WO2002011474A2 - System and method for anonymous but personalized provision of services - Google Patents

System and method for anonymous but personalized provision of services Download PDF

Info

Publication number
WO2002011474A2
WO2002011474A2 PCT/IL2001/000696 IL0100696W WO0211474A2 WO 2002011474 A2 WO2002011474 A2 WO 2002011474A2 IL 0100696 W IL0100696 W IL 0100696W WO 0211474 A2 WO0211474 A2 WO 0211474A2
Authority
WO
WIPO (PCT)
Prior art keywords
service
user
mediator
request
identity
Prior art date
Application number
PCT/IL2001/000696
Other languages
French (fr)
Other versions
WO2002011474A3 (en
WO2002011474A8 (en
Inventor
Amir Dorot
Avner Porat
Original Assignee
Cellact Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cellact Ltd. filed Critical Cellact Ltd.
Priority to AU2001282433A priority Critical patent/AU2001282433A1/en
Publication of WO2002011474A2 publication Critical patent/WO2002011474A2/en
Publication of WO2002011474A3 publication Critical patent/WO2002011474A3/en
Publication of WO2002011474A8 publication Critical patent/WO2002011474A8/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Definitions

  • the present invention relates to a system and a method for the anonymous provision of services to subscribers, and in particular, to such a system and method in which such services are provided for data transmission to a cellular telephone according to a fictional identity, such that the service can be personalized for the subscriber without the true identity of the subscriber being known to the service provider.
  • Cellular telephones have recently become increasingly popular for mobile voice communication, as well as for the exchange of text messages and other types of data.
  • cellular telephone systems provide similar services as the fixed, wire-based telephony system, or PSTN (public switched telephony network), except that cellular telephone systems are based upon signal transmission through radio frequency signals rather than wires.
  • PSTN public switched telephony network
  • cellular telephones permit mobile communication, such that subscribers are able to communicate while traveling, or otherwise when they are not at a fixed physical location.
  • cellular telephones permit subscribers to be contacted regardless of the location of the subscribers.
  • SMS short message service
  • WAP wireless application protocol
  • anonymous identity would be preferably unique for a particular subscriber and specific to a particular service provider, in order to prevent cross-referencing of information between different service providers.
  • a more useful solution would enable services to be provided anonymously to the subscriber, such that the subscriber could receive data transmissions through cellular telephones, or various types of services through the Internet on a computer, without being known to the service provider according to the actual identity of the subscriber, while still enabling the service provider to determine which subscriber is requesting the service. Furthermore, such a mechanism would even enable the subscriber to pay for such services as required, while still maintaining the anonymity of the subscriber to the service provider. Unfortunately, such a solution is not currently available.
  • the present invention is of a system and a method for providing a service to a user according to a fictional identity, optionally through a cellular telephone.
  • the present invention enables the user to send the request to a mediator which is able to identify the user, for example for billing purposes.
  • the mediator then masks the true identity of the user, for example with a fictional identity.
  • the request for the service is then sent to a service provider, optionally directly from the mediator, but more preferably through a service request center.
  • the service request center is optionally able to contact a plurality of service providers to request services.
  • the service is then provided to the user, without the service provider being aware of the true identity of the user, yet while still being able to provide personalized services specifically for that user.
  • the same fictional identity is given for the same user for the particular service provider, in order to maintain personalization.
  • a different fictional identity is given for the same user for different service providers, in order to prevent these service providers from cross-referencing information in order to track the behavior of the user according to the fictional identity.
  • a method for providing a service to a user according to a fictional identity through a mediator the user operating a computational device, the method comprising the steps of: (a) sending a request for the service by the user through the computational device; (b) receiving the request by the mediator; (c) assigning a fictional identity to the user by the mediator; and (d) submitting the request to a service provider by the mediator according to the fictional identity.
  • a system for providing a service to a user according to a fictional identity comprising: (a) a computational device for operation by the user; (b) a mediator provider for receiving a request for the service by the user through the computational device, the mediator provider assigning the fictional identity to the user; (c) a service request center for receiving the request from the mediator provider according to the fictional identity; and (d) a service provider for receiving the request from the service request center, and for providing the service.
  • the terms “subscriber” and “user” are used interchangeably to refer to an individual who receives a service through a cellular telephone and/or computational device.
  • network refers to a connection between any two or more computational devices which permits the transmission of data.
  • computational device includes, but is not limited to, personal computers (PC) having an operating system such as DOS, WindowsTM, OS/2TM or Linux; MacintoshTM computers; computers having JAVATM-OS as the operating system; graphical workstations such as the computers of Sun MicrosystemsTM and Silicon GraphicsTM, and other computers having some version of the UNIX operating system such as AIXTM or SOLARISTM of Sun MicrosystemsTM; or any other known and available operating system, or any device, including but not limited to: laptops, hand-held computers, PDA (personal data assistant) devices, cellular telephones, any type of WAP (wireless application protocol) enabled device, wearable computers of any sort, and any device which can be connected to a network as previously defined and which has an operating system.
  • PC personal computers
  • an operating system such as DOS, WindowsTM, OS/2TM or Linux
  • MacintoshTM computers computers having JAVATM-OS as the operating system
  • graphical workstations such as the computers of Sun MicrosystemsTM and Silicon GraphicsTM
  • WindowsTM includes but is not limited to Windows95TM, Windows NTTM, Windows98TM, Windows CETM, Windows2000TM, and any upgraded versions of these operating systems by Microsoft Corp. (USA).
  • computer is used interchangeably with “computational device”.
  • cellular telephone refers to any type of wireless or cordless device which is capable of data transfer through a radio frequency signal, optionally through a connection to the PSTN (public switched telephone network).
  • PSTN public switched telephone network
  • a software application could be written in substantially any suitable programming language, which could easily be selected by one of ordinary skill in the art.
  • the programming language chosen should be compatible with the computational device according to which the software application is executed. Examples of suitable programming languages include, but are not limited to, C, C++ and Java.
  • the present invention could be implemented as software, firmware or hardware, or as a combination thereof.
  • the functional steps performed by the method could be described as a plurality of instructions performed by a data processor.
  • FIG 1. is a schematic block diagram of an exemplary system according to the present invention.
  • FIG. 2 is a flowchart of an exemplary method according to the present invention for operating the system of Figure 1.
  • the present invention is of a system and a method for providing service to a user, optionally through a cellular telephone, according to a fictional identity.
  • the present invention enables the user to send the request to a mediator which is able to identify the user, for example for billing purposes.
  • the mediator then masks the identity of the user, for example with a fictional identity.
  • the request for the service is then sent to a service provider, optionally directly from the mediator, but more preferably through a service request center.
  • the service request center is optionally able to contact a plurality of service providers to request services.
  • the service is then provided to the user, without the service provider being aware of the true identity of the user, yet while still being able to provide personalized services specifically for that user.
  • Figure 1 is a schematic block diagram of a system according to the present invention. It should be noted that although both the system of the present invention and the method of operation thereof are explained with regard to cellular telephones, this is for the purposes of explanation only and is not intended to be limiting in any way.
  • a system 10 features a user 12, labeled "user A”, wishes to receive a service from a service provider 14, labeled "party D". However, user 12 wishes to receive this service with a previously authenticated yet fictional identity. Therefore, user 12 cannot directly contact service provider 14 in order to receive this service.
  • mediator provider 16 knows the identity of user 12, and optionally and preferably also has billing information for user 12, in order to be able to charge user 12 for a received service as necessary. More preferably, mediator provider 16 is able to authenticate the identity of user 12.
  • Mediator provider 16 now preferably contacts a service request center 18, optionally and more preferably with a unique "nickname" for user 12.
  • mediator provider 16 and service request center 18 can be collectively termed “mediator” and can be implemented together as one unit.
  • the unique nickname does not reveal the identity of user 12, however, but is simply used to indicate which subscriber has actually requested the particular service.
  • Service request center 18 preferably has access to a plurality of service providers, shown herein as service provider 14, a second service provider 20 (labeled as "party E") and a third service provider 22 (labeled as "party F”) for the purposes of explanation only and without any intention of being limiting.
  • service provider 14 wishes to receive a service from service provider 14, such that mediator provider 16 submits this request to service request center 18.
  • Service request center 18 then sends the request to service provider 14, optionally and preferably with the fictional identity in order to identify which subscriber should receive the service.
  • Service request center 18 and/or mediator provider 16 are optionally and preferably able to verify that user 12 should receive the service from service provider 14. If user 12 should not receive this service, for example because user 12 has not subscribed to the service, then preferably service request center 18 is able to block the request of user 12.
  • service provider 14 sends a request for payment to mediator provider 16 through service request center 18.
  • mediator provider 16 is able to collect any payment which is due from user 12.
  • service provider 14 may optionally ask service request center 18 to register user 12 for the requested service.
  • service request center 18 registers user 12 according to the fictional identity, as service request center 18 preferably does not have any other identifying information for user 12.
  • Service request center 18 then tells mediator provider 16 of the success or failure of registration for the subscriber as identified by the fictional identity, in order for mediator provider 16 to be able to inform user 12.
  • An example for the operation of system 10 is for data transmission services which are given to a cellular telephone subscriber according to a fictional identity.
  • User 12 therefore operates a cellular telephone for receiving the data transmission or other type of service.
  • User 12 sends a WAP (wireless application protocol) message to mediator provider 16, in order to be able to receive a Web page or other WAP-related data from service provider 14.
  • Mediator provider 16 is assumed to a WAP gateway, for example at a cellular telephone service provider.
  • Mediator provider 16 then communicates with service request center 18 to be able to send the request for the WAP-related data to service provider 14, which is assumed to be a WML (wireless mark-up language) server for serving Web pages in WML.
  • Service provider 14 sends the requested Web page to service request center 18, which passes the Web page to mediator provider 16 according to the fictional identity.
  • Mediator provider 16 then sends the Web page to the cellular telephone of user 12.
  • service provider 14 could provide the service according to any other cellular telephone data transmission protocol, including but not limited to, CDMA, TDMA, GSM or any other packet data protocol.
  • service provider 14 For push implementations of the present invention with cellular telephones, if service provider 14 wishes to contact user 12 to send content as part of a "push" mechanism, service provider 14 then sends a request to push the content to service request center 18. Either service request center 18 or mediator provider 16 then preferably determine whether user 12 has permitted such a push of content. If so, mediator provider 16 then receives the content from service provider 14 through service request center 18, and sends the content to the cellular telephone of user 12.
  • FIG 2 is a workflow diagram of an exemplary method according to the present invention for operating the system of Figure 1.
  • user 12 sends the request for a service to mediator provider 16.
  • mediator provider 16 stores a table, labeled "table B", which provides a unique mapping of the actual identity of each user to the fictional identity for that user.
  • table B has mapped user 12 to the fictional identity of "2".
  • mediator provider 16 sends the request for service from the subscriber having the fictional identity "2" to service request center 18.
  • Service request center 18 has a table, labeled "table C”, which lists all services which each subscriber is allowed to use, according to the fictional identity of the subscriber and the name of the service provider. For example, table C shows that the subscriber having the fictional identity "2" is allowed to receive a service from service provider 14.
  • this table also shows if the particular subscriber is known by a specific fictional identity to the service provider, either for all services or alternatively for a particular service of that service provider.
  • table C shows that the subscriber having the fictional identity "2" is specifically known to service provider 14 according to the fictional identity of "5".
  • table C is optionally and more preferably updated to reflect the change and/or addition.
  • service request center 18 sends the request for a service from the subscriber having the fictional identity of "5" to service provider 14, having converted the fictional identity of user 12 to the specific fictional identity for that particular service provider.
  • Service provider 14 now sends the requested Web page to service request center 18 for delivery to the subscriber having the fictional identity of "5". If payment is required, service provider 14 also sends the charge to service request center 18 for the subscriber having the fictional identity of "5". Service request center 18 then converts the fictional identity to "2”, and sends the requested Web page and/or charge to mediator center 16 for the subscriber having the fictional identity of "2". Mediator center 16 converts the name to the identity of user 12, and sends the desired Web page and/or charge to the cellular telephone of user 12.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system and a method for providing a service to a user, optionally through a cellular telephone. The present invention enables the user to send the request to a mediator which is able to identify the user, for example for billing purposes. The mediator then masks the identity of the user, for example with a fictional identity. The request for the service is then sent to a service provider, optionally directly from the mediator, but more preferably through a service request center. The service request center is optionally able to contact a plurality of service providers to request services. The service is then provided to the user, without the service provider being aware of the identity of the user, yet while still being able to provide personalized services specifically for that user.

Description

SYSTEM AND METHOD FOR ANONYMOUS BUT PERSONALIZED PROVISION OF SERVICES
FIELD AND BACKGROUND OF THE INVENTION The present invention relates to a system and a method for the anonymous provision of services to subscribers, and in particular, to such a system and method in which such services are provided for data transmission to a cellular telephone according to a fictional identity, such that the service can be personalized for the subscriber without the true identity of the subscriber being known to the service provider. Cellular telephones have recently become increasingly popular for mobile voice communication, as well as for the exchange of text messages and other types of data. For voice communication, cellular telephone systems provide similar services as the fixed, wire-based telephony system, or PSTN (public switched telephony network), except that cellular telephone systems are based upon signal transmission through radio frequency signals rather than wires. Hence, cellular telephones are also termed "wireless telephones", and communication over such telephones is termed "wireless communication".
One advantage of cellular telephones is that they permit mobile communication, such that subscribers are able to communicate while traveling, or otherwise when they are not at a fixed physical location. In addition, cellular telephones permit subscribers to be contacted regardless of the location of the subscribers. These advantages of mobile communication are also useful for the exchange of data, such as for text messages and even Web pages, for example. Cellular telephones are able to receive text messages through message exchange protocols such as SMS (short message service), for example, which permit one-to-one communication between cellular telephones through text messages. In addition, the WAP (wireless application protocol) protocol enables cellular telephones, which are WAP-enabled to receive Web pages. Thus, cellular telephones potentially provide a full communication solution for all of the different types of electronic communication for a subscriber.
However, currently such data transmission services can only be provided to a specific subscriber at a specific cellular telephone, such that the identity of the subscriber is known to the service provider. The subscriber can therefore receive services anonymously only if the identity of the subscriber is completely unknown, such that personalization is not possible, which is a serious disadvantage. This problem also exists for regular computers which are connected to the Internet, in that subscribers who are connected to a service provider through a computer must also be identified in order to receive services. Various "anonymizer" mechanisms exist, which attempt to mask the identity of the subscriber for certain specific purposes, such as for sending e- mail (electronic mail) messages for example. However, such mechanisms cannot be used to actually provide services to the subscriber. In particular, these mechanisms do not permit the subscriber to have an identity of some type, which is not the actual identity of the subscriber, yet which enables the subscriber to be identified to the service provider. Furthermore, such an
"anonymous identity" would be preferably unique for a particular subscriber and specific to a particular service provider, in order to prevent cross-referencing of information between different service providers. A more useful solution would enable services to be provided anonymously to the subscriber, such that the subscriber could receive data transmissions through cellular telephones, or various types of services through the Internet on a computer, without being known to the service provider according to the actual identity of the subscriber, while still enabling the service provider to determine which subscriber is requesting the service. Furthermore, such a mechanism would even enable the subscriber to pay for such services as required, while still maintaining the anonymity of the subscriber to the service provider. Unfortunately, such a solution is not currently available.
Therefore, there is an unmet need for, and it would be highly useful to have, a system and a method for the anonymous provision of services to a subscriber from a service provider, particularly for data transmissions to cellular telephones, even if the subscriber is required to pay for such services to the service provider, and such that the service is provided according to a fictional identity, such that the service can be personalized for the subscriber without the true identity of the subscriber being known to the service provider.
SUMMARY OF THE INVENTION
The present invention is of a system and a method for providing a service to a user according to a fictional identity, optionally through a cellular telephone. The present invention enables the user to send the request to a mediator which is able to identify the user, for example for billing purposes. The mediator then masks the true identity of the user, for example with a fictional identity. The request for the service is then sent to a service provider, optionally directly from the mediator, but more preferably through a service request center. The service request center is optionally able to contact a plurality of service providers to request services. The service is then provided to the user, without the service provider being aware of the true identity of the user, yet while still being able to provide personalized services specifically for that user. Preferably, the same fictional identity is given for the same user for the particular service provider, in order to maintain personalization. Optionally and more preferably, a different fictional identity is given for the same user for different service providers, in order to prevent these service providers from cross-referencing information in order to track the behavior of the user according to the fictional identity.
According to the present invention, there is provided a method for providing a service to a user according to a fictional identity through a mediator, the user operating a computational device, the method comprising the steps of: (a) sending a request for the service by the user through the computational device; (b) receiving the request by the mediator; (c) assigning a fictional identity to the user by the mediator; and (d) submitting the request to a service provider by the mediator according to the fictional identity.
According to another embodiment of the present invention, there is provided a system for providing a service to a user according to a fictional identity, the system comprising: (a) a computational device for operation by the user; (b) a mediator provider for receiving a request for the service by the user through the computational device, the mediator provider assigning the fictional identity to the user; (c) a service request center for receiving the request from the mediator provider according to the fictional identity; and (d) a service provider for receiving the request from the service request center, and for providing the service. Hereinafter, the terms "subscriber" and "user" are used interchangeably to refer to an individual who receives a service through a cellular telephone and/or computational device.
Hereinafter, the term "network" refers to a connection between any two or more computational devices which permits the transmission of data.
Hereinafter, the term "computational device" includes, but is not limited to, personal computers (PC) having an operating system such as DOS, Windows™, OS/2™ or Linux; Macintosh™ computers; computers having JAVA™-OS as the operating system; graphical workstations such as the computers of Sun Microsystems™ and Silicon Graphics™, and other computers having some version of the UNIX operating system such as AIX™ or SOLARIS™ of Sun Microsystems™; or any other known and available operating system, or any device, including but not limited to: laptops, hand-held computers, PDA (personal data assistant) devices, cellular telephones, any type of WAP (wireless application protocol) enabled device, wearable computers of any sort, and any device which can be connected to a network as previously defined and which has an operating system. Hereinafter, the term "Windows™" includes but is not limited to Windows95™, Windows NT™, Windows98™, Windows CE™, Windows2000™, and any upgraded versions of these operating systems by Microsoft Corp. (USA). Hereinafter, the term "computer" is used interchangeably with "computational device".
Hereinafter, the term "cellular telephone" refers to any type of wireless or cordless device which is capable of data transfer through a radio frequency signal, optionally through a connection to the PSTN (public switched telephone network).
For the present invention, a software application could be written in substantially any suitable programming language, which could easily be selected by one of ordinary skill in the art. The programming language chosen should be compatible with the computational device according to which the software application is executed. Examples of suitable programming languages include, but are not limited to, C, C++ and Java.
In addition, the present invention could be implemented as software, firmware or hardware, or as a combination thereof. For any of these implementations, the functional steps performed by the method could be described as a plurality of instructions performed by a data processor.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is herein described, by way of example only, with reference to the accompanying drawings, wherein: FIG 1. is a schematic block diagram of an exemplary system according to the present invention; and
FIG. 2 is a flowchart of an exemplary method according to the present invention for operating the system of Figure 1.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention is of a system and a method for providing service to a user, optionally through a cellular telephone, according to a fictional identity. The present invention enables the user to send the request to a mediator which is able to identify the user, for example for billing purposes. The mediator then masks the identity of the user, for example with a fictional identity. The request for the service is then sent to a service provider, optionally directly from the mediator, but more preferably through a service request center. The service request center is optionally able to contact a plurality of service providers to request services. The service is then provided to the user, without the service provider being aware of the true identity of the user, yet while still being able to provide personalized services specifically for that user.
The principles and operation of the present invention may be better understood with reference to the drawings and the accompanying description. Referring now to the drawings, Figure 1 is a schematic block diagram of a system according to the present invention. It should be noted that although both the system of the present invention and the method of operation thereof are explained with regard to cellular telephones, this is for the purposes of explanation only and is not intended to be limiting in any way. As shown, a system 10 features a user 12, labeled "user A", wishes to receive a service from a service provider 14, labeled "party D". However, user 12 wishes to receive this service with a previously authenticated yet fictional identity. Therefore, user 12 cannot directly contact service provider 14 in order to receive this service.
Instead, user 12 contacts a mediator provider 16 in order to receive the service. Mediator provider 16 knows the identity of user 12, and optionally and preferably also has billing information for user 12, in order to be able to charge user 12 for a received service as necessary. More preferably, mediator provider 16 is able to authenticate the identity of user 12.
Mediator provider 16 now preferably contacts a service request center 18, optionally and more preferably with a unique "nickname" for user 12. Optionally, mediator provider 16 and service request center 18 can be collectively termed "mediator" and can be implemented together as one unit. The unique nickname does not reveal the identity of user 12, however, but is simply used to indicate which subscriber has actually requested the particular service. Service request center 18 preferably has access to a plurality of service providers, shown herein as service provider 14, a second service provider 20 (labeled as "party E") and a third service provider 22 (labeled as "party F") for the purposes of explanation only and without any intention of being limiting. In this example, user 12 wishes to receive a service from service provider 14, such that mediator provider 16 submits this request to service request center 18. Service request center 18 then sends the request to service provider 14, optionally and preferably with the fictional identity in order to identify which subscriber should receive the service.
Service request center 18 and/or mediator provider 16 are optionally and preferably able to verify that user 12 should receive the service from service provider 14. If user 12 should not receive this service, for example because user 12 has not subscribed to the service, then preferably service request center 18 is able to block the request of user 12.
Alternatively, if user 12 is allowed to receive this service but payment is due, then service provider 14 sends a request for payment to mediator provider 16 through service request center 18. Next, preferably mediator provider 16 is able to collect any payment which is due from user 12.
According to preferred embodiments of the present invention, service provider 14 may optionally ask service request center 18 to register user 12 for the requested service. In this situation, service request center 18 registers user 12 according to the fictional identity, as service request center 18 preferably does not have any other identifying information for user 12. Service request center 18 then tells mediator provider 16 of the success or failure of registration for the subscriber as identified by the fictional identity, in order for mediator provider 16 to be able to inform user 12.
An example for the operation of system 10 is for data transmission services which are given to a cellular telephone subscriber according to a fictional identity. User 12 therefore operates a cellular telephone for receiving the data transmission or other type of service. User 12 sends a WAP (wireless application protocol) message to mediator provider 16, in order to be able to receive a Web page or other WAP-related data from service provider 14. Mediator provider 16 is assumed to a WAP gateway, for example at a cellular telephone service provider. Mediator provider 16 then communicates with service request center 18 to be able to send the request for the WAP-related data to service provider 14, which is assumed to be a WML (wireless mark-up language) server for serving Web pages in WML. Service provider 14 sends the requested Web page to service request center 18, which passes the Web page to mediator provider 16 according to the fictional identity. Mediator provider 16 then sends the Web page to the cellular telephone of user 12.
Additionally or alternatively, service provider 14 could provide the service according to any other cellular telephone data transmission protocol, including but not limited to, CDMA, TDMA, GSM or any other packet data protocol.
For push implementations of the present invention with cellular telephones, if service provider 14 wishes to contact user 12 to send content as part of a "push" mechanism, service provider 14 then sends a request to push the content to service request center 18. Either service request center 18 or mediator provider 16 then preferably determine whether user 12 has permitted such a push of content. If so, mediator provider 16 then receives the content from service provider 14 through service request center 18, and sends the content to the cellular telephone of user 12.
Figure 2 is a workflow diagram of an exemplary method according to the present invention for operating the system of Figure 1. As shown, user 12 sends the request for a service to mediator provider 16. Mediator provider 16 stores a table, labeled "table B", which provides a unique mapping of the actual identity of each user to the fictional identity for that user. As shown herein as an example only and without any intention of being limiting, table B has mapped user 12 to the fictional identity of "2".
Next, in step 2, mediator provider 16 sends the request for service from the subscriber having the fictional identity "2" to service request center 18. Service request center 18 has a table, labeled "table C", which lists all services which each subscriber is allowed to use, according to the fictional identity of the subscriber and the name of the service provider. For example, table C shows that the subscriber having the fictional identity "2" is allowed to receive a service from service provider 14.
More preferably, this table also shows if the particular subscriber is known by a specific fictional identity to the service provider, either for all services or alternatively for a particular service of that service provider. For example, table C shows that the subscriber having the fictional identity "2" is specifically known to service provider 14 according to the fictional identity of "5". For new registrations of a subscriber, table C is optionally and more preferably updated to reflect the change and/or addition.
Next, in step 3, service request center 18 sends the request for a service from the subscriber having the fictional identity of "5" to service provider 14, having converted the fictional identity of user 12 to the specific fictional identity for that particular service provider.
Service provider 14 now sends the requested Web page to service request center 18 for delivery to the subscriber having the fictional identity of "5". If payment is required, service provider 14 also sends the charge to service request center 18 for the subscriber having the fictional identity of "5". Service request center 18 then converts the fictional identity to "2", and sends the requested Web page and/or charge to mediator center 16 for the subscriber having the fictional identity of "2". Mediator center 16 converts the name to the identity of user 12, and sends the desired Web page and/or charge to the cellular telephone of user 12.
While the invention has been described with respect to a limited number of embodiments, it will be appreciated that many variations, modifications and other applications of the invention may be made.

Claims

WHAT IS CLAIMED IS:
1. A method for providing a service to a user through a mediator according to a fictional identity, the user operating a computational device, the method comprising the steps of:
(a) sending a request for the service by the user through the computational device;
(b) receiving said request by the mediator;
(c) assigning the fictional identity to the user by the mediator; and
(d) submitting said request to a service provider by the mediator according to the fictional identity.
2. The method of claim 1, wherein the computational device is a cellular telephone.
3. The method of claim 2, wherein the request is for a data transmission according to a cellular telephone data transmission protocol.
4. The method of claim 3, wherein said data transmission is a Web page, said mediator is a WAP gateway and said service provider serves Web pages according to WML.
5. The method of claim 1, further comprising the steps of:
(e) receiving the service and a charge for the service by the mediator; and
(f) transmitting the service and said charge to the user at the computational device.
6. The method of claim 1, wherein the service is personalized according to the fictional identity.
7. The method of claim 1, wherein the service is provided by a service provider, such that the fictional identity is always identical for requesting the service from said service provider.
8. The method of claim 7, wherein a plurality of services is provided by a plurality of service providers, such that the fictional identity is different for each of said plurality of service providers.
9. A system for providing a service to a user according to a fictional identity, the system comprising:
(a) a computational device for operation by the user;
(b) a mediator provider for receiving a request for the service by the user through said computational device, said mediator provider assigning a fictional identity to the user;
(c) a service request center for receiving said request from said mediator provider according to said fictional identity; and
(d) a service provider for receiving said request from said service request center, and for providing the service.
PCT/IL2001/000696 2000-07-31 2001-07-26 System and method for anonymous but personalized provision of services WO2002011474A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001282433A AU2001282433A1 (en) 2000-07-31 2001-07-26 System and method for anonymous but personalized provision of services

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US22189800P 2000-07-31 2000-07-31
US60/221,898 2000-07-31

Publications (3)

Publication Number Publication Date
WO2002011474A2 true WO2002011474A2 (en) 2002-02-07
WO2002011474A3 WO2002011474A3 (en) 2002-08-15
WO2002011474A8 WO2002011474A8 (en) 2004-04-29

Family

ID=22829879

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2001/000696 WO2002011474A2 (en) 2000-07-31 2001-07-26 System and method for anonymous but personalized provision of services

Country Status (2)

Country Link
AU (1) AU2001282433A1 (en)
WO (1) WO2002011474A2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2844943A1 (en) * 2002-09-24 2004-03-26 Radiotelephone Sfr Mobile telephone/internet secure access multimedia contents having isolating identifier with field linking first identifiant/user and second field filtering topics chosen only.
EP1439683A2 (en) * 2003-01-20 2004-07-21 Mitel Networks Corporation Internet appliance proxy protocol to support location-based services
EP1484859A1 (en) * 2003-06-06 2004-12-08 Societé Française du Radiotéléphone Control method with opaque user identifier administration for complete delivering of a multi-server service
EP1492306A2 (en) * 2003-06-26 2004-12-29 Vodafone Group PLC System and method for anonymous access at an Internet address, and module for the system
WO2005032100A1 (en) * 2003-09-30 2005-04-07 Telefonaktiebolaget Lm Ericsson (Publ) Means and method for generating a unique user’s identity for use between different domains
WO2006104435A1 (en) * 2005-04-01 2006-10-05 Telefonaktiebolaget Lm Ericsson (Publ) Anonymity in telephony communication systems
EP1764969A1 (en) * 2003-02-20 2007-03-21 Siemens Aktiengesellschaft Method for anonymous communications between a mobile terminal and a WAP-server for use of WAP-service
WO2011141386A1 (en) * 2010-05-10 2011-11-17 Nokia Siemens Networks Oy Anonymizing gateway

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0991242A2 (en) * 1998-09-29 2000-04-05 Phone.Com Inc. Method and apparatus for caching credentials in proxy servers for wireless user agents

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0991242A2 (en) * 1998-09-29 2000-04-05 Phone.Com Inc. Method and apparatus for caching credentials in proxy servers for wireless user agents

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1408670A1 (en) * 2002-09-24 2004-04-14 Société Française du Radiotéléphone-SFR Method for the production of a first identifier isolating a user connecting to a telematics network
FR2844943A1 (en) * 2002-09-24 2004-03-26 Radiotelephone Sfr Mobile telephone/internet secure access multimedia contents having isolating identifier with field linking first identifiant/user and second field filtering topics chosen only.
EP1439683A2 (en) * 2003-01-20 2004-07-21 Mitel Networks Corporation Internet appliance proxy protocol to support location-based services
EP1439683A3 (en) * 2003-01-20 2005-08-17 Mitel Networks Corporation Internet appliance proxy protocol to support location-based services
US7966423B2 (en) 2003-01-20 2011-06-21 Mitel Networks Corporation Internet appliance proxy protocol to support location-based services
EP1764969A1 (en) * 2003-02-20 2007-03-21 Siemens Aktiengesellschaft Method for anonymous communications between a mobile terminal and a WAP-server for use of WAP-service
CN100388206C (en) * 2003-06-06 2008-05-14 法国无线电话公司 Method with management of an opaque user identifier for checking complete delivery of a service using a set of servers
EP1484859A1 (en) * 2003-06-06 2004-12-08 Societé Française du Radiotéléphone Control method with opaque user identifier administration for complete delivering of a multi-server service
FR2855924A1 (en) * 2003-06-06 2004-12-10 Radiotelephone Sfr CONTROL METHOD WITH MANAGEMENT OF AN OPAQUE IDENTIFIER OF USER OF FULL DELIVERY OF A SERVICE USING A SET OF SERVERS
EP1492306A2 (en) * 2003-06-26 2004-12-29 Vodafone Group PLC System and method for anonymous access at an Internet address, and module for the system
EP1492306A3 (en) * 2003-06-26 2006-08-30 Vodafone Group PLC System and method for anonymous access at an Internet address, and module for the system
WO2005032100A1 (en) * 2003-09-30 2005-04-07 Telefonaktiebolaget Lm Ericsson (Publ) Means and method for generating a unique user’s identity for use between different domains
WO2006104435A1 (en) * 2005-04-01 2006-10-05 Telefonaktiebolaget Lm Ericsson (Publ) Anonymity in telephony communication systems
WO2011141386A1 (en) * 2010-05-10 2011-11-17 Nokia Siemens Networks Oy Anonymizing gateway

Also Published As

Publication number Publication date
WO2002011474A3 (en) 2002-08-15
AU2001282433A1 (en) 2002-02-13
WO2002011474A8 (en) 2004-04-29

Similar Documents

Publication Publication Date Title
KR100416342B1 (en) A method for receiving data using SMS and wireless Internet and system thereof
EP2342869B1 (en) System and method for managing and appling history information of terminal in converged personal network service environment, and converged personal network service server, mobile communication and end device therefor
US7606533B2 (en) Method and system for selecting data items for service requests
JP4071862B2 (en) Method and system for participating mobile station in data communication
US7392040B2 (en) Method and apparatus for negotiating mobile services
US7379958B2 (en) Automatic and dynamic service information delivery from service providers to data terminals in an access point network
US7206574B2 (en) Automated exchange of broadband communication addresses over a non-broadband channel in a wireless telecommunication system
US7920827B2 (en) Apparatus and method for facilitating physical browsing on wireless devices using radio frequency identification
EP1621035B1 (en) Method for secure downloading of applications
EP3496373B1 (en) Method for serving location information access requests
US20050277407A1 (en) Method and device for providing mobile services with virtual number
JP2001078273A (en) Method and system for exchanging sensitive information in a radio communication system
EP1195997A2 (en) Efficient communication with passive devices
JP2003502759A (en) SAT back channel security system for mobile terminals using USSD
US20080049691A1 (en) Database management in a wireless communication system
EP1510048B8 (en) Managing a communication device via a gprs and a gsm connection
WO2002011474A2 (en) System and method for anonymous but personalized provision of services
EP2218240A1 (en) Methods for establishing authenticated network connection in a packet-switched message to a short message service server (smsc)
JPH10336345A (en) Method for authenticating originator in communication network system, information terminal and information providing device
KR100541756B1 (en) Method for transferring data in wireless communication system
Ruggaber et al. Using WAP as the enabling technology for CORBA in mobile and wireless environments
US20050165665A1 (en) Billing in a communication system
KR20040079463A (en) Method for providing voice call service during wireless data service upon reguest of a user
KR20060017245A (en) Value added service subscriber information management system and method for mobile communication service system
KR20030025609A (en) Message Service Providing System and Method for Wireless Terminal

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ CZ DE DE DK DK DM DZ EC EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: IN PCT GAZETTE 06/2002 DUE TO A TECHNICAL PROBLEMAT THE TIME OF INTERNATIONAL PUBLICATION, SOME INFORMATION WAS MISSING UNDER (81). THE MISSING INFORMATION NOW APPEARS IN THE CORRECTED VERSION

NENP Non-entry into the national phase in:

Ref country code: JP