WO2004082251A1 - Receiver-side-led communication method, communication apparatus and communication program - Google Patents

Receiver-side-led communication method, communication apparatus and communication program Download PDF

Info

Publication number
WO2004082251A1
WO2004082251A1 PCT/JP2003/012014 JP0312014W WO2004082251A1 WO 2004082251 A1 WO2004082251 A1 WO 2004082251A1 JP 0312014 W JP0312014 W JP 0312014W WO 2004082251 A1 WO2004082251 A1 WO 2004082251A1
Authority
WO
WIPO (PCT)
Prior art keywords
treatment
communication
user
caller
information
Prior art date
Application number
PCT/JP2003/012014
Other languages
French (fr)
Japanese (ja)
Inventor
Guang Feng
Original Assignee
Guang Feng
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to JP2003-70953 priority Critical
Priority to JP2003070953 priority
Application filed by Guang Feng filed Critical Guang Feng
Publication of WO2004082251A1 publication Critical patent/WO2004082251A1/en
Priority claimed from US11/194,906 external-priority patent/US8712397B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/22Automatic class or number identification arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier

Abstract

A communication method using electronic devices over a network. It inhibits communication against receiver's intention, such as nuisance calls, nuisance e-mails, and e-mail attacks, with no heavy burden on the user, while maintaining compatibility with the conventional fundamental communication technology; reduces communication amount of public networks with respect to the nuisance e-mails; allows the user to perform, with more peace of mind and more relaxing attitude, the interaction with others, the activities of recruiting and job-hunting and so on by means of a network; and realizes an amalgam of common communication functions and monitoring/hearing functions or remote control functions. The right of deciding whether to establish communication is shifted to a receiver side. A term 'deal' is used which includes both meanings of rights and limitations to be given to a transmitter side. The receiver side gives the transmitter side 'deals' in advance, and stores, one by one, the deals given to the transmitter side in association with the ID of the transmitter side. Upon reception, the receiver side automatically responds based on the deals given to the transmitter side and the ID thereof. Communication against the receiver's intention can be nearly automatically inhibited.

Description

 Description Communication method, communication device, and communication program led by called party

 The present invention relates to a communication method using an electronic device on a network, and more particularly, to a step of establishing a connection between two communication devices when starting communication, a method of providing a communication service that meets both communication intentions, and a communication program and a communication device. Communication after the communication start stage of the present invention is performed in the same manner as conventional communication. For example, when the present invention is used for communication, the information transmission processing after the call response processing of the present invention is performed in the same manner as the conventional communication transmission processing, and the present invention is used for electronic mail Hi communication. The information transmission processing after the incoming call response processing of the invention is performed in the same manner as the conventional e-mail communication. Background art

 Telecommunications have become widespread. Various information technology services utilizing the Internet have rapidly spread into the general public, and high-speed, large-capacity, always-on communication has spread to ordinary households, and communication fees have dropped. Also caller number ^! Knowledge is also generalizing. The caller pays for the communication, and the caller takes control of the communication.

However, with the progress of technology, the weight of the cost is lower than the information of the communication, and the called party does not take the initiative of the communication, so the conventional communication includes, for example, the ΜΙδ number of the other party in the case of telephone and e-mail, If the e-mail address is strong, it can be transmitted and spoken regardless of the recipient's will. The issue of the safety of network life and the issue of public network traffic have also emerged. Silent mi¾, mm solicitation by the random extraction method, unsolicited mi 「,` `i-co / §3 r '' using the incoming call history, unsolicited telephone abuse of normal voice calls, unsolicited e-mail, and e-mail that adversely affects youth, Frequently, e-mail mass aggression acts have a way to ia the recipient. "Ministry of Internal Affairs and Communications, February 19, 2003, Regarding Unsolicited miS Using the Call History Function of Mobile mi§," In April 2002, the “Law Concerning the Proper Use of Specific E-mail Messages” was enacted, and the “Study Group on Responses to Unsolicited Communications” Report Kaichi-ichi October 7, 2002 The Ministry of Internal Affairs and Communications, etc. shows that the situation is serious.On the network, however, once you invite the other party in your business, such as business-to-person, personal-to-company, personal relations, and job hunting, you will be asked to send your e-mail address. ; ^ Since the ID is disclosed to the other party, it is not easy to break the relationship with the other party when you want to get lost. In addition, communications and surveillance generally fall into different categories and are not well harmonized, resulting in underutilized communications resources. As means for solving such a problem, JP-A-5-14488, JP-A-2002-344524, JP-A-10-353808, JP-A-2000-10880, JP-A-2000-163341 or JP-A-2000-163341 There is a prior art S disclosed in Japanese Unexamined Patent Publication No. 2000-244553, Japanese Patent Application Laid-Open No. 2000-270005, or Japanese Patent No. 3283873.

 In the prior art disclosed in Japanese Patent Application Laid-Open No. 2000-270005, the receiver registers a deleted fiber registered word, and deletes the e-mail addressed to the receiver by comparing the e-mail to the registered word. Delete the targeted email. There is also known a means for recording unopened messages in a spam mail and charging a reverse fee, such as the home patent No. 3283873.

 However, these technologies have a passive starting point on how to respond after unwanted communication has occurred. According to the Interim Report of the Study Group on Responses to Spam E-mails Held by the Ministry of Internal Affairs and Communications, January 24, 2002, "The use of information and communications has been extremely seriously hindered. Despite the fact that various countermeasures have been taken, the problem S has not been resolved yet, and even though new countermeasures have been taken one after another, the result is a “pretend play.”

The main difference between the present invention and the existing technology is that the current system, in which the caller has an advantage, is improved, and active communication is prevented from occurring. According to the present invention, the conversion from the sender superiority to the recipient superiority can be easily realized in a wide range of communication categories while maintaining the existing communication relations and the existing communication contract system. First, the effect realized by the present invention is that in various telecommunication services, unwanted reception can be rejected almost automatically while guaranteeing desired reception.

 The present invention will be described in light of the technical response to the issues reported by the ttft self-research ministry and the administrative legislative response. By performing the technical measures of the present invention in a wide range, the necessity of administrative legal measures is eliminated.

 First, to deal with the problem of unsolicited e-mail, as described in Example 2 below, it is possible to refuse unwanted reception, and to easily capture and maintain the user's existing communication partner relationship, and to establish a relationship sent from an unknown address. You can also receive the person's e-mail via the treatment application. While maintaining the existing communication relationships of the individual users, the maintenance range can be automatically extended to future communication relationships.

 Regarding the issue of “pay for unsolicited emails” of Mobile ® IS, according to the third embodiment, a mail route that is not permitted by the recipient is a communication route where the recipient is charged. The problem can be solved by not generating the signal on the wireless communication path. "I'm sick of annoying e-mails from my mobile phone. I'm in trouble doing business and can't turn off my mobile phone." "It arrives at midnight or early in the morning, disturbing the peace of life." "The sender address is spoofed."

Sections such as “It is troublesome to delete unnecessary emails because they are received one after another” can be solved by the third embodiment. The third embodiment can also solve the problem of “unsolicited e-mail paralyzing the communication system and making it impossible to transmit information”. Also, the situation where the communication band of the wireless communication path is occupied by junk mail can be improved. "If the child presses the button ... The request for 360,000 yen was«! §. "" When a junior high school girl saw an e-mail and «is from home, he received a request from an international mis company. Problems such as _! Can be solved because communication with a suspicious partner is rejected by the present invention.

Until now, ^^ has taken countermeasures such as "Default e-mail address ^ f" and "Change e-mail address" .However, obtain a list of valid e-mail addresses in advance and It cannot respond to what is sent to the sender. Also, e-mails from people who do not know the change will not be able to receive what they want. In contrast, the book The invention does not involve changing the address of the recipient. Countermeasures for “Receive specified mail” and increase the number of settings for the specified rejection function ”cannot respond to junk e-mails that frequently change the original mail address even if they reject specified mail. . On the other hand, since the present invention S automatically receives the reception from the new partner, any partner who has nothing to do with the receiver can be rejected. "Up to 400 packets per month (approximately 100 emails)» Don't charge "" Judgment to judge that junk mail has stopped functioning down its telecommunications facilities due to spam " Countermeasures for such issues require a lot of money and human resources. On the other hand, the present invention repels unnecessary communication and can save social human resources and funds. `` Changes to contracts to refuse to receive e-mails sent with a large number of e-mail addresses and with a high rate of missing addresses J On the other hand, the third embodiment of the present invention or claim 3 can reject the spam mail before the body of the spam mail is transferred from the header information of the transmitted mail. Can be solved with very few resources.

 As the concept of junk e-mail, it is not possible to determine what kind of e-mail is junk e-mail without subjectivity of individual recipients. Existing technologies such as filtering using the spam e-mail sender database and other methods cannot fully reflect the subjectivity of the recipient, and there is clearly a limit to what can be done in the situation where the sender address is constantly changing. . At the telecommunications network stage, viewpoints such as the prohibition of censorship, the protection of communications secrets, the obligation to provide fair services, and the relationship with "freedom of expression and business freedom", which telecommunications carriers have. Should be carefully considered. The purpose of the present invention is to prohibit the statement of an undesired sender by the recipient himself.The nature of the intention of the recipient depends on whether the present invention is implemented on the receiving terminal and whether the present invention is implemented on the server. Regardless, it is a feature that differs from the technology in that it does not contradict the principles of the law.

“New unsolicited communications such as one-way j have resulted in disruptions to telecommunications carriers' networks, causing serious damage such as long-term paralysis of lines. In addition to self-defense measures such as "Do not pack calls that you do not recognize", technical measures on the user side are mainly limited to rejecting / permitting designated number calls. Was. The limitations are obvious. In the fourth embodiment of the present invention, the "one-cut" {1} is automatically and immediately connected to the other party, and the guide message is sent. Therefore, the receiver can ignore the miscommunication, and communicate with the sender ^^ Is charged. Also, those who send junk e-mails from mobile phones will be charged for receiving the automatically replied request ^: question e-mail. In this way, it is possible to prevent unsolicited communication by giving an economical blow to unsolicited communicators without changing the current communication infrastructure system.

 According to the effects of the present invention, the technical problems taken up by the Ministry of Internal Affairs and Communications in the above two reports can be solved. If the technology of the present invention permeates, many of the administrative and legal measures proposed in the report will be unnecessary.

 Unwanted emails can be completely rejected, while almost automatically guaranteeing receipt of the desired emails. If you ask for personal information such as the recipient's name in the guidance information, you can reject all unsolicited emails that have nothing to do with the recipient, and there is no worry that those who know such information will be rejected. The treatment given by is automatically saved, so there is no need for the recipient to set the treatment. Since the recipient can freely decide the guidance information, it is possible to receive the mail of the sender in the desired category. For example, if you get a correct answer to a question such as “How much is one plus” ¾ίYou know that the speaker is not a machine but a human, and the other Unlike ^ such as transmitting machines, the receiver can decide for himself whether he wants to receive it in the future. Disclosure of the invention

In order to solve the above-mentioned problems, the present invention uses the term “treatment” so that the called party can establish the right to determine the success or failure of communication so that the way of receiving and responding is easy to control and easy for the user to understand. Was. The term “treatment” in the present invention includes meanings of both 与 え る ^ and restrictions given to the transmitting side as defined by the following terms. The called party gives treatment to the calling party in advance, saves the calling party ID and the treatment given to the calling party in association with each other, and automatically receives the call based on the calling party ID and the treatment given to the calling party. Respond. The definitions of terms in this specification are as follows.

“Treatment” is a method of handling the communication request of the other party, is a method of responding to the communication, and has two meanings: the right given to the caller by the called party and the limit given to the incoming call from the called party S. included. The meaning of the right direction is the right of the calling party to use the resources under the control of the called party, and the type of this right depends on the range of functions to be performed and the presence or absence of the permission procedure before i. Can be freely set by the called party. The meaning of the restriction is to limit incoming calls from the calling party or to Plih. ヽ There are many types of restrictions depending on each combination of means of implementation and whether or not to communicate the reason to the calling party at the time of implementation. Can be set freely by the called party. An "ID" is any length and type of symbol used to identify a user, such as an e-mail address or mis caller ID. “Public ID” is an ID for identifying a user. The “communication start stage” is a stage of establishing a connection between the two parties when starting communication. The “communication process” is a process of transmitting information after the incoming call response process / response process at the communication start stage of the communication service of the present invention. The result of this communication process is not always the transmission of information. “Treatment application” is a communication act for the calling party to indicate a desire for communication to the called party, and the communication action transmits at least the ID of the calling party to the called party j. The “initial expected treatment” is a treatment prestored in a storage measure, a treatment unique to a communication device, or a predetermined treatment before communication. "Treatment relationship" is a relationship established by the treatment that both users give to each other. “Treatment system” is a set of each type of treatment. “Treatment information” is information stored in the storage device in association with the ID of the called user, the ID of the calling party to whom the called user has been given treatment, and the given treatment. “User” is a person who uses the communication service of the present invention. “Server” means information processing software or software in a network that provides the communication service function of the present invention. “Treatment application criterion information” is a screening criterion for deciding treatment by examining the guide information, internal information and application information specified by the recipient. “Examine the treatment application” means to determine the treatment that the receiver gives to the sender who wishes to communicate. “Can apply for treatment” means that the treatment application of the sender is received, and the treatment can be given to the sender at the will of the receiver. "Cannot communicate" means that all communications, including Reject receiving.

Express the degree of satisfaction with the caller's request as treatment. For example, if you are completely satisfied, give treatment that can be remotely controlled, and if you cannot judge the request of an unidentified person or other person, give treatment that can apply for treatment. Refuse. " The specific implementation of each type of treatment differs depending on the user's device, and the total number of types of treatment that can be achieved differs depending on the user's device. The details of the treatment and the type of treatment are determined by the specific configuration of the receiving user's device and the specific configuration of the resources controlled by the receiving user. The user's device is m or mobile phone sis, for example, "Don't ring the ringtone, disconnect without leaving the call history", "Don't ring the ringtone, disconnect without leaving the call history", "Don't ring the ringtone cutting "," can not ring the incoming bell, disconnected from the by passing a ®ι§ owner of ^ message "," does not sound an incoming call bell, cutting the incoming call history, leaving 10 seconds ^ 1 message of the other party "," Ringing ring, waiting for answering machine, ringing ring, waiting for normal reception, ringing ringtone for birthday celebration melody, waiting for normal reception, calling immediately without ringing Decide the connection j that can be made as the type of treatment, set the initial treatment to "Ring the ringing ring, waiting for incoming messages" 」Enter, give the friends" Friends "treatment, and call the friends' mobile phone number The bell Enter "Ring, normal reception waiting" treatment, give the lover "lover" treatment, and enter the "ring a birthday celebration melody ringing ring, normal reception waiting" treatment for the lover's mobile MM number. For example, if you receive a malicious annoyance m, enter the treatment "Disconnect without ringing the ringing or leaving call history" to the other party number. For example, when a boss calls mii for the first time, the treatment of the other party's phone number is changed from the initial absence status to the "ringing of incoming calls, normal reception waiting status" treatment.

 Expand and simplify the treatment system according to the needs of individual users.

Users do not always need to enter the treatment settings for each caller individually when starting to use the service. For example, at the beginning of use, set the first expected treatment to “Ring a ringing ring, waiting for incoming calls”, and change the treatment required at that time as you receive an incoming call. If the first expectation is made even more strict, such as "do not ring the incoming call ring, disconnect after leaving the incoming call history" You can enjoy the ability better, or add a new treatment with the response method that best matches your personal environment and set it as the initial treatment.

 The treatment settings for each caller need not be grouped. If the initial treatment is set to the conventional communication response method, a message prompting the user to set a non-treatment setting is sent to the caller ID every time an incoming call is received. With the accumulation of service usage time, the treatment setting will be completed naturally, and the user will be able to achieve the purpose without excessive burden.

 An apparatus having a treatment function of “can apply for treatment” according to claims 7 and 8 can perform the treatment setting almost automatically.

 In a method for providing a communication service on a network, a step in which a receiving user inputs in advance a treatment that a receiving user gives to a calling party, an ID of a calling party to which the receiving user has previously given treatment, and Ml. Storing each of the treatments given in the storage device in association with each other, detecting the caller ID when receiving an incoming call, and treating the storage device in association with the caller ID based on the detected caller ID. Detecting the caller ID, performing communication processing based on the detected treatment, and determining whether the caller ID has not been detected or the neighbour associated with the caller ID has not been detected. And performing a communication process.

FIG. 23 and FIG. 24 are flowcharts of the communication method according to claim 1. The receiving side user power is input in advance by the receiving side user to the treatment given to the S calling side (2301), and the ID of the calling side to which the receiving side user has previously been treated is associated with the given treatment. (2302) in the storage device (2303). For example, treatment given to caller ID = 200 = "communication is possible", treatment given to caller ID = 300 0, "treatment application is possible", ... Then, in the storage device, “200, communication is possible”, “300, treatment application is possible”, and so on are stored. A step of detecting a caller ID when receiving an incoming call (2304); and a step of detecting a treatment associated with the caller ID from a storage device based on the detected caller ID (2305). Performing communication processing based on the detected treatment (2307), and the caller ID was not detected or the treatment associated with the caller ID was not detected; ^ , Based on initial treatment (2306).

 Allows the called party to enter the treatment given to the calling party by the called party, transfers the conventional right to determine the success or failure of the communication to the called party from the treatment setting, and furthermore, the strength of the communication, for example, restricted reception of e-mail The size can be specified in detail, and the control right can be used as an appearance of treatment, as compared to the conventional communication initiative.The unattended home communication terminal communicates with the user ^^, and the terminal controls the user's own ID. If the right is given, the TV mis can be used as a surveillance camera, the user can observe the house at home mis, and remotely control the personal computer.

 It is not necessary to give a name to a specific treatment type, but it is easier to set if a name is given to the treatment type. The same name treatment can be assigned to multiple calling users. For example, when a communication terminal is connected to the Internet at all times, the name of the user is given to the personal computer that is automatically connected to the Internet, and the name of the family is given to the PC camera activation right of the automatic connection. Manual ringing of bells If you give the name "friends" to the right to activate the PC camera and receive e-mail up to the maximum size of 100 MB, you can assign multiple IDs of yourself, family, and friends. The treatment of the corresponding name can be assigned.

 “Can apply for treatment” The treatment can be freely set by the user using the function of the communication device. For example, the 舌 ^ caller ID of the mi tongue and the «of the other party are stored in the storage device, and the e-mail ^ ^ The address and subject are stored in the storage device, and in the case of a homepage that provides services by the server, the caller ID and the application details are stored in the storage device provided by the server, and the intention of the treatment application is determined by the receiving user. Tell A device that has a processing function of “can apply for treatment” according to claims 7 and 8 almost automatically gives the other party the treatment as intended by the user.

The treatment information is stored in the receiving user server, and the ^ in the e-mail is stored in the receiving mail server that stores the e-mail recipient. When an email arrives at the mail server, it first receives an email header, extracts the sender's email address and recipient's email address from the header, detects the treatment information, and based on the treatment information. The result of the decision was rejection: ^, without receiving the body of the e-mail, tell the other party the reason for refusal from the details of the treatment, and put the reason for refusal in the response sequence for abnormal termination. E-mail server Return to. Explanation of terms and concepts: E-mail consists of two parts, header (»source, destination, etc.) and body (mail content, body), according to international standards. Process based on the details of treatment. For example, reject the details of treatment without leaving a history, or discard the received e-mail.

 In a method of providing a communication service on a network, a step in which a receiving user inputs in advance a treatment to be given to a calling side by a receiving user, a step in which the receiving user's own ID and the receiving IJ user are input in advance. A step of storing the ID of the caller who has been given the treatment and the treatment given by the user in the storage device one by one, a step of detecting the caller ID when the communication request arrives, and a step of detecting the caller ID Detecting a call associated with the caller ID from the storage device based on the detected caller ID, performing communication processing based on the detected call, and detecting the caller ID. If the treatment associated with the caller ID has not been detected or is not detected, the communication processing is performed based on the initial treatment, and the communication with the receiver ID is not detected. Characterized in that it comprises a floor

 When an e-mail transmission request arrives from a user's e-mail client, the sender's e-mail server first receives the e-mail header. From the header, the sender's e-mail address and the receiver's e-mail address, that is, the receiver ID , And performs treatment information acquisition and synchronization processing.Condition information acquisition means that the treatment information is detected from the storage device of the e-mail server of the deceased party, and if the treatment information is not detected, it is based on the called party ID. And retrieve the treatment information from the receiving mail / reserver that accommodates the e-mail recipient.

When the treatment information is detected, the information is stored in the storage device of the sending e-mail server. The treatment information is composed of the receiving side ID, the word side ID, and the contents of the given treatment, and the time B when the treatment information is acquired is set as the treatment information time, and the treatment information and the treatment information time are transmitted to the sending e-mail server. It is stored in the speaker's storage space of the storage device. Synchronization of the treatment information is as follows: 待 The treatment information was detected from the storage device of the e-mail server on the user's own side ^>, the detection execution time is compared with the treatment information time, and the time difference exceeds a predetermined time: ^ The service information is acquired again assuming that the service is out of date. The synchronization process enables efficient synchronization of the service information between the servers. If the e-mail server is Whether or not to receive a child mail from the deceased's e-mail client is determined by the result of judgment based on the treatment information. As a result of the judgment based on the treatment information, if the reception is rejected, the e-mail body is not received and the processing is performed based on the details of the treatment. For example, reject details of treatment without leaving a history: ^, Discard the received e-mail.

 As a result, unwanted e-mail is ejected from the exit of the speaker's terminal, and unnecessary information is not sent to the Internet, the line between the speaker and the Internet connection company, or the ISDN line. Reduce the load. Terminology concept explanation: Generally, the flow of e-mail transmission is from the speaker terminal to the e-mail server on the speaker side, from the e-mail server to the e-mail server on the receiving side, and from the e-mail server on the receiving side to the receiver terminal.

 Since the treatment information by the synchronization process is stored in the speaker's use storage space of the storage device of the e-mail server, set an upper limit on the number of items to be stored and send it to different recipients exceeding the upper limit. Can be banned. For example, if such an upper limit is set for a public sender's e-mail server with high anonymity, such an e-mail server can be used to send mail to an unspecified number of different recipients anonymously. The act of sending can be prevented. As a result, it is possible to prevent the act of sending to a large party at random.

 Weekly e-mail server is the same ^ Reject the body of unsolicited e-mail with the treatment information held by the receiving e-mail server. The e-mail server on the receiving side is the e-mail server, and the treatment information cannot be obtained from the e-mail server on the receiving side ^^. The setting of the treatment given to the e-mail partner can be done independently of the e-mail software used by the user. Therefore, there is no need to change the user's mail software environment.

In a method of providing a communication service on a network, a step in which a receiving user inputs in advance a treatment given to a calling side by a receiving user, a step in which the receiving user's own ID and the receiving user are treated in advance. A step of storing the given caller ID and the given treatment in a storage device in association with each other, a step of detecting a callee ID when a communication request arrives, and a step of detecting a caller ID Performing the acquisition and synchronization of treatment information; detecting the treatment information; and detecting the treatment associated with the caller ID from the difficulty based on the detected caller ID. Performing a communication process based on the detected treatment, and detecting no treatment associated with the t & SB calling party ID or associated with the ttif self calling party ID: ^, initial treatment Performing the communication processing based on the following steps: and performing the conventional communication, wherein the called party ID is not detected or the treatment information S is not detected, and the conventional communication is performed. By setting the treatment equivalent to the behavior of the communication response, communication requests from conventional communication devices can be communicated in the same way as before, and conventional communication devices refer to communication devices for which the ID of the caller cannot be reported. The MM indicates a call from the Shinkansen public, which is indicated by "^" and the caller ID "^." In this case, conventional communication is performed based on the first expected treatment.

 As a result, during the period of access to the invention service of the present application, it is possible to perform conventional communication with a partner who cannot be identified for a while while applying a function of setting a treatment such as preventing inconvenience to a specific partner that is necessary. . Also, when the ID of the caller can be recognized as a group ID, such as a call from a public mm displayed as “public mig” in the caller ID ^ ¾, a specific group is treated as ¾ “^”.

 Use the sender's email domain name, for example X.co.jp, as the group ID, and treat a particular group as ¾ ^. A domain is attached to a computer / network that exists on the Internet! ! ^ A child. A call request from the caller that is not the caller's intention was received: ^ If the ID of the caller is known, the caller is given a treatment to prevent communication, and then the communication from the caller can be (Sih can be received. If the sender's e-mail that is not intended by the sender is received, the sender's e-mail address is given a treatment that communication cannot be performed, and then the e-mail from the sender is not received.

 Set the severity of the initial treatment to be weaker, for example, store the ^^ caller ID and the other party's recording in mm on the device, store the ^^ address and subject of the e-mail on the device, and see who left the message after the fact.ゝ The car who applied for treatment is checked. The initial treatment is set to medium severity. For example, only the caller ID of is stored in the device, only the e-mail address is stored in the device, and afterwards, who receives the call is examined.

It can be set up so that only the parent's sis number can be received on the child's mobile phone, increasing safety. If you set a “call immediately without ringing” ring to the parent's MM number on your child's mobile phone 親, parents can observe the children's activities in the park and commuting to school.

 The server assigns a public ID to the user, the public ID can only be used for treatment, and the personal information stored on the server does not go through legal procedures and cannot be looked up by the user. For this reason, public ID can be used for socializing and recruiting on the network, and personal information is not disclosed to the other party, so it is easy to break the relationship with the other party. The server organizes and publishes user's public information according to purpose. Want to communicate with the user who has made it public. First, apply for treatment to the called party. Use the public ID to indirectly receive the call to the called party through the server and freely determine the treatment to be given to the other party. {1}, automatic connection monitoring can be performed, then the relationship with the other party is cut off, and this communication service can be used easily.

 BEST MODE FOR CARRYING OUT THE INVENTION

 The present invention can be realized in various embodiments. FIG. 1 is a diagram showing an operation example of the automatic answering telephone described in the fourth embodiment. Recipient user power S The treatment given to the sender is input to the recipient user, and the ID of the caller to whom the recipient user has given treatment is associated with the treatment given to the storage device one by one. Remember (see Fig. 1 (1)).

 The storage device differs depending on the specific communication device. The storage device of mti is built in ^ ^, and the ID of the receiving side is a fixed ig signal, so there is no need to store it. In the following description of the embodiments of the present invention, a database table and a magnetic storage medium are adopted as the storage devices constituting a part of the present invention. If so, for example, an optical storage medium can be employed in addition to an electronic memory circuit such as a RAM and a RAM.

 When a call request from the caller is received (Fig. 1 (2)), the storage device is searched based on the caller ID (see Fig. 1 (3)), and the storage device is associated with the caller ID, that is, the caller ID. Communication processing is performed based on the initial treatment, where no treatment was detected (Fig. 1 (4-9)). The result automatically gave the new SIS number the right to make a successful call.

FIG. 2 is a flowchart of the communication method according to claim 2. Communication method according to claim 2 Fig. 3 shows an example of a treatment relation master table that stores treatment information as an e-mail receiving server that causes a computer to execute the processing. When the e-mail arrives at the mail server, as a result of the judgment based on the treatment information, reception is rejected. The body of the e-mail is not received.

 4 to 6 are flowcharts of the communication method according to the third aspect. FIG. 7 explains the principle that an e-mail sending / receiving server for causing a computer to execute the communication method described in claim 3 sends an unwanted e-mail from the exit of the originator terminal.

User e-mail is a @ netinfotec h.co.jp, and the first expectation is "to save Fujimoto address, subject, and return the reason for rejection of reception, and reject reception" to the other party who does not know a and others. (See Figure 7 (1)). Let the email of user X be X @ XX X.ne.jp, and X send the email to a @ netinfotec h.co.jp (see Figure 7 (2)). The storage device of the mail server accommodating user X, or the treatment in the database The relation-related master did not receive the treatment given to a @ netinfote ch.co.jp to X @ xx x.ne.jp. Acquire the treatment information from the mail server netinfote ch.co.jp accommodating a (see Fig. 7 (3)). In the storage relation master of the mail server accommodating the user a or the processing master of the database, a@netinfotech.ch.co.jp has no treatment given to X @ xxx. 1 e.; Ip. @ xx x. ne. jp, and since the treatment information was detected, it is returned to the sending e-mail server (see Fig. 7 (4)). Treatment information: a @ netinfotec h.co.jp N X @ xx x.ne.jp, "Saving the sender address and subject, returning the reason for refusal to receive and rejecting reception" and information m: 2003. 2. 10 10: 10: 30 and the reason for rejection of the additional information were stored (see Fig. 7). When the treatment information is detected from the storage device of the e-mail server on the side of tfrlB, the treatment information is compared with the detection execution time and the treatment information time, and the treatment information is older than a predetermined time difference, for example, one hour. And re-acquire the treatment information. Acquisition of treatment information for the same address is performed only once within 1 B character! Therefore, the burden of synchronizing the treatment information between servers on the public network is small. In addition, as a result, an attack that frequently sends a large amount of e-mail to the same address is performed from the exit of the source whisperer terminal. Speaker ID of treatment information The number of items used on the sending side is more statistically counted. If the number exceeds the number of items specified in advance, new settings are made and words to different e-mail addresses are prohibited. As a result, it is possible to Plh the act of sending to a random party at random. FIG. 25 and FIG. 26 are flowcharts showing the operation of the treatment processing program “can apply for treatment” described in claims 7 and 8. A caller who has been given a treatment can be applied for treatment or, if the initial expected treatment has been set to be able to apply for treatment, has received an unknown caller, treatment can be given automatically by this processing method . Immediately communicate that the treatment determined by the treatment application committee is “communicable”.

 The age at which a treatment application is received is firstly subjected to an automatic examination based on the examination criteria (2663). Based on the result of the automatic examination, further manual examination is required. "Remember the application information and notify the recipient. If specified, the recipient can decide the final treatment.A plurality of guidance items and the screening criteria corresponding to the internal information can be used for each item.

FIG. 1 is a diagram showing an operation example of the automatic answering telephone described in Embodiment 4, FIG. 2 is a flowchart of the communication method described in claim 2, and FIG. FIG. 4 is a flowchart of the communication method according to claim 3, FIG. 5 is a flowchart of the communication method according to claim 3, and FIG. 6 is a flowchart of the communication method according to claim 3. Fig. 7 is an explanatory diagram of the principle of performing ISJh from the exit of the sender terminal of the unwanted e-mail power S source, and Fig. 8 shows the overall configuration of the first embodiment. FIG. 9 is a block diagram showing an internal configuration in the embodiment. FIG. 10 is a flowchart showing an operation of a main program in the embodiment. FIG. 11 is a main menu in the embodiment. Explain the screen configuration FIG. 12 is a diagram for explaining the connection waiting screen in the embodiment, and FIG. 13 is a diagram for explaining the TV mis-communication screen in the embodiment. FIG. 14 is a diagram for explaining the contact book screen in the embodiment, FIG. 15 is a diagram for explaining the member screen in the embodiment, and FIG. 16 is a treatment in the embodiment. Fig. 17 is a flowchart showing the application execution process. FIG. 18 is a diagram for explaining a user's personal setting screen in FIG. 18. FIG. 18 is a flowchart showing the operation of the main program in the embodiment, and FIG. 19 is a treatment examination in the embodiment. FIG. 20 is a diagram for explaining a treatment application qualification designation screen in the embodiment, and FIG. 21 is a flowchart showing the operation of the videophone communication program in the embodiment. FIG. 22 is a flowchart showing the flow of establishing a treatment relationship with the called party via the public ID in the embodiment, and FIG. 23 is a flowchart of the setting section of the communication method according to claim 1. 24 is a flowchart of the processing section of the communication method described in claim 1, and FIG. 25 is a flowchart of the setting section showing the operation of the treatment processing program "can apply for treatment" described in claims 7 and 8. One Yes, Fig. 26 is a flowchart of the processing section showing the operation of the "treatment application" treatment program described in claims 7 and 8, Fig. 27 is a block diagram showing the configuration of the second embodiment, and Fig. 28 is Example 2 This is a treatment system of adoption. Fig. 29 is an example of the treatment application standard information of the recipient setting, Fig. 30 is an example of the treatment information set, and Fig. 31 is a schematic flowchart of the user setting. Yes, Fig. 32 is a schematic flowchart of the reception process, Fig. 33 is the treatment application reference information setting screen of the second embodiment, Fig. 34 is the treatment setting screen of the second embodiment, and Fig. 35 is the embodiment. FIG. 36 is a block diagram showing a configuration of the fourth embodiment, FIG. 37 is a diagram showing a treatment system of the fourth embodiment, and FIG. 38 is a treatment application standard of the fourth embodiment. FIG. 39 is a diagram showing an example of information setting, and FIG. Is a diagram showing, FIG 40 is a schematic flow chart of an automatic response process of Example 4.

 [Explanation of symbols]

 10 Sano

 11, 111, 211 ... Control means

 12, 112, 212

 13, 14, 114, 214 ...... storage means

 15, 115, 215

 101, 102, 103, 104

16 Keypad and display. 1 7 Microphone, speaker Best mode for carrying out the invention

 Embodiment 3.

 Embodiment 3 of the present invention is an electronic mail receiving client 'server system. This is the best mode of the present invention because unnecessary communication of the communication infrastructure network can be prevented.

 FIG. 35 is a block diagram illustrating a configuration of the third embodiment. This is an example of a configuration adopted in a portable mime, a normal mail system, and the like according to the same operation principle as the mail receiving client system embodiment in FIGS. 31 and 32 of Embodiment 2 of the present invention. The treatment system, treatment information, and treatment application reference information in this configuration example are stored in storage means (13) on the server side. The setting process shown in Fig. 31 is performed in cooperation with the user terminal and the ISP, and the receiving process shown in Fig. 32 is performed by the ISP, and it is as if only the "receive" mail arrived at the server. You can see it. Thus, the effect of the present invention can be obtained without changing the user terminal. This effect includes the ability to reduce the amount of valuable communication between mobile phone user terminals and ISPs. If the ISP server receives only the e-mail header of the e-mail, it can judge the treatment given by the sender address and subject information contained in the header. Since processing is performed according to the prescribed treatment and the body of the e-mail need not be received, the traffic on the entire network can be reduced. In addition, it is possible to reduce the amount of traffic on the local communication path between the mail server, the system of claim 3 and the spam mail whisperer and the mail server.

 Example 1

 Example 1 of the present invention is an Internet videophone system.

1: Overall Configuration Hereinafter, an embodiment of the present invention will be described with reference to the drawings. FIG. 8 is a block diagram showing the overall configuration of the first embodiment. FIG. 9 is a block diagram showing the internal configuration of the first embodiment. In this figure, reference numeral 10 denotes a server, which is connected to the Internet via a route control device and an MIS line. Reference numerals 101, 102,... Denote various terminals, which are connected to the Internet in the same manner as the server (10). here, Each of the terminals (101), (102),… has an output unit such as a CRT, LCD, speaker, etc., an input unit such as a keyboard, mouse, camera, microphone, etc., and a function to execute a videophone program. .

 1-1: Server Configuration Next, the detailed configuration of the server (10) will be described (see FIG. 9). FIG. 9 is a block diagram showing the configuration of the server (10) and the terminal. In this figure, reference numeral 11 denotes a control means, which is constituted by a CPU and the like, and performs control of each unit, data transfer, various calculations, temporary storage of data, and the like. Reference numeral 12 denotes input / output control means for controlling data input from a terminal connected via the Internet and controlling data output to the terminal. Reference numeral 15 denotes a communication means for connecting to the Internet. Reference numerals 13 and 14 denote storage devices which store and store the following files, respectively.

 First, the main program is stored in the storage device (14). Such a main program is used in the control means (11), for example, a program for displaying a treatment application screen on a display unit of a terminal, a treatment examination program for displaying detailed information of a user who sent a treatment application, It consists of the public name of the user who applied for treatment in the user's contact book, the status display of other users, the start-up of TV programs and the display program of icons to be transmitted to the other party.

Next, the storage device (13) stores the user master database table and the treatment relation master database table. The user master stores user information records. One user information record is composed of user-specific information such as IJ user ID, password, electronic mail address, IP address, and self-introduction. Of these, the user ID is automatically given by the control means (11) when registering a new service participation. The password, e-mail address, and self-introduction store the information that the user has registered and told from the terminals (101), (102),…. The IP address stores the information said when the television Sl¾ communication program of the terminal (101), (102), ... is started. The treatment relationship master stores a treatment information record. One treatment information record is composed of treatment information and treatment application sign information. The treatment information includes the ID of the called user and the usage of the called It is composed of the ID of the caller who has been given the treatment and the treatment given. The treatment information and treatment application labeling information is the program information that displays the treatment application screen on the display of the terminal.

This is information input from the terminal, and is information said from the terminals (101), (102),...

 Next, the operation of the first embodiment will be described. Here, the terminals (101), (102),... Are connected to the server (10) and communicate with each other, and all function as terminals for the TV mystery. Will be described below assuming that the terminal (101) is connected. When the terminal (101) is connected to the server (10), the control means (11) detects this connection via the input / output control means (12) and controls the terminal (101) according to the main program. . FIG. 10 is a flowchart showing the operation of the main program.

2-1: Assume that the terminal ^ is a new user to explain the process of creating a user information record. Explain new registration. In step Sa1 shown in FIG. 10, the control means (11) displays a main menu screen as shown in FIG. 11 on the display unit of the terminal (101), and provides a service to the terminal operator. In order to use it, the user is prompted to select the desired process from “login” and “new registration”. On the main menu screen, a mouse cursor MC is displayed, and various operations can be performed by clicking a predetermined place. For example, if the mouse cursor MC is positioned in one of the display areas of the link buttons (1101) and (1102) and clicked, the processing indicated in the display area is performed, and the triangular button (22U ), (22D), (22L), and (22R), place the mouse cursor MC in the display area and click on it.The rectangular display area defined by the vertices of the triangle will be the upper, lower, left, It scrolls right. Here, the terminal operation is to place the mouse cursor MC in the display area of the link button (1102), and then perform a click operation (this operation is simply referred to as “click” below) and execute “New registration”. Select processing. Then, upon detecting this, the control means (11) advances the procedure to step Sa2 shown in FIG. 10, and in this step, the name, e-mail address, You will be prompted to enter the password for the terminal operation. If it is determined that the input e-mail address is not used for the user master, a user ID is automatically assigned by the control means (11) based on the input information, and the user ID is disclosed to the user. Use as ID. The next step S a 3 is performed. In step Sa3, the control means (11) controls the terminal (101) to display the contact book screen shown in Fig. 14. In the following steps Sa4 to Sa7, it is possible to return to the contact book screen and the main menu screen at any time by a predetermined operation. By the way, on this contact book screen, ¾ ^ of a newly registered user does not show any other party in the contact book, but for convenience of explanation, we will use the screen where several people already existed.

First, the addition of a new partner will be described. In order to communicate with a partner, the present invention first applies for treatment with the partner. Compiling a new partner is a specific procedure for applying for treatment. On the screen for adding a new partner, specify the treatment that you will give to the partner at the same time as applying for treatment to the partner. Encourage terminal operation to add members. For terminal operation, click the link button (1401). Then, the control means (1 1) performs the processing of the next step Sa4. In step Sa4, the control means (11) controls the terminal (101) to display the member addition screen shown in Fig. 15 and makes the terminal (101) open to the terminal operation. Prompt for ID information. A public ID is one that the user has disclosed on a bulletin board on the Internet or a chat on the network, or has been taught directly by the other party. On this member's addition screen, (1501) to (1502) are displayed in the “ID” and “Introduction” input boxes. Check button corresponding to "Publish address", "Private private email address", "Publicate homepage address", "Publicate profile address", "Publicize my status to this member" (1503) ~ (1507) is displayed, and the call acceptance treatment to be given to the other party is displayed. The selection box (1508) corresponding to the incoming call permission J is displayed, and input and selection are performed for the terminal operation. If you are prompted to do so, enter the public ID of the other party in the box and enter your personal ID in the “| Peri ID” box. , Then execute link button (1 5 1 0) Click. In the treatment system of the first embodiment, there are three types of incoming call permission for the incoming call response method of TV: "automatic rejection of reception", "every time inquiry", and "automatic reception". "Publish your email address to this member", "Publish your private email address", "Publish your homepage address", "Publish your profile address", "Publish your status to this member", (1509) (see Fig. 15). There are two types of treatment applications: "Allow treatment application" and "Rejection of treatment application". The default initial expectation is "Every time". If you do not disclose all information, it will be "Approval of treatment application".

 Now, by vigorous operation, the procedure performs the next execution process of the treatment application (see Figure 16). Here, the terminal operation f ^ is user a, the communication partner is user b, and the public ID of user b is 200. The control means (1 1) should process the treatment application based on the treatment given to the user b, the user S, and, first, whether the user a has already entered the sender b list of the user b. Is checked by searching the user master that has already been created (1661), and if so, the treatment given by user b to a with respect to the treatment application is checked (1602), The given treatment is controlled to display “Member i AD rejected” on the display of the terminal (101) in “Treatment application rejected”, and the procedure returns to step Sa3. Display the contact list screen, and if the user a does not exist in the caller's list of the user b and the treatment given is not “rejection of treatment application” ^, the user gives the default initial expectation to the user a, Create a new treatment information record consisting of the IDs of b and a, initial expected treatment and treatment application sign information, and treat Store it in the relation master and return to the contact book screen.

 In step Sa3, the control means (11) controls the terminal (101) to display the contact book screen shown in Fig. 14. Prompts the user to set the personal settings ¾m. The terminal operator ^ clicks the link button 1 4 0 2. Then, the control means (11) performs the process of the next step Sa7.

In step Sa7, the control means (11) controls the terminal (101) to display the user's personal setting screen shown in Fig. 17 and issues a public ID to the terminal operation. (1 7 0 1) is displayed, the display area of the public ID is controlled to be write-protected, and personal information (1 7 0 2) Is controlled so that it can be changed.

 2-2: It is assumed that the terminal (101) is operated by the user a in the login and 2-1 and that the treatment application is completed for the user. Here, it is assumed that the existing user b is operating the terminal (102). For convenience of explanation, the screen displayed on the terminal (101) in the description of 2-1 and FIGS. 11 and 14 are used here as the screen displayed on the terminal (102) of the user b. Server (1

The following description will be made assuming that the terminal (102) is connected to (0). When the terminal (102) is connected to the server (10), the control means (11) detects this connection via the input / output control means (12) and controls the terminal (102) according to the main program. FIG. 18 is a flowchart showing the login processing operation of the main program.

 Now, in step S a 1 shown in FIG. 10, the control means (11) causes the display section of the terminal (102) to display a main menu screen as shown in FIG. In order to use the service, the user is prompted to select the desired process from “login” and “new registration”.

 In this example, the terminal operator enters the e-mail address and password in the “Email address” input box (1103) and the “Password” input box (1104), and clicks the link button (11

01) Click on and select the “Login” process. Then, upon detecting this, the control means (11) checks by searching the created user master based on the input e-mail address and password (Fig. 18, 1801). If the control means (11) determines that the e-mail address and the password are not correct, the control means (11) advances the procedure to step Sa7, and displays “E-mail address password” on the display of the terminal (102). Is not correct ", the procedure returns to step Sa1, and the main menu screen is displayed again. On the other hand, if the control means (11) determines that the input e-mail address and passcode are correct, it performs the processing of the next step Sa3. In step Sa3, the control means (11) controls the terminal (102) to display the contact book screen shown in FIG. 14, and associates the new applicant for treatment with the treatment relation. Extracted from the master and notified to user b, user a who applied for treatment in user b's contact book is green and public name of user a sous s (1405), and in accordance with the information disclosure treatment given to user b by other users, the status is made public with colors and icons (1406), and the mail compose icon is displayed for the person whose email address was made public (1403), the link icon is displayed for the partner who has released the profile address (1404), and control is performed so that the detailed information of the partner corresponding to the pencil icon is displayed. When the link button (1407) is clicked, the control means (11) performs the processing of the next step Sa5. In step Sa5, the control means (11) controls the terminal (102) to display the friend list item editing screen shown in FIG. 19, and performs the treatment examination and the treatment change on this screen. Then, the detailed information (1 903) of the user a who sent the treatment application to the user b is displayed, and control is performed to edit the treatment (1901) given to the user a. Examining the treatment application of user a, deciding the treatment to be given to user a, and encouraging the selection of each treatment content. In addition to examining the treatment application, changes to the treatment given to the existing partner are also made on this friend list item edit screen.

 Now, the user b selects each treatment content and clicks the link button (1404). Then, the control means (11) updates the treatment information record based on the selected treatment content and stores it in the treatment relation master. Click the link button (1902) to cut off the relationship with the other party and delete the other party. Then, the control means (11) performs the process of step Sa6. In step Sa6, the control means (11) controls the terminal (102) to display the 1 to treatment application qualification designation screen shown in FIG. 20. If you select “Reject Application”, you will be disconnected from the other party in the future. User b clicks the link button update (2002). Then, the control means (11) updates the treatment information record based on the selected treatment content and stores it in the treatment relation master.

 2-3: Based on the processing described in 2-1 and 2-1 on TV IS communication, it is assumed that user a and user b have established a treatment relationship, and server (10) has terminal (101 ), Terminal of user b (1

02) is connected. Figure 21 is a flowchart showing the operation of the TV miscommunication program. In step Sa3, the control means (11) controls the display of the contact book screen shown in FIG. 14, and the user b executes the link button "Start the program" (1408). Click. Then, the control means (ID activates the TV mi¾ communication program for the terminal of user b and passes “1” as the start parameter. When the TV mis communication program is started, the IP address of the own terminal is used. Is sent to the server (Fig. 21, 2101), then the startup parameter determines whether it is an IP address (2102). If the parameter is determined not to be an IP address, the connection waiting screen is displayed and the connection is waited. Standby (Sb3: Connection waiting screen, Fig. 12.) The control means (11) sends the information record of user b based on the IP address information sent by the terminal videophone communication program of user b. Update and store it in the user master Then, display the status display icon (1409 in Fig. 14) of user b on the contact book screen of user a. Aiko Then, the control means (11) extracts the IP address of the user b from the user master, activates the videophone communication program of the terminal (101) of the user a, and Passing the IP address as a parameter (Fig. 21, 2103), notifying the caller ID, requesting connection to the destination Ip address, that is, sending to user b, and calling user b's TV fg communication program (2104) When the connection request arrives, the videophone communication program of the called user b asks the control means (11) for the calling party ID as a parameter ^: and sends the inquiry control. Means (11) extracts the treatment information from the treatment relation master of the server (10) based on the caller ID (2106), and sends the treatment given to the caller user a to the videophone communication program as an inquiry result. If the treatment given to the calling user a (2107, YES), the receiving user b's TV mig communication program does not sound the bell, automatically displays the input request screen, does not go through the input request, and automatically connects to the TV. Display the screen (Sb2: TV miS communication screen, Fig. 13, 1301) At the same time, display the sib communication program of the calling user a a sb2: TV mi§ Communication screen and communicate. If the treatment given to the calling user a is “every inquiry” (Fig. 21, 2108, YES), the TV of the called user b ¾ | ¾ The communication program rings the bell and prompts the input request screen (Sb 4: Confirmation inquiry screen: “Call from user a. Do you want to listen?” Is displayed), and asks the called user b to connect or not. Calling side videophone communication program Displays the approval waiting screen of the other party (Sb1: Waiting for approval screen: "Waiting for approval of the other party ..." is displayed). When the called party b approves the connection (Fig. 21, 2110, YES), the TV mig communication program displays the videophone communication screen, and responds to the calling party a's TV MIS communication program that the connection has been approved. Then, the television communication program running on the terminal of the calling user a determines this response (2109, YES), and displays the TV «| §communicating screen to communicate. Receiving user b does not approve the connection ^ (Fig. 21, 21 10, NO), TV MIS communication program displays connection waiting screen and refuses connection to calling user a's TV® | g communication program Then, the television «| ¾ communication program running on the terminal of the calling user a makes the response determined (2109, NO), and“ access denied ”is displayed on the terminal display of the user a. (Fig. 12, 1202, Fig. 21, 2111) and display the connection result, then display the connection waiting screen, and wait for the connection (Sb 3: Connection waiting screen, Fig. 12). In the case where the treatment given to the calling user a is “automatic rejection of reception” (FIG. 21, 2108, NO), the same processing as in the case where the called user b does not approve the connection is performed.

3: Outline of the flow Next, Figure 22 shows the flow of establishing a treatment relationship with the called party via the public ID. User a (2201) first logs in to the server (2202) via the Internet to receive the provision of the communication service of the present invention. A treatment application that expresses the desire to communicate in b will be made (see Figure 22 (1)). The user a who applies for treatment inputs the public ID of the called party b: 200 (Fig. 15, 1501), and at the same time, gives the inquiries to the user a. The server saves the treatment “Inquiry each time” given to user a to the specified partner b in the treatment relation master (2203), and the user a power S does not exist in the sender list of user b ^^, The first expectation of user b, “automatic rejection of reception” is given to user a (2204). In this state, user b can make a call and communicate with user a. Communication in the opposite direction is not possible. The called party is dominant. The server sends the result of receiving the application to user a to user a (see Fig. 22 (3) and (4)). After logging in to the server, user b (2205) extracts the other party who applied for treatment from the treatment relation master and notifies user b (see Fig. 22 (5) to (8)). , The user a who made the application i is displayed in green in the contact book of the user b and the public name souss of the user a (1 4 0 5), and the information disclosure treatment given to the other user S user b According to, the status is disclosed by color and icon (1406), and Fig. 19 displays the detailed information of user a who sent the treatment application to user b. User b examines the treatment-related application and decides the treatment to be given to partner a (Fig. 19, 1901) 0 The treatment “inquiry each time” given to partner a is stored in the server, No ”(see Figure 22 (10)). As a result, users a and b can mutually send a connection request to the other party of the television set fi.

 Example 2.

 The second embodiment of the present invention is an electronic mail receiving client system.

 FIG. 27 is a block diagram illustrating a configuration of the second embodiment. In this figure, symbol 10 is

It is a server β of I S Ρ (Internet service provider). Reference numeral 101 denotes an e-mail 'service user terminal. This embodiment is a client of the e-mail, service, and server of the ISP.

Reference numeral 11 denotes control means, which comprises a CPU or the like, and performs control of each unit, data transfer, various operations, temporary storage of data, and the like. Reference numeral 12 denotes input / output control means, which controls data input from a server connected via a communication line and controls data output to a server. Reference numeral 15 denotes communication transfer means, which is connected to the ISP. Reference numeral 16 denotes a keyboard and a display unit. Reference numeral 13 denotes a storage device which stores and stores the following programs and data, respectively.

 First, such a program is used in the control means (11). For example, a display, a treatment, an initial treatment, a request (a question, a correct answer, a program for setting a score to be given to the correct answer), a user usually It consists of an e-mail transmission / reception proxy program that mediates between the e-mail client software used and the e-mail service server.

Next, in the storage device (13), data such as treatment system, treatment information, and clearing standard for treatment application are stored. A magnetic storage medium is used as a storage device. This embodiment is commercialized as a PC (personal computer) application (URL: http: netinrotec n.co.jp/, http // www.Emailshi, co /). The configuration shown in FIG. 35 of the third embodiment is shown. An example could be that the same operating principle could be applied to mobile phones and ordinary mail systems, etc.

 The operation principle of the second embodiment will be described. FIG. 31 and FIG. 32 are schematic flowcharts of the user setting and receiving process. In step 3101 shown in FIG. 31, the control means (11) displays a screen as shown in FIG. 33 on the display unit of the terminal (101), and instructs the terminal operator to Prompt the user to enter the treatment application criteria information of 2, ie, the requirement β, the question, the correct answer, and the score given to the correct answer (3301). An example of a treatment application is as follows. Automatically reply to the sender as an e-mail with the treatment application guide (including the β question), and request that the answer to the confirmation question be entered in the subject of the response e-mail during the treatment application guide. In this way, the sender does not need to use a special mail terminal, and can apply for treatment at any mail terminal, including text terminals and mobile terminals.

 An example of internal information is the correct answer to a recommended question. An example of application information is the answer to a cafe question. An example of a judging standard for judging application information and determining treatment is the scoring standard of the answer, that is, the score given to the correct answer. Specify the treatment that the receiver gives to the sender in association with the total scoring in advance.

 When a correct answer is detected from the subject or body of the e-mail, for example, a keyword such as the name of the recipient, a predetermined treatment is given. In other words, it can implicitly perform the treatment application procedure and provide convenience to the sender.

 Recipients can freely expand and reduce treatment application criteria information. Figure 29 is an example of the criteria information for treatment application set by the recipient. In this example, three sets of data were entered.

 At the stage (3104) shown in FIG. 31, the control means (1 1) causes the display unit of the terminal (101) to display a screen as shown in FIG. 01) is prompted to select the first expectation (3402).

Fig. 28 shows the treatment system adopted in the second embodiment. The concrete implementation of the treatment of the type "communication is not possible" is that "reply message is rejected to the sender and reception is refused." Refuse The specific implementation of the type of treatment “can apply for treatment” is one treatment of “replying a request confirmation question to the sender and refusing to receive it”. If necessary, it is possible to add "Return the requested bacteria and questions to the sender and receive only the subject". The specific realization of the “communicable” type of treatment is “receiving limited size and saving to a temporary folder and notifying the recipient” and “receiving and saving to a temporary folder and notifying the recipient” and “ The first two are the treatment of "remember the application information and notify the recipient", which requires further manual review. Rewrite the treatment determined by automatic screening in the program.

 The initial treatment is the treatment given to "Other unknown e-mail addresses" in Fig. 30. In this example, the set treatment ID is 2, that is, if the message is received from an unknown e-mail address for the first time, the request question is returned to the sender and the reception is refused.

 In the initial setting of the product of this embodiment, first, after receiving the confirmation of the user, reception permission treatment (treatment ID = 5) is given to the person listed in the address book of the existing mail software (Fig. 34, Fig. 34). 3 4 0 3) After that, you can individually enter the reception permission / rejection address and domain name at any time, and set or change the treatment for each caller.

 FIG. 30 shows an example of the set treatment information, and the following functions can be simultaneously realized. In other words, designated reception (treatment ID = 5) and designated rejection (treatment ID = 1) for each address domain, rejection of the desired e-mail automatically sent by the machine (total score = 0, treatment ID = 2), irrelevant human power S Limited reception of e-mail sent and waiting for manual treatment examination (total score = 1, treatment ID = 3), e-mail sent by someone who knows the recipient's name Temporarily receive and wait for manual treatment examination (total score = 2, treatment ID = 4), usually receive mail sent by someone who knows the recipient's birthday (total score) 3, treatment ID = Five ).

The processing outline of the present embodiment shown in FIG. 32 will be described. In the electronic mail communication system, the sender ID is the sender's mail address, and the processing steps related to the detection are not shown. By the incoming call processing operation, the control means (1 1) advances the procedure to the step (3 201), detects the caller address or the treatment associated with the domain, and judges that the treatment has been detected. Then, next (3210) Proceed to communication processing based on treatment. On the other hand, if the control means (11) determines that no treatment has been detected, it proceeds to step (3203) and performs communication processing based on the initial treatment.

 An example of setting the first expected treatment in the present embodiment is a treatment of “can apply for treatment” type of treatment “replying a request confirmation question to the sender and refusing to receive”. An example of the stage of performing communication processing based on treatment will be described.

 The specific realization of the application act detection of this embodiment is the detection of the answer to the question from the mail subject. The control means (11) advances the procedure to step (3205). If it is determined that the answer to the question has been detected from the e-mail subject, the control means (11) proceeds to the next step (3207) to extract the disgusting answer and score it. Criteria (Figure

29), calculate the total score, associate it with the total score and give it to the caller (Fig.

The current communication processing treatment is determined based on (30), and the process proceeds to the next step (3208) to determine whether or not the treatment determined in claim 7 was "application for treatment". Judgment, that is, whether or not “the determined treatment ID was 2” is determined, and if it is determined that the decided treatment ID was 2, the next step (3210) “communication processing based on treatment” In other words, the process of “replying the requested question to the sender and rejecting reception” is performed, and the guidance information is notified to the sender specifically. On the other hand, if the control means (11) determines that the determined treatment ID is not 2, the control means (11) associates the treatment determined in the examination step with the ID of the caller in the storage device, namely The determined treatment is associated with the sender address (Fig. 30) and stored in the storage device. Then, the recipient is effective one by one unless the treatment determined by this examination is changed. After this, the procedure proceeds to step (3210).

 On the other hand, if it is determined in step (3205) that the answer S of the question was not detected from the e-mail subject, the process proceeds to step (3206), and the current communication processing is determined to be the treatment with the treatment ID of 2, ie, “ Request «, reply question to sender, refuse to receive” and proceed to step (3210). In step (3210), communication processing is performed based on the treatment. That is, the handling of the currently received mail is based on the treatment determined by the previous stage! The processing shown in Figure 28 of the treatment system is performed.

The step configuration shown in Fig. 32 is easy to commercialize! / Therefore, it differs from Fig. 24 and Fig. 26, but the logic method is the same. is there.

 In order to prevent the occurrence of an infinite loop of automatic reply mail by the automatic reply mail system (including “mailing list j and this system”), this system performs the following processing.

 1. When the user speaks normal mail, the system automatically gives the recipient address the receiving treatment. As a result, even if the recipient sends a mail for the treatment application guide (urn question), it can be received.

2. A special mail header is added to the mail of the treatment application guidance question) by automatic reply by this system. This system uses this mail header Even if you receive an e-mail, you should not reply automatically.

 In the present embodiment, multilingual processing of the guide information is performed based on the character code information included in the mail header information and the regional information included in the suffix of the domain name of the speaker address.

 Example 4.

 The fourth embodiment of the present invention is an automatic response fg machine. FIG. 36 is a block diagram illustrating a configuration of the fourth embodiment. Reference numeral 17 denotes a microphone and a speaker. FIG. 40 is a schematic flowchart of the automatic response process. This is a configuration example in which the same operation principle as that of the embodiment of the mail receiving client system shown in FIGS. 31 and 32 of the second embodiment of the present invention is applied to the ¾ | g machine. Fig. 37 shows the treatment system in this configuration example, Fig. 39 shows an example of setting treatment information, and Fig. 38 shows an example of setting treatment application standard information. The request confirmation question is recorded in advance. The user terminal of this embodiment can be realized as a PC application, the user terminal function is built into the device and the portable device, or as an external adapter dedicated to the mii device. The communication transfer means (15) shown in Fig. 36 is a modem having a voice communication function. For example, a modem compatible with V.90K56f1eX (made by SVEC) can be used.

For the first time in the implementation example of the treatment application, the receiver sends a request confirmation question message to the other party coming from a known signal, and the other party responds by pressing the dial button. Judge the response and decide the treatment. FIG. 1 is a diagram showing an example of an operation in which a telephone number of a new person concerned is automatically given a treatment that allows a normal call. The setting examples in Fig. 38 and Fig. 39 can realize the following functions. For each phone number of the other party Ignoring and rejecting designated reception (treatment ID = 4), rejection of treatment (treatment ID = 1) and incomplete call from machine (one-time call) mis (total scoring = 0, treatment ID = 2). Misleading a product (total scoring 2 1, treatment ID = 3), receiving a call from someone who knows the recipient's name normally (total scoring 2 or 3, treatment ID = 4), and Monitor home and children (total score = 9, treatment ID = 5). "Please wait and press 1. When the guide sound of J is played, normal processing will be performed if there is no further key operation for an ordinary person, but here the user enters a password (for example, 5 6 Press 7 8) to connect the call without ringing, so that you can monitor and observe.For example, you can select whether your parents can talk to your child's mobile tongue.

 Suppose that the treatment that can be monitored and monitored is not associated with the calling number.

 The exact method of reviewing a treatment application will depend on the user's instrumentation. Various methods can be adopted as long as they achieve the purpose of the examination step of the present invention. For example, in this embodiment, if the identity of the other party is found, it is desirable to end the question as soon as possible. If you find that you have entered your PIN in the first question, you may proceed so that you can connect immediately. In the example of i 図 in Fig. 1, when the sender is identified as a person who knows the name of the receiver, the voice guidance and authentication processes are immediately terminated, and the call becomes available.

 The user terminal of this embodiment functions by connecting to the subscriber line of the number display. There was an incoming call; ^, ® Detected the outgoing phone number (MODEM signal) before “calling terminal equipment, etc.” in the connection operation of the service interface (Nippon Telegraph and Telephone TO Co., Ltd.). Because the automatic response process is performed using the flowchart shown, even if a normal extension telephone is installed, the extension can be performed before the ringing tone of the «! ¾ machine is sounded. The inventions of claims 7 and 8 provide the user with a method of automatically determining the identity of the other party. In the setting example shown in the execution example, the name of the recipient can be known. You can also monitor and observe. Various functions applicable to the user's personal situation can be obtained by devising the settings.

Used for goods etc.! /, The existing technology automatic «Tori Yumi I gives voice guidance to the caller, the caller presses the dial button to operate, を ^ of the customer himself by the ΒPhone code number. The present invention differs in that the answering method differs for each calling number, that the caller does not need to register a password in advance, and that This technology differs from the technology in that the owner of the receiving machine can remotely control some functions of the receiving machine by setting himself / herself.

 【The invention's effect】

 As described above, according to the present invention, it is possible to lait unsolicited Ml tongue, unsolicited e-mail, e-mail attack, and unintended communication on the receiving side without excessive burden on the user. Public network traffic can be reduced for spam. Dating and job recruiting activities can be performed more easily and easily over a network. Communication in a form that only one side can transmit is possible. The communication function can be integrated with the monitoring / listening function or remote control function. The effects described above can be obtained while maintaining interoperability with conventional communication infrastructure technologies.

 In various telecommunications services, it is possible to reject unwanted reception almost automatically while guaranteeing desired reception. It can save the human and physical resources required for the modification and execution of communication contracts, administrative and legal development and execution, and so on. Industrial applicability

 As described above, the present invention is suitable for a communication method using an electronic device on a network.

Claims

The scope of the claims
In a method of providing a communication service on a network, a step of allowing a called user to input a treatment (defined in this specification) given to a calling side by a called user in advance, A step of storing the given caller ID and the treatment given by the lift user in association with each other in the storage device, a step of detecting the caller ID when receiving a call, and a step of storing the caller ID from the storage device based on the detected caller ID. Detecting a treatment associated with the caller ID; performing a communication process based on the detected treatment; and detecting a treatment in which the tiff's caller ID is not detected or associated with the caller ID. Performing a communication process based on the initial treatment that has not been performed.
In a method of providing a communication service on a network, a step in which a receiving user inputs in advance the treatment given to the calling side by the receiving user to the receiving side, and the ID of the receiving user himself and the receiving user's power S A step of storing the given calling party's ΪD and the given treatment in association with each other in a storage device, detecting a called party ID when a communication request arrives, and detecting a calling party ID Detecting a treatment associated with the calling party ID from the storage device based on the detected calling party ID, performing communication processing based on the detected treatment, and not detecting the calling party ID. Alternatively, the processing ability S associated with the calling party ID S is not detected, the communication processing is performed based on the initial treatment, and the called party ID is not detected ^^, and the conventional communication is performed. And A communication method, comprising:
In the method of providing a communication service on a network, a step of prompting the called user to input the treatment to be given to the called side S in advance to the calling side; A step of storing the ID of the caller who has been given treatment and the treatment given by t & t one by one in a storage device, a step of detecting the caller ID when a communication request arrives, and a step of detecting the caller ID Performing the treatment information acquisition and synchronization processing, detecting the treatment information, and detecting the treatment associated with the caller ID from the storage device based on the detected caller ID. Performing communication processing based on the detected treatment; ttft The self-originating ID has not been detected, or the treatment associated with the tfifB originating ID has not been detected.The communication processing is performed based on the initial treatment, and the tGlB receiving-end ID has been detected. A communication method, wherein the treatment information is not detected, and the communication is performed in a conventional manner.
The communication method according to any one of claims 1 to 3, wherein at least the following three types of treatment are included. 1. "I can apply for treatment." 2. "Can communicate". 3. "Cannot communicate". Claims characterized by comprising a step of setting a type of treatment, a step of setting the contents of each type of treatment, and a step in which the treatment and initial expectation given to the caller are changed by the callee. :! ~ 4, the slip force, the communication method described.
. Claims that start communication with the called party that did not give the calling party treatment. First, make a treatment application to the called party, and the receiving party that received the treatment request has a step of examining the treatment application. :! ~ 5, the communication method described.
· Claims-6: According to the communication method described in the slip force, the conditions or method required for the treatment application to notify the calling party's user power S in advance to the sender, or guidance information such as questions, and expectations Internal information such as the content of the application or the correct answer to the question to be submitted and the application criteria or the response to the question such as the application information such as the response to the question are entered into the receiving user and stored in the storage unit. And a step of performing communication processing based on the following "can apply for treatment" treatment, that is, a step of detecting an application act according to the guidance information from the contents of the incoming call, and a step of detecting the application act. The application information is extracted, the application information is examined based on the self-examination criteria, and the treatment determined in the tfiiB examination stage is `` can apply for treatment '', or the application act is not detected Notify the caller of the information Performing communication processing based on the treatment determined by the examination step, and the communication processing based on the treatment determined by the examination step; A communication method in which the provision of a glue sheet is provided.
In the communication method described in any one of claims 1 to 6, a condition or a method or a guidance information such as a question necessary for a treatment application to be notified in advance by a receiving side user to a calling side, and an expected application content or Is to input the examination criteria for examining the internal information such as the correct answer of the question and the application content or the application information such as the answer to the question and to determine the treatment, and store it in the storage unit. "Can apply for treatment" of performing communication processing based on treatment, i.e., detecting an application act according to ItilH guidance information from the incoming call content, Extracting the application information based on the examination criteria; and if the treatment determined by the examination step is “can apply for treatment”, or the application act was not detected. If the treatment determined by the step of notifying the sender of the guidance information and the step of self-examination of the tiff is not `` can apply for treatment '', and if the ID of the caller is detected, it is decided by the above examination step Treatment and caller ID The step of storing the information in the storage device in association with the self-examination step, and the step of performing the communication processing based on the treatment determined in the self-examination step if the treatment determined by the self-examination step is not “application for treatment”. A communication method comprising the steps of:
 9. The communication method according to claim 1, further comprising a step of assigning a public ID to a user who already has the ID by the server side.
0. A communication device having means for performing the communication method according to any one of claims 1 to 9. 1. A program for causing a computer to execute the communication method according to any one of claims 1 to 9.
2. A computer-readable recording medium on which a program for causing a computer to execute the communication method according to any one of claims 1 to 9 is recorded.
3. Claim:! A system and a subsystem for causing a computer to execute the communication method according to any one of claims 9 to 9.
PCT/JP2003/012014 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program WO2004082251A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2003-70953 2003-02-10
JP2003070953 2003-02-10

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
AU2003266549A AU2003266549A1 (en) 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program
JP2005504876A JPWO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system led by called party
PCT/JP2004/001182 WO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system in which called person has the initiative
US11/194,906 US8712397B2 (en) 2003-02-10 2005-08-02 Method and apparatus for controllable communication
US14/207,875 US20140195437A1 (en) 2003-02-10 2014-03-13 Method and apparatus for electronic transactions

Related Child Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2004/000118 Continuation-In-Part WO2004064284A2 (en) 2003-01-10 2004-01-09 Method for transmitting data stream via wireless medium and a wireless network
PCT/JP2004/001182 Continuation-In-Part WO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system in which called person has the initiative

Publications (1)

Publication Number Publication Date
WO2004082251A1 true WO2004082251A1 (en) 2004-09-23

Family

ID=32844563

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2003/012014 WO2004082251A1 (en) 2003-02-10 2003-09-19 Receiver-side-led communication method, communication apparatus and communication program
PCT/JP2004/001182 WO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system in which called person has the initiative

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/JP2004/001182 WO2004070614A1 (en) 2003-02-10 2004-02-05 Communication method and communication system in which called person has the initiative

Country Status (3)

Country Link
JP (1) JPWO2004070614A1 (en)
AU (1) AU2003266549A1 (en)
WO (2) WO2004082251A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4543854B2 (en) * 2004-09-24 2010-09-15 富士ゼロックス株式会社 Printing system and control method thereof
JP4580231B2 (en) * 2004-12-28 2010-11-10 日本電信電話株式会社 Reception control device
EP1967956A4 (en) * 2005-12-28 2010-09-29 Fujitsu Ltd Information processing device, information processing method and program
US20070165811A1 (en) * 2006-01-19 2007-07-19 John Reumann System and method for spam detection
JP4636562B2 (en) * 2006-10-16 2011-02-23 富士通株式会社 Call control system, communication terminal, scale value data storage device, and program
JP2008139926A (en) 2006-11-30 2008-06-19 Database Consultants Corp Email server apparatus and email server program
JP5417914B2 (en) * 2009-03-16 2014-02-19 ヤマハ株式会社 Relay device and program
JP2013157718A (en) * 2012-01-27 2013-08-15 Nippon Telegr & Teleph Corp <Ntt> Videophone device, display screen switch method of the same, and program

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002290566A (en) * 2001-03-27 2002-10-04 Nippon Telegraph & Telephone East Corp Terminating call selecting system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001217861A (en) * 2000-01-31 2001-08-10 Kddi Corp Prankster prevention system and mail center system
JP2002374307A (en) * 2001-06-18 2002-12-26 Canon Inc Mail server, client device, method of controlling them, electronic mail system, program and storage medium
JP2003036230A (en) * 2001-07-23 2003-02-07 Kobo Itonaga Proper communication method and device for e-mail and the like
JP3665009B2 (en) * 2001-11-01 2005-06-29 株式会社エヌ・ティ・ティ・ドコモ Mail delivery control method and apparatus, and wireless communication system
KR100472441B1 (en) * 2002-01-11 2005-03-08 삼성전자주식회사 Method of receiving selected mail at internet mail device
JP2003333097A (en) * 2002-05-13 2003-11-21 Fujitsu Ltd Mail server, personal terminal and mail receiving system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002290566A (en) * 2001-03-27 2002-10-04 Nippon Telegraph & Telephone East Corp Terminating call selecting system

Also Published As

Publication number Publication date
WO2004070614A1 (en) 2004-08-19
WO2004070614B1 (en) 2004-11-11
AU2003266549A1 (en) 2004-09-30
JPWO2004070614A1 (en) 2006-05-25

Similar Documents

Publication Publication Date Title
US20200007630A1 (en) Identity Management and Service Access For Local User Group Based On Network-Resident User Profiles
US20160156677A1 (en) Notification of Communication Events
US9860374B2 (en) Method for indicating the context of a call to a called party
US10250743B2 (en) Sender identification system and method
US9692891B1 (en) Methods and systems for blocking unwanted communications
US9641423B2 (en) Communication using delegates, such as delegates specified in an email or scheduling application
US20150180809A1 (en) Selection of a link in a received message for speaking reply, which is converted into text form for delivery
KR101819767B1 (en) Caller id surfing
US8982877B2 (en) Provision of telephony caller ID service via common instant communications clients
US20160044474A1 (en) Systems and processes to manage multiple modes of communication
US7334017B2 (en) Content provider entity for communication session
CA2393571C (en) Anonymity in a presence management system
CA2394344C (en) Presence management system
US6549937B1 (en) System and method for multi-protocol communication in a computer network
US7359938B1 (en) System indicating the presence of an individual or group of individuals
US7043538B2 (en) Thin instant messaging proxy interface with persistent sessions
US6389127B1 (en) Telephone status notification system
US8626862B2 (en) Identifying people and available communication modes
JP5615922B2 (en) Mashups and presence found on the phone
KR101279734B1 (en) Augmenting a call with context
US8107495B2 (en) Integrating access to audio messages and instant messaging with VOIP
US6212548B1 (en) System and method for multiple asynchronous text chat conversations
US8553857B2 (en) Systems and methods for receiving telephone calls via instant messaging
CN102164170B (en) contextual correlation engine
JP5008985B2 (en) Predictive communication routing scheme that uses instant message priority and / or settings to guide packet traffic for voice, video, and other multimedia communications

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP