WO2004070614A1 - Communication method and communication system in which called person has the initiative - Google Patents

Communication method and communication system in which called person has the initiative Download PDF

Info

Publication number
WO2004070614A1
WO2004070614A1 PCT/JP2004/001182 JP2004001182W WO2004070614A1 WO 2004070614 A1 WO2004070614 A1 WO 2004070614A1 JP 2004001182 W JP2004001182 W JP 2004001182W WO 2004070614 A1 WO2004070614 A1 WO 2004070614A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
party
rule
permission
information
Prior art date
Application number
PCT/JP2004/001182
Other languages
French (fr)
Japanese (ja)
Other versions
WO2004070614B1 (en
Inventor
Guang Feng
Original Assignee
Guang Feng
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to JP2003070953 priority Critical
Priority to JP2003-70953 priority
Priority to PCT/JP2003/012014 priority patent/WO2004082251A1/en
Priority to JPPCT/JP03/12014 priority
Application filed by Guang Feng filed Critical Guang Feng
Publication of WO2004070614A1 publication Critical patent/WO2004070614A1/en
Publication of WO2004070614B1 publication Critical patent/WO2004070614B1/en
Priority claimed from US11/194,906 external-priority patent/US8712397B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/22Automatic class or number identification arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier

Abstract

A communication method and a communication system. In order to cope with the problem that communication not preferable for the called person is increasing as use of the communication network is enlarged and the cost is reduced, there is provided a system for automatically establishing communication which is beneficial for both sides. Moreover, there are provided a method and a system for extracting a potential use value of a communication device by automatic identification of a known transmitter, registration/identification by automatic return of a new transmitter, and providing different processes for the respective transmitters identified. It is possible to reduce a useless communication amount caused by junk mails flowing in the public network, reduce the time required for manual judgment and deletion process, reduce the social load such as legislation establishment/execution, and realize excellent anonymous communication. The method and the system can be used for protecting the existing function of a communication device and a communication auxiliary device, preventing a crime, performing an urgent communication, and realizing a vehicle running guide function.

Description

 Description Communication method and communication system led by called party

 The present invention relates to communication using an electronic device on a communication network, and more particularly to securing communication security at a stage of establishing a communication connection. It relates to the integration of communication and remote control functions that determine all communication according to the will of the called party or the party that controls the called party's communication equipment.

Telecommunications have become widespread. Various information technology services utilizing the Internet are rapidly penetrating the general public, high-speed, large-capacity, constant transmission is spreading to ordinary households, and the caller ID is also generalized! / At present, it has the initiative of caller power communication.

 However, unsolicited communication against the recipient's will, fraudulent deception of the believer, e-mail that has a bad influence on the young, frequently `` attack '' by e-mail, and infection by simply looking at the screen of the received e-mail Innores has suffered serious damage, such as a failure of the “one-ring” incomplete call to cause a telecommunications carrier network to fail and cause extensive paralysis of the line for a long time. Also, negative problems such as paralysis of communication infrastructure and deterioration of function, drowning of normal communication, etc. have emerged. Weaknesses in existing public communications mechanisms have triggered more illegal or lawful behavior.

 Some of the conventional nuisance communication prevention technologies are classified into each alert level. Nothing can cope with various situations at the same time. For example, “Finger B No” rejects reception for a designated partner, but there is a problem that an unspecified number of partners cannot be all specified. In “designated reception”, the power is not received from the specified partner, but it becomes “separationism” (for example, see Patent Document 1, Non-patent Documents 1 and 2).

In the method of Patent Document 6, register the refusal number and solve! Can be more convenient. Depending on the receiving conditions specified by the recipient, it is not accepted or accepted, and the e-mail The speaker determines whether e-mail ^! Is possible.However, it is difficult to determine the conditions themselves, and there is also a problem that it is not possible to specify completely ( For example, see Patent Documents 2 and 3). There is also a method of recording the unopened message in the received unsolicited e-mail and paying it to the owner (for example, see Patent Document 4). Others extract the sender's Hsu information from the arrived e-mail (for example, see Patent Document 5).

 However, these technologies require (a) how to respond after at least one occurrence of unsolicited communication (see, for example, Patent Document 6), and that laws and regulations such as the opto The caller is forced to respond, especially for emails that have little effect. The reasons are: 1. The number of callers is huge. It is annoying to make a single call, and it is not practical to reply one by one. Even if it is rejected, the storage area for the number of items that can be registered is limited, and it cannot be increased indefinitely. tfrt can not solve self-regulation, for example, how to regulate the content of foreign language transmission, countries where there is no legal system for transmission restriction, or prosecuting offenders Not personal, but realistic. 2. I can't deal with one-way junk communication.

 3. We cannot cope with criminal acts such as "oleole fraud" by misrepresenting the identity of the sender, and the problem of being homeless and being used as a murderer! ^.

 (b) Perfect reception conditions cannot be set. With “增 reception” technology, there is a good possibility that important communications will not be received. Strict laws and regulations, and the opt-in method that allows only registrants to send out, impede freedom of expression and business freedom. As a concept of junk e-mail, there is no common criterion for determining what content is junk e-mail without the subjective factors of the individual recipients. Techniques such as filtering using a known spam mail sender database method cannot reflect the subjectivity of the called party at all, and have a limit that can be coped with in a situation where the sender address is constantly changing.

(c) In general, conventional communication systems rely on the notion that the communicating parties know each other's identity. For example, the issue of an individual plays the role of an individual's identity. For this reason, publishing the | g signal easily to an unknown party could lead to some danger. On the other hand, general person-to-person, person-to-company transactions, If you need anonymous communication at the beginning or end in activities such as dating and job hunting, once you invite the other party, your e-mail address or issue will be disclosed to the other party, so when you want to lose yourself easily cut off the relationship with the other party Absent. Patent Document 10 discloses a method in which two steps are required for anonymous communication and a communication channel is established through a dedicated anonymous communication center for removing both identities from communication contents.

 (d) With the advance of technology, small-sized portable communication devices are becoming multifunctional. Use of auxiliary equipment such as cameras, auxiliary location information devices, etc., children, blurred elderly people, can be used safely and as a means of communication even when unattended, satisfying potential needs Absent. For example, some use of position information is provided with a control means for setting a travel route, but the calculation amount is large, and it is not suitable for a small device such as a portable M (for example, see Patent Documents 7 and 8). There are also mobile phones that have a means of receiving radio waves from GPS satellites, but there is no means to prevent unwanted communication!ヽ (for example, see Patent Document 9).

 [Patent Document 1] Japanese Patent Application Laid-Open No. 5-144888 (Claim 1, FIG. 1-4)

 [Patent Document 2] Japanese Patent Application Laid-Open No. 2000-3044 5224 (Claims 11-15, Figure 1-119) [Patent Document 3] Japanese Patent Application Laid-Open No. 2000-108 No. 80 Publication (Claims 1-5, Fig. 1-18) [Patent Document 4] Japanese Patent No. 3 283 873 Specification (Claims 1-2, Fig. 1-3) [Patent Document 5] Japanese Patent No. 3003640 (Claims 1-2, Figure 1-2) [Patent Document 6] Japanese Patent Application Laid-Open No. 2000-29056 Gazette (full text, Fig. 1-3)

 [Patent Literature 7] Patent No. 346003 Akira Ishida (Claims 1-2, Fig. 1-2) [Patent Literature 8] ^ Hei 6-660821 (Claims 1-2, Fig. 1) [Patent Document 9] Japanese Patent No. 30395536 (Full text, Fig. 17) [Patent Document 10] US Patent No. 5888 4270 description (full text, Fig. 11-19) [Patent Document 11] U.S. Patent No. 6,070,149 Aitodashi (^ X)

[Non-patent document 1] Study group on how to respond to unsolicited e-mail, "Interim Report", [online], January 24, 2004, Ministry of Internal Affairs and Communications, p. Search on March 9], Internet URL: http://www.soumu.go.jp/s-news/2002/020124 4.html> [Non-patent document 2] Study group on how to deal with spam mail, "Report", [online], October 7, 2002, Ministry of Internal Affairs and Communications, p. 3-5 [January 9, 2004 Search], Internet URL: http://www.soumu.go.jp/s-news/2002/021007_l.html>

 [Non-Patent Document 3] Mias (J. Myers) RFC1939, POP3 (Post Office Protocol-Version 3) ,, [online], May 1996, IAB (Internet Architecture Boad) standard recommendation document RFC (Request for Comments), p. 11 [Searched January 12, 2004], Internet URL: (ftp://ftp.rfc-editor.org/iii-notes/rfcl939.txt)

 [Non-Patent Document 4] Klesin (J. Klensin), RFC 2821, (Simple Mail Transfer Protocol) ", [online], April 2001, IAB (Internet Architecture Boad) standard recommendation document RFC (Request for Comments) ), p. 32, [Search January 14, 2004], Internet URL: (ftp://ftp.rfc-editor.org/in-notes/rfc2821.txt)

 [Non-Patent Document 5] R Resnick ("RFC 2822 (Internet Message Format)", [online], April 2001, IAB (Internet Architecture Boad) standard recommendation document EFC (Eequest for Comments), p. 26 [Searched on January 20, 2004], Internet <URL: (ftp '// ftp.rfc-editor.org/in-rtotes/rfc2822.txt) Disclosure of Invention

 [Problems to be solved by the invention]

All of these have prevented the intent of the party using the called party's communication «, ie, the inconvenience of the caller! /, And giving the caller control over some or all of the called communication machine. It is about the will expressed in two directions. The problem with the prior art is that it cannot satisfy this will. It is an object of the present invention to solve this problem and satisfy the will of the guilty party. Specifically, it is an object of the present invention to use communication resources efficiently and safely as intended by tGt. Communication, function to control communication devices, open normally Normally, eliminating unwanted communication without impairing conventional communication functions, reducing unnecessary communication volume, emergency communication, anonymous communication, efficient mobile establishment Utilize the auxiliary equipment of communication devices such as information services. Are the objects of the present invention.

 [Means for solving ¾]

 In order to solve the above problem, the present invention provides a method for receiving a call request of individual callers after the callee's intention determines all Mi of the communication device and identifies the caller or caller group. If you receive a request for aversive communication, select one of the methods for dissatisfied treatment and treat the lift self-communication request; tfft Means a method of performing a specific action on a communication request of a specific caller determined by a party.

 The conventional concept of communication is usually caller-driven, and it has been assumed that, for example, when a call is made to the other party, the other party receives the call. The response method is also simple and does not need to be described in special terms. The present invention has various response methods, and there is no appropriate technical term to be concisely expressed. Therefore, the term “treatment” is used to express the relationship between the parties.

 Rejection treatment is an expression of intention to completely reject the caller, communication permission treatment is a conventional communication need, and control permission treatment is a potential need, an expression of desire to give the caller control of the communication device. is there.

 The idea of the present invention starts after all the sender's communications have obtained ttffF permission. If an unknown caller sends a call without permission, they first ask for the caller's name, determine the caller's identity, and decide whether or not to communicate. This is called application acceptance. This flow can be compared to the example of a receptionist or secretary. Instructed the secretary in advance to the prescribed rules, the secretary arrived at the indicated visitor; ^, responded in the indicated manner, if an unknown re-visitor came, name and business And determine whether or not to allow visitors to pass through based on the rules taught by their boss. For example, if your boss is interested in a visitor's business, let him / her know. If you find that you are an old acquaintance of your boss, let him go. A clever secretary will remember the visitor and will be able to quickly decide whether to treat the second visitor kindly or to pay in advance.

 If your boss comes, follow your orders. The boss has control. This is analogous to remote control of communication.

According to the present invention, a party gives an instruction to an electronic secretary who realizes the role of a return secretary in advance, and the disgusting electronic secretary processes a communication request according to the instructions of the party. Electronic secretary with caller ID and Teach the first rule, which consists of a pair of treatments, and respond to communication requests based on the first rule first. Also, tell the electronic secretary the second rule consisting of questions, correct answers and treatment, and do not know how to handle it according to the first rule ^^, ask the sender and ask the sender the correct answer based on the second rule Take action and remember the caller's ID and treatment as the first rule. In addition, instruct the electronic secretary on how to respond to speakers who could not obtain the correct answer.

 The second rule can include the personal information of the parties. For example, if a rule specifies that the party's name is known, it is possible to reject callers who do not even know the name of the called party. Family members and relatives can also be identified using passwords and passwords. In the case of rnis communication, it is possible to use sound knowledge and voice! ^.

 [Action]

As described above, all communications are permissioned by multiple treatments, and the P- caller's question is automatically presented, which provides a means for the unauthorized caller to obtain permission to follow the caller's will. Provide a means for automatically granting permission by automatically scoring answers.

 Based on the iS given to the caller, the caller ID determines whether communication is possible or not. Claim 2 provides a more convenient means of giving permission, and all parties who have contacted the receiver at least once have the first rule. It is automatically stored in the file, and the caller-initiated communication is realized by permitting communication based on automatic judgment to the (only a few) true parties who make a communication request for the first time.

 If there is a mistake in the automatic judgment or if you want to stop the communication relationship, the receiver can arbitrarily deny the given communication permission.

Compared with the prior art in which incoming is selected by designated rejection or designated reception (see, for example, Patent Document 6), the present invention provides the following: designated rejection, designated reception, designated acceptance, designated control 1, designated control 2, ... In addition, countless functions coexist. Therefore, the present invention differs in quality from these prior arts. From another point of view, the setting information list of the conventional technology, such as the rejection of designation of the conventional technology, cannot be set on the receiving side. The present invention is automatically set by the operation of the setting information S on the transmitting side, and The difference is that the setting information list is automatically increased and completed according to the intention of the called party. The difficulty in preventing unwanted communication is: What is the power to become unwanted communication? I can't solve it without finding the answer. The present invention does not provide the answer. The real answer is known only to the recipient. The present invention only lays out a way to realize an electronic secretary capable of fibering the true answer.

 【The invention's effect】

( a ) Prevent spam mail and spam mis. The greatest feature of the present invention is that PM: is performed before a nuisance communication occurs, without being permitted even once logically. 1. If the sender ID and the receiver ID do not match, communication is not allowed. Even if the sender ID can be forged, it cannot be matched with the recipient ID pair. Unauthorized caller IDs cannot be falsified, such as calling notification.If unknown callers are given a limited number of application opportunities, and then unconditionally rejected, it is possible to prevent the program from automatically attempting unsolicited communications. . 2. For those who want to do one-way mti, the application procedure is automatically started; ^, and the charges for communication charges begin to the speaker, so that sanctions can be given. 3. Since it is automatically performed according to the determined procedure for the person who has not been registered, it is possible to deal with “oleole fraud” in which the elderly and others are inadvertently fooled.

 (b) At the same time, in the case of a person who answers the callee's question accurately, for example, the name of the callee can be answered. There is no restriction on the caller's freedom. When you want to sell or advertise a product, both parties will be interested in it if they are interested. The present invention includes means for informing the called party of interest in advance, and does not reject communication that is beneficial to both parties.

 (c) When the present invention is operated on the receiving server, the request can be! Sjh at the time of transmitting a nuisance communication request. It can reduce the amount of communication due to a large amount of wasted mail on the public network, make effective use of equipment, and save money for the nuisance communication of communication companies. Even if it does not operate on the receiving server, it can reduce the social burden of changing communication contracts and implementing legislation, and save time for manual judgment of spam mails and deletion processing. Eliminating unwanted communications will eventually increase the use of communication methods.

(d) Simple anonymous communication, one-way communication that allows only one side to make calls. Dating and job recruiting activities can be performed more easily and easily via a public communication network. (e) Automatically know the other party in accordance with the subjective consciousness of each of the parties, and even if the other party obtains illegal communication permission due to the problem of automatic processing, the permission can be revoked.

 (f) Communication on the receiving side The communication device and the communication auxiliary device can be used efficiently and safely according to the intention of the ruler. , Security, emergency communication, and vehicle guidance functions can be integrated. This creates new uses and new needs.

 As used herein, the term “treatment” refers to a method of performing a specific action on a communication request of a specific caller determined by a party, and the “rule” refers to a search condition of an object to be processed and the corresponding condition. The first rule refers to the knowledge used to control the processing, expressed as a pair of action definition information when the search condition is satisfied. · The “first rule” is related to the sender ID (sender identifier). A rule having a condition part having an application condition and an execution part instructing the execution of an action corresponding to the treatment,

"When actually receiving a communication request from a caller, if the ID of the disgusting caller detected from the t & lB communication request (hereinafter referred to as" actual caller ID ") matches the caller ID in the condition part, The first rule set j is the first set of rules, and the first rule set j is referred to as! /, Create the first rule and add it to the first rule set to give treatment to the caller. ・ The `` second rule '' corresponds to the condition part with the applicable conditions for the expected application contents and the treatment It is a rule that has an execution unit that instructs the execution of the action, and expresses the matter that `` if the application content that t & f expects from the communication request is detected, the obscene communication request will be treated based on the above treatment ''. · The "third rule" is that caller I This rule has a condition part that has application conditions related to D and reception time, and an execution part that instructs execution of the action corresponding to the treatment.If the fact sender ID detected from the communication request is the ffilE "If the caller ID matches, and if a predetermined time has not elapsed since the reception time, the communication request is treated based on the treatment". Is a rule that has a question to be presented to the sender, a condition part that has application conditions regarding the correct answer to the disgusting question, and a part that performs actions related to scoring. If the answer is correct, then the score of Shukumi is counted and the total score is summed up.). ・ The `` fifth rule '' has the applicable conditions regarding the caller ID and the sending time. A rule that has a condition part to perform the action corresponding to the treatment, and an execution part that instructs execution of the action corresponding to the treatment.

"If the destination ID (the caller ID) matches the Shuki callee ID in the condition section, and if the predetermined time has not elapsed since the disgusting transmission time, ifrt "Sending self-originating request" means "Sender" means a member selected from the group consisting of the party and equipment requesting the start of communication. Is the called party ID and the information of the first rule set, and the self-called party ID is the only one, and means the first rule set. · “ID” is determined by the communication service provider. This means the identity U provided to the party using the communication service, and it is possible for one party to send multiple! ^ U children ^ ft. ^ T means that the electronic secretary determines that the communication can be allowed, locks the communication request to the called party, In the same state as when the communication request of the communication means arrives, it is possible to make a final decision on whether or not the callee will communicate.The “receiving client” collects the mail of the callee stored on the server Means devices that can receive e-mail, such as mobile phones that receive e-mail, and services that comply with the POP3 (Post Office Protocol-Version 3) specified in the standard recommendation document RFC (Request for Comments) issued by the IABdnternet Architecture Boad). This is the case for a host that is trying to use e.g., `` The client j means a device that speaks mail, for example, a client terminal that speaks mail, an ISP server that speaks mail, and Means the side that removes the service, the exchange of mii corresponds to the server, · "Receive server" receives and saves the mail, and the called party accesses it ^ \ saved This means a device that provides a service that delivers mail to the recipient, such as a mail center of a mobile mii company and a host that provides POP3 service. "Email" means e-mail;-"Allow control" allows the communication request and confirms that the caller has control. Instructing the local communication device to let the caller communicate with the caller without the intervention of the callee, '"advance application" means that the parties disclose information including their own ID (key IJ child), This means that the caller is requested to apply for communication permission, and before the caller makes a communication request, ΙίίΙΕ it applies to the party for communication permission. The return service ^ ft person, liifS ID before the liifS ID For the party concerned, it means that the person selected from the group consisting of the # 2 person and the third party of the Shukki communication service will register the recommendation information of the contacting party, and "bell permission" means the sender Means that the voice signal acquired by the transmitter of the called party's communication device is acquired. `` Location acquisition permission '' means that the sender obtains the location information obtained by the location acquisition means installed on the called party through the called party's communication device. · "Alert for alert" means to let the caller output information through the called party's communication device to alert the caller. · "Allow information transfer" means for the sender. Information to the called party's communication device “First expected treatment” means a method in which the electronic secretary takes a preset action when treatment cannot be determined by applying the first and second rulesets, "Subject" means informational fields that have the purpose of information read by the person included in the mail header. "Sender's e-mail address" is for a reply specified by the sender. It means the destination mail address that sends the mail to the sender, including the destination mail address. ・ "Treatment application" means applying for communication permission, and the traditional outgoing act is also considered as one form of treatment application. 'A “treatment relationship” is a relationship that is established by the treatment that both parties give to each other, a “treatment set” means a set of multiple treatments, and an “application content” applies for permission to communicate.・ `` Expected application content '' means the called party's ability S expected application content.For example, when asking the other party for the name of the called party, the exact name is the expected application content. Yes, that is, the correct answer to the question is the expected application content, or it can be specified as a topic of interest or a keyword or the expected application content.

 E-mail related terms Conceptual explanation: In general, the flow of e-mail transmission is from the sender terminal (sending client) to the e-mail server (receiving server), from the mail server (game client) to the receiving server, from the receiving server to the receiving terminal (The receiving client). The outgoing mail server has two roles, the receiving server and the client.

 Hereinafter, embodiments of the present invention will be described with reference to the drawings.

Figure 1 shows claims 50-98, 10 using the method of claims 1-49, 101, 103. FIG. 2 is a diagram showing a schematic configuration example of an embodiment of the invention described in 2, 104; The party terminal 101 communicates on the network 104 via the electronic secretary 102, of which the inventions of claims 26 and 75 are transmitted via the electronic secretary. All incoming calls go through the electronic secretary. The electronic secretary may be incorporated into the terminal of the party or the server providing the communication service, or may be incorporated into the mts machine or the ^^ side in addition to the communication. Incorporate on the server side and connect with the terminal concerned through a communication channel. The instruction file 103 may be incorporated into or independent of the electronic secretary. The parties may directly enter data in the instruction file (not shown). The instruction file is stored in the data storage device. As long as the storage device achieves the object of the present invention, for example, an optical storage medium can be employed in addition to a magnetic storage device, an electronic memory circuit such as a RAM and a ROM, and the like. The preferred implementation of the instruction file is a database that organizes, integrates, and retrieves interrelated data, including multimedia information.

 FIG. 2B is an embodiment of the embodiment of the embodiment of the present invention. FIG. 4 is a layout diagram of a record showing the contents of a data database (hereinafter, referred to as R 1 DB) recording a first rule set relating to a caller and 51.

 The table contains all data from the database. A table is a collection of columns. Data is organized in rows and columns. Each row represents a record, and each column represents a field in that record.

 The layout of the record consists of information organized by the phrase "Food Red Name" (left side of the table shown) and "Finoredo | Shiki" (right side of the table shown). Lines match each field. A primary key is a column containing values that uniquely identify each row in a table. A foreign key is a column that establishes a link between the data in two tables.

 R 1 DB has a caller ID and a treatment ID Fino redo.

FIG. 2A is a layout diagram of a record showing the contents of a data database (hereinafter referred to as TDB) recording an embodiment of a treatment set. The specific realization of each treatment differs depending on the device of the party, and the total number of types of treatment that can be realized depends on the device of the party. The set of treatment can be extended and simplified according to the needs of the parties concerned. FIG. 2C is a layout diagram of a record showing the contents of a data 'database (hereinafter referred to as GDB) recording one embodiment of the presentation information. The information presented by Fujimi includes a question to be presented to the caller ^ \ Even in the format shown in Fig. 2F.

 FIG. 2D is a layout diagram of a record showing the contents of a data database (hereinafter referred to as R2DB) that records an example of a second rule set relating to expected application contents and treatment.

 FIG. 2E is a layout diagram of a record showing the contents of a data 'database (hereinafter referred to as R3DB) recording an embodiment of the third rule set relating to the sender, reception time and treatment.

 Figure 2F is a record layout diagram showing the contents of a database (hereinafter referred to as R4DB) that records the questions presented to the caller, the correct answers to the questions of the cafeteria, and an example of the fourth rule set for scoring. It is. The questions and the presentation information stored in the GDB include those selected from the group consisting of text, audio, and images.

 Figure 2G is a layout diagram of a record showing the contents of the data database (hereinafter referred to as R5DB) that records the fifth embodiment of the fifth rule set regarding the recipient ID, the transmission time, and the treatment.

 FIG. 2H shows data 'record layout' indicating the contents of data 'database (hereinafter referred to as TRDB)' which records one embodiment of the treatment relation master.

 FIG. 3A is a layout diagram of a record showing the contents of a party data database (hereinafter referred to as PDDB) according to an embodiment relating to party data.

 FIG. 3B is a layout diagram of a record showing the contents of the confirmation data * database (hereinafter referred to as VDB) in one embodiment relating to the data recording the mm request.

 FIG. 3C is a layout diagram of a record showing the contents of the prover data database (hereinafter referred to as VRDB) in one embodiment relating to the data for recording the prover information.

FIG. 4 is a flowchart according to an embodiment of the first aspect of the present invention. When a caller's communication request is received, the ID of the contacter, that is, the fact sender ID is detected from the self-communication request (401), the instruction file is read (402), and the next first rule set is applied. Apply the first ruleset in the procedure. That is, all rules in the first rule set regarding caller ID and treatment are と し ^ Then, find a rule that satisfies the applicable conditions, search the R 1 DB under the condition that the caller ID and the fact caller ID are -i T (4 0 3), and judge whether or not it has been found (4 04), when the record is detected, that is, when a rule satisfying the applicable condition is found, the treatment given to the disgusting sender can be extracted from the field of the treatment ID. Then, the chrysanthemum part of the rule is executed (406). If not found, the presentation information is presented to the return sender, and the communication request is processed based on the application acceptance treatment (405).

 Accepting the application means allowing the caller to indicate to the called party that he / she wants to communicate, the t & IS action is capable of transmitting the communication requirements including the ID of the calling party to the called party, and After the presentation information is presented to the sender, the sender's original communication purpose cannot be achieved before the sender's response is received and the lift self-reaction is determined to be correct. The term “communication requirements” refers to establishing a communication connection between the caller and the electronic secretary before the caller's original communication purpose is achieved, and requesting communication with the callee who arrives at the ttilB electronic secretary. Means communication contents. For example, in «| g communication, the caller's name, number, and requirements are recorded and communicated to the recipient, and the electronic secretary sends voice guidance and receives the caller's reply, but determines that the reply is correct Do not allow conversations with recipients before they are Repeat questions and answers are possible. Judgment can be made immediately and post-callees can be determined. The reply can be received by Dyano v or voice identification.

 For the purposes of this invention, the term "application accepted j" refers to any exchange that facilitates an ongoing cycle of presenting a guidance message and receiving a response.

 In the case of e-mail communication, the e-mail address, subject, etc. are received, but are not given to the recipient before the contents are determined to be correct, and the electronic secretary returns the presentation information and follows the presentation information. Don't give it to the recipient before the sender's reply is judged to be correct.

 The presentation information can be freely determined by the called party. For example, you can ask the caller for personal information, such as the name of the callee.

Some conventional technologies have the ability to stay away. According to the present invention, it is different from calling a caller or rejecting a caller by checking who the caller is, not IJ. There is a type in which a difficult image recognized by a machine such as a deformed character or the like is displayed to the other party, and an e-mail is received or an account is acquired based on the result of determining whether the other party has human power. The difference is that the personal information of the callee of the present invention can be correctly answered and the other party can be determined to be a relevant person.

 FIG. 5 is a flowchart of one embodiment of the second aspect of the present invention. ID is detected (501), the instruction file is read (502), the first rule set is applied (503), the result is determined (504), and the application is accepted according to the expected application. For all the rules in the second rule set related to the contents and, the rule that satisfies the application condition is found (505), and whether or not the power is found is judged (506), and the rule is found. If there is no treatment, treatment is performed based on the predetermined treatment method, that is, the first expected treatment. For example, 提示 refuse reception after presenting the presentation information to the sender. Or refuse to receive the message without presenting any guidance. It is desirable to decide by the parties. It is desirable that the initial treatment be selected from the treatment set excluding the application acceptance treatment (507). When the conditions for applying the first rule set are satisfied and no rules are found, the application acceptance treatment is executed. It is possible to let the user select whether or not to have power.

 If a rule that satisfies the applicable condition is found, the communication request is treated based on the given treatment, that is, the treatment described in the rule execution unit (508). The treatment includes communication permission and reception ft., And permits various communication depending on the performance of the communication equipment on the receiving side, such as partially permitting communication and recording the requirements of the caller. It can be specified according to the intention of the owner of the equipment. For example, the basic knowledge of basic communication is only: ^ 、 Electronic secretary's communication allowance is simply passed through so that it does not disturb the implementation. If communication is not allowed, simply interrupt all communication. A communication facility incorporating the invention according to claims 33 and 82 has a basic communication function and a function for controlling. The electronic secretary is instructed to perform the control permission treatment on the communication equipment to be in a controlled state, and then the communication contents including the caller's instruction are passed. Further, various controlled states as described in claims 34, 35, 39, 47, 48, 83, 84, 88, 96, 97 can be realized.

FIG. 6 is a flowchart of one embodiment of the method according to the third aspect. Communication is via e-mail It is a belief. Detects the sender's email address (601), reads the instructions file (602), applies the first rule set (603), determines the result (604), applies the second rule set (605), Judging the result (606), the presentation information includes an explanation of the conditions for receiving the mail, and the treatment of the communication permission is to receive the mail. That is, the electronic secretary passes the mail, and the callee receives the mail. Receiving refusal treatment does not receive the mail (608), and presenting the presentation information to the sender means replying the presentation information to the sender (607).

 FIG. 7 is a diagram showing a configuration of an embodiment of a system according to claim 53 using the method according to claim 4. An electronic secretary and instruction files R 1DB, GDB, R2DB are incorporated in the receiving client side user terminal 701. Reference numeral 702 indicates a receiving server of the Internet service provider (ISP).

FIG. 8 is a flowchart of an embodiment of the method according to the fourth aspect. The way to apply for permission to communicate to the sender is to include the application in the subject line of the email. The information to be presented should include at least the content that prompts the applicant to write the application details in the subject of the tirt email, such as presenting a question and prompting them to write their answer in the subject. Then, the user logs in to the receiving server (801), and detects the sender's ID, that is, the sender's mail address from the header of the humble mail (802). For example, by sending the command “TOP 10” described in POP3 (Non-Patent Document 3), a general mail receiving protocol, receiving the header of the first mail from the POP3 server and analyzing it, Email addresses can be detected. Then, the instruction file is read (803), and the first rule set is applied in the first rule set application procedure (804, 805, 809), and a rule satisfying the application condition is not found in the first rule set. In this case, the second rule set is applied in the following example procedure (806, 807). First, for each record of R4DB, the correct answer is extracted one by one (see Fig. 2F). Based on the extracted contents,! / Find what you want and grade it. Then, using all the records in R 2 DB as, a record that matches the score value is detected, and if it is detected, that is, if a rule that satisfies the applicable condition is found, the treatment ID is calculated from the treatment ID field. Can be extracted. Then, the execution part of the rule is executed (809). Initial treatment Process (8 0 8).

 There is also an invention that extracts the sender's! U information from the arrived e-mail (Patent Document 5). The present invention differs in that the sender ID is extracted from the header of the arriving e-mail. The present invention achieves the object without opening the mail body. Therefore, compared with the invention of opening the body of the e-mail, the amount of communication, especially in the case of the mobile phone and the communication with the server, can be significantly reduced.

 FIG. 9 is a diagram showing the configuration of an embodiment of the system according to claims 54 and 55 using the method according to claims 5 and 6. An electronic secretary and instruction files R1DB, GDB, R2DB are incorporated in the receiving server 901. Reference numeral 902 indicates a receiving client. Reference numeral 903 indicates a mail sending client.

 FIG. 10 is a flowchart of an embodiment of the method according to the fifth aspect. The way to apply for communication permission to be presented to the sender is to write the contents of the application in the email Φ ^. The information to be presented should include at least the content that prompts the user to include the content of the disgust application in the subject of the email, receives it up to the envelope (1001), detects the sender's email address, and gives instructions. The file is read (1002), and the first rule set is applied in the first rule set application procedure (1003, 1004, 1009). In order to receive the subject of the email where the rule that satisfies the applicable condition is not found from the first rule set, the header that includes the subject of the fit self email is received (1 0 5), and Then, the second rule set is applied in the second rule set application procedure (1006, 1007, 1009). Process initial treatment (1008).

FIG. 11 is a partial flowchart of the early determination process of an embodiment of the method according to claim 6. The early decision means to decide and execute rejection of the mail before the mail body is completely received. According to the present invention, it is possible to determine rejection of the mail body by judging the content of the mail subject. However, prior art SMT P-compliant mail senders have sent a mail envelope, but before sending the content, there is a step to check for authorization, but once the content of the mail starts to speak, it sends the body There is no previous step to check for authorized data (see Non-Patent Document 4). Therefore, the word client that was forcibly canceled (ie, determined early) by closing the content communication channel, There may be a manufacturer implemented to ignore the error code returned when terminated and repeat. The present invention can realize an early decision that can prevent the generation of useless traffic even when receiving from such a conventional sender.

 The determination process starts from the point where no rule satisfying the application condition of the step of applying the first rule set of claim 5 (FIG. 10 (1004)) is found. Apply the third ruleset according to the third ruleset application procedure below. That is, the R 3 DB is searched based on the condition that the caller ID (the mail address of the caller in this embodiment) is sufficient and that a predetermined time has not elapsed from the reception time to the search time. (1101), judging the result (1102), if the record is detected, that is, if a rule that satisfies the applicable condition is found, the treatment can be extracted from the field of the treatment ID. Then, the execution part of the rule is executed (1110). If no rule that satisfies the applicable conditions is found, the message is received up to the header containing the subject S of the email (1103), and the second rule set is applied by the second rule set application procedure (1104, 1105, 1112), process initial treatment (1106). However, if the treatment and initial expected treatment of the second rule set execution unit include rejection (judgment: 1107), create a third rule based on the fact sender ID, reception time, and reception rejection treatment. Then, in addition to the third rule set (1108), the communication request is processed based on the treatment. If the reception is refused during the treatment, a temporary error status is returned to the sending client, and the communication is forcibly stopped ( 1109), otherwise, the communication request is processed based on the treatment given (1112). The purpose of the third rule is to cause the prior art SMTP-compliant sender to abort the prior art step before it receives the header. Since it only needs to be executed once, the rule is deleted when the execution part of the third rule is executed (1111).

FIG. 12 is a flowchart of an embodiment of the method according to claim 7. The way to apply for permission to communicate to be presented to the sender is to include the details of the application in the email. The presentation information includes at least the content that prompts the user to enter the contents of the self-application in the fif own mail, receives the envelope (envelope) (1201), detects the sender's e-mail address, reads the instruction file ( 1 202), apply the first ruleset in the first self ruleset application procedure (1203, 12 04, 1209). If no rule satisfying the application condition is found from the first rule set, the content is received (1205), and the second rule set is applied in the second rule set application procedure (1206, 1207, 1209). ). Process initial treatment (1208).

 FIG. 13 is a flow chart of an embodiment of a method according to claims 8, 11, 13, 25, 101 utilizing the system according to claims 57, 60, 62, 74, 102. ID is detected (1 301), the instruction file is read (1302), the first rule set is applied (1303), the result is determined (1304), the second rule set is applied (1305), and the result is determined. (1306), Initial treatment is processed (1307). The difference from claim 2 and FIG. 5 is that if the second rule that satisfies the applicable condition is found, claims 101 and 102 further determine the storage condition (131 0), and the condition is satisfied The electronic secretary has found that ¾ίί! Β is to give the caller the treatment of the second rule execution unit. That is, the first rule is created based on the ID of the tfilB sender and the self-service, added to the first rule set (1309), and the communication request is processed based on the service (1308). Normally, the treatment of the ^ part of the second rule found by f! Ff is not accepted, ^ one of the preservation conditions. The storage conditions can be specified or changed by the parties.

 This process is called automatic examination. Using this method, such as correctly answering the question specified by the called party, all the parties who have contacted the recipient at least once are automatically memorized in the first rule, and the same question is answered a second time Is not done. Application acceptance treatment is not usually given to a specific party. Accepted If a person who has been given treatment is demoted and given an application acceptance treatment, it is useful as a record of communication with that person.

 Step 1307 takes action based on the first expectation. The first expectation in this example is to refuse reception after presenting the presentation information to the sender. Unknown sender ^^, It is necessary to present the presentation information in order to have the sender apply for communication permission. If the presentation information was not presented in the exchange of application acceptance, it can be presented in this step. It is also possible to not present it at the will of the parties.

FIG. 14 is a flowchart of a part of an embodiment of the method according to claim 9 using the system power S according to claim 58. The processing of this part is the processing block of the first expectation of claim 2 (Fig. 5 (507)). That is, if the treatment is not determined by the first and second rules, the third rule set is applied by the dislike third rule set application procedure (1401, 1402, 1405). When applied, the corresponding rule is deleted from the Fujimi third rule set (1406), and a first rule is created based on the caller ID and predetermined treatment, and added to the first rule set (1407). If a rule that satisfies the applicable condition is not found, a third rule is created based on the caller ID, reception time, and predetermined treatment, and added to the third rule set (1403). Carry out the original first expectation of claim 2 (1404).

 The present invention automatically replies to the sender whose age is unknown, and sets the identity of the sender as β. However, most spam email replies are now; forged. Automatic replies can create new spam emails. According to the present invention, when a second e-mail is received from the self-reply address, if the party does not include the information that can identify the predetermined identity ^^, the party specifies IB the predetermined treatment, for example, ignoring the reception , Ignore the corresponding address, give reception refusal treatment, and then reject reception without automatic reply.

 In spite of the inconvenience, this invention is able to ISJt an attack by repeated applications. The idea of claim 9 provides a partner with a finite number of application opportunities, and responds to repeated applications using a machine or the like. This can be achieved by including the number of times in the execution conditions or by giving a finite number of application treatments.

 FIG. 15 is a diagram showing a configuration of an embodiment of a system according to claims 59 and 61 utilizing the method according to claims 10 and 12. The electronic secretary and O¾t indication files R1DB, GDB, and R2DB are embedded in the terminal 1501. Provide means for communicating through real-time interaction. The party terminal 1502 having control can communicate with the called party terminal 1501 without intervention of the called party, and can send a control command 1510 to the terminal 1501. The party terminal 1503 that has received the communication permission treatment can perform normal two-way communication 1520 with the terminal 1501. The method of claim 16 described later can communicate and control.

FIG. 16 is a flowchart of an embodiment of the method according to claim 10. ID detection (1 601), read the instruction file (1602), apply the first ruleset and judge the result (1 603, 1604), the rule that the rice cake is formed is not found ^. In the case of ^, the presentation information is presented to the sender, and then the response of the unwanted S sender is received (1605), and the second rule set is applied. (1606, 1607), and depending on the result, treat the communication request based on the first expected treatment or the treatment given (1608, 1609).

 FIG. 17 shows a part of a method according to an embodiment of the present invention. The processing in this part exemplifies the procedure for repeatedly presenting the guidance message, receiving the response, and determining the accuracy of the response. This corresponds to a processing block (FIG. 16 (1605)) of claim 10 in which "presentation information is presented to an apologetic sender and the response of the sender is received". R4DB power / rail data record processing completion is determined (1701), extracted (1702), a question is presented to the caller, and the caller's answer is received (1704). One question can have more than one correct answer. For example, ϋ ^ number, there are multiple 1¾1 Ban Go. In this embodiment, the mechanism for asking multiple correct answers (1705) does not ask the same question, but checks the answer received at the previous question as to whether it is the next correct answer. Judgment is made by giving the R 4 DB a mark that does not require the presentation of a question, or by leaving the question field blank (1703). In some cases, not all questions need to be presented. For example, in some cases the identity of the other party can be determined by the first question. In this embodiment, the total score (1706) exceeds a predetermined score: ^ has a t mark to end the question and answer (1707). The systems according to claims 65, 72, and 73 using the method according to claims 16, 23, and 24 include means for receiving a response from the speaker according to the type of the presentation information. For example, when a response is obtained by pressing the TO Diano number, a means for recognizing the pressed number is provided.

 However, の of the sender is performed by the calling number. According to the present invention, it is possible to iisij the caller by using a number or password issued by the party. Communication is possible from unspecified calling terminals using numbers.

FIG. 18 is a diagram showing the configuration of an embodiment of the system according to claim 66 using the method according to claim 17. The electronic secretary and the instruction file are incorporated in the communication service providing server 1801 side. * A separate instruction file is available and multiple parties are available. Have the right to use The parties enter data to build their instructions file from any terminal 1803 or machine (1820). A communication request or control command of the originator terminal 1802 is sent via the electronic secretary server (1810).

 Fig. 19 is a diagram showing a configuration of an embodiment of a system according to claim 71 using the method described in claim 22. The electronic secretary has the means to access the instruction file (1930) over the network, and one party uses multiple electronic secretaries (1901, 1904). The plurality of electronic secretaries access one instruction file 103. Reference numeral 1940 indicates a mail via the server 1904.

FIG. 20 is a partial flowchart of the transmission process of an embodiment of the method according to claim 26 using the system power S according to claim 75. For all the rules in the fifth rule set relating to the originating time and the treatment of the destination called party II, find the rule that satisfies the applicable condition, judge the result (2001, 2002), and determine if the applicable condition is satisfied. If a rule is found, it processes the outgoing request based on the treatment given (2004). If no tfff rule is found, send a communication request to the called party and receive treatment (2003). The receiving party determines the treatment received by the predetermined return code of the electronic secretary according to the present invention and communicates with the recipient (2005, 2006). If the receiving party uses a conventional technique, for example, if it is a conventional mail receiving server, it is desirable to regard the reception as rejected if an error code of 7 or more is received. A fifth rule is created and added to the fifth rule set on the basis of the treatment received, “cannot communicate immediately”, the callee ID, call time, and treatment of the treatment (2007). A main object of the present invention is to prevent unwanted communication from originating. It is preferably operated on a server as shown in Figs. The party should not enter data into R5DB. If the treatment given to the other party is rejection, repetition of the call within the specified time is prevented. It is desirable that the predetermined time is set by the server administrator. For example, if a treatment such as “Please call again after one hour” is given, you can do it on the server side. If you do not clear R5DB, the number of R5DB records of senders of mass nuisance communication will increase without notice. Depending on the number of R 5 DB records, the server administrator can manage the power to reduce the speech efficiency of the sender, and can manage it. FIG. 21 is a diagram showing a configuration of an embodiment of a system according to claims 80, 81, and 98 utilizing the method described in claims 31, 32, and 49. FIG. 22 is a partial flowchart of the processing of the first party in one embodiment of the method according to claims 31, 32, 49. FIG. 23 is a partial flowchart of a process of a second party of an embodiment of the method according to claims 31 and 49. FIG. 24 is a flowchart of a server search, data transmission, and treatment exchange processing part of an embodiment of the method according to claims 31, 32, 49. The invention may be used simultaneously by two or more parties. In the claims and the following description, the treatment given by the first party to the data disclosure partner is entered into the PDDB, the proxy authorization treatment is given to the server (2202), and the second party sends a search request to the return server Yes (2302).

 See Example 4 for another example of party data in addition to the PDDB.

Parties 2101, 2102 Power S First and second data and at least one party rule for disclosing ttff self-data, and input to server 2103 to give said server communication permission treatment (2110, 2111) , 2201, 2301). The server receives the party data and party rules and stores them in the PDDB (2401). The party rules disclose information, disclose the profile of the person who does not disclose, the power of β before disclose the information, and include information on what information is disclosed to which candidates, Store in the disclosure authorization profile. The second party sends a search request containing the search criteria (2112, 2302), and the server receives it and searches the PDDB (2402). The search result of ¾ ^ of the record meeting the above criteria is sent to the second party (2303, 2403). It is determined whether or not the first data force S satisfies the search criteria (2404) .If there is data of H1 that satisfies the above search criteria, it is determined whether or not the first seven levels are satisfied (2405). ), If satisfied, sends the first data to the second party (2113, 2303, 2406). If the first party gives the server a delegation permit treatment and enters into the PDDB the treatment given to the second party whose first data is to be disclosed, the server will act on behalf of the L: Then, the second party is given a second grant to the subject to be disclosed contained in the first data (2113, 2407). It is determined whether the second party rule is satisfied (2408), and if so, the second data of the second party is transferred. Dislike to send to the first party (2 1 1 4, 2 2 0 3, 2 4 0 9). Claim 31 1: ^, Processing to act as an alternative to the treatment.

 Party rules can be included as a personal recommendation requirement before disclosing information. It is possible to specify in the party rules on the condition that information on the parties has been obtained.

 It is possible to ask the server for β of the information about the parties. Is stored in the microbe database VDB, and the prover information is stored in the prover data 'database VRDB.

 Based on the access permission information (ID, password) stored by the party's instruction file in Sano-ku on the network, log in to the server and enter data in the instruction file. The agency permission is entered in the instruction file based on the access permission information entered by the client.

 The instruction file is stored locally. 亍 Permission is realized by giving the server the information set forth in claim 33! Permission treatment and inputting it into the local instruction file.

 An object of the present invention is to easily realize anonymous communication and easy data exchange.

 A process in which the server processes the search request and determines whether the first data satisfies the search criterion, and satisfies the first (second) second rule disclosing the first (second) data The implementation of the process for determining whether or not is known from Patent Document 10. There are many search techniques that can be used, including keywords, fuzzy logic and natural language search tools.

According to the present invention, since the called party can determine the success or failure of the communication, the connection between the party ID such as the number and the identity can be disconnected. Only connect with people whose personal telephones and e-mails are easily trusted. It is possible to obtain the effect S like a private network in a public network. In the present invention, even if the public network communication ID used by the other party is used, the communication of the other party can be refused later, so that as long as the identity is not disclosed, the anonymity is maintained and the ordinary number can be used. In addition, anonymous communication that can use all communication functions can be realized. For example, the present invention There is no need to intervene a dedicated central controller to remove from the communication content. There is no need to create a special communication channel.

 Using the method of claim 29, the identity β information of the party is stored on the server. The telecommunications service provider or third party managing the server has statutory information protection obligations. In the case of damages caused by illegal activities, the identity of the other party can be checked by legal means, so communication can be performed with confidence.

 If you set the other party's treatment to reject, you can cut off the communication relationship. Necessary, ϋ¾π ι

Use D to sign a new contract for anonymous communication separately from the one for normal use. For example, Nippon Telegraph and Telephone East Corporation (NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION) can use an additional number service in addition to the original subscriber line number, and can use the additional number as a caller ID. You can use the new email address as a follow-up car ID. When the need for anonymous communication is eliminated, setting the treatment to reject reception feels like a burden: ^, Additional ID contracts can be abolished.

 The concept of normal language treatment is exchange. The term treatment of the present invention also has a relation of exchange, but “treatment exchange” is not necessarily simultaneous exchange. In the present invention, only one side can give communication permission, and only the other side can communicate.

 FIG. 25 is a flowchart of an embodiment of the method according to claim 33. Claim 1 added control permission treatment.

 FIG. 26 is a diagram showing a configuration of an embodiment of the system according to claims 82 and 84 using the method according to claims 33 and 35. The party that controls terminal A2601 has given terminal C2663 information transfer permission treatment. The information is transferred from the terminal C to the terminal A, the data is written to the storage device 13 of the terminal A (2610), and when the alert permission treatment is given, the information is output to the display unit 18 through the terminal A. In addition, it is possible to make the speaker 17 emit a sound to call attention of a nearby party. The terminal B 2602 and the terminal A perform normal bidirectional communication (2620).

Fig. 27 shows the method of claims 88, 89, 90, 91, 92, 93 using the method described in claims 39, 40, 41, 42, 43, 44. FIG. 1 is a conceptual diagram illustrating a configuration of an embodiment of a system. The illustrated means are provided for when needed, and are not meant to be all-inclusive. The method of claim 39 The ruler of the mobile device 2701 gave the location call permission treatment to the caller of the terminal A2702. The mobile station issues a location information acquisition command 2 7 1 1 from the terminal A, and the mobile station acquires location information by the installed location acquisition means in accordance with the command, and transfers the acquired location information to the terminal A (2 7 1 2). The method according to claim 40, wherein the frustrated position information is: a GPS position signal received from a GPS satellite 274, position information converted from the received GPS position signal, a base station of a PHS terminal 270 Includes the current location information based on the location information and the one selected from the group consisting of the mobile terminal location information based on the Hfi base station 2.706 location information (hereinafter referred to as “specific location”). According to the method of claim 41, in order to issue a communication request to a terminal 有 す る having a pre-registered ID, ΙίίΙΕ the position information is detected and transferred to the terminal A (2714). The method according to claim 42 further provides the terminal A with the target information, and further gives the terminal A the treatment of (a) information transfer permission and (b) alerting permission. A transfers the information to the mobile device, outputs the information to the information display means of the mobile device, and calls the attention of the nearby party through the mobile device's alerting means (27 15). The calling of attention includes causing the self-organizing mobile device to generate one selected from the group consisting of voice, light, and vibration. 43. The method according to claim 43, wherein the touch destination information includes arrival destination information, and the information to be transferred to the t! FtS mobile device is map information, a summary route, a current route, forward traffic information, and a detour. Includes those selected from the group consisting of information. The method according to claim 44, wherein the disgusting location information includes a specific location. The terminal B2703 and the mobile device perform normal two-way communication (2713).

FIG. 28 is a flow chart of an embodiment of the method according to the present invention. The purpose of this example is to provide a mobile terminal having the function of collecting positional information, for example, a mobile miscellaneous device, to efficiently provide a vehicle with a driving ability. When a communication request is issued to the server terminal of a fixed device having a pre-registered ID, the current location and destination information of the mobile device are transmitted to the server, and the server receives the information (2801). After the server searches for the route and sends it to the mobile station (2802), the server searches the recommended route for congestion information at predetermined intervals (2803) and determines whether or not congestion occurs. (2804) Occurs, the server power given position acquisition permission treatment S Acquires the current position of the mobile device, checks the travel route (2805), and there is a traffic jam before the travel route. If it does, search for a detour (2 8 0 6, 2 8 0 7), a detour exists ¾ ^, information ^ 1 permission, and the server given the alert permission treatment transfers the detour information to the mobile device, and then voices the driver. Notify (2808).

 A route search requires a large amount of calculation and calculation speed. Retrieving dynamic road traffic information from mobile devices is inefficient. According to the present invention, an operation that cannot be performed by an inexpensive mobile terminal is left to a server, and communication is performed to a mobile device only when there is congestion that may be involved, thereby notifying detour information. By giving control permission treatment to the server, the receiving party does not need to perform any operations. Route search and detour search are known from Patent Documents 7 and 8.

 Fig. 29 is a conceptual diagram showing the configuration of an embodiment of the system described in claims 94, 95, 96, 97 using the method described in claims 45, 46, 47, 48. is there. The method according to claim 45, further comprising the step of: detecting the position change of the mobile device 2701, transferring the position information ftilB changed to the terminal A2702 having an ID registered in advance. 2 9 1 1). Terminal A gives the mobile device the information ^ ¾ permission and the alerting permission treatment. In the method according to claims 46, 47, 48, the control permission includes an observation permission. It is assumed that the ruler of the mobile device has given the caller of terminal A permission to listen and monitor. A communication request, command, and command are issued from terminal A (2921). According to the command, the mobile device sends a voice signal obtained by the installed transmitter and an image signal obtained by the imaging device to terminal A (2922). This Italy !! can be used as a mobile device to send children ^! 蒦. For example, parents can find out where their children are and watch their activities in the park or at school. When the child is in school, moving, etc., the positional information that has been changed is automatically sent to the parent terminal A. The mobile device desirably uses PHS, and the information is transferred by e-mail which is packet communication. Terminal A desirably uses a personal computer that is always connected to the Internet via an ADSL line or the like, and displays the location of the child carrying the mobile device on a map in real time. It can also be used for car security. If there is any unintended movement of the vehicle, a warning is sent to the owner of the vehicle and it can be tracked. For those who require high position accuracy such as taxi and transportation, it is desirable to use the GPS position acquisition means!

Patent Document 9 discloses an image display unit that adds position information of a mobile device to map data and displays the image on an image. The mobile device described in Patent Document 9 cannot reject inconvenience. INDUSTRIAL APPLICABILITY The present invention can prevent unwanted communication, especially in the case of children, can set communication permission only for relatives, enhance security, Is different.

 FIG. 30 is a diagram showing the configuration of an embodiment of the system according to claim 100. ίElectronic mail stored in the storage device 13 of the client 301 is sent to the receiving server 302. For examples of the configuration of the electronic mail 3003, refer to the conventional SMTP (Non-patent Document 4, Non-Patent Document 5). FIG. 31 is a flowchart of an embodiment of the method according to claim 99, which utilizes the system power S described in claim 100. Initialize session, Initialize sending client

(3101). Envelope (3102) is an SMT P compliant command: MAIL command, RCPT command to send a line, the sender and recipient mail addresses to the receiving server, and the envelope is accepted. It is checked whether or not (3 1 0 3). The processing up to this point is the same as for SMTP. The information field included in the header is transmitted (3104) to determine the authorization to transmit the body based on the information included in the header, and the information field allows the called party to determine the specified receiving conditions. And check if it is authorized (310 5). In the present invention, this step is called "INFO command". Based on the received tiff envelope and the information fields, the receiving server can match the receiving conditions specified by the called party to determine whether or not to approve the transmission of the next body. Issue the authorized conventional DATA command and say the content (310). Authorized and accepted ^ \ ¾ {normal processing of words, delete already-written mail from storage device 13 (3107, 3109). Unauthorized error processing is performed (3108).

Prior art After the SMT P approves the envelope, the content speaks as a single block a week and performs an approval check. When using only commands in the layer of the mail transfer protocol, it is not possible to reject content reception unless the entire content has been received. Therefore, even if it can be determined that the content should be rejected based on the content, useless communication has already occurred. On the other hand, in the content that has already been widely used (Non-Patent Document 5), the information fields of the subject (Subject), the comments (Comments), and the keywords (Keywords) with the purpose of having the content of information called by the person Can describe information that can determine the specified reception conditions. Existing mail communication software also has a means to record information in the key field. The sender does not know the receiving conditions of the called party first! /, The receiving server informs the calling party of the receiving conditions of the called party by automatic reply means. In addition, the e-mail address of the sender who has satisfied the receiving conditions only once is recorded. For subsequent transmissions, the sender's address included in the envelope is used to judge the sender's address and the sender who has satisfied the previous receiving conditions ^; Pass content without checking information fields. As described above, the receiving server can determine whether to approve the transmission of the lift own body based on the received envelope and the information received before receiving the tin own body.

 It is desirable to separate the i-self information field from the header and send it before the content as the body sending authorization standard.However, in order to make the best use of existing communication software, the i-self information field is headered. The content may be sent out first, and if approved, the content may be sent without changing the content from the conventional one, that is, by the DATA command for sending the conventional content (3106). Alternatively, the header may be sent first, and if authorized, the body may be stated.

 As described above, the present invention utilizes an already widely accepted subject field to construct an efficient mail communication system capable of preventing unsolicited mail communication.

 The invention described in claims 99 and 100 is an invention relating to a client. The inventions described in claims 5 and 54 relate to the receiving server. These can be used simultaneously. BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a diagram showing an example of a basic schematic configuration of the present invention, FIG. 2 is a layout diagram for realizing an instruction file in a database, and FIG. 3 is a layout of records relating to party data, confirmation request data, and attester information. FIG. 4 is a flowchart of claim 1, FIG. 5 is a flowchart of claim 2, FIG. 6 is a flowchart of claim 3, and FIG. 7 is a diagram showing a system configuration of claim 53. FIG. 8 is a flowchart of claim 4, FIG. 9 is a diagram showing a configuration example of the system of claim 54, FIG. 10 is a flowchart of claim 5, and FIG. Is a partial flowchart of the determination process, and FIG. 12 is a flowchart of claim 7. FIG. 13 is a flowchart of claim 8, FIG. 14 is a flowchart of claim 9, and FIG. 15 is a diagram showing a system configuration example of claim 59. 16 is a flowchart of claim 10, FIG. 17 is a diagram showing a procedure of presenting a repeated guidance and receiving a reaction, and FIG. 18 is a diagram showing an example in which an electronic secretary and an instruction file are incorporated in Sano's side. Yes, FIG. 19 is a diagram showing an example of accessing an instruction file through a network, FIG. 20 is a flowchart of a transmission processing part, FIG. 21 is a diagram showing the system configuration of claim 80, FIG. 2 is a partial flowchart of the processing of the first party, FIG. 23 is a partial flowchart of the processing of the second party, FIG. 24 is a flowchart of the treatment exchange processing part, and FIG. It is the flowchart of claim 33, and FIG. FIG. 27 is a diagram showing a system configuration of claim 82, FIG. 27 is a conceptual diagram showing a configuration of a position information system, FIG. 28 is a flow chart of a vehicle travel guidance function, and FIG. Fig. 30 is a conceptual diagram showing the configuration of the change monitoring system. Fig. 30 is a diagram showing the configuration of a mail sending client. Fig. 31 is a mail sending flowchart. Fig. 33 is a diagram showing the contents of the instruction file of the disgusting machine. Fig. 34 is a flowchart of the telephone. Fig. 36 is a diagram showing an example of automatically giving treatment, Fig. 36 is a diagram showing the configuration of an answering machine, Fig. 37 is a diagram showing the contents of an instruction file of the telephone, and Fig. 38 is a menu reception Block diagram showing the configuration of the client system FIG. 39 is a diagram showing the contents of the instruction file of the system, FIG. 40 is a schematic diagram showing the reception process, FIG. 41 is a diagram showing a question input screen, and FIG. 2 is a diagram showing an initial expectation selection screen, FIG. 43 is a block diagram showing the configuration of the Internet videophone system, FIG. 44 is a block diagram showing the internal configuration, and FIG. 45 shows the operation of the main program. Fig. 46 is a diagram showing the main menu ffi, Fig. 47 is a diagram showing the contact book TO, Fig. 48 is a diagram showing the add member screen, Fig. 49 Is a diagram showing a treatment application process, FIG. 50 is a diagram showing a personal setting screen, FIG. 51 is a flowchart showing a mouth guin processing operation, and FIG. 52 is a friend list editing screen. Fig. 53 is a diagram showing a treatment application qualification designation screen. 5 4 shows the operation of the TV telecommunications program. FIG. 55 is a diagram showing a connection waiting screen, FIG. 56 is a diagram showing a videophone communication screen, and FIG. 57 is a diagram showing an outline of a flow for establishing a treatment relationship.

 [Explanation of symbols]

 11, 111, 211 ... Control means

 12, 112, 212 ··· 'I / O control means

 13, 14, 114, 214 ... Storage device

 15, 115, 215

 16 ... Keyboard and display.

 17… Microphone, speaker

 18 ... Camera, keyboard and display. BEST MODE FOR CARRYING OUT THE INVENTION

 When the present invention is operated on the server side, the effects of preventing unwanted communication and reducing the traffic of the entire network can be obtained at the same time. If the automatic screening function is used at the same time, the convenience on the receiving side will increase. Furthermore, when the control permission function is used at the same time, a multifunctional terminal is realized.

 [Implementation ^ Π

 Example 1. Automatic answering machine (3201)

 FIG. 32 is a block diagram showing the configuration. Reference numeral 17 denotes a microphone and a speaker. Figures 33A-D show TDB, R1DB, R2DB, R4DB). The presentation information is a question to be presented to the caller. The question is a pre-defined audio file. In this example, the blank question field indicates that the question is not required to be presented, and the predetermined total score for the early completion of the question and answer is 3 (see Figure 17 (1707)). If the total score is 5, the caller automatically gives the caller the treatment of the second rule execution section (see Fig. 13 (1310)).

FIG. 34 is a schematic flowchart of the process, and the basic part is the same as in claims 11 and 13. In this embodiment, the power of the party terminal is the machine, or the party terminal It can also be implemented as an external adapter dedicated to a TO machine. For the first time, the caller sends a question message to the caller from the mis number that the callee does not know, and the caller answers by pressing the dial button. The response is cut in half ij to determine treatment.

 FIG. 35 is a diagram showing an example in which automatic examination is performed to automatically give a telephone number of a related person a treatment that allows a normal call. According to the present invention, information that can be understood only by the called party is instructed to the electronic secretary in the instruction file. Various functions can be set from the basic nuisance communication prevention function. The instruction file setting in this example can realize the following functions. Designated reception for each mis number of the other party (Treatment ID

= 4), refusal of designation (treatment ID = 1), unknown party needs to accept the application, so the call is automatically received immediately without ringing, so the other party is charged the communication fee. As a result, it is possible to give financial sanctions to the caller of the SIS incomplete call (one cut) SIS, and there is no reply of the caller's power, so the total score = 0, treatment ID = 0, Rejected, the number will not remain in the reception history. However, the party giving the permission sounds the same ringing tone as usual, and no charge is made until the recipient receives the call. If you misspell the callee in the first question, you will be immediately rejected. In other cases, pressing 4 will send you the second question, prompting you to press the dial button for real estate sales: 1, for English conversation, 2 for household goods, and 4 for sports equipment. When each selection is made, the system automatically sounds a ringtone according to the score, records without ringing, disconnects the call, does not automatically store the caller ID even if the call is made, or automatically Remember. When the security code 5 6 7 8 is pressed, the call is automatically connected without ringing. This allows you to monitor your home and children. For example, you can choose whether your parents can talk to your child's mobile tongue.

 The first question in this example is simple, but you can set it to ^ i to suit your actual situation. For example, first name and last name are divided into two questions and presented in order (first square and then second eye S are presented), and each of them presents five options. Probability is reduced by a factor of 25.

The number set to positive ^! Can have various functions depending on the device. For example, it can be used as an extension number, and if the guidance question is "Please press extension number", that number Can be received regardless of the calling number.

 If the calling number of the other party's home phone is given treatment, if the same person makes a call from a public phone, ask the user to enter the other party's home number as the identification message in the guidance message, and enter the number and the treatment 'It information The treatment can be confirmed by collation.

 The specific method of examining the treatment application depends on the configuration of the party's device. Various methods can be adopted as long as they achieve the purpose of the examination step of the present invention. For example, it is conceivable to utilize sound recognition and image recognition.

 Used in games etc. In some cases, the automatic mistaking bow I of the existing technology sends voice guidance to the caller, which is operated by pressing the dial button and confirming the customer by using a personal identification number. The present invention differs from the present invention in that the answering method differs for each calling number and that the caller does not need to register a password in advance.

 In this example, the electronic secretary accepts the intention of the parties by rules and scores, but it is also possible to accept in natural language. For example, "Receive a call from someone who knows my name.", "Receive a call to my interests." The electronic secretary can listen to these requests using well-known rule-based technology (for example, see Patent Document 11), and let the user input the required information and information, and can organize the necessary rules.

 The electronic secretary of the present invention can be installed on the server side using known technology (for example, see Patent Document 6).

 Example 2 Answering Machine | Machine (3661)

 FIG. 36 is a diagram showing a telephone according to an embodiment of the system described in claim 104 using the method described in claim 103. Figures 37A-C show a data database (GDB) that records TDB, R1DB, and response guidance (presentation information).

This example illustrates the concept of the present invention, in which all communications are permissioned by multiple treatments, providing a means for granting permission to unauthorized parties. In this example, you don't directly receive the mis call ^^ This protects the elderly and other vulnerable people from fraudulent crime. Business such as ¾ to use non Japanese Mete ^ except by that n registers suitable to the user having a certain limited communication range It is also possible to refuse all «K from outsiders who do not have it, and with the accumulation of use time, the treatment setting will be completed naturally, and the purpose can be achieved without undue burden on the parties.

 For example, the first expected treatment is to be away from home, and you can talk immediately if you can identify yourself with the other party's voice. It is desirable to devise operational convenience, such as registering the number of the other party who called last with a single button. If there is an important customer, you can register the number of the other party in advance. Callers can be identified by group. For example, it is possible to translate a region code and give a communication permit to the home number. This example is simple and easy to use and has low manufacturing costs. It can be implemented on an external adapter dedicated to telephones, or on a server that provides switching equipment and related services.

 Conventionally, when a communication request is made by paying money, it is natural that the receiving side receives the request. However, with the development of the communication network, the cost of issuing a communication request is becoming lower and the number of people who can access the communication network is increasing. No reason. At the very least, it should be possible to deny mis from people who have nothing to do with it. Conversely, except for public services, the person who calls sis usually knows in advance the person he wants to talk to and has a requirement. Therefore, the communication based on the permission system of the present invention can prevent unwanted communication at a level where the conventional communication function is hardly sacrificed.

 Example 3. Mail receiving client system

In the present embodiment, the electronic secretary is incorporated in the party terminal. And product Lee spoon as a PC (personal computer) application (URL: litt: 〃 www.netiniotech.co.jp, http://www.Emailship.com) N is expected to be soon published sale.

FIG. 38 is a block diagram illustrating the configuration of the third embodiment. In this figure, reference numeral 10 denotes an ISP server β. Reference numeral 381 denotes a mail service terminal. This embodiment is a client of the mail service server of IS @, and reference numeral 11 denotes control means, which is constituted by a CPU, etc., for controlling each part, ^^ of data, various operations, temporary storage of data. Storage, etc. Reference numeral 12 denotes input / output control means for controlling data input from a server connected via a communication line and controlling data output to the server. Symbol 15 is for communication It is a means of transmission and connects to an ISP. Reference numeral 16 denotes a keyboard and a display unit, and reference numeral 13 denotes a storage device.

 First, such a program is used in the control means 11 and includes, for example, a program for setting a treatment, an initial expectation, a requested question, a correct answer, a score to be given to the correct answer, an electronic secretary main body program, and the like. You.

 Next, the storage device 13 stores data such as an instruction file. A magnetic storage medium is used as the storage device. Figures 39A-E show TDB, R1DB, R2DB, R4DB, and GDB. Automatically reply to the caller with questions and suggestions. FIG. 40 is a schematic flowchart of the receiving process. The basic parts are the same as in claims 4 and 8 and FIGS. The control means 11 causes the display section of the terminal 38 1 to display a question input screen as shown in FIG. 41, and, for the terminal operation, a criterion for determining this treatment, that is, a request am question and a correct answer Prompt the user to enter the number of points to be given to the correct answer (4 1 0 1). When an e-mail from a sender without permission arrives at the server, the system automatically replies to the sender with the information and questions that guide you to the permission application, and asks you to enter the answer to the question in the subject of the response mail during the application guidance. Many spam messages were automatically quoted by «. For example, if you get the correct answer to a question such as “How many do you add one?”, You know that the sender is not «but a human, Unlike transmitting machines, the carer can decide for himself whether he wants to receive it in the future. Of course, there are many machines that can add, but it would not be profitable to automatically make a machine that can answer each individual question.

 The present invention can achieve the object without opening the mail body. In particular, the amount of traffic in the billing portion of the connection with a server such as a mobile phone can be significantly reduced. If a correct answer is found in the subject or body of the e-mail, for example, the name of the called party or a keyword in the category of interest, a predetermined treatment is given. In other words, the permission application procedure is performed implicitly, which can be convenient for the sender. It is desirable to use the form of the present invention that resides on the server side to search from the text.

The control means 11 causes the display section of the terminal 38 1 to display a screen as shown in FIG. 42, and for the terminal, selects the first expectation 4 202 from the list 420 1 Encourage them to do so. Fig. 39A shows the treatment set adopted in this example, and the specific realization of the treatment of the application acceptance type is one treatment of “replying the request confirmation question to the sender and rejecting reception”. If necessary, you can add, for example, “Respond to the request confirmation question to the sender and receive only the subject”. A specific realization of a type of treatment that partially permits communication is “receive limited size, save it in a temporary folder, and notify the called party”. Furthermore, the treatment of “remember the contents of the application and notify the called party” is necessary for the manual examination. If the called party gives the final treatment, the treatment decided by the automatic examination can be changed. ^ Received from an unknown e-mail address requests β as initial treatment, returns a question to the sender, and rejects the request.

 In the initial setting of the product according to the present embodiment, first, after obtaining the party's permission, the recipient listed in the address book or the like of the existing mail software is given an acceptable treatment (treatment ID = 5) (Fig. 42, 4). 203) After that, you can always allow individual reception, enter the reception address or domain name, and set or change the treatment for each sender. In addition, it can be set so that the recipient address is extracted from the e-mail that the parties said weekly, and the reception permission treatment is automatically given. Fig. 39 is an example of the set treatment information, and the following functions can be realized simultaneously. In other words, for each address or domain, designated reception (treatment ID = 5) and finger ¾ ¾ (treatment ID = 1), reject unwanted mail automatically sent by «¾ (total score = 0, Treatment ID = 2), unrelated people (1 + 1 = 2 powers S) receive limited mail and wait for manual treatment examination (total score = 1, treatment ID = 3), callee's Receives mail sent by someone who knows the name and waits for manual treatment examination (total score = 2, treatment ID = 4), usually sends mail sent by someone who knows the recipient's birthday Receive (total score> 3, treatment ID = 5). See Figure 17 for scoring.

This embodiment character code is included in the mail header information - carry out the multilateral language corresponding processing of de information and caller Adoresu of domain name presentation information Te basedヽto local information that is included in the suffix of 0

 Example 4. Internet videophone system

 In the present embodiment, an electronic secretary operating on the server side and a mi-television terminal communicating with the client side via a disgusting electronic secretary are used.

1: FIG. 43 is a block diagram showing the entire configuration. FIG. 4 shows the internal structure of the first embodiment. FIG. 3 is a block diagram illustrating a configuration. In this figure, reference numeral 430 denotes a server, which is connected to the Internet via a route control device and an Ml tongue line. Reference numerals 431 to 434,... Denote various types of terminals, which are connected to the Internet in the same manner as the server 430. Here, each of the terminals 431, 432,... Has an output unit such as a CRT, an LCD, and a speaker, an input unit such as a keyboard, a mouse, a camera, and a microphone, and a function of pursuing a television program.

 1-1: Server Configuration Next, the detailed configuration of the server 430 will be described. FIG. 44 is a block diagram showing the configuration of the server 430 and the terminal. In this figure, reference numeral 11 denotes a control means, which is composed of a CPU and the like, and performs control of each unit, data transfer, various calculations, temporary storage of data, and the like. Reference numeral 12 denotes input / output control means for controlling data input from a terminal connected via the Internet and controlling data output to the terminal. Sign

Reference numeral 15 denotes a communication transfer means for connecting to the Internet. Reference numerals 13 to L4 are storage devices, and the following files are stored and stored, respectively.

 First, the storage device 14 stores a main program. Such a main program is used by the control means 11 and is used, for example, to display a program for displaying a treatment application screen on a display unit of a terminal, and to display detailed information on the transmission of the treatment application. i From the examination program, the public name of the party who applied for treatment in the party's contact book, the status display of the other party, the video phone program, and the program for displaying icons to be transmitted to the first person, etc. Be composed.

Next, the storage device 13 stores a party master database table and a ■ relationship master database table. The party master record stores party information records. One party information record consists of party-specific information such as the ID, password, e-mail address, IP address, and self-introduction (see PDDB for another example of party data). In this embodiment, the party ID is automatically assigned by the control means 11 when newly registering for service participation. Claims 14, 28, 29, 37, 63, 77, 78, 86 Execution of identity registration can be performed at this stage. Pass The address, e-mail address, and self-introduction store the information registered and said from the terminals 431, 432,…. As the IP address, the address of the terminal that was mentioned when the television IS communication program of the terminal 431, 432, ... was started is stored. The treatment relationship master stores a treatment information record. One treatment information record includes treatment information and treatment application indication information.

 When the present invention is operated on the client side, the treatment given to the other party by R 1 DB is recorded. For operation on the server side, it is desirable to use the treatment-related master TRDB (see Fig. 2H) with high efficiency in this embodiment. The treatment information consists of the recipient's own ID, the sender's ID that the recipient has given treatment, and ΙίίΙΒthe treatment given. The treatment information and the treatment application sign information are information input from the user interface of the program for displaying the treatment application screen on the display unit of the terminal, and are information transmitted from the terminals 431, 432,…. is there.

 2: The operation will be described. Here, the terminals 4 3 1, 4 3 2,…

The connection is made with the terminal 30 to perform communication, and both function as terminals of the party involved in the TV miscommunication. However, for the sake of convenience, the following description will be given assuming that the terminal 431 is connected to the server 4330. server

When the terminal 431 is connected to 4300, the control means 11 detects the connection force via the S / I input / output control means 12 and controls the terminal 431 according to the main program. Fig. 45 is a flowchart showing the operation of the main program.

2-1: To explain the process of creating the party information record, it is assumed that the party is a new party. Explain new registration. In step S a 1 shown in FIG. 45, the control unit 11 causes the display unit of the terminal 4 31 to display a main menu screen as shown in FIG. In order to use the service, the user is prompted to select the desired process from “Login” and “New registration”. On the main menu screen, mouse power MC is displayed, and various operations can be performed by clicking a predetermined place. For example, if the mouse cursor MC is positioned in one of the display areas of the link buttons 4601 and 4602 and clicked, the processing indicated in the display area is performed. Click the mouse cursor on the display area of button 22U, 22D, 22L, 22R. When the MC is positioned and clicked, the rectangular display area defined by the vertices of the triangle scrolls up, down, left, and right, respectively. Here, the end ¾¾ ^ moves the mouse cursor MC to the display area of the link button 4602, and then performs a click operation (this operation is simply referred to as a click hereinafter) to execute “New”. Select the "Register" process. Then, upon detecting this, the control means 11 advances the procedure to step Sa2 shown in FIG. 45, and in this step, inputs the name, e-mail address and password to the terminal operation. Prompted. If it is determined that the input e-mail address is not used by the party master, the control means 11 automatically assigns a user ID based on the input information, and the user ID is used as a public ID of the party. use. The next step S a 3 is performed. In step Sa3, the control means 11 controls the terminal 431 to display the contact book screen shown in FIG. 47. In the following steps Sa4 to Sa7, the user can return to the contact book screen and the main menu screen at any time by performing a predetermined operation. Now, on this contact book screen, for the newly registered party: ^, no contact is displayed in the contact book, but for convenience of explanation, the explanation will be made using the screen where there are already several persons.

 First, the addition of a new partner will be described. According to the present invention, in order to communicate with the other party, first, the other party is requested to be treated. Adding a new partner is a specific procedure for applying for treatment. On the new partner's screen, at the same time as applying for treatment to the other party, specify the treatment to be given to your own shochu. Prompt the member for the terminal operation. For the end, click the link button 47701. Then, the control unit 11 performs the process of the next step Sa4. In step Sa4, the control means 11 controls the terminal 431 to display the member addition screen shown in FIG. 48, and sends the public ID information to the terminal "¾". Prompt for input.

Here, column f of the prior application of claims 14, 27, 38, 63, 76, 87 is shown. The public ID is disclosed by the parties themselves on an Internet bulletin board or a chat on the communication network, or is directly taught by the other party. On this member's addition screen, the ID and self-introduction input boxes 4801, 482 are shown. Regarding the information disclosure treatment to be given to the other party, "publicize the e-mail address to this member", "private Publish mail address "," Homepage Check buttons 480 3 to 480 7 corresponding to "Publish dress", "Publish profile address", and "Publish my status to this member" are shown, and A selection box 480 08 corresponding to “Allow incoming calls” is shown, and the terminal operation is prompted to input and select. The terminal sets the public ID of the other party to 200 and the “UID” button. Enter in Tatus, and your introduction is '· ·'. "In the" About me "box and then click on the Execute link button 4810.

 In the treatment set of the present embodiment, there are three types of incoming call permission for the TV MIS incoming call response method: “automatic reception rejection”, “every time inquiry”, and “automatic reception”. “Automatic reception” is control permission treatment. The receiver's communication device: Instructs the Tvmis terminal that the caller has control, and can communicate with the ttff's own caller without the caller's intervention. Of course, the terminal must always be able to receive.

 Regarding the scope of information disclosure to the other party, "Public e-mail address to this member", "Private private e-mail address", "Publicate homepage address", "Publicate profile address", " The status can be made public ”(4809), and there are two types of treatment applications:“ Allow treatment application ”and“ Reject treatment application ”. The default initial expectation is“ Every time ” If you do not disclose all information, it will be "Approval of treatment application". This embodiment does not include the function to change the initial expectation.

Now, the next execution process of the procedural skill S treatment application is performed by vigorous operation (see Figure 49). Here, it is assumed that the terminal operation is “a”, the partner to communicate with is “a”, and the public ID of the barb “b” is 200. The control means 11 has already created whether or not the party a already exists in the sender list of the party b in order to process the treatment application based on the treatment given by the party b to the party a. Check by searching the party master (4901), did ^^, check the treatment that party b gave to a for the treatment application (4902), and the treatment given was "Refuse treatment application" ^ After controlling to display “Member's mouth rejected” (S a 8) on the display section of terminal 4 3 1, return the procedure to step Sa 3 and display the contact list screen again. If party a does not exist in party b's list of senders and the treatment given is not `` great treatment application, '' ^^ gives default initial expectation to party a, ID of b and a and initial expectation And treatment application marking Create a new treatment information record composed of information, store it in the treatment relation master, and return to the contact book screen.

 In step Sa3, the control means 11 controls the terminal 431 to display the contact screen shown in FIG. 47. Prompt the end user for personal settings ¾ ^. For the terminal operation, click the link button 4702. Then, the control means 11 performs the processing of the next step Sa7.

 In step Sa7, the control means 11 controls the terminal 431 to display the personal setting screen of the party shown in FIG. 50, and provides the terminal operator with the public ID 50 01 is displayed, the display area of the public ID is controlled to be write-protected, and the personal information 5002 is controlled so that it can be changed.

 2 _ 2: Log-in, 2-1 assumes that terminal 4 3 1 is operated, and completes the treatment application to party b. Here, it is assumed that the existing party b is operating the terminal 4 32. For the sake of explanation, the screen displayed on the terminal 431 in the description of 2-1 and FIGS. 46 and 47 are used here as the screen displayed on the terminal 432 of the party b. The following description is based on the assumption that the terminal 432 is connected to the server 4330. When the terminal 432 is connected to the server 4330, the control means 11 detects this connection via the input / output control means 12 and controls the terminal 432 in accordance with the main program. FIG. 51 is a flowchart showing the operation of the main program to perform a mouthful processing.

Now, in step S a 1 shown in FIG. 45, the control means 11 displays a main menu screen as shown in FIG. 46 on the display section of the terminal 4 32, and The user is prompted to select the desired process from “Login” and “New registration” to use the service. In this example, enter the mail address and password in the “Mail Address” input box 4603 and the “Password” input box 4604. Perform a click operation and select "Login" processing. Then, upon detecting this, the control means 11 checks by searching the already created party master based on the input e-mail address and password (Fig. 51, 5101). Where the control hand In step 11, if it is determined that the e-mail address and the password are not correct, the procedure proceeds to step Sa7, and control is performed to display "incorrect e-mail address password" on the display of the terminal 4 32. After that, the procedure returns to step Sa1 to display the main menu screen again. On the other hand, if the control means 11 determines that the input e-mail address and password are correct, it performs the processing of the next step Sa3. At step Sa3, the control means 11 1 controls the terminal 4 32 to display the contact book screen shown in FIG. 47, and extracts a new applicant for treatment from the treatment relation master, Notifying party b, party a who has applied for treatment in party b's contact book will be displayed with its public name souss (4705), and in accordance with the information disclosure treatment provided by other party to party b. Make the state public with colors and icons (4 7 0 6), and contact the person who published the mail address! /, The mail creation icon is displayed (4703), the link icon is displayed for the person who has disclosed the profile address (4704), and the detailed information of the corresponding person is displayed with the pencil icon. To control. When the link button (4707) is tlicked, the control means 11 performs the processing of the next step Sa5. In step Sa5, the control means 11 controls the terminal 432 to display the friend list item edit screen shown in Fig. 52, and performs treatment examination and treatment change on this screen. Display the detailed information 5203 of the party a who sent the treatment application to the party b, and control the editing of the treatment 5201 provided to the party a. Examine the treatment application, decide the treatment to be given to the party a, and urge to select each treatment content. In addition to the examination of the treatment application, the change of the treatment given to the existing partner is also performed on the item edit screen of the friend list.

Now, the party b selects each treatment content and clicks the link button 5204. Then, the control means 11 updates the treatment information record based on the selected treatment content and stores it in the treatment relation master. To cut off the relationship with the other party ^, click the link button 5202 to delete the other party. Then, the control means 11 performs the process of step Sa6. In step Sa6, the control means 11 1 controls the terminal 4 32 to display the treatment application qualification designation screen shown in FIG. 53, and the treatment application qualification 5 Rejection " If you select, you will be disconnected from the other party in the future. Party b licks the link button update 5 3 0 2. Then, the control means 11 updates the treatment information record based on the selected treatment content and stores it in the treatment relation master.

 This example illustrates the implementation of the anonymous communication function part of the invention described in claims 31, 32, 49, 80, 81, 98. As long as the parties do not disclose their identities, as long as the anonymity is maintained, anonymous communication that can use all communication functions easily can be realized using a normal number (ID). The server is not a dedicated central controller that removes identities from communications, and does not need to create special communication channels. In order to prevent crime, it is only necessary to securely register the ID at the acquisition stage.

2-3: Television M communication, based on the processing described in 2-1 and 2-2, assume that party a and the party have established a treatment relationship, and server 430 has terminal a of party a and terminal of party b on server 430 Assume that 4 3 2 is connected. FIG. 54 is a flowchart showing the operation of the television communication program. In step Sa3, the control means 11 performs control to display the contact book screen shown in FIG. 47, and the party b clicks the link button "Start the program" (4708). Then, the control means 11 activates the videophone communication program for the terminal of the party b, and passes "1" as the activation parameter. When the TV ® | ¾ communication program is started, the terminal sends its own IP address to the server (5401), and determines whether or not the startup parameters are IP address strength (5402). If it is determined that is not an IP address, it displays the connection waiting screen and waits for connection (Sb3: Connection waiting screen, Fig. 55). Check the waiting connection request (5405). The control means 11 updates the information record of the party b based on the IP address information sent by the terminal television program of the party b and sends the updated information record to the party master. Then, to display the parties b status icon (FIG. 4 7, 4 7 0 9) to the camera icon contact book screen of the parties a. Party a clicks the camera icon 4 7 0 9 of party b. Then, the control unit 11 extracts the IP address of the party b from the party master, activates the videophone communication program of the terminal 431 of the party a, and passes the IP address as a parameter (5403). Notifies the speaker ID and sends the destination IP address. Request a connection to the party b, that is, make a call to the party b and receive the response of the TV miscommunication program of the called party b 404). When the connection request arrives, the caller b's TV miscommunication program asks the control means 11 for the caller ID as a query ^: parameter, and the control means 11 receiving the query ^: sends a server based on the caller ID to the server. The treatment information is extracted from the 430 fiber relation masters (5406), and the treatment given to the sender party a is returned to the videophone communication program as a result of the inquiry. The treatment given to the sender party a is ^^ (5407, YES), and the electronic secretary instructs the receiver's communication device Tvrnis terminal that the sender has control, and in response to this, Caller b's TV TO communication program permits the communication request without ringing the bell, without displaying the input request screen and input request, sending a connection approval response, automatically connecting, and using the camera. When the other party acquires the image signal to be acquired, that is, sends the image signal and simultaneously receives the image signal sent by the other party, it displays it on the screen, and displays the screen during the TV miscommunication (s2: TV mi¾communication screen, (Fig. 56) is displayed.

 On the other hand, the TV of the caller party a «| §

After step 409, the received image signal is displayed on the screen during videophone communication, and communication or monitoring is performed (Sb2). The treatment given to the sender party a is “every inquiry” (Fig. 54,

5408, YES), Television MIS communication program of called party b sounds a tone and displays an input request screen (Sb 4: Approval inquiry screen: "Participant a. ) Is displayed and asks the party b of the called party who can or cannot connect. ^ ¾ "At the same time, the TV misi communication program of the caller displays the screen waiting for approval of the other party (Sb 1: Screen waiting for approval:" Waiting for other party's approval ... "is displayed.) When the callee b approves the connection (Fig. 54, 5410, YEs), the TV miscommunication program displays the TV miscommunication screen and responds to the caller party a's television ¾fg communication program as having accepted the connection, Then, the TV TO communication program running on the terminal of the caller party a determines this response (5409, YES), displays the TV telephone communication screen, and performs communication. Callee b does not approve the connection ¾ ^ (Fig. 54, 5410, NO), TV MIS communication program connects ίTera machine (Status display: 5501) screen is displayed, and caller party a's TV TO communication Make the program reply that the connection was refused, and then The television lllgii communication program running on the party's terminal a determines the response (5 409, NO) and displays “access denied” on party a's terminal display (Figure 55, 550 2, After displaying the connection as shown in Figs. 54 and 5411), display the connection standby screen and wait for the connection (Sb3: Connection standby screen, Fig. 55). The treatment given to the sender party a causes the same processing as in the case of “automatic rejection of reception” (Fig. 54, 5408, NO), where ftft self-callee b does not approve the connection.

3: Outline of Flow Next, Fig. 57 shows the flow of establishing a treatment relationship with the called party via the public ID. In order to receive the communication service of the present invention, the party a first logs in to the server 5702 via the Internet using the terminal 5701, and uses the public ID: 200 that was disclosed by the party b. However, a treatment application that expresses the desire to communicate with the other party b is made (1). The party a who applies for treatment inputs the public ID of the called party b: 200 (Fig. 48, 4801), and at the same time, the party a gives the other party b the "every inquiry" (4808) treatment. The server stores the treatment “Every time inquiry” given by the party a to the designated party b in the treatment relation master (5703), and the party a is not included in the sender list of the party b: ^, Give the initial treatment “automatic reception” to party a (5704). In this state, party b can transmit and communicate with party a. Communication in the opposite direction is not possible. The speaker takes the initiative. Inform the party a that the server has accepted the application to the party a (3), (4). This * ¾ ^ uses terminal 5705 to login to the server, extracts the new applicant for treatment from the treatment relation master, and informs party b of (5) to (8). The party a who made the treatment application in the contact book of the party b is displayed with his wife and the public name souss of the party a (4705), and according to the information disclosure treatment given to the party b by the other parties, the color and icon Publish the state with (4706). Figure 52 displays the details of the party that sent the treatment request to the parties. Party b examines the treatment-related application and decides the treatment to be given to the other party a (Fig. 52, 5201). The treatment given to the other party a, “Every time,” is replaced with the treatment “automatic rejection of reception” stored in the server (10). This allows parties a and b to send a connection request to each other on the videophone. Industrial applicability

As described above, the present invention is suitable for a communication method using an electronic device on a communication network.

Claims

Scope of the request This is a method of performing communication via an electronic secretary system (hereinafter referred to as “electronic secretary”) that supports communication in a telecommunications network. Processing the communication request in accordance with the instructions of the averse party, the method comprising: (a) inputting data to build an instruction file instructing the business to the electronic secretary; 1) A first set of rules described by a rule having a condition part having an applicable condition regarding a caller ID (caller identifier) and a ^ f 亍 part instructing to perform an action corresponding to treatment ( Hereafter, the first rule set) and (The first rule set) are defined as “when a communication request is actually received from a caller, if the ID of the caller detected from the tiilB communication request (hereinafter“ fact Caller I D ”) matches the caller ID in the condition part, the communication request is treated based on f & f self-treatment.” In this specification, the first rule is It is said that creating and adding to the first rule set gives treatment to the caller), (2) presentation information to be presented to the caller, and (b) the electronic secretary capable of performing the following operations. Performing a communication. (1) Detect the ID of the disgusting sender from the communication request from the sender, (2) access the instruction file, (3) apply all rules in the ttrf own first rule set as Find the rule that holds, and execute the hater / rail execution section (hereinafter simply referred to as applying a predetermined set of rules). (4) Present the fffffS presentation information to the t & IB sender, ( 5) For each humble communication request, (i) 伝 send the communication request to the called party (hereinafter referred to as “communication permission J”) and (ii) reject the tfilE communication request (hereinafter, And (ii) receiving a communication request (hereinafter referred to as “application acceptance”), and a plurality of treatment methods (hereinafter referred to as “treatment set”). When a request is received, one of the above IGt self-communication request to be treated; in this specification, unless otherwise specified, the tiff self-treatment method is referred to as “treatment,” and the specific caller's specific communication request to be determined by the parties. The term “acceptance of application” refers to a method of taking action, and the term “acceptance of the application” allows the caller to indicate to the called party that he / she wants to communicate, and the guilty act is to convey at least information for the calling party to the called party. It is not possible to achieve the original communication purpose of the caller before it is possible to present the presentation information to the caller, receive the caller's response, and determine that the communication can be permitted based on the ttilS reaction. "" Means the communication that arrived at the electronic secretary before the sender's intended communication purpose was achieved. 2. The method according to claim 1, wherein the self-instruction file further includes a condition part having an application condition regarding an expected application content, and a purple part instructing execution of an action corresponding to the treatment. The second set of rules (hereinafter referred to as the “second rule set”) and the second rule (IfflS second rule are described as follows) And process the request for self-assessment communication ”), and the acceptance of the application includes the following operations. (a) 嫌 I hate myself from the communication request. Detect the application content that I expect. (b) Apply the second rule set of tfflS. 3. The method of claim 2, wherein the return communication is an e-mail communication, the ilB sender ID is the sender's e-mail address, and the bogus presentation information includes a description of the conditions for receiving the e-mail. The self-communication permission treatment is to receive an e-mail, the tflt self-presentation is to reply to the sender, and when the communication request arrives, the electronic secretary first If the rule set is applied, and no rule satisfying the application condition is found, the application is accepted. In the step of accepting the application, the application condition is satisfied when the second rule set is applied. If no rule is found, that is, the treatment cannot be determined, a method characterized by presenting the ttilS presentation information to the iff sender and then rejecting the fit self communication request. 4. The method according to claim 3, wherein the presentation information to be presented to the disgusting sender makes an application for permission for communication, and the presentation information is a content that prompts at least to describe the application content in the subject of the e-mail. The electronic secretary is installed on the receiving client side, and rejecting the communication request is to send a delete command to the receiving server to delete the electronic mail from the receiving server. The secretary-in-law electronic secretary logs in to the receiving server, receives the header including the subject of the above-mentioned e-mail, and then applies the first rule set of tfft, and accepts the application. Method (the term “receiving client” as used herein means a device that can retrieve the e-mail of the called party stored on the server, and the “receiving server” hand Resides, if the called party to access, means a device for the service to pass the stored e-mail to the recipient). The method according to claim 3, wherein the presentation information to be presented to the caller causes the application of permission for communication, wherein the presentation information includes a content prompting the user to describe the application content in at least a subject of the unwanted S-mail, Disagreement 3 An electronic secretary is set up on the receiving Sano side, and rejecting the communication request means stopping the communication after notifying the client of the tfff e-mail that an error has occurred, and the electronic secretary is When a request for communication is received, first, ftflB factual sender ID power S is received up to the envelope (¾f) of the above-mentioned e-mail, and the first rule set is applied, and the application conditions are satisfied. If the rule is not found, receive the subject of the ffffS e-mail and accept the application (the term used in this document, “ It means a device to send e-mail). The method according to claim 5, wherein the instruction file further includes a condition part having an application condition regarding a caller ID and a reception time, and an execution part instructing execution of an action corresponding to treatment. The third set of rules described below (hereinafter referred to as the “third rule set”) and the third rule are described as follows: “If the fact sender ID detected from the communication request is the sender ID in the condition section, And if the predetermined time has not elapsed from the tfif self-reception time, the IfflB communication request is processed based on the disgust treatment. " Can further perform the following operations: (a) create the third rule and add it to the third rule set; (b) apply the third rule set; Stopping (a) First, tfff own third rule set If the rules that apply the conditions are satisfied and no rule is found, the third rule is created based on the fact that the sender ID, the reception time and the reception rejection treatment are used. (3) In addition to the rule set, returning a temporary error status to the return message of the return e-mail, then forcibly terminating the communication by closing the underlying delivery connection, and (b). If a rule that satisfies the applicable conditions is found, the client of the e-mail is notified of the occurrence of a permanent error, the communication is officially stopped, and the applicable rule is changed to the third rule. v A method characterized in that it includes removing a cutout. 7. The method according to claim 3, wherein the presentation information to be presented to the conferees is to apply for permission to communicate, and the presentation information includes at least content that prompts the user to describe the application content in a disgusting e-mail. An electronic secretary is set up on the receiving server side, and rejecting the return communication request means stopping the communication after notifying the client of the e-mail that an error has occurred, and When the request for guilty communication arrives, the self-secretary first receives the envelope (envelope) of 101 self-e-mail containing the fact sender ID, and applies the first rule set. A method characterized by receiving the content of the above-mentioned e-mail and accepting the application if no established rule is found. 8. In the method according to claim 3, when applying the second rule set of tins, if a second rule satisfying the application condition is found, treatment of the execution unit of the found second rule is performed. To a tfrf self-speaking speaker. 9. The method according to claim 2, wherein the self-instruction file further includes a third rule set, and the return electronic secretary can further perform the following operations. (a) Create the 3rd rule of Shuki and add it to the 3rd rule set of Shuki. (b) Apply the set of 3rd rule of disgusting. 10. The method of claim 2, wherein the communication is a telephone communication, the presentation information includes a description of a condition for receiving the communication, and when the communication request arrives, the electronic secretary first: Applying the first rule set, if no rule that satisfies the applicable conditions is found, accept the application, and in the step of accepting an aversion application, present the iflE presentation information to the tfrt own sender. In response to the caller's response, the second rule set is applied, and no rule that satisfies the applicable conditions is found. That is, the treatment cannot be determined. A method characterized by processing ttrf self-communication requests based on a predetermined processing method including rejecting communication after that (hereinafter referred to as “first expected treatment”). 10. In the method according to claim 10, when the second rule set is applied, when a second rule satisfying the application condition is found, an execution unit of the found second rule is used. Giving treatment to tfilE senders. 2. The method according to claim 10, wherein the treatment set authorizes the communication request, instructs the called party communication device that the caller has the control right, The method of including communication without intervention (hereinafter referred to as “control permission”). 3. The method according to claim 10, wherein the self-treatment set includes a control permission, and when the second set of return rules is applied, if a second rule satisfying the application condition is found, A method of giving the caller the treatment of the execution unit of the second rule that has been found. 4. The method according to claim 13, wherein the parties disclose information including their IDs (identifiers) to cause the caller to apply for permission to communicate, and the request includes making the request through the Internet. Before the caller issues a request for communication with the café, the application requesting permission of the communication to the apologizing party is specified, and the party using the communication service is specified by the ID, and the provider of the communication service specifies the ID. Providing to a party using the key communication service, wherein the one selected from the group consisting of a third party of the communication service and a third party registers identification information of the party. And how. 5. The method according to claim 14, wherein the first control permission and the second control permission are the control of the self-control, and the first control permission of the control is the communication between the caller and the third party. This means that the voice signal acquired by the transmitter of the device is acquired (hereinafter referred to as “¾ permission”). A method of setting the position information to be acquired by the position acquisition means installed on the side (hereinafter referred to as “position acquisition permission”) as a glue sheet. 6. The method according to claim 15, wherein the disgust presentation information further includes a question to be presented to the self-originator, and Iff! The return-to-self instruction file, which is an answer to the self-question, is further provided with a rule having a self-question to be presented to the leaked sender, a condition part having an application condition concerning the correct answer of the question, and a part for executing an action concerning the score. (The fourth rule set is called “fourth rule set”.) The fourth rule dislikes is “If the answer to the tfllB question from the vulgar sender is correct, dislike 3 points And sum up the total score)), and the lift secretary of the electronic secretary can further perform the following operations. (a) present the self-question to the self-sender, (b) receive the Mf self-sender's answer to the question, (c) | & apply the fourth set of rules. 7. The method according to claim 2, wherein the self-treatment set permits the communication request, instructs the called party communication device that the calling party has control, and informs the calling party of the called party. A method characterized by including communicating without intervention (hereinafter referred to as “control permission”). 8. The method according to claim 17, wherein the control permission is to cause the caller to send information to a communication device on the receiving side (hereinafter, referred to as "information ^ ¾ permission"). Method. 9. The method according to claim 17, wherein the self-control permission is a position acquisition permission. 0. The method according to claim 17, wherein the control permission is a permission.
1. The method according to claim 17, wherein the permission to control the self-return control causes the return caller to obtain an image signal obtained by an imaging device installed on the receiver through the receiver's communication device. (Hereinafter referred to as “translation permission”).
2. The method according to claim 2, wherein the touch input includes one selected from the group consisting of inputting through a network and performing input operation from a mis-machine.
3. The method according to claim 2, wherein the t & f self-presentation information further includes a question to be presented to the self-originator, and the expected application content is an answer to the question with a predetermined total score. The itrt self-instruction file further includes a fourth rule set, and the electronic secretary can further perform the following operations. (a) submit the ffit question to the t & f caller; (b) receive the caller's answer to the question; and (c) apply the fourth set of rules.
4. The method according to claim 23, wherein the disgust presentation information includes one selected from the group consisting of text, voice, and image, and the tfilE answer includes a number, text, voice, and image. A method selected from the group consisting of:
5. In the method according to claim 2, when applying the second rule set to Shuki, if a second rule satisfying the application condition is found, the execution unit of the found second rule waits. A method characterized by giving a treat to a caller.
6. The method according to claim 2, wherein the IilB instruction file further comprises: a condition part having applicable conditions relating to a callee ID and a transmission time; and an execution part instructing execution of an action corresponding to the treatment. The fifth set of rules (hereinafter referred to as the "fifth rule set J") and the fifth set of rules (the fifth rule set, "If the destination ID (caller ID) is If the ID matches the ID and the predetermined time has not elapsed from the transmission time, the request for the fiflB transmission is processed based on the self-service treatment. " The secretary should also be able to: (a) Apply the fifth rule set of tiilB, (b) Send a communication request to the called party and receive treatment, (c) Create a fifth rule of disgust, and add it to the fifth rule set.
7. The method as claimed in claim 2, wherein the tfflH party discloses information including its own ID and causes the caller to apply for permission to communicate, including making an iff self-application through the Internet, Before sending a Iff! Self-communication request, the caller must apply for permission to communicate with the key user.
8. In the method according to claim 27, the # ^ party of the communication service removes the ID to the party using the | & | self communication service, and the third party of the communication service ^^ and the third party. A method selected from the group consisting of: registering the identity β of the lift party and information.
9. In the method described in claim 2! The provider of the communication service makes the ID the party who uses the communication service, and the identity selected from the group consisting of »the party of the flit own communication service and a third party is A method characterized by registering information.
0. In the method according to claim 29, the tfif self-provider provides one or more additional IDs ¾ft separately from the fit self which has already been given the original ID. The method characterized by doing.
1. The method according to claim 2, wherein the first party includes first data including his / her own ID, and at least one first party rule for disclosing the first data. A server 'system (hereinafter simply referred to as a "server") to provide said server with said communication permitting treatment; and a second party including second data including its own ID and said second data. Enter at least one second party runore to disclose the ffft3 server and give the disgusting server the communication permission treatment; and send a search request including at least one search criterion to the server And a method in which both parties receive data from their own server, which performs the following processing. (a) the tirt server processes the self-search request and determines whether the first data satisfies the search criterion; if the first data satisfies the search criterion, The following processing is performed. (1) If the first party's first party data disclosing the first data is satisfied, Send to the second party. (2) ifS fulfills the second party rule disclosing the second data of the second party, m fit the second party's ffilH second data to fit first party.
2. The method according to claim 31, wherein the treatment set includes causing a caller to act on behalf of the party and provide treatment to a third party (hereinafter referred to as "transfer permission"). The first party gives the lift server a disgust ftf permission treatment, and includes the treatment given to the second party to whom the Sfrt himself data is to be disclosed, in addition to the tooth first data. If the first party rule that discloses the tins first data of the first party is fulfilled, the café server acts as the originator, acting on behalf of the first party and acting on the second party. of A method characterized by giving the parties personal treatment (hereinafter referred to as “treatment exchange”).
3. The method of claim 1, wherein the self-serving set further comprises: permitting the humble communication request to indicate to the called party communication device that the caller has control; A method characterized by including communication without the intervention of the called party (hereinafter referred to as “control permission”).
4. The method according to claim 33, wherein the tfft self-control permission is to cause the caller to send information to the called party communication device (hereinafter, referred to as “information transfer permission”). Features method.
5. The method according to claim 3 4, wherein the control permission, the second control permission exists, before Symbol second control authorization, to output the information through the called party communication device to肅己callers Calling the callee's attention (hereinafter referred to as “warning permission”), and calling attention to the person, is to select something selected from the group consisting of voice, light, and vibration. A method of laying a tree including generating in a communication device.
6. The method of claim 33, wherein accepting the application includes recording information for the sender.
7. In the method according to claim 33, the communication service provider makes the ID the party using the it self communication service and selects from the group consisting of the ttft self communication service ^ party and a third party. Registering the identity of the party. 8. In the method according to claim 37, the t & lB party provides the tfft party already provided with the original ID with one or more additional IDs separately from said original ID, Disclose information, including your ID, to have the caller apply for permission to communicate, including making the request through the Internet. A method characterized by applying for communication permission to a business person.
9. In the method according to claim 33, (4) the control permission is to cause the ttlfS sender to acquire location information acquired by location acquisition means installed on the called party through the called party's communication device ( Hereinafter referred to as “location acquisition permission”).
0. The method according to claim 39, wherein the position information is a received GPS (Global Positioning System) position signal, position information converted from the received GPS position signal, a current position of a PHS (Personal handy phone) terminal. And information selected from the group consisting of mobile terminal location information obtained based on the mobile base station location information (hereinafter referred to as “specific location”).
1. The method according to claim 39, wherein the ffftS receiver communication device is a mobile communication device (hereinafter, referred to as “mobile device”), and the dislike mobile device communicates with a terminal having an ID registered in advance. The method of issuing a request is to detect tGIE location information and transfer it to a tiT terminal.
2. The method according to claim 41, wherein the control permission includes an information transfer permission and a warning permission permission, and the t! HB mobile station transmits a communication request to a terminal having a pre-registered ID. If so, the purpose information is transferred to the disgusting terminal, and further to the disgusting terminal.
(b) The permission to alert and the treatment of, and the alerting are characterized in that the ttilB mobile station generates an object selected from the group consisting of voice, light, and vibration. And how.
3. The method according to claim 42, wherein the destination information includes arrival destination information, and the information to be transferred to the mobile station is a group consisting of map information, ■ route, forward congestion information, and detour information. A method comprising including a selection.
4. The method according to claim 43, wherein the disgusting location information includes a specific location.
5. The method according to claim 41, wherein the gf | B motive detects the position change and sends the changed position information to the t & f terminal.
6. The method according to claim 45, wherein the permission to control the self-control includes ||
7. The method according to claim 33, wherein the control permission is performed by causing the tiflE caller to obtain a voice signal obtained by a transmitter of the called party's communication device (hereinafter referred to as “listening permission”). A method to make something a tree.
8. The method according to claim 33, wherein the permission for control is to cause the touching sender to acquire an image signal acquired by an imaging device installed on the called party through the called party's communication device. (Hereinafter referred to as “monitoring permission”).
9. The method according to claim 33, wherein the first party includes first data including its own ID and at least one first party rule for disclosing the tiff own first data. And to a server system (hereinafter simply referred to as “server J”) to give the server the communication permission treatment; and that a second party includes second data including his / her own ID and Entering at least one second party rule to disclose the second data and the communication permission treatment to the server; and providing a search request including at least one search criterion to the server. And sending data to the server; and both parties receiving data from the self-server that performs the following processing: (a) The disgusting server processes the ffit self-search request, and the tfilE Data meets Shukumi search criteria Determining whether the first data of the first person satisfies the search criteria for the first person, and performs the following processing. (1) If the first data of the first party is disclosed, If the first party rule is satisfied, ΙίίΙΒthe first party's tfif itself sends the first data to the key himself second party (2) if the second data of the second party is sent If the FflB second party rule to be disclosed is met, ΙίίΙΒthe second party's ffif sends the second data to the tfflB first party.
0. An electronic secretary system for supporting communication in a telecommunications network, comprising: (a) means for detecting the ID of the caller from a communication request from the caller; and (b) access for accessing an instruction file having the following: Means, (1) first rule set, (2) presentation information to be presented to the caller, and (c) all rules in the first rule set are defined as ¾ ^, and the application condition is satisfied. And (d) present the leaked information to the f ft self-originator. (A) A means for executing the rule execution section (hereinafter simply referred to as a means for applying a predetermined set of rules). Means, (e) for each communication request, (1) transmitting the communication request to the called party (hereinafter referred to as “communication permitted”), and (2) rejecting self-serving communication request That (below Below, it is provided with a treatment set including “Reception rejection J” and (3) Accepting the request for self-communication (hereinafter referred to as “application acceptance”). A means for selecting one from the set and treating the tfrf self-communication request; a means for permitting unknowing it (hereinafter referred to as “communication permitting means”); and a means for rejecting the reception (hereinafter referred to as “communication permitting means”).と い う Receiving means for rejection ”and means for accepting a frustrated application (hereinafter referred to as“ application receiving means ”). And a system comprising:
1. The system according to claim 50, wherein (a) access means for accessing the ttrf self-instruction file having the second rule set; and (b) means for accepting self-applications are: A system comprising: means for detecting an application content expected by tiflB from a self-communication request; and (2) means for applying a self-second rule set.
2. In the system according to claim 51, the disagreement 3 communication is an e-mail communication, the key sender ID is a speaker's e-mail address, and the disgust presentation information is a condition for receiving an e-mail. The terrible communication permission treatment is to receive an e-mail, the means provided by the café is a means for replying to the sender, and the means for receiving the communication request; Apply the set and find no rule that satisfies the applicable conditions.If ル ー ル: ^, accept the application.The guilty application accepting means: 適用 When applying the second rule set, Means for presenting the ttriB presentation information to the tine sender and rejecting the communication request if no rule is found, that is, if treatment cannot be determined.
3. In the system according to claim 52, (1) the presentation information presented to the sender causes a request for permission to communicate, and the presentation information prompts at least to describe the application content in a subject of the e-mail. Rejecting the tfifS communication request, including the content, is to send a delete command to the receiving server to delete the e-mail from the receiving server, and then log in to the receiving server and reject the e-mail. Received a header containing the subject of power, et al.
(1) means for applying a rule set and accepting applications; and M
4. The system according to claim 52, wherein the presentation information presented to the cafeteria self-caller makes a request for communication permission. The refusal of the itS communication request, including the prompting content, is to stop the communication after notifying the e-mail sending client of the occurrence of the error, and when the communication request is received, first, If you receive even the evil email envelop (fibre) containing the ID of the caller and apply the first rule set of Shuuki, if no rules satisfying the applicable conditions are found, Means for receiving the subject of the e-mail and accepting the application.
5. The system according to claim 54, wherein the office 3 instruction file further includes a third rule set, and means for performing the following operations: (a) creating a tiff self third rule; A system comprising: (b) applying the third set of frustration; and means for stopping communication in addition to the third set of difficult rules. (A) First, apply the f & t third rule set. If no rule satisfying the applicable conditions is found, the third rule is set based on the fact sender ID, reception time, and reception rejection treatment. In addition to the third rule set, the user sends a temporary error status to the client and sends a temporary error status to the client, and forcibly terminates communication by closing the underlying delivery connection. (B) If a rule that satisfies the conditions for the shu-mi application is found, the transmission of a permanent error is notified to the tfrt e-mail sending client, and the communication is officially stopped. Therefore, the corresponding rule is deleted from the third rule set of tfft.
6. The system according to claim 52, wherein the presentation information to be presented to the caller causes a request for permission to communicate, and the presentation information includes a content that prompts at least to describe the application content in a humble e-mail. Including, including rejecting the return request is to stop the communication after notifying the difficult client of the disgusting e-mail of the occurrence of the error and then stopping the communication when the request for the Fujimi communication arrives. In fact, the e-mail containing the caller ID is received up to the envelope (envelope), and the first rule set is applied. Rule not found: ^ means for receiving the content of the tins email and accepting the application.
7. In the system according to claim 52, when applying the ftrt self second rule set, when finding a second / rail satisfying the application condition, executing the found second rule. A system for providing f & f self-originators with the treatment of the f & f.
8. The system according to claim 51, wherein the ttflB instruction file further includes a third rule set, and further includes means for performing the following operations. (a) Create a third rule for flB and add it to the third / rail set. (b) Apply the third set of rules.
9. The system according to claim 51, wherein the communication is a telephone communication, the presentation information includes a description of a condition for receiving the communication, and the presenting means includes a voice, a character, an image, and a mixture thereof. Means for transferring a message selected from the group consisting of: a means for receiving a communication request, a means for applying the first rule set, and a method for not finding a rule satisfying the application condition. Means that accepts the application, that is, presents the presented information to the sender, receives the response of the IfflB sender, and applies the second set of disgusting rules, and the rule for which the applicable conditions are satisfied If the request is not found, that is, if the treatment cannot be determined, a means for processing the request for suicide communication based on a predetermined processing method including recording the communication request and rejecting the communication. System characterized in that it comprises a.
0. In the system according to claim 59, when the second rule set is applied, when a second rule satisfying an application condition is found, the found second / rail execution unit is executed. Means for giving treatment to Ifif self-originators.
1 · The system according to claim 59, wherein the treatment set includes a control permission, and the ttff self-treatment means set includes means for performing a key self-control permission (hereinafter referred to as “control permission means”). A system that uses this as a glue sheet.
2. The system of claim 59, wherein the treatment set includes a control permission, The treatment means set includes a control permission means, and when the second rule set is applied, when a second rule satisfying the application condition is found, the treatment of the execution unit of the found second rule is performed. Means for giving to the caller.
3. The system according to claim 62, wherein the party discloses means including his / her ID (f ^ child), means for causing the caller to apply for permission to communicate, and手段 means for applying for communication permission to the party before the caller makes a communication request (hereinafter referred to as “advance application means”), and ID of the party using the communication service The communication service provider makes the ID difficult for the party using the communication service, and the one selected from the group consisting of the communication service provider and a third party registers the identity information of the party. A system comprising:
4. The system according to claim 63, wherein the self-control control permission includes a first control permission and a second control permission, the first control permission is «permission, and the second control permission is a second permission. The control permission is to allow the caller to obtain the position information to be obtained by the position obtaining means installed on the called party through the called party's communication device (hereinafter referred to as “position obtaining permission”). The first control permission means is performed by the first control permission means and the second control permission means, and the first control permission means is the means for permitting the above-mentioned observation (hereinafter referred to as “hearing permission means”). The second control permitting means is a means for permitting the acquisition of anxiety position 啬 (hereinafter referred to as “position acquisition permitting means”).
5. The system according to claim 64, wherein the presentation information further includes a question to be presented to the sender, and the application content expected by the tfft is a f & f question with a predetermined total score. A system according to claim 1, wherein the instruction file further includes a fourth rule set, and further includes means for performing the following operations. (A) present the return question to ΙίΤΐΕsender, (b) receive the response of the cafe caller to the tfrt question, and (c) apply the fourth set of rules.
6. The system of claim 51, wherein the treatment set permits the communication request. And instructing the called party's communication device that the calling party has the control right, and causing the calling party to communicate without intervention of the called party (hereinafter referred to as “control permission”). A system that includes a means for permitting iff self-control (hereinafter referred to as “control permission means”).
7 · The system according to claim 66, wherein the control permission is to cause the caller to transmit information to a called party communication device (hereinafter, referred to as “information transfer permission”), and the control permission means includes: A system for permitting information transfer (hereinafter referred to as "information permitting means").
8. The system according to claim 66, wherein the control permission is a position acquisition permission, and the control permission means is a position acquisition permission means.
9. The system according to claim 66, wherein (i) the control permission is a warning permission, and (ii) the control permission means is a hearing permission means.
0. The system according to claim 66, wherein the control permission causes the speaker to acquire an image signal acquired by an imaging device installed on the called party through the called party communication device. (Hereinafter referred to as “monitoring permission”), and the control permitting means is means for performing a monitoring permission.
1. The system according to claim 51, wherein the access means is means for accessing through a network.
2. The system according to claim 51, wherein the presentation information further includes a question to be presented to the self-originator, and the expected application content is a response to the question that has obtained a predetermined total score. The instruction file further includes a fourth rule set, and further includes means for performing the following operation. (A) present the ffif self question to the fflt self caller; (b) receive the Ι ΙΒ caller's answer to the self question; and (c) apply the fourth set of rules.
3. The system according to claim 72, wherein the presentation information includes one selected from the group consisting of text, voice, and image, and the answer is a number, text, voice, and image. Means selected from the group consisting of images, the means for presenting the presentation information to the self-originator include text output means, voice file playback means, and text-to-speech synthesis means for converting text strings to voice. And means for detecting the contents of the application, including means selected from the group consisting of means for outputting image signals, and means for recognizing the means selected from the group consisting of numbers, texts, voices, and images. A system comprising:
 In the system according to claim 51, when the second rule set is applied, if a second rule that satisfies the application condition is found, the execution unit of the found fiilS second rule is treated. (4) A system comprising: means for giving to a sender.
5. The system according to claim 51, wherein the instruction file further comprises a fifth rule set, means for applying the fifth set of rules, sending a communication request to the called party, and treating And a means for creating a fifth rule for tfrt, and adding the fifth rule to the fifth rule set.
6. The system according to claim 51, wherein the parties disclose information including their own IDs and have the caller apply for permission to communicate, and the self-application includes making the request through the Internet. Means for requesting permission of the disgusting party for communication before issuing a request for Fujimi communication.
7. In the system according to claim 76, the communication service provider provides an ID to use the communication service, and comprises a courageous communication service provider and a third party. Means selected from the group comprising: ttff means for registering the identity of the party concerned;
8. The system according to claim 51, wherein the party of the communication service sets an ID to a party who uses the communication service, and a party selected from a group consisting of a party of the communication service and a third party. A means for registering the identity information of the party concerned.
9. The system according to claim 78, wherein the ffflS provider sculpts one or more additional IDs separately from the original ID to the touching party who has already been authenticated by the original ID. Below is a system that uses “additional IDs (called additional means)” as a tree.
0. The system of claim 51, wherein the first party includes first data, including his or her own ID, and at least one first party rule for disclosing the first data. A means for inputting to the server system (hereinafter referred to as “server”) to give the contact server a communication permission treatment; and a second data including a second party's own ID and the second data described above. Entering at least one second party rule and ffilB server to disclose the ffilB server, granting the server the communication permission treatment, and sending a search request including at least one search criterion to the server And a means for receiving data from the server, wherein both parties have means for performing the following processing. (A) the server processes the ftff self-search request and determines whether the first data satisfies the search criterion; if ΙίίΙΒthe first data satisfies the key self-search criterion, The following processing is performed. (1) If the first party rule that discloses the first data of the first party is satisfied, the I0IB first data of the first party is transferred to the second party. Send to 2 parties. (2) if satisfying the knitting himself second party rule disclosing the second data of the second party, d transmitting the second data of the second party to ffff himself first party
1. The system according to claim 80, wherein the treatment set includes proxy permission, the treatment means set includes means for performing proxy permission (hereinafter, referred to as “proxy permission means”), and t & t If the party grants the server tfif surrogate permission treatment to the server and includes the treatment given to the first party data and the ttrt own second party subject to tin data disclosure, If the server satisfies the ttilB first party rule, which discloses the tGIE first data of the first party, the server acts as the sender of the first party on behalf of the operation of the first party. And a means for providing collective treatment (hereinafter referred to as “treatment exchange means”).
2. The system according to claim 50, wherein the ttrt self-treatment set further permits the communication request to instruct the called party communication device that the caller has control, To The caller must be able to communicate without the intervention of the called party (hereinafter referred to as “control permission J”), and the set of self-service procedures must include means for permitting IS control (hereinafter referred to as “control permission means”). A system with special features.
3. The system according to claim 82, wherein said control permission is to cause said caller to transfer information to a called party communication device (hereinafter referred to as "information transfer permission"), and said control permission means is provided. Is a means for permitting touch information (hereinafter referred to as "information transfer permitting means").
4. The system according to claim 83, wherein the control permission includes a second control permission, the second control permission is an alerting permission, and the tfft alerting is performed by voice. Generating an item selected from the group consisting of light, light, and vibration in the communication device on the called side of the third party, wherein the tflfS control permitting means includes a second control permitting means, and the second control The permitting means is means for causing the caller to output information through the caller-side communication device to draw the caller's attention (hereinafter, referred to as “warning permitting means”). . 5. The system according to claim 82, wherein the application acceptance includes: a unit for recording information for identifying a sender and a unit for recording information for a sender.
6. The system according to claim 82, wherein the communication service provider provides the ID to the party using the communication service, and is selected from the group consisting of tin self-service provider and a third party. And a means for registering the identity verification information of the tfrf own party.
7. The system according to claim 86, further comprising: a follow-up DID means; and a pre-application means.
8. The system according to claim 82, wherein the control permission is to cause the caller to acquire location information acquired by location acquisition means installed on the callee side through the callee-side communication device (hereinafter, referred to as a caller). The return control permission means is a means for permitting key position acquisition (hereinafter, referred to as "position acquisition permission means"). Stem.
 88. The system according to claim 8, wherein the location information is a received GPS (Global
Positioning System) Position signals, position information converted from received GPS position signals, current position information of PHS (Personal handy phone) terminals, and mobile terminal position information provided based on base station position information A system characterized by including those selected from a group (hereinafter referred to as “specific positions”).
 88. The system according to claim 88, wherein the ttrlS receiver-side communication device is a mobile device, and when the mobile device issues a communication request to a terminal having a pre-registered ID, the mobile device transmits the location information to the terminal. Means for detecting and transferring to a StflB terminal. 90. The system according to claim 90, wherein the frustration control permission includes an information transfer permission and a warning permission, and the strict self-treatment means set includes an information permission means and a warning permission means. When the disgusting mobile device issues a communication request to a terminal having a pre-registered ID, the target information is set to the terminal, and the three disagreeable terminals are further notified (a) information permission and (b) Means for giving a warning permission, treatment of the following, and causing the warning to include: generating in the mobile device a device selected from the group consisting of voice, light, and vibration. .
 In the system according to claim 91, ΙΐίΙΒthe destination information includes arrival destination information, and the information to be transferred to the mobile device is a group consisting of map information, recommended routes, forward congestion information, and detour information. A system comprising selected ones.
 The system according to claim 92, wherein the key position information includes a specific position.
 · The system according to claim 90, wherein the ftrlE mobile device detects a position change: ^, means for transferring the ttrt changed position information to the lift terminal. System.
The system according to claim 94, wherein said control permission is permission, and said control permission means is a permission means. 6. The system according to claim 82, wherein the control permission is performed by causing a self-originator to acquire an audio signal acquired by a transmitter of a called party communication device (hereinafter, referred to as "permission to listen"). The system according to claim 1, wherein the control permitting means is a means for permitting the hearing (hereinafter, referred to as a "listening permitting means").
7. The system according to claim 82, wherein the control permission is to cause the ftilB sender to acquire an image signal acquired by an imaging device installed on the called party through the called party communication device (hereinafter referred to as ftilB calling device). The system is characterized in that the control permission means is means for performing self-monitoring permission.
8. The system of claim 82, wherein the first party includes first data including its own ID and at least one first data for disclosing the first data. A means for inputting into the server. System (hereinafter referred to as “server”) the rules of the parties and for giving the disgusting server the treatment of permitting self-communication; and the second party including the second data including its own ID. Enter at least one second party rule to disclose the second data, and to the sukki server, give the disgusting server the communication permission treatment, and enter at least one search criterion. A system for sending a search request containing the request to a server; and a means for receiving data from a disgusting server, wherein both parties have a means for performing the following processing. (A) The ftrlE server processes the fit self search request and determines whether the first data of the sulky meets the search criterion, and if the first data of the bad satisfies the tins search criterion, The following processing is performed. (1) If the first party rule that discloses the first data of the first party is satisfied, the first data of the first party is converted into a tiff file. Send to second party. (2) If the ttrt own second party rule that discloses the second data of ffjfS second party is satisfied, send the second data of the second party to tfif own first party.
9. In the way of saying e-mail, the e-mail main body consists of an entity with an envelope and content, the e-content has two parts, a header and a body, and Contains any information needed for The tent contains the object to be delivered to the recipient, the ttrt self-header is a sequence of strings with a special syntax defined in the standard, the body is just a sequence of characters following the header, Then, the disgusting e-mail is transmitted to the receiving server in the order of the key disgusting envelope, the disgusting header, and the body described above, and ΙίίΙΕ the authorization for describing the body is determined based on the information included in the editing header, and Before transmitting the body, the self-acknowledging server transmits the body based on the received envelope and the information received before receiving the body. Deciding whether or not to authorize.
 0. In the method of sending an e-mail, the tfrfE e-mail constitutes an entity with an envelope and a content, the content having two parts, a header and a body, and the envelope described above accomplishes transmission and delivery. The tffia content contains the material to be delivered to the recipient, including any information necessary for the ¾tif header, which is a sequence of strings in a special syntax specified in the standard, and the body Is just a sequence of characters following the header, and sends the email to the receiving server in the following order: self-envelope, tiff-self-header, tiff-self-body, and hates permission to send the body. Judgment based on the information contained in the data, and means for checking whether or not the body is authorized before sending the Ken 3 body. , A system for a key himself envelope received, TTRT based on information received before receiving his own body, and determining whether to authorize the transmission of the body.
 1. The method according to claim 25, wherein if predetermined storage conditions are satisfied, mm is given to the Ml originator.
 2. The system according to claim 74, wherein a predetermined storage condition is satisfied ^^, and a means for providing a self-service to the caller is provided.
3. The method of claim 1, wherein the communication is a telephone communication, wherein the presentation information comprises at least response guidance, and presenting the presentation information to a disgusting caller comprises: Sending the presentation information to the tongue machine. A method comprising the step of: responding to a caller.
 4. The system according to claim 50, wherein the communication is telephone communication, the presentation information includes at least a response guidance, and the means for presenting the presentation information to the caller comprises: a telephone of the caller. A method for transmitting the presentation information to a requester, wherein the application receiving means includes a means for responding to a disgusting sender.
PCT/JP2004/001182 2003-02-10 2004-02-05 Communication method and communication system in which called person has the initiative WO2004070614A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2003070953 2003-02-10
JP2003-70953 2003-02-10
PCT/JP2003/012014 WO2004082251A1 (en) 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program
JPPCT/JP03/12014 2003-09-19

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2005504876A JPWO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system led by called party
US11/194,906 US8712397B2 (en) 2003-02-10 2005-08-02 Method and apparatus for controllable communication
US14/207,875 US20140195437A1 (en) 2003-02-10 2014-03-13 Method and apparatus for electronic transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2003/012014 Continuation-In-Part WO2004082251A1 (en) 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/194,906 Continuation-In-Part US8712397B2 (en) 2003-02-10 2005-08-02 Method and apparatus for controllable communication

Publications (2)

Publication Number Publication Date
WO2004070614A1 true WO2004070614A1 (en) 2004-08-19
WO2004070614B1 WO2004070614B1 (en) 2004-11-11

Family

ID=32844563

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2003/012014 WO2004082251A1 (en) 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program
PCT/JP2004/001182 WO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system in which called person has the initiative

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/JP2003/012014 WO2004082251A1 (en) 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program

Country Status (3)

Country Link
JP (1) JPWO2004070614A1 (en)
AU (1) AU2003266549A1 (en)
WO (2) WO2004082251A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006092305A (en) * 2004-09-24 2006-04-06 Fuji Xerox Co Ltd Printing system and control method therefor
JP2006185382A (en) * 2004-12-28 2006-07-13 Nippon Telegr & Teleph Corp <Ntt> Reception controller
JP2007195165A (en) * 2006-01-19 2007-08-02 Internatl Business Mach Corp <Ibm> Method, computer program, and system for verifying caller
JP2008099213A (en) * 2006-10-16 2008-04-24 Fujitsu Ltd Call control system, communication terminal, scale value data storage device and program
JPWO2007077603A1 (en) * 2005-12-28 2009-06-04 富士通株式会社 Information processing apparatus, information processing method, and program
WO2010107031A1 (en) * 2009-03-16 2010-09-23 ヤマハ株式会社 Relay device, setting update method, and program
US7818383B2 (en) 2006-11-30 2010-10-19 Shingo Kodama E-mail server
JP2013157718A (en) * 2012-01-27 2013-08-15 Nippon Telegr & Teleph Corp <Ntt> Videophone device, display screen switch method of the same, and program

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001217861A (en) * 2000-01-31 2001-08-10 Kddi Corp Prankster prevention system and mail center system
JP2002290566A (en) * 2001-03-27 2002-10-04 Nippon Telegraph & Telephone East Corp Terminating call selecting system
JP2002374307A (en) * 2001-06-18 2002-12-26 Canon Inc Mail server, client device, method of controlling them, electronic mail system, program and storage medium
JP2003036230A (en) * 2001-07-23 2003-02-07 Kobo Itonaga Proper communication method and device for e-mail and the like
JP2003141043A (en) * 2001-11-01 2003-05-16 Ntt Docomo Inc Mail delivery control method and device, and radio communication system
JP2003216548A (en) * 2002-01-11 2003-07-31 Samsung Electronics Co Ltd Method of receiving mail in mail apparatus, method for transmitting mail in mail server and method of deleting mail in mail server
JP2003333097A (en) * 2002-05-13 2003-11-21 Fujitsu Ltd Mail server, personal terminal and mail receiving system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001217861A (en) * 2000-01-31 2001-08-10 Kddi Corp Prankster prevention system and mail center system
JP2002290566A (en) * 2001-03-27 2002-10-04 Nippon Telegraph & Telephone East Corp Terminating call selecting system
JP2002374307A (en) * 2001-06-18 2002-12-26 Canon Inc Mail server, client device, method of controlling them, electronic mail system, program and storage medium
JP2003036230A (en) * 2001-07-23 2003-02-07 Kobo Itonaga Proper communication method and device for e-mail and the like
JP2003141043A (en) * 2001-11-01 2003-05-16 Ntt Docomo Inc Mail delivery control method and device, and radio communication system
JP2003216548A (en) * 2002-01-11 2003-07-31 Samsung Electronics Co Ltd Method of receiving mail in mail apparatus, method for transmitting mail in mail server and method of deleting mail in mail server
JP2003333097A (en) * 2002-05-13 2003-11-21 Fujitsu Ltd Mail server, personal terminal and mail receiving system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006092305A (en) * 2004-09-24 2006-04-06 Fuji Xerox Co Ltd Printing system and control method therefor
JP4543854B2 (en) * 2004-09-24 2010-09-15 富士ゼロックス株式会社 Printing system and control method thereof
JP2006185382A (en) * 2004-12-28 2006-07-13 Nippon Telegr & Teleph Corp <Ntt> Reception controller
JP4580231B2 (en) * 2004-12-28 2010-11-10 日本電信電話株式会社 Reception control device
JPWO2007077603A1 (en) * 2005-12-28 2009-06-04 富士通株式会社 Information processing apparatus, information processing method, and program
JP2007195165A (en) * 2006-01-19 2007-08-02 Internatl Business Mach Corp <Ibm> Method, computer program, and system for verifying caller
JP2008099213A (en) * 2006-10-16 2008-04-24 Fujitsu Ltd Call control system, communication terminal, scale value data storage device and program
JP4636562B2 (en) * 2006-10-16 2011-02-23 富士通株式会社 Call control system, communication terminal, scale value data storage device, and program
US7818383B2 (en) 2006-11-30 2010-10-19 Shingo Kodama E-mail server
WO2010107031A1 (en) * 2009-03-16 2010-09-23 ヤマハ株式会社 Relay device, setting update method, and program
JP2010219731A (en) * 2009-03-16 2010-09-30 Yamaha Corp Relay device and program
CN102356611A (en) * 2009-03-16 2012-02-15 雅马哈株式会社 Relay device, setting update method, and program
JP2013157718A (en) * 2012-01-27 2013-08-15 Nippon Telegr & Teleph Corp <Ntt> Videophone device, display screen switch method of the same, and program

Also Published As

Publication number Publication date
WO2004082251A1 (en) 2004-09-23
WO2004070614B1 (en) 2004-11-11
AU2003266549A1 (en) 2004-09-30
JPWO2004070614A1 (en) 2006-05-25

Similar Documents

Publication Publication Date Title
US9866685B2 (en) Caller ID surfing
US20160286000A1 (en) Authorization and Authentication Based on an Individual&#39;s Social Network
US9866509B2 (en) Spam filtering and person profiles
US8891742B2 (en) IP handset-based voice mail notification
US8982877B2 (en) Provision of telephony caller ID service via common instant communications clients
US10289817B2 (en) Trust conferencing apparatus and methods in digital communication
US9641423B2 (en) Communication using delegates, such as delegates specified in an email or scheduling application
US20180068270A1 (en) Method and apparatus for selectively releasing personal contact information stored in an electronic or telephonic database
US10492038B2 (en) Method and apparatus to manage messaging providing different communication modes depending on one identifier and not requiring to disclose contact information
US8325900B2 (en) Telephone call classification utilizing a social network graph
US8433767B2 (en) Intelligent processing in the context of away and offline instant messages
US20150229595A1 (en) Systems and methods for spam filtering
US8483371B2 (en) Apparatus, systems and methods for managing incoming and outgoing communication
US8605867B2 (en) Audio message delivery over instant messaging
EP1393539B1 (en) System and methods for receiving telephone calls via instant messaging
US8825016B1 (en) Active phone book enhancements
US6621892B1 (en) System and method for converting electronic mail text to audio for telephonic delivery
US6668043B2 (en) Systems and methods for transmitting and receiving text data via a communication device
US6917672B2 (en) Third party regulation of calls based on the caller and callee pair to a call
US6122348A (en) System and method for managing incoming communication events using multiple media options
AU2008204404B2 (en) Detection of unanswered call in order to give calling party the option to alternatively dictate a text message for delivery to the called party
US6587871B1 (en) System, method, and apparatus for converting voice mail to text and transmitting as an email or facsimile
USRE40992E1 (en) Method and system for blocking unwanted communications
CN102164170B (en) contextual correlation engine
US7196630B2 (en) Method and apparatus for routing a communication to a user based on a predicted presence

Legal Events

Date Code Title Description
AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

121 Ep: the epo has been informed by wipo that ep was designated in this application
B Later publication of amended claims

Effective date: 20040726

WWE Wipo information: entry into national phase

Ref document number: 2005504876

Country of ref document: JP

122 Ep: pct application non-entry in european phase
DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)