Language selection

Search

Patent 2371135 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2371135
(54) English Title: METHOD FOR ESTABLISHING A CONNECTION IN A TELECOMMUNICATIONS NETWORK
(54) French Title: PROCEDE D'ETABLISSEMENT D'UNE CONNEXION DANS UN RESEAU DE TELECOMMUNICATIONS
Status: Dead
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04Q 3/00 (2006.01)
(72) Inventors :
  • BITTROFF, ULRICH (Germany)
  • DE CAMBRAY, LAETITIA (Germany)
  • HERZOG, UWE (Germany)
  • LORANG, CHRISTOF (Germany)
  • CAPELLMANN, CARLA (Germany)
  • DASSOW, HEIKO (Germany)
(73) Owners :
  • DEUTSCHE TELEKOM AG (Germany)
(71) Applicants :
  • DEUTSCHE TELEKOM AG (Germany)
(74) Agent: FETHERSTONHAUGH & CO.
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2000-05-06
(87) Open to Public Inspection: 2000-11-16
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/EP2000/004071
(87) International Publication Number: WO2000/069182
(85) National Entry: 2001-11-09

(30) Application Priority Data:
Application No. Country/Territory Date
199 21 838.2 Germany 1999-05-11
100 07 385.9 Germany 2000-02-18

Abstracts

English Abstract




The invention relates to a method for establishing a connection from an
initiating subscriber to a designated subscriber in a telecommunications
network without providing the respective initiating subscriber with the
permanent identifier of the designated subscriber. The invention provides that
an anonymous identifier is assigned by a confidence instance (S, C) to the
permanent identifier of the designated subscriber (B). In order to establish
the connection via the initiating subscriber while using the anonymous
identifier of the active home exchange (V), the utilized identifier is
indicated as an anonymous identifier and is routed to the confidence instance
(S, C). The confidence instance (S, C) determines the assigned permanent
identifier from the routed anonymous identifier and transmits it to the home
exchange (V). The home exchange (V) proceeds to establish the connection to
the designated subscriber (B) while using the transmitted permanent
identifier. An embodiment of the method also serves to transmit an anonymous
identifier for a future return call to a called subscriber.


French Abstract

L'invention concerne un procédé d'établissement d'une connexion dans un réseau de télécommunications à partir d'un abonné de départ vers un abonné cible, sans que l'identification permanente de l'abonné cible ne soit connue de l'abonné de départ. Selon l'invention, une identification anonyme est assignée par une instance de confiance (S, C) à l'identification permanente de l'abonné cible (B). Pour permettre d'établir la connexion via l'abonné de départ en utilisant l'identification anonyme du central actif (V), l'identification utilisée est désignée comme identification anonyme et est transmise à l'instance de confiance (S, C). L'instance de confiance (S, C) détermine l'identification permanente assignée à partir de l'identification anonyme transmise et transmet ladite identification permanente au central (V). Le central (V) réalise l'établissement de la connexion à l'abonné cible (B) en se servant de l'identification permanente transmise. Un mode de réalisation du procédé sert également à transmettre à un abonné appelé une identification anonyme pour un rappel ultérieur.

Claims

Note: Claims are shown in the official language in which they were submitted.



What is claimed is:
1. A method for establishing a connection from an initiating subscriber to a
destination
subscriber in a telecommunications network without the respective initiating
subscriber knowing permanent identifier of the destination subscriber,
wherein
- an anonymous identifier is assigned to the permanent identifier of the
destination
subscriber (B) by a confidence instance (S, C),
- for establishing the connection via the initiating subscriber while using
the
anonymous identifier, the utilized identifier is recognized by the particular
active
switching center (V) as an anonymous identifier and routed to the confidence
instance
(S, C),
- the confidence instance (S, C) determines the assigned permanent identifier
from the
received anonymous identifier and transmits it to the switching center (V),
- the switching center (V) proceeds to establish the connection to the
destination
subscriber (B) while using the transmitted permanent identifier.
2. The method as recited in Claim 1;
wherein the confidence instance is constituted by a code server (C) in
conjunction
with a service control function (S) of the telecommnunications network which
is at
least partially designed as an intelligent network (1), and
the routing of the anonymous identifier from the switching center (V) and the
transmission of the permanent identifier to the switching center (V) take
place via a
service switching function of the intelligent network (1).
3. The method as recited in Claim 1;
wherein the anonymous identifier is deleted at a predetermined time after the
assignment.
12


4. The method as recited in one of the preceding Claims,
wherein the anonymous identifier can be deleted by an input of the destination
subscriber.
5. The method as recited in one of the preceding Claims,
wherein a permanent identifier can be assigned only one anonymous identifier
at a
time.
6. The method as recited in Claim 5:
wherein an authorization check is carried out before the confidence instance
assigns
the anonymous identifier.
7. The method as recited in one of the Claims 5 or 6,
wherein error messages are output by the confidence instance when an
assignment is
not possible.
8. The method as recited in one of the preceding Claims,
wherein the request for the assignment of the anonymous identifier and the
communicaiton thereof take place over the Internet.
9. The method in one of the Claims 1 through 7,
wherein the request for the assignment of the anonymous identifier and/or the
communication thereof take(s) place via data transmission from the destination
subscriber via a digital connection.
10. The method as recited in Claim 9;
wherein the digital connection is constituted by the D channel of the ISDN.
11. The method as recited in one of the Claims 1 through 7,
wherein the request for the assignment of the anonymous identifier and/or the
13

communication thereof take(s) place via data transmission from the destination
subscriber by means of the multifrequency method.
12. The method as recited in one of the Claims 1 through 7,
wherein the request for the assignment of the anonymous identifier and/or the
communication thereof take(s) place via data transmission in the form of short
messages (SMS).
13. The method as recited in one of the Claims 1 through 7,
wherein the request for the assignment of the anonymous identifier and/or the
communication thereof take(s) place via data transmission in the form of
electronic
mail (E-Mail).
14. The method as recited in one of the Claims 1 through 7,
wherein the request for the assignment of the anonymous identifier and/or the
communication thereof take(s) place via voice input and voice output.
15. The method as recited in one of the preceding Claims,
wherein the assignment is requested by an input of the destination subscriber.
16. The method as recited in one of the Claims 1 or 2,
wherein the request for the assignment between the anonymous and the permanent
identifiers takes place during the dialing of a permanent identification of a
later initiating
subscriber by the destination subscriber,
and the anonymous identifier is transmitted to the later initiating
subscriber.
17. The method as recited in Claim 16 for establishing a return connection
after the
termination of a connection to the initiating subscriber started by the
destination subscriber,
wherein the anonymous identifier is converted by the confidence instance (8,
C) into
the permanent identifier of the destination subscriber (R) on request (R1) of
the
14

initiating subscribes, and the return connection to the destination subscriber
(B) is
established (R9) while using the permanent identifier.
18. The method as recited in Claim 17.
wherein the anonymous identifier assigned to the destination subscriber (B) is

generated anew for each connection establishment to a later initiating
subscriber.
19. The method as recited in one of the preceding Claims,
wherein when a return call is established using the anonymous identifier, the
destination subscriber (B) is informed of this fact by a perceivable
signaling.
20. The method as recited in Claim 19,
wherein a connection requested by the initiating subscriber (A) is
automatically
established from the destination subscriber (h) upon completion of the
signaling after
the destination subscriber has confirmed that a connection is to be
established, the
connection being automatically effected from the destination subscriber (B) to
the
initiating subscriber (A).
21. The method as recited in one of the Claims 17 through 20,
wherein the permanent identifier is transmitted (H6) to a code server (C)
linked to the
network,
the code server (C) converts the permanent identifier into a free anonymous
identifier
and stores the anonymous identifier for the period of validity thereof with
the
permanent identifier being assigned thereto, and
the code server outputs (H7) the anonymous identifier which is transmitted to
the
initiating subscriber.
22. The method as recited in Claim 21,
wherein the anonymous identifier is transmitted (R6) to the code server (C),
and the code server (C), by the way of the stored assignments, retrieves and
outputs (R7)~
15




the permanent identifier.

23. The method as recited in Claim 17,
wherein the permanent identifier of the destination subscriber (B) is routed
to a
service control function (S) by the switching center (V) of the
telecommunications
network (1);
the service control function (S) obtains (H6) an anonymous identifier from a
code
server (C) while indicating the identifier of the destination subscriber (B);
the code server (C) converts the identifier into a free anonymous identifier
and stores
the anonymous identifier for the period of validity thereof with the permanent
identifier being assigned thereto and outputs the anonymous identifier to the
service
control function;
the service control function (S) routes the anonymous identifier to the
switching
center (V);
and the switching center (V) establishes the connection with the called
initiating
subscriber (A) while indicating (H9) the anonymous identifier.

24. The method as recited in Claim 23,
wherein an identifier which identifies the code server is added to the
anonymous
identifier.

25. The method as recited in ore of the Claims 23 or 24,
wherein for a return call, the anonymous identifier of the destination
subscriber (B) is
routed to a service control function (S) by an appropriate switching center
(V) of the
network (1),
the service control function (S) obtains (R6) the permanent identifier of the
destination subscriber (B) from the appropriate code server (C) while
indicating the
anonymous identifier,
the service control function (S) routes this identifier to the switching
center (V);
and the switching center (V) establishes (R9) the connection with the
destination



16




subscriber (B).
26. The method as recited in one of the preceding Claims,
wherein the telecommunications network (1) is a circuit-switched network for
voice
or data transmission,
and the identifiers are telephone numbers.

27. The method as recited in one of the preceding Claims,
wherein the anonymous telephone number includes a dialing prefix for dialing
up the
confidence instance (S, C).

28. The method as recited in one of the Claims 1 through 25,
wherein the telecommunications network is a network for transmitting data of
any
kind including video and audio data and/or textual messages
and the identifiers are user addresses of this network.



17

Description

Note: Descriptions are shown in the official language in which they were submitted.


OCR. ~1. 2001 12.17PM DDK N0. 92E4~r. 4
CA 02371135 2001-11-09
[320.1005]
MfiTHOD h'OR ESTABLISHTNCr A CONNECTION IN A TELECOM~M.UNICA,TIONS
NETWORK
[0001] The pl~sCnt invention relates to a method for cstablishitig~ a
connection from an
initiating Subscriber to a da~tirration subscriber in a tclecummunications
network without the
respeotiwc initiating sub8crlber knowing the portnanant idcutif3er of the
destination
subscriber.
[0002) A rcqucsl for a call inevitably involves the disclosure of one's own
telephone
number. Itr the ca8e of nev~rspaper advertisements, a way out presents itself
mostly via a box
number whicL, however, prevents an imrxiediate conta~;t of the interested
party with the
advertiser, resulting in delays. Moreover, the intcrestGd party then lies to
express
himsclflhcrsclf in writing. However, if the telephone cumber is indicated in a
newapapcr
ndvcrtiscmcut, then it is mostly possible to identity IIrG owner of thre
telephone nuinbcr via
electronic data bases which allow a nuxnbor search, ncsul~titag in the
possibility of abuse.
Thus, foi in5taziCe, a public offer of telling a precious object may attract
burglars. The
possibility of publishing an adverbisEnnent under a box number has to be
eompletoly ruled out
for some puLlic;ations :e~uh as in the case ofpiii rwalls W ith private
axmouneements in stores or
schools.
[0003] ThdrefOre, the object of the prc'cnt inverrtivn 18 to oprt~ to a
subscriber of a
tclcconuuuuications network the possibility of being called without the cailar
knowiur~ his/her
telephone number, hereinafter else referred to as perrxlanent identifier.
[0004 This objective is xhioved according lu the present invention
in that an anonymous identifier is assikued to the permanent identifier of the
dcstirrxlion subscriber by a confidence instance,
in that, for e~tablxshiz~ the eonncctiorr via the initiating subscriber while
using the
anonymous identifier, the utilized identifts~r is recognj~P.d by the
particular active Switching
center as an anonymous identifier and routed t0 the ennfidenee instanec,
in that. the confidence instance Qctennines the assigned permnncnt idarrtiliar
8'om the

OCT, fl 1, 2001 12:1 flPM DDK ~ ° ~ N0. 9264_x. 5_
CA 02371135 2001-11-09
t~iu. ~ ~ns~
rocoiw:d anonymous i~irntif~er and tranoamits it to the switching center,
iii that the switching center prooeeds to establish the connection to the
destination
subscriber while using the transmitted pormancnt iaaxitifier.
[OOOSj Althaugh a first field of application of iLd method according to the
present invanliun
is tslophuny, the use in other telaeomnnunicatialis networks, in particular
data. izctworks, is not
to be excluded.
[OOOG) An advantsigeous embodiment of the iuclhod acenxdiug to the present
inve~iliurt
causists in that thp coafidenoe instanco is cuuslituted by a code server ixi
coixjunction with a
sci-vicd control fimetiori of the teleeomrriunications network which is at
loast partially
dr~igned as an intelligent netwvork, and in chat the routing of the anonymous
idcnti~rr &om.
tltc ~witehing center and the tronaixiission of the permanent id«itifier to
the awitchiiig center
taka place via a. service twitching function of the inteliigrnt ~ietwork.
[0007[ To limit the stock of numbers W rich has to he kept ready for the
anonyiuuus
idtmtifer, it is provided according to a rofinement to de~Gte fihe anonymous
identifier at a
predetermined time after the sssigiuiioiit. In a practical application of the
nnetl~v~1 aceozding
lu the present invention, the prodctcri>ziuCd time will hp established in
accordaitcG with the
pcriud of tirrxe within which the destination subscribcsr will still expect
calls afixr his/her
publication, fnx example, the advertisalu~at, such aq, for example, one or two
wac;ks. ~7ue tn
this time limitation of the smonymous idculafier, moreover, an izisignificant
iiitcrest in an
unauthori~Fd intrusion into the conf dr~cice instance is to be expectod no
that siuiple projective
iueasures arF sui~cient, if indicated.
[0008] In the method aeoording to tam present lnvPtttiori, moreover, provision
can be made
for the annriymous idaiitificr to be dGletable by an input of the destination
subscriber. 1n tkzis
mantaet, it is possible, for example, to prevent the destination subaczib~
fi~oui rc~cciving
f~ucther calls concerning an advcitiacxi object after it has been sold. The
delrtion of the code
can bo indicated to further callers by an approrriatc spoken meosage.
l

OCT. ~1. 2001 12.10~M DDK ----N0. 9264__x. 6. _
CA 02371135 2001-11-09
[~ZU.1005]
[0009] Anotlicr berte$eial e~mbodirtxent of the prcseirt invention cnrtisists
in that a pcrn~aueut
idantif~cr eau be assigned only one anonymous identi$er at s time. In this
mcmncr, an abusive
extension of the assignment of anonymous idcnti$em is prevented.
(0010] Zn au expedient embodiment of the prescitt invention, pmvision is made
for an
authorizatiau ckteck tn k~e carried out before tli~s con$dence inst2ince
assigns the anonyr~iuus
idcntifior. This check can prevent, for oxampld, au uuauthori~ed person from
gcneratity an
anonymous identi$er fir a call cumber.
[0011 j Moreover, provtsiou can be made for the conflder~ce instance to output
erivr
messages whets ate aaaa~ment is not possible. Such error messages can says
- au anonymous identifier already c~;ists fur the entered call number,
the entered call aunaber was not co~rcca,
the request crn~ld riot be csuricd out due to a System error.
[0012) According tn an advantageous ombwliment of thA present in~rentior~, a
user-friendly
asaigruiieut of the anonymous zdentificr eau be effected in that the request
for the assignment
of the a~ruuymous ide~ntif~er and the commutuccttiori thereoftake place over
the iiilernet.
Consoquenlly, the user can be advantageously guided ma suitable graphical usrr
interfaces,
infomualion and entries coruplemcntiz~tg ouc another in 2n expedient naanncr.
[0013) Further ways to request the assi~nmetlt of they anonymouo identifier
and to
conLtiunicate it to the destination subsct~ibcx are, in the 1SDN', preferably
via the D-channel
or, in the case t~f other digital subscriber lines via suitable channels, in
analuk and alas digital
r~ctwurks via the rrxultifrequsr~oy mcfihod, by short messages (SMS),
electrons mail (F-mail),
and via voice input and output. Dcpetiding on the individual aonditio~ns, ii
is also posaihle to
use mixed forms such as requesting by means of transmission via the
naultifrequency method
and communication via voico output, which allows the use of a. sintplc
telcph011e with arl
a~~alug subscrihex line.

OCT, ~I, 2001 12;10PM DDK ~ ---~-~ _N0. 9264_~P~
CA 02371135 2001-11-09
[520.1005)
[0014] When using the ax~thod according to ihn present invention for the
applicatiotrs
mcntiutted at the outset, the method is prcfetdbly designed m such a manner
that tlia
asStgillllCttt is requested by an input of the daslirtdtiori suhcrxiber. It is
then coraplctaly up to
the dcstiuttlion subscriber whether hc/ahc wants to use an anonyncious
identifier, hereinafter
also referred tv ac code.
[00x31 Tn modern telephone networl,;s, tltc call tlumher of the calliztg
subscriber is
autonxatically transnxitted to the called subscriber. Fur legal provisions on
dais becuzity and
privacy, a Calling subscriber has the possibility of suppressing the
ttxnsmisaioix of his/her own
call number to the called subscriber. l3ccause of thi s, the called subscriber
will later not he
able ~o call back the caller unlo~s hcJslxc knows the call number of the
caller anyway.
[0016) In sonxe cases, however, it cart be desirable tbr both subscribers
tlxdt such a retittn
cuttnection can he established on request of the called subscriber without the
calling
subscriber disclosing his/her call nutubcr.
[0017J A .ft~rther embodimcrtt of ittG present invention makes this possible
in that then request
fvr the asaigrtment botween the atxuttytnous and the permanent idcntifieta
lakes place during
the dialing of z pertnnnent identifier of a later initiating subscriber by
lltcs destination
subscriber, and in that the anonymous identifier is transnnitted to the lat~sr
initiating
subscriber. ''This procedure enn be started by the destirxation subacribar by
enterfng an
appxopri atc~ prefix.
[0018] The return eontaacction is then preferably established in that the
anonymous identifier
is eonvertc~d by the confidence iltstanee into the pe~tnatnent identifier of
the destination
subscriber upon request of the initiating suhscsiber, and in that the tctum
connection to tire
destination subscriber is cgtablisLad using the permanent identifier.
[0019) 'this e~tnbodimc~nt of the present invention allows a subSCribCr IO
receive return etilts
d

OCT.31.2001 12:18PM DDK --. N0.9264.~P. 8
CA 02371135 2001-11-09
($20.1 tltrl]
wlvlc keeping his/her anonynuty. For imstaxice, in the case rrfrsyehologieal
counseling
telephone serviocs, the itec:rssiry cart atioe to prowidc r:rrtnpreher~sive,
qualified counsel by
way of a returxa call wittumt having to xemove the armnyrnity of tlto caller.
Arun.her
application case c:an be the query of a data haw. Irr spite ofthe tclcphorric:
transmission of the
query results by means of a return call, no ccmclusions about the inqui ri ng
person are
possible.
[OOZOj In n refincrrtent crf ne present inveu~tior~, prevision is made tbr the
destirrH~ian
subscriber to be ialforme~.ci of this tact by a perceiv~ahle sigaaling rwhan a
rotor rr c:all is
established usip ~.'fxe antonymous idcntifioc. Ti. is then posexble for the
dcvinarion subscriber
to adapt lii~fher behavior, in particular, to a<:cept or reject the return
call.
[0021] In a further rcfuic«rant ofthis specific cmbodiurcnt, a return call
between the
initiating subsetibor and ~.he destination subscriber varx also be aohievcd.
in that a. c:onrtection
requested by flat icri~i.rting subscriber is automdl.ir:ally established from
the degtitlation
subscriber upon ccrmpletiozt of the si~czaliiig after the destination
subscriherr has confirmed
that a conna:~.ion is to be e3tablishcd, LhH connection beizy autoirrnLically
effected from the
destination subscriber to the initiatirr~ subscriber.
[(1022] '!he conversion of ~hc ponnanent identifier crf the destination
subscriU~sr iuto the
anonymous idcnti f rr can be effected in that ihrs permaxxent identifier is
i.rsrnsmitted to a code
server linked to the network, in that the codh server converts the pcrrnsnent
identifier into a
test ar~onyrnr~us identifier arid stores the anonymou, identifier firr the
period of validity
thcrerrf with the perxnrutont idcrrlilier being assigned thereto, aruJ in that
the node acrvcr
outgun the anonymous identilicr which is transmitted to the initiating
subscriber.
[0023] '1'hc oo>zvomirrn of the anonymous idcni.i:0er of the doatination
suhacxtber into the
permancrat idcm.ifier for the purpose of the return ca]] case, be effeclxd in
that the anony;nous
identifier is lrrnstztitted to the code serve, and iu that the code ~c:rver,
by way of the atorGrl
assigrrrnents, retrieves and outJms the permanent idcntifrcr.
S

OCT, 31. 2001 12:10PM DDK h0. 9264"-.~. 9
CA 02371135 2001-11-09
(520.1005]
[0024] The ostaLlishment of an anoxiyirious connev;tion between tho
destination subscriber
and a oallcd initiating subscriber can be carriod trot in that the identi$er
of the dcstiiiation
subscribor is motel to a servftc.e control function by an appmpriate switohing
center, in that
the aervieo control #linetinn obtains an aaon~riuous identifier teorti a code
server while
indicating the i~lCntifier of the destination subscriber, in that the code
setvcr converl~ the
identifier into a free anonymous identifier an s stores the anonymous
identi$cr fvr the period
of validity the~GUf with the permanent identifier bCing assignAd thereto and
outputs the
anonymous idciztilier to the cexvice control furictiou" in that the service
eontml ftuicliort
routoa the anonymous identifier to the switching centex,and iii that the
switohing center
establishes the co~aneCtfon with the called initiating subscriber while
indicating lliC
anonymous adatltiflcT.
[002S] To allow the code server to bo idcntifiedr another refinezri~nt of the
piasnnt invention
makes provia~ion ibr an idP.ntifier which identifies the code server to be
added for the
ano,nyn~ous iQentlfier.
[0026] Tho cslablighment of a connection-back betwPGn the initiating
subscriber and the
destination subscriber sari be carried out in that the anonymous identifier of
iha destination
subscriber is routed rn a service contml fuiictiora by an appropriate
switcliiux center of the
network, iu that the service control fixnctiou obtains the permaTion~t
idontifiat of the
deatinatioi~ subscrfber from the appropriate wde server while indiaatirig tits
anonymous
idcntifiei, in that the service control function routes this identifier to the
switching center, and
in. that the switching cexiter ertablishcs the uunnectinti with the
dostinYatiou subsCrlber.
[002~J Tlie method according to the present in'venti~n can advaritagcously bo
used in such a
marina' drat the teleaommunicationa network is a eircuit.switehed network for
voice or data
transrnissiun, and that the identifiers arc tclephono numbers. In this
comirn:lion, preferably,
prowisiun is made for the anonymous t~slaphone number to include a dialing
pieBx for dialing
up the wnfidence instance.
1i

OCT. ~1. 2001 12.19PM DDK - N0. 9264.~.~. 10_
CA 02371135 2001-11-09
X520.11105]
[0028) Other apNlications can consist in that the tclecutnmunieations network
is a network
~or trnnsmittil~ data of any .kind, including vidw attd audio data and/or
textual massaKas and
in that the identi~crs era user addressee of dais network.
[00Z9] Bxculplary embodiments of the present uivention are depicted in tho
dravwing with
reference to several Figures and will be cxplaiucQ in greater detail in the
following
deocriptiou.
[0030) Fig. 1 shows a ~chematie roprcsentatiott of a first erabodiment of the
presdtu
invezttion,
Pig. 2 depic2S a. flow chart on the assigtrment of thes finonyrtious
identifier iti
accorrianco with the method au;ording t~ the present invention,
Fik. 3 repree~ts a flew chart on tltG astablisbment of a eonrreatYOn in
accordance
with the method according to ttte present invention,
Fig. ~ shown a schematic roprcacutaliun t0111uqtr~te a second embodiment of
the
precept invention,
Fik. 5 is a flow chart on the cstablislunent of a. forward connection,
Fig. 5 shows a. xlovcr chart on the ostablishment of a return cormcctio4l
ac:cordfng tc~
the second exnbodimcnt, and
FYg. 7 depicts a flow chart ort tho c;ummunication in an eleatxonic news
system in
aeenrdanee with the metliod accol'ding tn the present invcrttiou.
[0031) Itt the Figures, id~ntieal pacts are provided with the same refcro~ucG
symbols.
7

OCT. 71. 2001 12.19PM DDK -"'-.~~ N0, 9264-~, 11 ._
CA 02371135 2001-11-09
[520.1005]
[0032] Fig. 1 shows an intelligent network 1, for example a digital network
with a digital
subscriber lint, of which are represented xn individual switching cGillc~r V'
having a switching
unuit 2, a subacubm line group 3, and a service switching function 4
(wnfotxtling to TI't.l_T
Q.1211) for coupling the intetligtnt network to the distributed switched
network as weal as a
service control function S and a code server C which is conistitutr.~l by a
computer which
carries out the couver~slon ofthe~ anonymous identifies into pa~unanent
identifiers and vice
versa and ~uvhiel~ stores the assignments of the identifiers to the
subsc.7cibers in a data base. To
the example, two subscriber lines A and B are linked to the same switching
center V'.
N'umcrous switchi~rtg centers exist in the network. ~ the event tlu~t lWO
subscribers to be
conracctod are xiut linked t0 the carne switching oentex, the proce~bars
deserlhe~i in the
following take place analegnnsly.
[0033] Murcvver, user'tJ ~t'subscriber line B possesses a lcxnZinal T, for
exarinple a
computer, wvlrich has access to tk~e Internet and which permits a dale
exchange with, service
control fiuiciaon S of intelligent network 1, possibly via furihur components
wtueh are not
shown (fur example SMF). Moreover, service switching function 4 is connected
with service
control fiuictiun S via an INAY interface.
[003~4~ Service control furtctiox~ S hey, access to code server C via an A rPl
interface or via a
logically equivalent e~m~munieatians protocol. Dccausa of this, x'eque.Sta
c»ch as
''translatcCaller mQ" anti "translateCodeU" which basically means "translate
the permanent
idcutifitsr of the caller indicated in brackets" and "traalslale the anonymous
identifier" oan b~
routed lu code server f:.
[0035) For i~tat~ce, it' user U of subscriber liztc H wants to place a
newspaper advertisement
without thereby rublishing hislhar telephone nuuiber in connection with the
advertised
oUjecl, heJshe can rerluest the assignment of an auouymvus identifier via
teaxniaal T and the
Zuterztet which i9 not shown. For this purpose, hel'hG is prcwided by servic~
control function
S or an interposed eornpoaent with an iiyu~ mask via which he/she enters
his/her own call
8

OCT, 31. 2001 12.19PM DDK ~~ -N0, 9264--'~, 12-
CA 02371135 2001-11-09
~s2o. ~ en5~
number and tliG request to be pmvidod with an anonymous identifier. Sorvicc
control
function F foA wards this request to the cn~le server. Provided that so code
has been stored yet
for flue sub~cniber lfne B and that n~ other reasons exist for xofu3ing an
anonymous idcutifier.
such an auouyuiuus identifier is generatESet and eo~mmuaicated to uoor U via
hislhcr tcrniiual
T. The user can thou malts the ettde known in the newspaper ndvertiecxncnt or
another
publication.
[003G] Fur instance, if the user of suhscriber Tins A wants to get iatv
contact with the
advertiser, he/she dials the code indicated ire the advertisement. The code
iaoludcs a diuliug
prefix (for example 015 I) fmrn which switchixtg center V (Fig. 1) recognizes
tlral this is an
anoityiuuus identifier. Therefnrn., srarvice switchi~ function 4 inquires of
code smvGr C via
service control ~.cnction S which permanent ideaitifier is assigrtcd to this
anonymuus identifier
and receives in response the perrt~anent identifier ~cwhich iE then routed to
the switclury unit
fur establishullg the connecaion to subscriber line B.
(0037] Fig. 2 shows the procedure for assigning an onor~ymous adcntifim.
Tuitia,Ily, request
AhT far an anonymous identttier is transmitted from teimirral T to sczvice
coulrul function S
vu~Iuch returns a mask tQ the terminal into which user U enters his/lier
Nanuenent sub6criber
number PCB (that is the call number of subscriber line B). The aubscribci
number reaches
wde server C: via. RArvice control function S, the eodc server gcneratiy tm
axtonym0us
subscriber number A~K ii of subscriber line B and returning it to tcnn~aal T
vid S.
(0038] Fig. 3 depicts the establishment of a oonacction fmm subsvribrr A to
subscriber B
with the assistance ~f anonymous identifier AKB. To this end, the auuuynvus
identifier
AKB is initial 1y dialed by subscriber ~1, and thus routed tv switvluug center
V which, after
recognizing that this is an anonyx~.oue identifier, queries fihc perrttaumt
identifier from code
server C;, aq desscribed above. Subsequently, the conrr,oction establishment
is completed cn
that the call reaches sabseribor lire B.
[OO:i9~ The cot~figuratxvn shown is Fig. 4 is similar Lu ttia.t according to
Fig. I ; hnvve:ver,
9

~NO. 9264-~. 1 ~
OCT. 71. 2001 12;19PM DDK
CA 02371135 2001-11-09
[52~.1UU$]
subscriber B not 11C1I1~, allocated a separate terminal. .A. configuration
o~that kind can, on one
hand, be used to rcquesl lhc assignment of the anonym~nc identifier aver' the
telephone of
subscriber B via auiLable data transmission tyPea so that subscriber B can
make lonown a
code, similarly as ui Fi,g. 1. On the other hand, the cnntigtuation according
to Fig. 4 can also
ba used to anonynize ilic idcrrtifier of suhscrih~r T3 for cextam
conversations, which will be
explained in. the fulluwixxg with reference to Figurns 5 and 6.
[0040] Wlxeu ~lcslanation subscriber B calls later the initiating subscriber
A, th~n the
connection requGyt of ddstination subscriber F3 is transmitted (Hl) to
connected svvitchiag
center V via tl'ie layer 3 protocol DSc I of the 15DN network as shown in Fig.
5. 'lo activate
the code service, destinati0ri subscriber'fi rlaces a prefix (for example
0150) before the call
nuiuLcr of initiating subscriber A. Thereupon, at H3, s<witehing center V
aenda a request to
service cvtitrul function S 'via service switching fimction 4 under the INAP
protocol. The
dialed call number of initiating suhscrihAr A is partially input along with
the request at ZI2 as
an arguntGUt. Then, at H3, additional digits of Initiating subscriber A are
requested
suvscy,utx~tly. At H4. the quantity of subsequently requested digits io
traasmuittod. The call
uutuvcr routed by destination suhacriber 13 at H4 aria switc)ning center V at
HS is uacd at II6
by tire scrvice~ control function to request an anonymous identifier from code
server C, the
a~xuuytaous identifier being transmitted to service control function S at H7
and, at IIB, fuially
to the swilctung center rwhieh, rat Ii9, establishes a connection to
initiating subscriber A wlailc
t<a~xautilting the anoDymous identifier of destination subscriber H.
[0041] As shown in Fig. c;, atesps kl through R9 are carried out
cortospondingly if iutiatuy
subscriber A requests a return connection to subscribar B who is unknown to
himlhcr with We
aid of the anonymous identifier and of a preceding dialing prof~~c (for
example 0151). At R6,
service control flanetion S requests the ananymous identifier to be translated
back into tire
identifier of destination suhsrnber B. Code server C delivers the identifier
of dcstittatiutr
subscriber B from its data ha.Re, and the connection can be established at
IZ9.
[0042] Fig. 7 shows how a destination sub3eribcr B mutes a rcqueal lo a code
sclver C at
l0

ocT. ~1. 2001 12:19PM DDK - No. 9264'-~. 14
CA 02371135 2001-11-09
[520.1003]
N1. Cods server C converts ilic iQcnlafier of destination subscriher H iuato
an. aaonymouc
identifier and, at N2, routes flat ir~ucsl, together With the at~onymrn~s
identifier, to news
sc~nrcr N of the news syslGiti requested by destination suhcerih~.r 13 where
it is published. Aa
initiating subscriber A wlm lu~~ vn to the system at N3 reads the re~tiest of
destination
subscriber B at N4. Tf initiating suvsuribrr A wants to reply rhe3rAco, then
heJshe, while
indicating the anonymous idautifirr of destination subscriber H, ~entis
hislher aaswer to coda
server C at N5 which routes it tv ~lcsliztation subseriher R at Nti.
11

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date Unavailable
(86) PCT Filing Date 2000-05-06
(87) PCT Publication Date 2000-11-16
(85) National Entry 2001-11-09
Dead Application 2006-05-08

Abandonment History

Abandonment Date Reason Reinstatement Date
2002-05-06 FAILURE TO PAY APPLICATION MAINTENANCE FEE 2002-06-03
2005-05-06 FAILURE TO REQUEST EXAMINATION
2005-05-06 FAILURE TO PAY APPLICATION MAINTENANCE FEE

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Registration of a document - section 124 $100.00 2001-11-09
Registration of a document - section 124 $100.00 2001-11-09
Registration of a document - section 124 $100.00 2001-11-09
Registration of a document - section 124 $100.00 2001-11-09
Registration of a document - section 124 $100.00 2001-11-09
Registration of a document - section 124 $100.00 2001-11-09
Application Fee $300.00 2001-11-09
Reinstatement: Failure to Pay Application Maintenance Fees $200.00 2002-06-03
Maintenance Fee - Application - New Act 2 2002-05-06 $100.00 2002-06-03
Maintenance Fee - Application - New Act 3 2003-05-06 $100.00 2003-04-16
Maintenance Fee - Application - New Act 4 2004-05-06 $100.00 2004-04-14
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
DEUTSCHE TELEKOM AG
Past Owners on Record
BITTROFF, ULRICH
CAPELLMANN, CARLA
DASSOW, HEIKO
DE CAMBRAY, LAETITIA
HERZOG, UWE
LORANG, CHRISTOF
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2001-11-09 1 30
Representative Drawing 2002-04-26 1 9
Drawings 2001-11-09 6 90
Cover Page 2002-04-29 1 50
Claims 2001-11-09 6 222
Description 2001-11-09 11 538
Assignment 2001-11-09 9 274
PCT 2001-11-09 25 1,205