission means”).
  85. 83. The system according to claim 82, wherein the application acceptance includes means for recording information for identifying a caller and recording information for identifying the caller.
  86. 83. The system according to claim 82, wherein a communication service provider provides an ID to a party using the communication service, and the party is selected from the group consisting of the communication service provider and a third party. And means for registering the identity confirmation information.
  87. The system according to claim 86, further comprising additional ID providing means and prior application means.
  88. 83. The system according to claim 82, wherein the control permission allows the caller to acquire position information acquired by position acquisition means installed on the callee side through the callee side communication device (hereinafter referred to as “position acquisition permission”). And the control permission means is means for permitting the position acquisition (hereinafter referred to as “position acquisition permission means”).
  89. The system according to claim 88, wherein the location information includes a received GPS (Global Positioning System) location signal, location information converted from the received GPS location signal, a current location information of a PHS (Personal handy phone) terminal, and A system including one selected from a group of mobile terminal location information provided based on mobile phone base station location information (hereinafter referred to as “specific location”).
  90. 90. The system according to claim 88, wherein the receiver communication device is a mobile device, and the mobile device detects the location information when issuing a communication request to a terminal having a pre-registered ID. Means for transferring to the terminal.
  91. The system according to claim 90, wherein the control permission includes information transfer permission and attention calling permission, and the treatment means set includes information transfer permission means and attention calling permission means, and the movement When the machine issues a communication request to a terminal having a pre-registered ID, the purpose information is transferred to the terminal, and (a) information transfer permission and (b) alerting permission are further transmitted to the terminal. The system for giving a treatment and the arousing the attention includes causing the mobile device to generate what is selected from the group consisting of voice, light, and vibration.
  92. 92. The system according to claim 91, wherein the destination information includes arrival destination information, and the information to be transferred to the mobile device is selected from the group consisting of map information, recommended route, forward traffic jam information, and detour information. A system characterized by including.
  93. 94. The system according to claim 92, wherein the position information includes a specific position.
  94. The system according to claim 90, further comprising means for transferring the changed position information to the terminal when the mobile device detects a change in position.
  95. 95. The system according to claim 94, wherein the control permission is a hearing permission, and the control permission means is a hearing permission means.
  96. 83. The system according to claim 82, wherein the control permission is to cause the caller to acquire an audio signal acquired by a transmitter of a communication device on the called party side (hereinafter referred to as “listening permission”). The means is a means for permitting the hearing (hereinafter referred to as “hearing permission means”).
  97. 83. The system according to claim 82, wherein the control permission causes the caller to acquire an image signal acquired by an imaging device installed on the callee side through the callee side communication device (hereinafter referred to as "monitoring permission"). The control permission unit is a unit that performs the monitoring permission.
  98. 83. The system of claim 82, wherein the first party includes first data that includes its identity and at least one first party rule for disclosing the first data. Means for providing to the server the communication permission treatment; and a second party including at least a second data including its own ID and at least the second data to disclose the second data. Means for inputting a second party rule to the server, providing the server with the communication permission treatment, and transmitting a search request including at least one search criteria to the server; and both Means for receiving data from the server having means for a party to perform the following processing: (A) The server processes the search request, determines whether the first data satisfies the search criteria, and if the first data satisfies the search criteria, the following processing (1) If the first party rule disclosing the first data of the first party satisfies the first party rule, the first data of the first party is sent to the second party . (2) If the second party rule disclosing the second data of the second party is satisfied, the second data of the second party is sent to the first party.
  99. In the method of sending e-mail, the e-mail constitutes an entity with an envelope and content, the content has two parts, a header and a body, and the envelope has any information necessary to accomplish transmission and delivery. The content includes an object to be delivered to the recipient, the header is a sequence of strings according to a special syntax defined in the standard, and the body is a sequence of characters following the header. And the e-mail is transmitted to the receiving server in the order of the envelope, the header, and the body, and the authorization to transmit the body is determined based on the information included in the header, before the body is transmitted. The receiving server includes a step of checking whether the receiving server is authorized. And the envelope, on the basis of the received information before receiving the body, wherein the determining whether to authorize the transmission of the body.
  100. In the method of sending e-mail, the e-mail constitutes an entity with an envelope and content, the content has two parts, a header and a body, and the envelope has any information necessary to accomplish transmission and delivery. The content includes an object to be delivered to the recipient, the header is a sequence of strings according to a special syntax defined in the standard, and the body is a sequence of characters following the header. And the e-mail is transmitted to the receiving server in the order of the envelope, the header, and the body, and the authorization to transmit the body is determined based on the information included in the header, before the body is transmitted. Includes a means for checking whether or not it is authorized. And Beropu, based on the received information before receiving the body, the system and determining whether to authorize the transmission of the body.
  101. 26. The method according to claim 25, wherein the treatment is given to the caller when a predetermined storage condition is satisfied.
  102. 75. The system according to claim 74, further comprising means for giving the treatment to the caller when a predetermined storage condition is satisfied.
  103. The method according to claim 1, wherein the communication is telephone communication, the presentation information includes at least response guidance, and presenting the presentation information to the caller is performed with respect to the caller's telephone. Sending presentation information, wherein accepting the application includes recording the caller's response.
  104. 51. The system according to claim 50, wherein the communication is telephone communication, the presentation information includes at least response guidance, and the means for presenting the presentation information to the caller is configured with respect to the caller telephone. A method for sending presentation information, wherein the application receiving means includes means for recording a response of the caller.
JP2005504876A 2003-02-10 2004-02-05 Communication method and communication system led by called party Granted JPWO2004070614A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2003070953 2003-02-10
JP2003070953 2003-02-10
JPPCT/JP03/12014 2003-09-19
PCT/JP2003/012014 WO2004082251A1 (en) 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program
PCT/JP2004/001182 WO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system in which called person has the initiative

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004230357A JP2006215590A (en) 2003-09-19 2004-08-06 Communication method and communication system by initiative of addressee

Publications (1)

Publication Number Publication Date
JPWO2004070614A1 true JPWO2004070614A1 (en) 2006-05-25

Family

ID=32844563

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2005504876A Granted JPWO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system led by called party

Country Status (3)

Country Link
JP (1) JPWO2004070614A1 (en)
AU (1) AU2003266549A1 (en)
WO (2) WO2004082251A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4543854B2 (en) * 2004-09-24 2010-09-15 富士ゼロックス株式会社 Printing system and control method thereof
JP4580231B2 (en) * 2004-12-28 2010-11-10 日本電信電話株式会社 Reception control device
EP1967956A4 (en) * 2005-12-28 2010-09-29 Fujitsu Ltd Information processing device, information processing method and program
US20070165811A1 (en) * 2006-01-19 2007-07-19 John Reumann System and method for spam detection
JP4636562B2 (en) * 2006-10-16 2011-02-23 富士通株式会社 Call control system, communication terminal, scale value data storage device, and program
JP2008139926A (en) 2006-11-30 2008-06-19 Database Consultants Corp Email server apparatus and email server program
JP5417914B2 (en) * 2009-03-16 2014-02-19 ヤマハ株式会社 Relay device and program
JP2013157718A (en) * 2012-01-27 2013-08-15 Nippon Telegr & Teleph Corp <Ntt> Videophone device, display screen switch method of the same, and program

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001217861A (en) * 2000-01-31 2001-08-10 Kddi Corp Prankster prevention system and mail center system
JP2002290566A (en) * 2001-03-27 2002-10-04 Nippon Telegraph & Telephone East Corp Terminating call selecting system
JP2002374307A (en) * 2001-06-18 2002-12-26 Canon Inc Mail server, client device, method of controlling them, electronic mail system, program and storage medium
JP2003036230A (en) * 2001-07-23 2003-02-07 Kobo Itonaga Proper communication method and device for e-mail and the like
JP3665009B2 (en) * 2001-11-01 2005-06-29 株式会社エヌ・ティ・ティ・ドコモ Mail delivery control method and apparatus, and wireless communication system
KR100472441B1 (en) * 2002-01-11 2005-03-08 삼성전자주식회사 Method of receiving selected mail at internet mail device
JP2003333097A (en) * 2002-05-13 2003-11-21 Fujitsu Ltd Mail server, personal terminal and mail receiving system

Also Published As

Publication number Publication date
WO2004070614A1 (en) 2004-08-19
WO2004070614B1 (en) 2004-11-11
WO2004082251A1 (en) 2004-09-23
AU2003266549A1 (en) 2004-09-30

Similar Documents

Publication Publication Date Title
US9948772B2 (en) Configurable phone with interactive voice response engine
US10237356B2 (en) Identity management and service access for local user group based on network-resident user profiles
US9967381B1 (en) Virtual telephony assistant
US9866685B2 (en) Caller ID surfing
US9692891B1 (en) Methods and systems for blocking unwanted communications
US8982877B2 (en) Provision of telephony caller ID service via common instant communications clients
US8428228B1 (en) Unified communication system
US9204268B2 (en) Systems and processes to manage multiple modes of communication
US8325900B2 (en) Telephone call classification utilizing a social network graph
US7987236B2 (en) Recipient control of source audio identifiers for digital communications
US6768792B2 (en) Identifying call parties to a call to an incoming calling party
US7068768B2 (en) Method for populating a caller&#39;s information to a host-based address book
CA2256289C (en) System and method for managing incoming communication events using multiple media options
US7949105B2 (en) Method and system for multimodal presence detection
US7734709B2 (en) Controlling computer response message traffic
JP5615922B2 (en) Mashups and presence found on the phone
US7702792B2 (en) Method and system for managing communication sessions between a text-based and a voice-based client
US7133687B1 (en) Delivery of voice data from multimedia messaging service messages
US7493381B2 (en) System and method for providing a service
EP2098050B1 (en) Virtual contact center with dynamic routing
JP5416877B2 (en) Existence management system, multiple access network, and processing method
US7251495B2 (en) Command based group SMS with mobile message receiver and server
US8195137B2 (en) Updating contact information for mobile traffic
US7277697B2 (en) Method and system for establishing a teleconference over a telephony network
US7860524B2 (en) Method of push-to-talk service