WO2001080078A1 - Traitement et gestion de communications - Google Patents

Traitement et gestion de communications Download PDF

Info

Publication number
WO2001080078A1
WO2001080078A1 PCT/US2001/010606 US0110606W WO0180078A1 WO 2001080078 A1 WO2001080078 A1 WO 2001080078A1 US 0110606 W US0110606 W US 0110606W WO 0180078 A1 WO0180078 A1 WO 0180078A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
party
communications
identification code
intended recipient
Prior art date
Application number
PCT/US2001/010606
Other languages
English (en)
Inventor
William S. Meisel
Original Assignee
Meisel William S
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meisel William S filed Critical Meisel William S
Priority to AU2001249770A priority Critical patent/AU2001249770A1/en
Publication of WO2001080078A1 publication Critical patent/WO2001080078A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals

Definitions

  • the invention relates generally to the handling and management of communications.
  • Various types of communication exist including telephone, electronic mail (email), facsimile (fax), paging, specialized wireless communications (such as Personal Digital Assistants), postal mail, and instant messaging.
  • Managing the different types of communications has become increasingly complex for individuals as well as companies and organizations. For example, individuals may have multiple versions of a given type of comnninication. such as both business and home email addresses, as well as home, business, and wireless telephone numbers.
  • the types of communications are becoming less distinct. Callers can retrieve email messages by telephone by having the messages read to them using text-to-speech synthesis, and can reply by voice.
  • the reply voice messages may, in some implementations, be sent as an audio file attachment to an email message.
  • a communications system includes a database storing identification codes each of which is associated with a respective party and is independent of a particular type of communication medium.
  • the database also stores information including options set by a first party indicative of how communications addressed to the first party are to be handled.
  • the system includes service provider equipment configured to intercept a communication from a sender, to query the database for instructions regarding handling of the communication based on an identification code associated with an intended recipient of the communications, and to automatically handle the communications in accordance with the instructions.
  • Methods of use and articles that include a computer-readable medium with computer-executable instructions also are disclosed.
  • Various implementations may include one or more of the following features or advantages.
  • the techniques described here can facilitate and improve the handling and management of communications over various media.
  • a party can dictate how incoming communications addressed to that party are to be handled.
  • Options can be set for handling communications from specific parties as well as unclassified parties.
  • the techniques allow the options to be changed readily.
  • each party can more easily control when, how and where it receives the communications addressed to it.
  • FIG. 1 illustrates an exemplary communications system including a database according to the invention.
  • FIG. 2 illustrates the structure of an exemplary record stored in the database.
  • FIG. 3 is a flow chart of a method for handling a communications according to the invention.
  • FIG. 4 is a flow chart of a method by which a party can become a registered user of another party.
  • FIG. 5 illustrates various security features according to one implementation of the database.
  • FIG. 6 illustrates the system of FIG. 1 with the addition of a mirrored database.
  • FIG. 1 illustrates an exemplary communications system 10 that includes a central database 12.
  • the database 12 stores a record 50 (FIG. 2). including a unique communications identification code 52, for each party that is enrolled in the system 10. The identity of the party 54 associated with each particular code also is stored in the database 12.
  • the identification codes can take the form of alphanumeric strings.
  • the codes may consist only of numbers so that they easily can be entered on keypads or spoken and recognized accurately with automatic speech recognition equipment.
  • the strings of numbers preferably have internal relationships such as check-sums, that allow the codes to be validated, thereby facilitating detection of fraudulent numbers.
  • the codes should be long enough so that they can provide unique identifiers for a large number of people.
  • the number of valid codes can be limited to a small fraction of the possible codes to reduce the likelihood that guessing a number randomly will generate a valid code.
  • a party also can choose an alphanumeric alias that is not in use and that can be used as a shortened version of the identification code when a full keyboard is available.
  • alphanumeric codes when entered on a telephone or similar keypad, alphanumeric codes can be translated into corresponding numeric codes.
  • alphanumeric codes can be generated so that they are unique even when entered on a telephone or similar keypad using the letters on the keypad for the letters in the code.
  • Additional information associated with a particular identification code can be stored in the database 12 as well.
  • the additional information stored in the database 12 can include personal contact data 56 that can serve as an electronic business card.
  • the personal contact data 56 can include other information, such as a link to an Internet Web site or a photograph of the person.
  • a party can enter additional information 58 into the database 12 by setting various options that allow the database automatically to manage incoming communications addressed to that party.
  • a party can block all communications for which the sender does not provide its identification code or the party may choose to block all communications from a particular source identified, for example, by a communications identification code or email address.
  • communications from a particular source can be categorized by priority so that communications having different priorities are handled differently.
  • high priority phone calls might be forwarded to a wireless phone, while lower priority calls might be forwarded to a message center.
  • business emails might be forwarded to a business email address
  • personal emails might be forwarded to a personal email address.
  • the type of access allowed by a particular source can be controlled. For example, a party might choose to receive communications from a particular source only email. Other options can be selected and stored by the database 12.
  • the party applies for an identification code, the party provides personal contact data and sets basic options related to the handling and management of incoming communications addressed to that party.
  • the identity of the party should be verified and each party should be assigned only a single identification code.
  • the personal information provided by the applicant can be validated, at least partially.
  • the applicant ' s identification code can be sent by postal service to the mailing address specified by the applicant with a request that the applicant confirm receipt in order to activate the applicant ' s code.
  • the applicant ' s identification code can be sent to the email address specified by the applicant with a request that the applicant send a reply. If no reply is received within a specified period, the validation would fail.
  • the personal contact data can include data 57 that is publicly available to other parties who are given permission to access the database 12.
  • Such publicly accessible data can include the full name of the party, its mailing address, telephone number or email address, as well as other information. If. for example, party A gives its identification code to party B, then party B can access the publicly available data 57 associated with party A through a personal computer 14 or other device connected to a network 16 such as the Internet.
  • Software residing, for example, on the personal computer 14 allows party B to use the computer to enter the identification code of party A and access the publicly available data associated with party A.
  • the publicly available data 57 automatically is retrieved and saved locally in the computer 14 or other device, thereby avoiding typing errors.
  • communications through the system 10 can use one of several types of communication.
  • the system 10 can include a telephone service provider 18 that allows a party to send communications from the personal computer 14 or other device through a telephone connection 22 over a telephone line 20.
  • the system also can include an email service provider 24 that allows a party to send communications from the personal computer 14 or other device through a network connection 22 over a network 20 such as the Internet.
  • Other communications service providers such as facsimile service, aLitomated postal service and instant messaging, also can be used in the system 10.
  • other devices including personal digital assistants (PDAs) or enhanced telephones, can be used instead of the personal computer 14.
  • PDAs personal digital assistants
  • enhanced telephones can be used instead of the personal computer 14.
  • the identification code associated with the intended recipient is included 60 as part of the communication.
  • the sender and recipient's respective identification codes can be entered either manually or automatically.
  • Manually entering the identification codes can include the following.
  • the recipient's identification code can be entered using a telephone keypad. Alternatively, the recipient ' s code can be spoken into the telephone receiver and recognized using speech recognition techniques.
  • the recipient ' s code can be included in the "to" field. Alternatively, the recipient's code can be included in the body of the email message and indicated by a marker or simply recognized by context.
  • the recipient ' s identification code also can be used in other forms of communication, including instant messaging and standard postal service. For example, with respect to standard postal mail, the recipient's identification code can be included in the mailing address and the sender's identification code can be included in the return address.
  • the codes can be incorporated, for example, into an automated mail system that uses bar codes. Similarly, in the context of an instant messaging system, the sender and recipient's codes can be associated with the system's identifying "handles.”
  • a specific device such as a personal computer or wireless telephone can be associated with a particular sender so that the sender's identification code automatically is incorporated as part of the communication prior to transmittal.
  • the sender or recipient's identification code can be entered automatically in response to the entry of corresponding information.
  • a sender of a voice communication by telephone would speak the name of the recipient into the telephone receiver to initiate the communication.
  • the recipient's identification code would automatically be retrieved from a directory and placed into the communication.
  • the sender ' s core can similarly be added.
  • a communication sent through the system 10 is intercepted 62, for example, by the appropriate service provider 18. 24.
  • the recipient's identification code is extracted 64 from the intercepted communication.
  • the communication is treated 66 as originating from an unclassified sender. Assuming that the sender's identification code is included in the communication, it too is extracted 68.
  • Control software uses the sender and recipient's identification codes to query the database 12 and check 70 whether the sender is listed as a registered user with respect to the recipient.
  • each service provider 18, 24 runs software to handle management of communications based on information stored in the database 12.
  • the service providers 18, 24 can utilize the database 12 as an information resource or can form part of a forwarding service of the database itself. Communications between the service provider 18 and the database 12 can take place over a network 30.
  • communications between the service provider 24 and the database 12 can take place over a network 32.
  • the networks 30, 32 can be implemented, for example, using the Internet.
  • software for handling management of commLinications can reside locally at the receiving end of the communication, for example, in the recipient ' s personal computer 14A for email or telephony, or in a PBX voice-mail system for telephone calls.
  • Handling of a particular communication can include one or more of the following exemplary actions depending on the options previously set by the recipient and stored in the database 12.
  • the control instructions as dictated by the options selected by the intended recipient and stored in the database 12 can indicate that communications from unclassified senders should be treated, for example, as low- priority messages or simply rejected.
  • Some communications may be rejected if the intended recipient sets options to block all communications from the sender or communications sent by the sender over a particular communications medium. In such situations, the content of the communication can be saved in the database 12 for a specified period in case the recipient wishes to recover or review rejected messages.
  • the recipient's instructions as indicated by the options set and stored in the database 12 may require changing the form of a message.
  • a recipient may want voice messages from a particular party to be delivered as attachments to an email message.
  • the recipient may want email messages to be communicated over the telephone using text-to-speech synthesis.
  • Technology for performing such text-to-speech synthesis is available commercially.
  • existing features of the message type are used.
  • some email systems are capable of attaching an indication of priority to the communication. and some email programs handle different priorities differently, for example, by storing them in different electronic folders and/or highlighting high priority messages.
  • Existing telephone systems can put a call through or put it into a voice mail queue.
  • Some systems allow high-priority queues.
  • the options selected by the recipient and stored in the database 12 can indicate, for example, that for high-priority messages or messages from specific individuals, the recipient should be paged or called on a mobile phone.
  • the options set by the recipient can indicate where messages from the sender should be directed.
  • control instructions stored in the database 12 may indicate whether the sender is to be informed of the disposition of the message.
  • the options set by the intended recipient may indicate that a reply should be sent to a party whose message was rejected indicating that the message was undeliverable.
  • the options set by the recipient may dictate that the sender should receive a courtesy reply that the message was received and that a substantive reply can be expected soon.
  • FIG. 4 illustrates one technique by which a party, such as party C. can become a registered user of another party, such as party D.
  • party C provides 80 its identification code to party D along with a request to become a registered user.
  • Party D then can access the database 12. for example, over the network 16.
  • party C can review the publicly available data about party C that is stored in the database 12. Based on the publicly available data about party C and other known information.
  • Party D decides 82 whether to list party C as one of its registered users. If party D decides to accept party C as a registered user, then party D would select and set 84 various options indicating how communications from party C are to be handled.
  • the database 12 automatically can send 86 a communication to party C indicating that party C is now a registered user of party D.
  • the communication to party C also can disclose the identification code of party D and can indicate what forms of communication are acceptable for messages sent by party C to party D. If party D declines to accept communications from party C. one of several actions can be taken. In one scenario, party D can simply ignore the reqLiest of party C. In that case, party C would not receive any message indicating that party D does not wish to receive communications from it. Communications from party C, however, are effectively blocked. Alternatively, party D may select and set 88 options in the database 12 to block all messages from party C. The database 12 automatically can send 90 a message to party C indicating that its request was not accepted. Depending on the options set by party D, party C may be able to appeal party D's decision not to accept its communications. However, party D's identification code would not be provided to party C.
  • FIG. 5 illustrates an exemplary implementation.
  • the servers 90 can receive outside requests for contact or control information and transmit the requests over a secure encrypted line to the database 12.
  • Another server 100 processes requests directed to the database 12 from the servers 90 and forward the requests to the database 12.
  • the database 12 returns an encrypted reply that can be decoded within one of the secure servers 90 and can be sent to the processing application.
  • the encrypted version then can be erased from the disk in the server 90.
  • the servers 90 need not have a significant amount of data at any given time. Furthermore, the data in the servers 90 is constantly changing.
  • one or more mirror encrypted databases 98 can be included to provide additional reliability.
  • a mirror encrypted database 98 that includes the contents of the database 12 can serve as a local database for one or more service providers, such as the provider 18.
  • Certain information contained in the database 12 can be modified by the user. For example, a user can update its personal contact data 56. including the personal data 57 that is available to the public. In addition, a user can change the way in which the system is set to handle communications addressed to the user. Such changes can be made by accessing the database 12, for example, from the personal computer 14A or other device and changing the settings for the options 58 for handling incoming communications from either registered or unclassified users. To prevent changes being made by unauthorized persons, each enrolled user may be required to use a private password to obtain access and make changes to its information stored in the database 12. In some implementations, old personal contact data is stored in the archive 96 (FIG. 5). A Liser can set options using the database 12 so that changes to the user ' s personal contact data automatically are communicated to parties that previously have communicated with the user.
  • Changes to a party ' s identification code may occur for one of several reasons, and a user can request that its identification code be changed at any time. For example, if a user is receiving an excessive number of communications from telemarketing companies, the user may wish to obtain a new identification code. The party with whom the new identification code is associated can specify a list of other parties who are to be informed of the new identification code automatically. The database 12 then can transmit a message to inform the other parties of the new identification code.
  • Expired identification codes also can be retained in the database 12 or the associated archive 96.
  • the expired and new identification codes can be linked to allow the user to set options that determine how communications addressed to an expired identification code are to be handled.
  • communications addressed to an expired identification code are treated as originating from an unclassified sender.
  • the sender of the communication automatically can be informed of the new identification code.
  • communications from a sender who directs the communications to an expired identification code can be treated in the same way as communications from that sender were previously handled.
  • the sender can be notified of the new identification code automatically. After a specified number of such notifications, if the sender does not begin using the new identification code, communications from that sender are handled as originating from an unclassified sender. Combinations of those techniques can be used as well.
  • Software installed on the user's personal computer 14A can cause the computer to retain the identification codes of contacts with whom a party has previously communicated.
  • the list of identification codes for such contacts can be stored, for example, in a database in the user ' s personal computer 14A or other access device.
  • the software also can cause the computer 14A to poll the database 12 periodically and obtain up-to-date changes to identification codes of other parties with whom the user has communicated.
  • software can cause the computer 14A to poll the database 12 and obtain up-to-date changes to personal contact data of other parties with whom the user has communicated. Any changes can be obtained and stored automatically in the user's personal computer 14A or other access device on a periodic basis so that the list of contacts stored in the personal computer is current.
  • the system automatically can check whether other identification codes have been issued to that sender. If such an identification code has been issued to the same sender, the database 12 can handle the present communication in the same way as dictated by the earlier identification code. Parties can be discouraged from improperly obtaining an identification code by pretending to be another party because of costs and other controls, including the ability of a recipient to protest a call to the organization maintaining the database 12.
  • a communication that is a reply to an earlier communication can be handled in the same manner as the original message, in other words, according to options set by the addressee of the reply message.
  • replies can be handled differently from unsolicited communications.
  • a software flag or other label can be inserted into the reply automaticalh'.
  • the database 12 can be configured to recognize such a label and to automatically pass the reply back to the sender of the original communication.
  • the database 12 also can be configured to compile and retain lists of the recipient identification codes accessed by each sender. Broadcast communications. such as advertising, can be detected automatically by detecting overuse of an identification code by a transmitting party. Such identification codes can be placed on a list of broadcasters, and parties enrolling in the system can elect to reject messages from anyone on the broadcaster list. To prevent broadcasters from obtaining additional identification codes, multiple identification codes assigned to a single party can be correlated to one another. New identification codes assigned to the party automatically can be placed on the broadcast list. An appeals process can handle exceptions. Broadcasts of changes of contact information that are initiated by the database 12 need not be considered broadcasts for this purpose.
  • the database 12 can be supplemented by associated services that handle various communication types as well as provide contact and control information.
  • Such associated services can include, for example, an email forwarding service that uses information in the database 12 to control the disposition of the email based on the sender.
  • the types of control can include rejecting specified email messages, categorizing email messages by priority, and directing the email to different email accounts based on control instructions in the database 12.
  • a forwarding service for standard postal mail can include screening out unwanted mail or delivering it in a separate container, under control of the database 12.
  • the mail can be delivered in other forms, for example, by scanning it into a digital form to be viewed by a browser or similar software.
  • the foregoing services need not be located at the site of the database 12.
  • a dedicated processor includes instructions for performing the functions described above.
  • the system can include a general-purpose processor.
  • Computer-executable instructions for implementing the techniques can be stored as encoded information on a computer-readable medium such as a magnetic floppy disk, magnetic tape, or compact disc read only memory (CD-ROM).

Abstract

Un système de communication (10) comprend une base de données (12) mémorisant un code d'identification (52) dans un enregistrement de base de données (50). Chaque code d'identification (52) est associé à un élément respectif (54) et est indépendant du moyen de communication de type particulier. La base de données (12) mémorise également des options comportant des informations (58) établies par un premier abonné (54) indiquant la manière dont les communications adressées au premier abonné (54) doivent être traitées. L'équipement fournisseur de services est configuré pour traiter automatiquement une communication destinée à un abonné (54) selon les instructions (58) établies par l'abonné.
PCT/US2001/010606 2000-04-14 2001-04-02 Traitement et gestion de communications WO2001080078A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001249770A AU2001249770A1 (en) 2000-04-14 2001-04-02 Handling and management of communications

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US19762000P 2000-04-14 2000-04-14
US60/197,620 2000-04-14
US61814500A 2000-07-11 2000-07-11
US09/618,145 2000-07-11

Publications (1)

Publication Number Publication Date
WO2001080078A1 true WO2001080078A1 (fr) 2001-10-25

Family

ID=26892997

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/010606 WO2001080078A1 (fr) 2000-04-14 2001-04-02 Traitement et gestion de communications

Country Status (2)

Country Link
AU (1) AU2001249770A1 (fr)
WO (1) WO2001080078A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2405004A (en) * 2002-12-10 2005-02-16 Mk Secure Solutions Ltd Electronic message filtering
GB2405234A (en) * 2002-12-10 2005-02-23 Mk Secure Solutions Ltd E-mail message filtering method for excluding spam
EP1664971A2 (fr) * 2003-09-12 2006-06-07 Motorola, Inc. Appareil et procede permettant de formater un appel multimedia

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5621727A (en) * 1994-09-16 1997-04-15 Octel Communications Corporation System and method for private addressing plans using community addressing
US5742668A (en) * 1994-09-19 1998-04-21 Bell Communications Research, Inc. Electronic massaging network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5621727A (en) * 1994-09-16 1997-04-15 Octel Communications Corporation System and method for private addressing plans using community addressing
US5742668A (en) * 1994-09-19 1998-04-21 Bell Communications Research, Inc. Electronic massaging network

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2405004A (en) * 2002-12-10 2005-02-16 Mk Secure Solutions Ltd Electronic message filtering
GB2405234A (en) * 2002-12-10 2005-02-23 Mk Secure Solutions Ltd E-mail message filtering method for excluding spam
GB2405234B (en) * 2002-12-10 2005-09-14 Mk Secure Solutions Ltd Electronic mail system
GB2405004B (en) * 2002-12-10 2005-12-21 Mk Secure Solutions Ltd Electronic mail system
EP1664971A2 (fr) * 2003-09-12 2006-06-07 Motorola, Inc. Appareil et procede permettant de formater un appel multimedia
EP1664971A4 (fr) * 2003-09-12 2007-04-18 Motorola Inc Appareil et procede permettant de formater un appel multimedia
US7519042B2 (en) 2003-09-12 2009-04-14 Motorola, Inc. Apparatus and method for mixed-media call formatting

Also Published As

Publication number Publication date
AU2001249770A1 (en) 2001-10-30

Similar Documents

Publication Publication Date Title
US9699125B2 (en) Method and apparatus for a non-revealing do-not-contact list system
EP1675334B1 (fr) Enregistrement de listes noires pour la prévention de spam
US6266692B1 (en) Method for blocking all unwanted e-mail (SPAM) using a header-based password
US7330713B2 (en) Handportable cellular telephone adapted to receive messages and a method for processing messages
US6779022B1 (en) Server that obtains information from multiple sources, filters using client identities, and dispatches to both hardwired and wireless clients
CN1303829C (zh) 在无线和非无线环境中促进用户定义伙伴组之外的瞬时通信
US6621892B1 (en) System and method for converting electronic mail text to audio for telephonic delivery
JP5166244B2 (ja) 送信者を識別するシステムおよび方法
US7627642B1 (en) Methods and systems for automatically presenting users with option to call sender responsive to email message
US7660856B2 (en) Method and system for web-based event notification
US7197640B2 (en) Use of identification codes in the handling and management of communications
GB2365566A (en) Addressing Email messages using name and telephone number
US20050100143A1 (en) Identification and management of automatically-generated voicemail notifications of voicemail and electronic mail receipt
US20110287761A1 (en) Systems and methods for filtering cellular telephone messages
US6192218B1 (en) Method and system for identifying and transmitting calling party information as part of a paging signal
US8111819B2 (en) Message server and method for notification of a user about the delivery of an electronic message
US7292679B2 (en) Method and a system for submitting messages deposited in an inbox of a messaging service
JP3451512B2 (ja) マルチメディア情報送達方法及びシステム
EP1198931A1 (fr) Procede et systeme pour messagerie electronique
WO2001080078A1 (fr) Traitement et gestion de communications
EP1129565A1 (fr) Methode de stockage et d'expedition de messages vocaux et de telecopieur au moyen d'une plate-forme de courrier electronique
AU2004208425B2 (en) Method and apparatus for a non-revealing do-not-contact list system
JP2003169095A (ja) 電子メールシステム及び電子メール配信方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP