WO2001050682A1 - Communication utilisant des numeros de telephone virtuels - Google Patents

Communication utilisant des numeros de telephone virtuels Download PDF

Info

Publication number
WO2001050682A1
WO2001050682A1 PCT/IL2000/000810 IL0000810W WO0150682A1 WO 2001050682 A1 WO2001050682 A1 WO 2001050682A1 IL 0000810 W IL0000810 W IL 0000810W WO 0150682 A1 WO0150682 A1 WO 0150682A1
Authority
WO
WIPO (PCT)
Prior art keywords
party
communication channel
communication
channel
server
Prior art date
Application number
PCT/IL2000/000810
Other languages
English (en)
Inventor
Yoram Solberg
Arie Barlin
Original Assignee
Amigochat Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Amigochat Inc. filed Critical Amigochat Inc.
Priority to AU17291/01A priority Critical patent/AU1729101A/en
Priority to IL14455000A priority patent/IL144550A/xx
Publication of WO2001050682A1 publication Critical patent/WO2001050682A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/401Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/45Aspects of automatic or semi-automatic exchanges related to voicemail messaging
    • H04M2203/4536Voicemail combined with text-based messaging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/12Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13034A/D conversion, code compression/expansion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13091CLI, identification of calling line
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13093Personal computer, PC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13095PIN / Access code, authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13103Memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13109Initializing, personal profile
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1313Metering, billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13175Graphical user interface [GUI], WWW interface, visual indication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13204Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13339Ciphering, encryption, security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13377Recorded announcement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13389LAN, internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13399Virtual channel/circuits

Definitions

  • This invention relates to a technique of anonymous communication over a public telephone network. More particularly this invention relates to a technique for reestablishing anonymous telephone communication between parties who have previously communicated anonymously using another technique.
  • U.S. Patent No. 5,818,836 proposes an anonymous voice sys- tern which can establish an anonymous telephone communication through a circuit switched network (CSN) .
  • CSN circuit switched network
  • two parties place separate telephone calls to the anonymous voice system through the CSN.
  • the parties then enter matchcodes through their telephone keypads.
  • the anonymous voice system compares the matchcodes entered by the parties and connects the telephone calls if the matchcodes match.
  • the system may include an on-line data service that establishes electronic communication between the parties through corresponding data terminals.
  • the data terminals may have resident anonymous voice input commands that can be selected by the parties.
  • the on-line data service transmits a connect command to the anonymous voice system which dials the two parties, or waits for the parties to dial the system, and then connects the parties.
  • the system also stores a couple record during the first anonymous call recording the matchcode and the telephone numbers of both parties .
  • This system is not easily scalable to mass use by internet participants. Its reliance upon the participants to select a matchcode virtually guarantees matchcode conflicts, and risks a r ⁇ isconnection.
  • the system attempts to reduce this risk by relying on automatic number identification (ANI) to obtain the caller's telephone number.
  • ANI automatic number identification
  • the participants are identified using both the chosen matchcode and the ANI.
  • This arrangement requires a record of the participants' telephone numbers to be maintained, and telephone access to the system is limited to the particular telephone numbers which were used to create the system's database entries. If multiple parties are involved, then each must return to the telephone which was entered into the system's database record before a connection can be established.
  • the telephones must all be identifiable using ANI, which is not universal. For example a subscriber can disable the ANI feature from his telephone.
  • agent which provides a virtual telephone number switchboard service to the parties.
  • the agent is particularly adapted for use over a data network, which may be the Internet .
  • the agent provides software modules which can be integrated with web browsers and similar communication equipment.
  • One or all of the parties desiring to establish subsequent anonymous communication select a Virtual Tele ⁇ phone Number (VTN) icon on the web page of a chat site or on the browser which connects them to the chat server.
  • VTN Virtual Tele ⁇ phone Number
  • the chat server sends a request to a VTN server for a VTN "box number", which is analogous to a telephone extension number.
  • the VTN server generates a single-use VTN box number, which is not currently in use in the VTN system.
  • the sin- gle-use VTN box number is stored within the VTN server's switchboard database.
  • the VTN server provides all the chatters the telephone number of the VTN call center switchboard (the VTN PSTN) , and the single-use VTN box number for use upon reaching the switchboard.
  • the chatting parties may optionally disconnect from the internet chat server, and within a mutually agreed upon time window, call the VTN call center switchboard, and enter the single-use VTN box number.
  • the chatting parties may remain connected to the internet chat server, and continue their vocal conversation by internet-based vocal technologies, for example voice-over-IP.
  • the chatting parties can enter their single-use VTN box number by providing the information to a human operator, or preferably by keypad entry, using known tone-dial technology.
  • the VTN call center switchboard then connects all participants who entered the assigned single-use VTN box number on the same telephone line.
  • the box After the parties have disconnected from the VTN box number, the box is closed and deleted from the VTN server's switchboard database, and its space is released for formation of a new single-use VTN box number in order to service new participants. Moreover, if there is no entry to the VTN box, it will be automatically deleted after a predetermined time-out interval.
  • the VTN call center switchboard may have many open boxes at a given time.
  • At least one of the chat participants subscribes to the virtual telephone number service at a VTN web site by providing an actual telephone number (PSTN or MP) , but does not provide any other personal details.
  • the subscriber receives a unique personal identification number (PIN) for identification when he uses the VTN service.
  • the subscriber may download client software to his personal computer, which includes a PIN.
  • the PIN is automatically transmitted to the VTN server whenever he engages the VTN icon in his internet browser or on the web page of the chat site.
  • the VTN server and VTN call center switchboard can be located in a common telephone center, or can be geographically distributed in many telephone centers under central synchronization control. They can also be located at the site of the chat server, or within public telecommunica- tions systems.
  • a first chatter who has previously subscribed to the VTN service, may receive the single-use VTN box number and the telephone number of the VTN call center switchboard, and co - municate these to a second chatter manually, or via the chatting server.
  • the second chatter then accesses the VTN call center switchboard and enters the single-use VTN box number.
  • the VTN call center switchboard looks up the actual telephone number of the first chatter, and establishes an active tele- phone connection between the two chatters. Neither the subscriber nor the second chatter, who need not be a subscriber, has revealed his telephone number to the other. Subsequent telephonic sessions can be established between the two chatters by repeating the above-described procedure, using a new single-use VTN box number.
  • the VTN call center switchboard calls the participants. Prior to their usage of the system, the participants must register and provide some information, for example their actual telephone numbers. They then receive a password and PIN number. After they schedule a meeting with one another as described above, companion, they both engage an icon on the chat site web page, or their internet browsers, after which they are each requested them to enter their respective passwords and PIN numbers.
  • the VTN call center switchboard then calls each of them at their pre-registered telephone number and establishes a connection between the two telephone lines. The connection can be established immediately, or at a scheduled time.
  • a first party participant who has previously subscribed to VTN services in the manner given above, contacts the VTN call center switchboard.
  • a first party may desire to sell his car, but does not wish to reveal his actual telephone number.
  • the first party contacts the VTN call center switchboard by any suitable method, identifies himself using his password and PIN, and requests a code identifier.
  • the first party publicizes the code and invites offers .
  • the call is forwarded to the pre-registered telephone number of the first party.
  • the first party can define conditions for the telephone connection, for example permissible times for receiving forwarded telephone calls from the second party.
  • a plurality of partici- pants call a telephone community, which is realized as a central telephone switchboard.
  • the participants are presented with a list of currently available chat rooms, each dealing with an assigned topic.
  • chat rooms can be created, either by the community administration, or by chatters themselves.
  • the switchboard is accessible by normal telephonic communication, or via an internet VTN web site.
  • Currently available chat rooms are made known by any public medium, e.g., television, radio, the community web sites, or other internet sites.
  • the geographical location of the community switch- boards may be presented.
  • the telephone chat room is open to a limited number of participants.
  • Supervision of the chat form is accomplished by a system administrator, which may be a human, or a computer-controlled device, following a set of predetermined rules.
  • the ad- ministrator may govern who will speak at a given moment, and for how long. Chatters may move among chat rooms as they wish, and may elect to chat privately with particular co-participants in the chat.
  • the invention provides a method for establishing an anonymous communications channel between two parties, which comprises receiving a first communication from a first party on a first communication channel, and responsive to the first communication, generating a transaction identifier.
  • the method further comprises memorizing the transaction identifier, communicating the transaction identifier to the first party, and thereafter accepting a second communication from one of the first party and a second party on a second communication channel. While maintaining the second communication channel the method further comprises authenticating the one party according to the transaction identifier, receiving a third communication from the other party on a third communication channel, authenticating the other party according to the transaction identifier, and connecting the second communication channel with the third communication channel to enable the first party to communicate with the second party.
  • the first communication channel is established via an internet.
  • At least one of the second communication channel and the third communication channel is a telephonic channel.
  • the method includes the step of invalidating the transaction identifier subsequent to performing the step of connecting the second communication channel with the third communication channel .
  • the step of communicating the transaction identifier to the first party also includes providing a telephone number to the first party.
  • the second communication and the third communication are telephonic, and are directed to the telephone number.
  • the telephone number includes a first telephone number that is ac- Completed in the step of accepting the second communication and a second telephone number that is accessed in the step of accepting the third communication.
  • At least one of the first communication, the second communication, and the third communication is effected using a voice over IP protocol.
  • the method further includes determining whether the first party has attempted the first communication more frequently than a predetermined rate, and if so, disconnecting from the first communication channel.
  • Another aspect of the invention includes determining whether at least one of the first party and the second party has attempted the second communication more frequently than a predetermined rate, and if so, disconnecting from the second communication channel.
  • An aspect of the invention includes communicating on the second communication channel a first set of identifiers to the one party, wherein members of the first set correspond to parties who are currently available for connection with the one party, receiving via the second communication channel a second set of identifiers from the one party, wherein the sec ⁇ ond set includes at least a subset of the first set, and connecting the one party with members of the second set.
  • An additional aspect of the invention includes receiving in the second communication a first set of identifiers from the one party, communicating on the second communication channel a second set of identifiers to the one party, wherein the second set includes at least a subset of the first set, and wherein members of the second set correspond to parties who are currently available for connection with the one party, receiving via the second communication channel a third set of identifiers from the one party, wherein the third set includes at least a subset of the second set, and connecting the one party with members of the third set.
  • the first party communicates via a first online data service
  • the second party communicates via a second online data service.
  • the invention provides a computer software product, comprising a computer-readable medium in which computer program instructions are stored, which instructions, when read by a computer, cause the computer to perform the steps of receiving a first communication from a first party on a first communication channel, responsive to the first communication generating a transaction identifier, memorizing the transaction identi- bomb, communicating the transaction identifier to the first party, thereafter accepting a second communication from one of the first party and a second party on a second communication channel, and while maintaining the second communication channel, authenticating the one party according to the transaction identifier, receiving a third communication from the other party on a third communication channel, authenticating the other party according to the transaction identifier, and connecting the second communication channel with the third communication channel to enable the first party to communicate with the second party.
  • the com ⁇ puter further performs the step of invalidating the transaction identifier subsequent to performing the step of connect- ing the second communication channel with the third communication channel .
  • the computer further performs the steps of determining whether the first party has attempted the first communication more frequently than a predetermined rate, and if so, then disconnecting from the first communication channel.
  • the computer further performs the steps of determining whether at least one of the first party and the second party has attempted the second communication more frequently than a predetermined rate, and if so, disconnecting from the second communication channel.
  • the computer further perform the steps of communicating on the second com- munication channel a first set of identifiers to the one party, wherein members of the first set correspond to parties who are currently available for connection with the one party, receiving via the second communication channel a second set of identifiers from the one party, wherein the second set in- eludes at least a subset of the first set, and connecting the one party with members of the second set.
  • the computer further receives in the second communication a first set of identifiers from the one party.
  • the computer communicates on the second communication channel a second set of identifiers to the one party, wherein the second set includes at least a subset of the first set, and wherein members of the second set correspond to parties who are currently available for connection with the one party, receives via the second communica- tion channel a third set of identifiers from the one party, wherein the third set includes at least a subset of the second set, and connects the one party with members of the third set.
  • the invention provides a method for establishing an anonymous communications channel between two parties, comprising the steps of identifying a first party, memorizing identification information concerning the first party, establishing a criterion for establishing a connection between the first party and a second party, generating a transaction identifier, memorizing the transaction identifier, communicating the transaction identifier to the first party, thereafter accepting a first communication from the second party on a first communication channel, and while maintaining the first communication channel, authenticating the second party according to the transaction identifier, verifying compliance of the second party with the criterion, responsive to the step of verifying, establishing a second communication channel with the first party according to the identification information, and connecting the second communication channel with the first commu- nication channel to enable the first party to establish a second communication with the second party.
  • the first communication channel is established via an internet.
  • At least one of the first communication channel and the second communication channel is a telephonic channel.
  • At least one of the first communication channel and the second communication channel is effected using a voice over IP pro- tocol.
  • At least one of the first communication channel and the second communication channel is effected using a wireless device.
  • Another aspect of the invention includes determining whether the second party has attempted the first communication more frequently than a predetermined rate, and, responsive to the step of determining, disconnecting from the first communication channel .
  • the first party communicates via a first online data service
  • the second party communicates via a second online data service.
  • the invention provides a computer software product, com- prising a computer-readable medium in which computer program instructions are stored, which instructions, when read by a computer, cause the computer to perform the steps of identifying a first party, memorizing identification information concerning the first party, memorizing a criterion for establish- ing a connection between the first party and a second party, generating a transaction identifier, memorizing the transaction identifier, communicating the transaction identifier to the first party, thereafter accepting a first communication from the second party on a first communication channel, and while maintaining the first communication channel authenticating the second party according to the transaction identifier, verifying compliance of the second party with the criterion, responsive to the step of verifying, establishing a second communication channel with the first party according to the identification information, and connecting the second communication channel with the first communication channel to enable the first party to establish a second communication with the second party.
  • the first commu- nication channel is established via an internet.
  • At least one of the first communication channel and the second communication channel is a telephonic channel.
  • At least one of the first communication channel and the second communication channel is effected using a voice over IP protocol.
  • At least one of the first communication channel and the second communication channel is effected using a wireless device.
  • the first party communicates via a first online data service
  • the second party communicates via a second online data service.
  • the invention provides a computer implemented communications system, comprising an interactive voice response machine, a server linked to the interactive voice response machine and to a data network, the server has computer instructions installed therein, which instructions, when read by a computer in the server, cause the server to perform the steps of receiving a first communication from a first party via the data network on a first communication channel, responsive to the first communication, generating a transaction identifier, memorizing the transaction identifier, communicating the transaction identifier to the first party, wherein the interactive voice response machine receives a second communication from one of the first party and a second party on a second communication channel comprising a first one of the lines, and while maintaining the second communication channel the inter- active voice response machine receives a third communication from another of the first party and the second party on a third communication channel comprising a second one of the lines.
  • a database application of the server authenticates the first party and the second party according to the transaction identifier, and responsive to a signal from the server the interactive voice response machine connects the second communication channel with the third communication channel to enable the first party to communicate with the second party.
  • a telephonic switch has a plurality of lines connected to a public network linked to the server, wherein the telephonic switch is interposed in a connection between the second communication channel and the third communication channel.
  • the data network is an internet.
  • the server further performs the step of invalidating the transaction identi- bomb subsequent to performing the step of connecting the second communication channel with the third communication channel .
  • the server further perform the steps of determining whether the first party has attempted the first communication more frequently than a predetermined rate, and if so, disconnecting from the first communication channel.
  • the server further performs the steps of determining whether at least one of the first party and the second party has attempted the second communication more frequently than a predetermined rate, and if so disconnecting from the second communication channel.
  • the server further performs the steps of communicating on the sec- ond communication channel a first set of identifiers to the one party, wherein members of the first set correspond to parties who are currently available for connection with the one party, receiving via the second communication channel a second set of identifiers from the one party, wherein the second set includes at least a subset of the first set, and connecting the one party with members of the second set.
  • the server further perform the steps of in the second communication, receiving a first set of identifiers from the one party, communicating on the second communication channel a second set of identifiers to the one party, wherein the second set includes at least a subset of the first set, and wherein members of the second set correspond to parties who are currently available for connection with the one party, receiving via the second communication channel a third set of identifiers from the one party, wherein the third set includes at least a sub- set of the second set, and connecting the one party with members of the third set.
  • the invention provides a computer implemented communications system, comprising a telephonic switch has a plurality of lines connected to a public network, an interactive voice response machine connected to the telephonic switch, a server linked to the interactive voice response machine, to the telephonic switch and to a data network, the server has computer instructions installed therein, which instructions, when read by a computer in the server, cause the server to perform the steps of identifying a first party, memorizing identification information concerning the first party, memorizing a criterion for establishing a connection between the first party and a second party, generating a transaction identifier, memorizing the transaction identifier, communicating the transaction identifier to the first party, wherein the telephonic switch accepts a first communication from the second party on a first communication channel comprising a first one of the lines, and while maintaining the first communication channel the server authenticates the second party according to the transaction identifier, verifies compliance of the second party with the criterion, and responsive to the step of verifying, establishes a
  • the data network is an internet.
  • At least one of the first communication channel and the second communication channel is effected using a wireless device.
  • At least one of the first communication channel and the second communication channel is effected using a voice over IP protocol .
  • the server further perform the steps of determining whether at least one of the first party and the second party has attempted the second communication more frequently than a predetermined rate, and if so, disconnecting from the second communication channel.
  • the telephonic switch is connected to a plurality of on-line data services, wherein the first communication channel is established via a first one of the on-line data services and the second communication channel is established via a second one of the on-line data services.
  • Fig. 1 is a diagram illustrating the architecture of a system in accordance with a preferred embodiment of the invention
  • Fig. 2 is a block diagram of a server in the embodiment illustrated in Fig. 1;
  • Fig. 3 is a diagram illustrating the architecture of a system similar to Fig. 1 that is adapted for operation in a passive mode;
  • Fig. 4 is a flow chart illustrating the operation of the embodiment of Fig. 3 in a passive mode
  • Fig. 5 is a flow chart illustrating the operation of the embodiment of Fig. 1 in an active mode
  • the system 10 is connected to a plurality of telephone lines 12, preferably the telephone lines 12 number between 30 - 120, and are provided by any convenient carrier 14.
  • the telephone lines 12 feed into a telephone switch 16 of known type, which is ca- pable of handling calls on all the telephone lines 12 simultaneously.
  • the telephone switch 16 is linked bidirectionally to an interactive voice response machine 18 (I R) , which accepts calls arriving on the telephone lines 12, and receives the secret code, preferably using the well known dual tone multifre- quency (DTMF) interactive voice response protocol.
  • I R interactive voice response machine 18
  • a plurality of parties 20, 22 communicate with the carrier 14 using telephone instruments 24.
  • the parties 20, 22 inform the interactive voice response machine 18 of their assigned matchcodes.
  • the interactive voice response machine 18 confirms identity of matchcodes among a plurality of parties, including the parties 20, 22, who are accessing the system 10 using the telephone lines 12 at a given time.
  • the interactive voice re- sponse machine 18 is also linked via a data network 26, which may be the Internet, and is linked to a server 28 that hosts a web site of an agent that communicates with the holds a homepage, and communicates with the parties 20, 22 in a web session and also maintains a database of activity, which is pref- erably an SQL database.
  • the system 10 in the currently preferred embodiment is configured as follows.
  • the telephone lines 12 number 30-120.
  • the telephone switch 16 is capable of handling a corresponding number of telephone calls simultaneously.
  • the server 28 has a number of modules, which can be implemented as concurrently executing processes, depending on the performance characteristics of the particular hardware with which the server 28 is realized.
  • a code generator 30 generates match- codes, which are output to a validity checker 32.
  • the validity checker 32 queries a database 34 which includes currently active matchcodes.
  • Software to operate the server 28 and to interact with users, including the code generator 30, the validity checker 32, and necessary software to operate the database 34, and the billing program 36 may be provided on any convenient computer readable medium.
  • the system 10 integrates with existing chat platforms and Internet portals.
  • integration is achieved by the embedding of no more than one hyperlink (button) in the chat web page. Selection of this hyperlink connects the computer 38 of a party 20 to the server 28 over a bi-directional channel 40 via the Internet.
  • a pop-up window appears in the user screen. The pop-up window describes the terms and condi- tions for the use of the VTN service.
  • the party 20 After reading the rules the party 20 confirms his intent to use the VTN service by pressing an "accept" option. This causes a request to be communicated from the computer 38 to the server 28 via the channel 40.
  • a code generation process executing in the server 28 generates a 5-digit code.
  • the code can be of any desired length, and can be alphanumeric or numeric.
  • a validity check is then conducted by another process, indicated in Fig. 2 as the validity checker 32, to assure that the generated code does not already exist in the database of the "waiting list" calls. If the code is valid a response is communicated from the server 28 to the computer 38, and a pop-up message appears, displaying appropriate information on the use of the assigned code, and the telephone number of the VTN service to be called in order to engage the system 10.
  • the code, together with a time stamp is stored in an SQL database 34 of the server 28 for later use, and for reference by the validity checker 32.
  • the party 20 who receives the code communicates it together with the telephone number of the VTN service to his fellow chatter, shown in Fig. 1 as the party 22. This communication is preferably accomplished in a "private room" mode.
  • the parties 20, 22 then agree on the date and time for their subsequent telephone conversation to take place.
  • the Subsequent Telephone Call .
  • both of the parties 20, 22 call the telephone number of the VTN service, and their calls traverse the facili- ties of the carrier 14, enter the telephone switch 16. It will be understood that the parties 20, 22 can use different carriers.
  • the telephone switch 16 passes both calls to the interactive voice response machine 18, which requests the assigned code.
  • the parties 20, 22 inform the system 10 of the assigned code, preferably using DTMF. The call normally arrive at different times.
  • Fig. 1 the telephone switch 16 and the interactive voice response machine 18 are shown as separate modules for clarity of presentation. However it is known to combine their functions into a single module, which can be employed in a preferred embodiment of the invention.
  • the server 28 in interacting with the parties 20, 22, and in performing other functions required by the VTN service, may communicate with multiple on-line data services concurrently.
  • the interactive voice response machine 18 Upon receiving a call the interactive voice response machine 18 initially consults an internal list of calls that are presently "on hold" in order to determine if the current call is from a second party seeking to connect with a first party who is waiting on hold. If there is no match, then the inter- active voice response machine 18 communicates with the server 28, preferably via the Internet, and requests that the validation of the assigned code.
  • the validity checker 32 which again references the database 34. However now the validity checker 32 verifies the existence of the assigned code in the database 34, rather than its non-existence. If the assigned code is successfully validated, the caller is placed on the internal list of calls presently on hold. A message is communicated from the server 28 to the interactive voice response machine 18, which then requests the first caller of the parties 20, 22 to await the entrance into the system 10 of the second caller of the parties 20, 22. While on hold, the first caller is provided with music, advertisements, or other telephonic communications for his enjoy- ment in accordance with the policies of the VTN service.
  • the second caller of the parties 20, 22 is processed in the same manner as the first caller.
  • both of the parties 20, 22 are connected in the telephone switch 16. Now they can speak to one another as long as they wish, or alternatively their conversation could be limited in time, according to the policies of the VTN service.
  • the system 10 is not informed of the telephone numbers from which the parties 20, 22 have placed their calls, and does not maintain a record of the telephone numbers. While the above procedure has been described for convenience in terms of two parties 20, 22, any number of parties can access the system 10 at the same time, limited only by the number of telephone lines 12 and the capabilities of the telephone switch 16. Thus a conference call can be arranged among an arbitrary number of parties, all of whom remain mutually anonymous. In the presently preferred configuration of the system 10, as many as 60 couples of users can be connected simultaneously.
  • the server 28 includes a suitable software module 42 for the generation of statistical reports, as well as for display- ing a live log all transactions entering the system on a monitor 44 which is connected to the system 10.
  • An operator screen displayed on the monitor 44 enables the operator to extract various reports and graphs showing exact system activities such as: total number of calls, total of calls failed, reasons for failures, calls per hour in a day, web sites of origination, etc.
  • different operating parameters can be dynamically controlled by the operator using the interface provided by the monitor 44, e.g., system on/off, duration of each telephone call, and pricing policies.
  • the parties 20, 22 desire to establish yet another telephonic communication, a different code will be assigned when the system 10 is again accessed, even though the parties are the same. It will be appreciated that since the parties 20, 22 are identified by assigned codes, they can access the system 10 from any telephone or communication device at different times. In the preferred embodiment of the invention, the system 10 is indifferent to the actual telephone numbers of the parties 20, 22.
  • the systems described have at least three configurations: an active configuration where the system calls the users; a "semi-passive" configuration: where one or more user calls the system and all other users are called by the system; and a passive" configuration where a plurality of users call the system. Passive Mode.
  • Fig. 3 is similar to the arrangement of Fig. 1, and in which like reference numbers denote the same element throughout.
  • Fig. 4 in initial step 46 the parties 20, 22 are in chatting contact via an internet chat web site 48 over channels 50.
  • the chat web page has a link or button which, when engaged, directs the server of the chat web site 48 to communicate with the server 28 on a channel 52.
  • the parties 20, 22 agree that they wish to communicate by telephone, one of them engages a chat site link at step 54.
  • a request is sent through the chat web site 48 to the server 28 by the party 20.
  • step 54 can be completed by the selection of a link or option on the browser of the party 20, and the communication to the server 28 could be routed directly from the party 20 to the server 28, eliminating the chat web site 48 as an intermediary in the communication.
  • This alternative has the advantage that the proprietor of the chat web site 48 has no indication of the intended telephonic communication.
  • the communication between the party 20 and the server 28 may be encrypted to enhance security.
  • step 58 the server 28 then generates a one-time code, which can be either numeric or alphanumeric.
  • the number of digits may change as needed, but is preferably 5 digits.
  • step 60 the one-time code is sent out from the server 28.
  • the system 10 recognizes both the parties 20, 22, and following decision step 62 automatically replies to both of them at step 64, according to their IP addresses, or nicknames, sending the code, together with the telephone number of the telephone switch 16. This dual message relieves the requesting party 20 of the obligation to forward the information to the party 22.
  • step 66 the code is returned to the requesting party 20, together with the tele- phone number of the telephone switch 16.
  • the return communication is routed via the chat web site 48, and in other embodiments it reaches the party 20 directly.
  • step 68 the party 20 then gives this information to the party 22, his chatting companion, preferably in a "private room" chat session.
  • step 70 the information regarding the specific code and other information regarding the telephone call request are stored in the database 34 (Fig. 2) .
  • the two parties 20, 22 they both call the given number and are answered by the interactive voice response machine 18 at step 72, at which time the IVR leads them through the process of connecting each other.
  • each of the parties 20, 22 is requested to enter his specific code.
  • the interactive voice response machine 18 determines whether two concurrent callers have identical specific codes. If so, then at termination step 76 the connection is completed in the telephone switch 16, and the parties 20, 22 speak with each other, and may decide whether to proceed with subsequent connections.
  • the one-time code is also invalidated by the server 28, so that it cannot be reused in subsequent attempts to establish a connection, and in some embodiments the one-time code is filed in a codes bank 78 for eventual reuse.
  • the use of the codes bank 78 is advantageous when using short transaction identifiers, as the activity space eventually becomes exhausted. Reissuing transaction identifiers from the codes bank 78 m accordance with a policy such "least recently used" prevents a transaction identifier from being reused within too short a time in- terval, and avoids conflicts among different parties who might otherwise have been issued the same transaction identifier during a period of activity.
  • a further test is made to determine if a timeout period has expired. This prevents the telephone switch 16 from becoming congested in situations where the second one of the parties 20, 22 fails to contact the system 10 within a predetermined time interval as measured from the time the first one of the parties 20, 22 made contact with the system 10. If the timeout interval has not elapsed, then control returns to decision step 74. If the timeout interval has elapsed, then the waiting party is disconnected from the telephone switch 16 at termination step 82. The one-time code still remains valid for use in subsequent attempts to establish a connection. However had a successful connection actually been established, it would be necessary to repeat the procedure beginning at step 5 .
  • VTN service In the passive mode of operation two chatters can call each other for further acquaintance without violating their respective privacies. They do not need to reveal their telephone number or any other personal information to anyone. There is no need for prior registration in the VTN service.
  • the system is passive in the sense that the users call the system and not vice versa.
  • Direct billing for the VTN service is possible according to known techniques. For example billing can be done by the carrier, using specially assigned telephone numbers, such as the "1-900" series in current use in the United States, "0190" in Germany, or the "056/1957” in Israel. It is also possible to collect revenues via a billing program 36 (Fig. 2) that executes in the server 28.
  • the billing program 36 may collect credit card information from the parties 20, 22 when they enter the system, using known billing, authorization and settlement mechanisms. It is also possible to collect revenues using many variants of a prepaid registration technique. Active Mode.
  • the system 10 calls the parties 20, 22 to establish a connection therebetween.
  • the parties 20, 22 Prior to their usage of the system 10, the parties 20, 22 are pre-registered in the database 34 at step 84, at which time they provide information, including their telephone numbers. They then receive a password and PIN number.
  • the parties 20, 22 establish initial contact in the same man- ner as disclosed in the discussion of passive mode operation.
  • the browser interface with the parties 20, 22 is identical to that disclosed in the passive mode operation.
  • the parties 20, 22 mutually agree on a time for a subsequent telephone contact, and both then engage the chat site link at step 88.
  • the parties 20, 22 both contact the server 28, and they provide their passwords and PIN numbers.
  • the system 10 then, at step 92, calls each, of them at their preregistered telephone number, and if, at decision step 94, the system 10 was successful in contacting both of the parties 20, 22, a connection between the two is established via the telephone switch 16 at termination step 96.
  • the system 10 may either call the parties 20, 22 immediately following the contact in step 90 at a predetermined time. if at decision step 94 one or both of the contacts were unsuccessful, control proceeds to decision step 98 where it is determined whether a criterion for termination of the procedure has been met.
  • the criterion may be a timeout period may, or the procedure may abort after a predetermined number of it- erations. If the criterion has not been met, then control returns to step 92. If the criterion is met, then the procedure terminates at termination step 100.
  • a semi-passive mode of operation is disclosed with refer- ence to Figs. 1, 2, and 6. This is a hybrid configuration in which one user calls the system 10 while the other is called by the system 10.
  • the party 20 Prior to their usage of the system 10, the party 20 is pre-registered in the database 34 at step 102, at which time he provides information, including his telephone number. The party 20 then receives a password and PIN number.
  • the semi-passive configuration permits the party 20 to predetermine contact parameters, which is accomplished at step 104.
  • Step 104 may occur at the time of preregistration, or subsequently.
  • the party 20 may specify during which hours the system 10 is permitted to contact him in order to establish a connection with the party 22.
  • the party 20 publicizes his PIN number, and the telephone number of the telephone switch 16.
  • the party 22 formulates an intention to contact the party 20. This can occur, for example, in the context of an advertisement in which the party 20 has included his PIN number, the telephone number of the telephone switch 16, and has invited a telephonic communication from the party 22.
  • the party 22 contacts the system 10.
  • the system 10 determines if the code provided by the party 22 matches the PIN number of the party 20. If not, the procedure terminates at termination step 112. If there is concordance between the code provided by the party 22 matches the PIN number of the party 20, then control proceeds to decision step 114, where it is determined if the conditions according to the contact parame- ters that were provided in step 104 are satisfied. If not, the procedure terminates at termination step 112.
  • the system 10 then, at step 116, calls the party 20 at his preregistered telephone number while the party 22 awaits. If, at decision step 118 the system 10 was successful in contacting the party 20, connection between the parties 20, 22 is established via the telephone switch 16 at termination step 120.
  • control proceeds to decision step 122, where it is determined whether a criterion for termination of the procedure has been met.
  • the criterion may be a timeout period may, or the procedure may abort after a predetermined number of iterations. If the criterion has not been met, then control returns to step 116. If the criterion is met, then the procedure terminates at termination step 112.
  • An exemplary application of the semi-passive mode of operation is the electronic analog of a blind newspaper advertisement, in which the advertiser wishes to remain anonymous, but desires to receive offers or requests from the general public.
  • the PIN number has the same function as the blind box number of the newspaper advertisement, with the enhancement that the system 10 is able to screen inquiries and exclude those that do not meet predetermined criteria. Alternate Embodiments.
  • the parties 20, 22 may be issued different codes, which provides a greater degree of security.
  • the server 28 is able to match the two codes when contact is made between the system 10 and the parties 20, 22.
  • the parties 20, 22 receive different contact telephone numbers, which is appropriate when they are located remote from one another, possibly in different countries.
  • a mechanism for graceful termination of the procedure is provided.
  • the parties 20, 22 may be offered the opportunity of rescheduling their conversation. This can be accomplished using the interactive voice response machine 18, or by other communication such as e-mail.
  • the system 10 in some embodiments supports voice over IP protocols, and the telephone switch 16 is adapted to support cellular telephone systems, and wireless devices.
  • deci- sion step 62 Fig. 4
  • decision step 110 Fig. 6
  • an "anti-spam" mechanism in deci- sion step 62 (Fig. 4) or decision step 110 (Fig. 6) in the active and semi-passive modes of operation respectively. This is particularly useful if the Internet is being used to contact the system 10. If the IP address of one or both of the parties 20, 22 is known to the system 10, it is possible to detect re- quests arriving at a higher than expected rate from one of them, and in such case the request may be disregarded by the system. Such a mechanism may also protect the system from malicious accesses, such as denial-of-service attacks. In some embodiments provision is made for blocking the VTN service from specific ANIs. For example the telephone numbers associated with unpaid accounts.
  • the server 28 is made accessible to pre-registered users, such as the party 20.
  • the party 20 when the party 20 preregisters, he designates a nickname for himself.
  • the party 20 can see the nicknames of all the other participants who are currently on-line. It is possible for the party 20 to obtain a direct telephonic connection to a co-participant simply by marking the nickname of that individual on his browser or other communication device.
  • the party 20 submits nicknames to the server 28 of individuals with whom he would like to connect by telephone.
  • the server 28 polls a list of participants who are currently online, and should a match occur, the party 20 is signaled by the server 28, and he then has an option of being telephonically connected with at least a subset of the matched co-participant.
  • the telephone system is con- nected to several chat services and chatters from different chat services can call the same switch.
  • the system architecture is similar to that shown in Fig. 1, except now the party 20 is connected to an online data service 124 over a channel 126, and the party 22 is connected to a different online data service 128 over a channel 130.
  • the server 28 is linked to both the online data service 124 over a channel 132, and with the online data service 128 over a channel 134. While the channels 132, 134 are preferably routed via the Internet, they could be private data network or via dedicated telephonic or similar communication channels.
  • the request is submitted via the online data service 124, which transfers the request to the server 28.
  • the code which is assigned by the server 28 is communicated to the online data service 124, which manages further communication with the party 20.
  • the online data services 124, 128 transmit PIN numbers to the server 28 which translates them to the actual telephone numbers of the parties 20, 22.
  • the translated telephone numbers are then transmits these to the interactive voice response machine 18. This arrangement is more secure than transmitting the actual telephone numbers to the server 28. Specialized Applications.
  • the embodiments described herein have many applications other than the facilitation of telephone conversations between internet chatters under conditions of anonymity. Modifications of the VTN system will readily occur to those skilled in the art whenever there is a need for anonymous telephonic conversation, or for other means of telecommunication conversation, where either one or both sides wish to maintain their privacy. Examples include customer-to-customer (C2C) applications, such as forums, virtual communities, professional consultation sessions, where the client wishes to remain anonymous, while the professional is unconcerned with his own privacy. Other examples include on-line trading, and on-line auctions. Business-to-customer (B2C) applications include trading and auctions where the customer wishes to remain anonymous at the first acquaintance.
  • C2C customer-to-customer
  • B2C business-to-customer
  • Fields of application include art dealing, antiquities, stocks, finance, diamonds and other precious goods .
  • Business-to-business (B2B) applications where both businesses wish to initially remain anonymous, include activities such as bond and currency trading, travel deal offers, and B2B auctions .
  • the VTN system can be adapted to the formation of forums, such as internet forums.
  • the prospective moderator identifies a topic of interest, and sends a message to the a chat site, scheduling a telephonic conference with public participation on the topic.
  • the VTN system reserves an arbitrary number of positions on its telephone switch for participants who call a specially assigned telephone number during a predefined time interval. The participants are mutually connected as they contact the VTN system.
  • An example of such a forum is a celebrity chat, wherein, at a known time a celebrity is available to chat with the participants who access the VTN system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Appareil (28) et procédé assurant un service de commutation à numéros de téléphone virtuels à deux parties (20, 22) désirant communiquer l'une avec l'autre de façon anonyme. Le service est particulièrement adapté à l'utilisation sur l'Internet. On peut télécharger des modules pouvant être intégrés à des navigateurs Web et des sites Web tel que des sites de bavardage-clavier. Un identificateur de transaction ou code d'appariement met en oeuvre un numéro de téléphone virtuel à l'attention des parties (20, 22); le service agit alors comme un agent pour faciliter le contact entre eux. Dans certains modes de fonctionnement, l'agent ne connaît pas les identités ou les numéros de téléphone réels des parties.
PCT/IL2000/000810 2000-01-04 2000-12-01 Communication utilisant des numeros de telephone virtuels WO2001050682A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU17291/01A AU1729101A (en) 2000-01-04 2000-12-01 Communication using virtual telephone numbers
IL14455000A IL144550A (en) 2000-01-04 2000-12-01 Comunication using virtual telephone numbers

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US17450400P 2000-01-04 2000-01-04
US60/174,504 2000-01-04

Publications (1)

Publication Number Publication Date
WO2001050682A1 true WO2001050682A1 (fr) 2001-07-12

Family

ID=22636402

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2000/000810 WO2001050682A1 (fr) 2000-01-04 2000-12-01 Communication utilisant des numeros de telephone virtuels

Country Status (3)

Country Link
AU (1) AU1729101A (fr)
IL (1) IL144550A (fr)
WO (1) WO2001050682A1 (fr)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10136308A1 (de) * 2001-07-26 2003-02-13 Web De Ag Daten-Kommunikationsverfahren und Daten-Kommunikationssystem mit virtuellen Telefonnummern
TR200103599A1 (tr) * 2001-12-12 2003-03-21 Telsi̇m Mobi̇l Telekomi̇ni̇kasyon Hi̇zmetleri̇ A.Ş. Konferans chat servis sistem ve yöntemi
FR2829893A1 (fr) * 2001-09-18 2003-03-21 France Telecom Procede d'etablissement d'une communication telephonique entre deux terminaux, serveur et terminal pour la mise en oeuvre du procede
NL1019396C2 (nl) * 2001-11-19 2003-05-20 Mobillion B V Werkwijze voor anonieme communicatie.
EP1315351A1 (fr) * 2001-11-23 2003-05-28 Koninklijke KPN N.V. Systémes et procédés destinés à assurer à des participants à un forum de discussion une communication vocale anonyme
EP1333637A1 (fr) * 2002-01-31 2003-08-06 Koninklijke KPN N.V. Procédé et système de télécommunication
WO2006003069A1 (fr) * 2004-07-02 2006-01-12 Siemens Aktiengesellschaft Procede et dispositif pour etablir et faire fonctionner une liaison de communication rendue anonyme
DE102004061356A1 (de) * 2004-12-21 2006-07-06 Deutsche Telekom Ag Verfahren und Vorrichtung zum Kommunizieren in einem Telekommunikationsnetz
WO2006075853A1 (fr) * 2005-01-11 2006-07-20 Ktfreetel Co., Ltd. Procede et appareil permettant de fournir un numero de telephone mobile virtuel
EP1683287A2 (fr) * 2003-11-13 2006-07-26 Nokia Corporation Procede et appareil d'augmentation des capacites de type bluetooth d'un terminal sans fil
WO2006135959A1 (fr) * 2005-06-20 2006-12-28 Gravity Ventures Pty Ltd Systeme d'information pour telecommunications
WO2008059536A2 (fr) * 2006-11-17 2008-05-22 Parag Dhanvantrai Jasani Système et procédé pour établir une communication anonyme
EP2051471A1 (fr) * 2007-10-18 2009-04-22 Nokia Siemens Networks Oy Communication mobile pseudonyme pour des communautés Internet
US7684554B1 (en) 2002-01-02 2010-03-23 8×8, Inc. Virtual telephone extension
WO2011162786A1 (fr) * 2010-06-23 2011-12-29 Intuit Inc. Procédés, systèmes et produits de programmes informatiques pour masquer des numéros de téléphone de dispositifs de communication
WO2014151684A3 (fr) * 2013-03-15 2014-11-20 World Emergency Network - Nevada, Ltd. Rattachement de multiples lignes téléphoniques à un seul téléphone mobile ou fixe
US9031218B2 (en) 2011-06-30 2015-05-12 World Emergency Network—Nevada Ltd. Attaching multiple phone lines to a single mobile or landline phone
WO2015185289A1 (fr) 2014-06-06 2015-12-10 Nicknameapps Gmbh Procédé de communication entre deux terminaux mobiles
US9253311B2 (en) 2011-10-12 2016-02-02 World Emergency Network—Nevada Ltd. Controlled recorded 3-way calling
US9998603B2 (en) 2011-06-30 2018-06-12 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10645213B1 (en) 2016-03-30 2020-05-05 World Emergency Network—Nevada Ltd. Virtual numbers for intelligence operations
US10944860B2 (en) 2011-05-31 2021-03-09 World Emergency Network-Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
US11044360B1 (en) 2015-12-17 2021-06-22 8X8, Inc. Dynamic direction of incoming calls

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4847890A (en) * 1987-08-10 1989-07-11 The Telephone Connection Anonymous interactive telephone system
US5818836A (en) * 1995-08-09 1998-10-06 Duval; Stephen C. Method and apparatus for anonymous voice communication using an online data service
US5907677A (en) * 1996-08-23 1999-05-25 Ecall Inc. Method for establishing anonymous communication links
US6148067A (en) * 1996-07-02 2000-11-14 At&T Corp. Anonymous voice communication
US6157829A (en) * 1997-10-08 2000-12-05 Motorola, Inc. Method of providing temporary access of a calling unit to an anonymous unit

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4847890A (en) * 1987-08-10 1989-07-11 The Telephone Connection Anonymous interactive telephone system
US5818836A (en) * 1995-08-09 1998-10-06 Duval; Stephen C. Method and apparatus for anonymous voice communication using an online data service
US6148067A (en) * 1996-07-02 2000-11-14 At&T Corp. Anonymous voice communication
US5907677A (en) * 1996-08-23 1999-05-25 Ecall Inc. Method for establishing anonymous communication links
US6157829A (en) * 1997-10-08 2000-12-05 Motorola, Inc. Method of providing temporary access of a calling unit to an anonymous unit

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10136308A1 (de) * 2001-07-26 2003-02-13 Web De Ag Daten-Kommunikationsverfahren und Daten-Kommunikationssystem mit virtuellen Telefonnummern
FR2829893A1 (fr) * 2001-09-18 2003-03-21 France Telecom Procede d'etablissement d'une communication telephonique entre deux terminaux, serveur et terminal pour la mise en oeuvre du procede
WO2003026262A1 (fr) * 2001-09-18 2003-03-27 France Telecom Procede d'etablissement d'une communication telephonique entre deux terminaux, serveur et terminal pour la mise en oeuvre du procede
US9055423B1 (en) 2001-09-28 2015-06-09 8X8, Inc. Virtual telephone extension
US9641689B1 (en) 2001-09-28 2017-05-02 8X8, Inc. Virtual telephone extension
NL1019396C2 (nl) * 2001-11-19 2003-05-20 Mobillion B V Werkwijze voor anonieme communicatie.
EP1315351A1 (fr) * 2001-11-23 2003-05-28 Koninklijke KPN N.V. Systémes et procédés destinés à assurer à des participants à un forum de discussion une communication vocale anonyme
TR200103599A1 (tr) * 2001-12-12 2003-03-21 Telsi̇m Mobi̇l Telekomi̇ni̇kasyon Hi̇zmetleri̇ A.Ş. Konferans chat servis sistem ve yöntemi
US9924030B1 (en) 2002-01-02 2018-03-20 8X8, Inc. Virtual telephone extension
US10869188B1 (en) 2002-01-02 2020-12-15 8X8, Inc. Virtual telephone extension
US10440177B1 (en) 2002-01-02 2019-10-08 8X8, Inc. Virtual telephone extension
US7684554B1 (en) 2002-01-02 2010-03-23 8×8, Inc. Virtual telephone extension
US11729601B1 (en) 2002-01-02 2023-08-15 8X8, Inc. Virtual telephone extension
WO2003065679A1 (fr) * 2002-01-31 2003-08-07 Koninklijke Kpn N.V. Procédé et système de télécommunication
EP1333637A1 (fr) * 2002-01-31 2003-08-06 Koninklijke KPN N.V. Procédé et système de télécommunication
EP1683287A4 (fr) * 2003-11-13 2008-12-03 Nokia Corp Procede et appareil d'augmentation des capacites de type bluetooth d'un terminal sans fil
EP1683287A2 (fr) * 2003-11-13 2006-07-26 Nokia Corporation Procede et appareil d'augmentation des capacites de type bluetooth d'un terminal sans fil
WO2006003069A1 (fr) * 2004-07-02 2006-01-12 Siemens Aktiengesellschaft Procede et dispositif pour etablir et faire fonctionner une liaison de communication rendue anonyme
DE102004061356A1 (de) * 2004-12-21 2006-07-06 Deutsche Telekom Ag Verfahren und Vorrichtung zum Kommunizieren in einem Telekommunikationsnetz
WO2006075853A1 (fr) * 2005-01-11 2006-07-20 Ktfreetel Co., Ltd. Procede et appareil permettant de fournir un numero de telephone mobile virtuel
WO2006135959A1 (fr) * 2005-06-20 2006-12-28 Gravity Ventures Pty Ltd Systeme d'information pour telecommunications
WO2008059536A3 (fr) * 2006-11-17 2008-09-18 Parag Dhanvantrai Jasani Système et procédé pour établir une communication anonyme
WO2008059536A2 (fr) * 2006-11-17 2008-05-22 Parag Dhanvantrai Jasani Système et procédé pour établir une communication anonyme
WO2009049915A1 (fr) * 2007-10-18 2009-04-23 Nokia Siemens Networks Oy Communication mobile impersonnelle pour des communautés internet
US8606305B2 (en) 2007-10-18 2013-12-10 Nokia Siemens Networks Oy Impersonal mobile communication for internet communities
EP2051471A1 (fr) * 2007-10-18 2009-04-22 Nokia Siemens Networks Oy Communication mobile pseudonyme pour des communautés Internet
WO2011162786A1 (fr) * 2010-06-23 2011-12-29 Intuit Inc. Procédés, systèmes et produits de programmes informatiques pour masquer des numéros de téléphone de dispositifs de communication
US10944860B2 (en) 2011-05-31 2021-03-09 World Emergency Network-Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
US9031218B2 (en) 2011-06-30 2015-05-12 World Emergency Network—Nevada Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10887456B2 (en) 2011-06-30 2021-01-05 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US9270814B2 (en) 2011-06-30 2016-02-23 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US9998603B2 (en) 2011-06-30 2018-06-12 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10218838B2 (en) 2011-06-30 2019-02-26 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10547740B2 (en) 2011-06-30 2020-01-28 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US9736296B2 (en) 2011-06-30 2017-08-15 World Emergency Network—Nevada, Ltd. Attaching multiple phone lines to a single mobile or landline phone
US10375233B2 (en) 2011-10-12 2019-08-06 World Emergency Network—Nevada, Ltd. Controlled recorded 3-way calling
US9253311B2 (en) 2011-10-12 2016-02-02 World Emergency Network—Nevada Ltd. Controlled recorded 3-way calling
US10547737B2 (en) 2011-10-12 2020-01-28 World Emergency Network—Nevada, Ltd. Controlled recorded 3-way calling
US10999735B2 (en) 2011-10-12 2021-05-04 Callyo 2009 Corp Controlled recorded 3-way calling
WO2014151684A3 (fr) * 2013-03-15 2014-11-20 World Emergency Network - Nevada, Ltd. Rattachement de multiples lignes téléphoniques à un seul téléphone mobile ou fixe
WO2015185289A1 (fr) 2014-06-06 2015-12-10 Nicknameapps Gmbh Procédé de communication entre deux terminaux mobiles
DE102014108063A1 (de) * 2014-06-06 2015-12-17 Nicknameapps Gmbh Verfahren zur Kommunikation zwischen zwei mobilen Endgeräten
US11044360B1 (en) 2015-12-17 2021-06-22 8X8, Inc. Dynamic direction of incoming calls
US11632457B1 (en) 2015-12-17 2023-04-18 8X8, Inc. Dynamic direction of incoming calls
US10887453B2 (en) 2016-03-30 2021-01-05 World Emergency Network—Nevada, Ltd. Virtual numbers for intelligence operations
US10645213B1 (en) 2016-03-30 2020-05-05 World Emergency Network—Nevada Ltd. Virtual numbers for intelligence operations

Also Published As

Publication number Publication date
AU1729101A (en) 2001-07-16
IL144550A0 (en) 2002-05-23
IL144550A (en) 2003-06-24

Similar Documents

Publication Publication Date Title
WO2001050682A1 (fr) Communication utilisant des numeros de telephone virtuels
US6175619B1 (en) Anonymous voice communication using on-line controls
US5802156A (en) Method for billing and controlling fraud in providing pay information services
EP1305926B1 (fr) Dispositif d'authentification d'utilisateur et d'autorisation pour l'utilisation d'un systeme securise
US6049602A (en) Virtual call center
US8873738B2 (en) Controlling hold queue position adjustment
US6310873B1 (en) Internet telephony directory server
US5960069A (en) Method of billing a multiple service representative conference call
CA2177092C (fr) Service de telecommunication familial vrai
US7486779B2 (en) Origin device based callee identification
GB2397731A (en) Authenticating a user access request to a secure service over a primary communication channel using data sent over a secondary communication channel
WO2002037240A2 (fr) Système informatique
US6535582B1 (en) Voice verification system
US20080089493A1 (en) Registration Of A Telephone/Computer Association In A Computer Telephony Integration Environment
JP2000209352A (ja) 会議通信装置
TW200814703A (en) Method and system of authenticating the identity of the client
KR100549782B1 (ko) 범용 사설 교환기와 호환되는 콜센터 시스템
JPH09186772A (ja) 会議型メールボックス・サービス
KR20020027433A (ko) 단문 메시지를 이용한 유무선 인스턴트 메시지 전송방법
EP1082837A2 (fr) Procede de telephonie sure avec mobilite dans un systeme de telecommunication et de communication de donnees qui comprend un reseau ip
KR100884198B1 (ko) 온라인상에서의 콜센터 시스템과 이를 이용한 텔레마케팅호 처리 방법
EP2081372A1 (fr) Conférence audio
US20090092240A1 (en) Audio Conferencing
KR20010091637A (ko) 인터넷전화국을 이용한 음성,문자,데이터 단말기간의통화방법
KR20010079183A (ko) 고객 식별 전화번호 서비스 방법 및 이를 수행하기 위한시스템

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)