Language selection

Search

Patent 2324114 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2324114
(54) English Title: A METHOD FOR USING A TELEPHONE CALLING CARD FOR BUSINESS TRANSACTIONS
(54) French Title: PROCEDE D'UTILISATION D'UNE CARTE TELEPHONIQUE POUR DES TRANSACTIONS COMMERCIALES
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
(72) Inventors :
  • COCHINWALA, MUNIR (United States of America)
  • COHEN, ERNEST SAMUEL (United States of America)
  • SURI, NAVEEN (United States of America)
(73) Owners :
  • TELCORDIA TECHNOLOGIES INC.
(71) Applicants :
  • TELCORDIA TECHNOLOGIES INC. (United States of America)
(74) Agent: KIRBY EADES GALE BAKER
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 1999-03-22
(87) Open to Public Inspection: 1999-09-30
Examination requested: 2000-09-15
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US1999/006195
(87) International Publication Number: US1999006195
(85) National Entry: 2000-09-15

(30) Application Priority Data:
Application No. Country/Territory Date
60/079,156 (United States of America) 1998-03-24

Abstracts

English Abstract


A method using a telephone calling card to transact commerce electronically.
In one embodiment a user initiates a phone call to a merchant using a calling
card provided by a service provider. The service provider initially checks the
identify of the user through the use of a PIN code (1). Once the user's
identity is validated the user's call to the merchant is established. The user
and merchant then agree upon the sale of item at which time an invoice is
provided to the service provider by the merchant. The invoice is then approved
by the user while the merchant is disconnected from the call. In another
embodiment the user is connected to the merchant over the Internet, the user's
identify having been previously validated by an Internet Service Provider. The
user drags a copy of the invoice to an application running on a Web Page. The
application appends the user's digital signature to the invoice and mails it
to the merchant. The merchant then presents the signed invoice to a server
which authenticates the signature of the user prior to approving the sale.


French Abstract

L'invention concerne un procédé d'utilisation d'une carte téléphonique pour effectuer des transactions commerciales électroniques. Dans un mode de réalisation, un utilisateur initie un appel téléphonique vers un commerçant avec une carte téléphonique fournie par le fournisseur de services. Le fournisseur de services vérifie d'abord l'identité de l'utilisateur grâce à un code PIN (numéro d'identification personnel) (1). Après validation de l'identité de l'utilisateur, l'appel de l'utilisateur au commerçant est établi. L'utilisateur et le commerçant se mettent alors d'accord sur la vente d'une article et une facture est envoyée au fournisseur de services par le commerçant. La facture est approuvée par l'utilisateur et le commerçant est déconnecté de l'appel. Dans un autre mode de réalisation, l'utilisateur est connecté au commerçant via Internet, l'identité de l'utilisateur ayant été validée auparavant par un fournisseur de services Internet. L'utilisateur tire une copie de la facture pour une application se trouvant sur une page Web. L'application joint la signature numérique de l'utilisateur à la facture et l'envoie par la poste au commerçant. Le commerçant présente alors la facture signée à un serveur qui authentifie la signature du client avant d'approuver la vente.

Claims

Note: Claims are shown in the official language in which they were submitted.


WHAT IS CLAIMED IS:
1. A method for electronic commerce using a trusted third party
comprising the steps of:
a customer identifying himself to a network using a telephone calling
card and the network completing a connection between the customer and a
merchant;
negotiating, between the buyer and merchant, the terms for sale of an
item selected by the customer;
signaling the trusted third party that the identified customer wishes to
make a purchase;
forwarding, by the customer, a PIN to the trusted third party;
forwarding, by the merchant, an invoice having information on the
selected item to the customer;
forwarding the invoice to a server for validation of the customer's
approval and availability of funds;
securely signaling, by the customer, approval of the merchant's
invoice; and
signaling, by the server, to the customer and the merchant approval of
funds disbursement.
2. The method of claim 1 further comprising the step of billing the
purchase to the customer's telephone or calling card bill.
3. The method of claim 2, wherein the step of customer
identification comprises the steps of the user dialing a number for a
telephone
service provider, said dialed number having a PIN code uniquely associated
with the customer, and the telephone service provider validating the identity
of
the customer based on the dialed PIN code.
4. The method of claim 3, where said customer signaling approval
step comprises the substeps of:
the telephone service provider establishing two independent telephone
calls, one call each to the customer and merchant;
the telephone system playing a recording of the merchant invoice for
the customer; and
the telephone system collecting a keyed or spoken approval response
from the user.
-11-

5. The method of claim 4, where the customer approval of an
invoice comprises the substeps of the user obtaining a copy of the invoice and
the user signing the invoice using a digital signature, created using either
public or private key cryptography.
6. The method of claim 1, wherein the step of the customer
identifing himself to the network comprises dialing into an Internet Service
Provider modem pool.
7. The method of claim 6, wherein the step of the customer
identifying himself to the network further comprises the steps of the user
using
a computer to dial into said Internet Service Provider modem pool, inputting
of
a unique identification code by the user, and the Internet Service Provider
validating the identity of the customer based on the inputted unique
identification code.
8. The method of claim 7 where the step of the customer signaling
approval of an invoice comprises the step of:
the customer placing a copy of the invoice into an eCard application
running at the customer's computer;
the eCard application querying the customer for a password;
the eCard application creating a customer digital signature based on
the password;
the eCard application appending the digital signature to the invoice;
the eCard application mailing a copy of said appended invoice to the
merchant;
submitting, on the part of the merchant, of the signed invoice to an
eCard server; and
validating, at the eCard server, the signature of the customer.
9. The method of claim 8, wherein said step of creating a customer
digital signature is done using either public or private key cryptography.
-12-

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
A METHOD FOR USING
A TELEPHONE CALLING CARD FOR BUSINESS TRANSACTIONS
FIELD OF THE INVENTION
The present invention relates to the field of commercialization for
s business transactions. More particularly, the present invention relates to
the
problem of securely and efficiently using a telephone calling card as a credit
card for business transactions.
BACKGROUND OF THE INVENTION
More and more consumers are choosing to consummate purchases
io without physically entering the location where the service or item is
located.
This social phenomena has grown in recent years due to the Internet, in
particular the World Wide Web, and other electronically based shopping
networks, such as the Home Shopping Network. In fact, virtual malls that
allow consumers to wander from virtual store to virtual store through the use
is of a personal computer are available. In addition to home shopping, other
areas that may ultimately be widely available via electronic commerce include
movies on demand, video games, video libraries, home banking, and music
on demand. It is particularly attractive to the consumer to purchase goods
and services without the trouble of looking for a parking spot or waiting in
line.
2o Indeed, electronic commerce could one day be the dominant means used for
purchasing any and all items or services and may very well revolutionize the
way business is conducted.
In today's economy, a consumer wishing to make a modest electronic
purchase (i.e., without being physically present) has only two alternatives.
If
2s he is conducting business through the computer, he can use some secure
electronic payment scheme, such as eCash or MiIliCent. Otherwise, the only
instrument available is the ordinary credit card.
eCash is a software-based payment system that allows users to make
electronic payments from any computer to any other computer over any
3o computer network including the Internet. An eCash purchase requires three
participants - a buyer, a seller, and a bank. Initially, the buyer withdraws
digital coins, or eCash, from her bank account. The digital coins are in fact
messages having strings of digits with each digital string corresponding to a
-i-

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
different digital coin. The messages are transmitted to the buyer's computer
where eCash software automatically manages the digital coins. A buyer
having eCash on hand may then make purchases from a seller or merchant
who has previously signed up to the eCash transaction system. Before a sale
s is consummated between buyer and seller, however, the seller's software
automatically sends the digital coins it receives from the buyer to the bank.
By sending the coins to the bank the seller is able to protect herself against
fraud. As such, the bank is used as a central authority. In order to protect
the
privacy of the buyer eCash uses "blind signatures", as described in Chaum,
io David L., U. S. Patent No. 4,759,063, entitled "Blind Signature Systems",
and
Chaum, David L., U. S. Patent No. 4,949,380, entitled "Returned-Value Blind
Signature Systems". One drawback of this system is that in order to make a
purchase both the buyer and the seller must have accounts on the eCash
system. This drawback may be particularly chilling in that the impulse to buy
is an item or service may not survive the time it takes for a consumer to sign
up
with such a system. Another drawback is that each purchase requires
processing by an intermediary, e.g., a bank, before the purchase is deemed
completed.
MiIliCent is another software based payment system primarily designed
2o for content-based Internet commerce. The MiIliCent system is based on the
use of "scrip". Scrip is a pre-paid electronic coupon that essentially
replaces
cash for purchases. Scrip is issued by brokers, that act as intermediaries
between consumers and vendors, or by vendors. Basically, a consumer, by
way of a credit card, for example, buys vendor specific scrip, i.e., that
scrip
2s can only be used to purchase content from a particular vendor, either from
a
broker or vendor, and then uses the scrip to make purchases. While the
MiIliCent system does not require user accounts it also has drawbacks. For
one, each user must subscribe and use MiIliCent software. In addition, scrip
is vendor specific thereby limiting the flexibility of the shopping consumer.
3o Thus, not unlike eCash MiIliCent may have a negative impact on the spur of
the moment purchase. On the other hand, the low transactional costs
associated with systems such as eCash or MilliCent make them particularly
attractive for purchasing items or services that cost as little as 10 cents.
-2-

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
eCash and MiIliCent are just two of the many prior art schemes that
provide for secure electronic commercial transactions over computer
networks. Other popular schemes include CyberCash, Netl3ill, NetCash and
NetCheck, and systems offered by Netscape, First Virtual Holding, and NTT.
s Despite the variety of these electronic commerce systems, these systems
share a common goal of providing a system that is secure against fraud,
security breaches, or counterfeiting, and assures consumer privacy. In order
to provide an adequate measure of security almost all electronic commerce
systems employ encryption techniques. As such, both public key and private
to key encryption or decryption schemes are used to establish the identity of
the
buyer or the merchant, to verify information, and to provide electronic
signatures that are legally binding and not likely to be forged.
Consumers who use credit cards to remotely shop are afforded greater
flexibility in choosing with whom they transact business than are consumers
is who use electronic commerce systems such as eCash or MiIliCent. A
consumer using a credit card to make an electronic purchase first requests
the purchase from the merchant. The merchant then contacts the institution
that issued the consumer's credit card for authorization. If the purchase is
authorized, the merchant is eventually given a token which the merchant
2o transfers into its bank account and the consumer is forwarded a bill from
the
institution. Using a credit card to make an electronic purchase has it own set
of problems. First, although encryption is used in credit card transactions to
protect information such as credit card numbers, credit card security is poor.
Any merchant can take the information given by the user and purchase
2s additional goods from other merchants; even if the fraud is detected, there
is
little hope of tracing it back to the dishonest merchant. The danger of
eavesdropping or snooping by an outsider to the transaction also poses a
significant risk. More significant is the risk associated with break-ins at a
host
where credit card numbers may be stored. Second, and probably more
3o importantly, credit card overheads are typically high ($0.20 + 2% of
transaction cost is typical). This makes credit card payment inappropriate for
payments under $1.00.
Of utility then would be a method and system that allows a consumer to
purchase items or services from merchants without requiring either the
-3-

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
merchant or consumer to install proprietary software. In addition, such a
system or method should be secure by not requiring the consumer to divulge
private information, such as credit card numbers, that may be
misappropriated. Finally, such a system should be ubiquitous allowing any
s and all consumers to make purchasers without visiting a store.
SUMMARY OF THE INVENTION
Our invention is a method and system that uses a telephone card to
make payments as part of an electronic commercial transaction.
Our system includes an eCard server connected to a public network
io through which a consumer and a merchant can communicate and transact
business. In accordance with our system, the public network may be the
Internet or the Public Switched Telephone Network (PSTN). Accordingly, our
system provides the opportunity for in-home shopping without requiring the
consumer to own a personal computer or a credit card.
is In conducting purchases over the Internet in accordance with our
invention, a secret encryption key is shared by the user and the calling card
server. In general, when a user or consumer wishes to make a purchase, he
contacts the merchant, who prepares an invoice. The user signs the invoice
using his telephone calling card number and a PIN code. The merchant then
Zo sends the signed invoice to the eCard server. The server authenticates the
signature, verifies that the user has sufficient funds for the purchase, and
sends a confirmation to the merchant. After receiving confirmation the
merchant then informs the user of the successful purchase. The user is later
billed for the item on his phone bill, and the invoice is preserved at the
eCard
Zs server for auditing and to guarantee non-repudiation of the transaction. In
accordance with our invention no private information is passed on to the
merchant (even the customer name can be hidden). As such, the risk of fraud
is reduced.
In accordance with an embodiment of our invention purchases may be
3o conducted over the PSTN. In accordance with this embodiment the user first
initiates a phone call to the merchant using his telephone calling card. Thus,
the user first identifies himself to the telephone network. The telephone
network then completes the call to the merchant so that the merchant and the

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
user can negotiate a transaction. Once negotiations are completed either the
user or the merchant signals the telephone system to mediate a transaction;
for example, the user may use a flash-hook/dialed code, or the merchant may
use the Internet. The merchant transfers an audible invoice along with the
s user's PIN (so the user can authenticate the purchase is actually being
made)
to the eCard server. The eCard server then plays the audible invoice and the
user's pin to the user so that the user can agree to either accept or decline
the
purchase. If the purchase is agreed to, the user is billed for the item on a
subsequent telephone phone bill, and the invoice is again saved for future
io auditing and non-repudiation. A further extension of this embodiment of our
invention includes the user purchasing a prepaid calling card, thereby
removing the additional step of later billing the user.
In accordance with another embodiment of our invention transactions
may occur via the tnternet using the World Wide Web. In this embodiment,
is the consumer first dials into a server maintained by an Internet Service
Provider (ISP), which can be a telephone company. As part of the dial in
process the consumer's identity is validated. The user then drags a copy of
an invoice or purchase order to an application running on a Web Page. The
application appends the user's digital signature to the invoice and mails it
to
ao the merchant. The merchant then presents the signed invoice to the eCard
server which authenticates the signature of the user prior to approving the
sale.
Our invention affords several advantages over the prior art. Some of
these advantages include:
2s The widespread availability of calling cards provides more sales
opportunities for merchants. Because calling cards are even more
widely available than credit cards, a much large segment of the
purchasing public are therefore available to merchants as potential
electronic commerce customers. More importantly these customers
3o need not be credit worthy as customers may purchase pre-paid cards
having different levels of digital money available;
Even where billing is necessary practically every telephone
customer is already being billed on a monthly basis, making the billing
overhead smaller;
-s-

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
Calling cards, unlike most credit cards, are secured (with the
customer's utility service). Because the telephone service provider has
greater leverage than a typical bank, it is less likely to have to spend
large amounts of money on collections;
s The calling card infrastructure is designed to handle much
smaller payments than the financial services infrastructure;
Telephone companies can leverage the security available from
the existing PSTN to provide better security and user authentication;
Telephone companies are generally trusted by both the public
io and merchants, and so they can serve as a suitable "trusted third party"
in contract protocols; and
User identity can be kept private for those transactions that do
not involve shipping (e.g., paying for downloaded maps or videos).
Additional objects, advantages and novel features of the invention will
is be set forth in the description which follows and, in part, will become
more
apparent to those skilled in the art upon examination of the following or may
be learned by practice of the invention. The objects and advantages of the
invention may be realized and attained by means of the instrumentalities and
combinations particularly pointed out in the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustratively depicts the system architecture of the present
invention.
FIG. 2 is a state diagram depicting the information flow between the
2s elements depicted in FIG. 1 in carrying out a transaction over the PSTN;
and
FIG. 3 is a state diagram depicting the information flow between the
elements depicted in FIG. 1 in carrying out a transaction over the Internet.
DETAILED DESCRIPTION OF THE INVENTION
Turning to FIG. 1 there is depicted a generalized schematic of a
3o system 100 in accordance with our invention. The system 100 connects
users or consumers 101 to various merchants or businesses 105 and financial
institutions 106 through either the Public Switched Telephone Network or
Internet 111. The user's 101 connection to merchant 105 is established or

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
managed by a service provider or a trusted third party 112, i.e., an Internet
Service Provider (ISP) or a telephone company. A calling card or eCard
server 115 is also connected to the network 111 and stores a list
(illustratively
depicted as database 116) of calling card numbers, PINs, user names and
s addresses, and credit limits, if any. It should be noted that although we
illustratively separate the merchant 105 from the service provider 112 the
merchant and service provider might be the same entity. For example, some
telephone companies already have their own on-line shopping networks. In
general, after service provider 112 connects the user 101 to merchant 105,
io the user 101 initiates operation of the system by selecting an item or
service
offered by merchant. Once a price is negotiated between the user 101 and
the merchant 105, the user 101 selects the eCard as the method of payment.
Once the method of payment is selected, a series of actions, discussed in
detail below, are initiated and managed by eCard server 115, which actions
is allows the user 101 to be billed for the service or good.
Calling cards are issued by all major telephone companies. These
cards have proven to be an effective and convenient way for customers to
make toll calls when away from home. Typically, the user dials a toll-free
number and types his calling card number and a secret code (PIN). The
2o service provider checks the validity of the number and correctness of the
PIN
and allows the user to place toll calls. Charges for the calls appear on the
user's telephone bill. As such, calling cards already provide a secure method
of connecting users over the PSTN. Our invention leverages the security
already present in the PSTN and enhances this security on computer
zs networks, e.g., Internet, by using cryptographic techniques.
The primary cryptographic technique used in our invention is private
digital signatures. To use these signatures, the user 101 and the server 115
share a secret key. In order to sign a document, the user 101 appends the
secret key to the document and computes a cryptographic checksum, using a
3o standard cryptographic hash function such as MD5 or SHA. The checksum is
sent along with the document to the server 115, which performs the same
checksumming process. If the checksums agree, the server 115 can be sure
that document was signed by the user 101. A private digital signature is the
preferred encryption method because each telephone calling card customer
_7_

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
can be given a private key at the time the card is disbursed. Private key
encryption is also better suited for our invention because here there is no
arbitrary person to whom consumers must identify themselves. More
importantly, private key encryption is cheaper to implement and takes
s advantage of the fact that the service provider issues calling cards and
serves
as the trusted third party. Nonetheless, public key cryptographic techniques
may also be used to authenticate the signature of the customer.
Turning now to F!G 2., there is illustrated the method steps of a first
embodiment of our invention which allows a consumer to make a purchase
io over the PSTN. As FIG. 2 shows the process begins when a consumer or
customer 101 places a telephone call 202 to a merchant 105 from either the
consumer's home, or by using a calling card, or through some other
mechanism identifies himself to the PSTN. Once the consumer's identity is
established, the consumer's service provider system or PSTN 11 establishes
is the call 202 between the consumer 101 and the merchant 105. The
consumer 10i and merchant 105 then negotiate a transaction 208.
Once negotiations are completed the consumer 101 hits a
predetermined sequence of keys 210 on the telephone pad, e.g., flash hook
followed by *678, to signal the service provider system 111 that a consumer
2o wishes to make a purchase. When the service provider system 111 receives
this sequence or signal 210 the system 111 temporarily disconnects both the
merchant 105 and the consumer 101 and establishes two new calls, one 212
to the consumer 101 and the other 214 to the merchant 105. Alternatively,
instead of temporarily disconnecting the merchant 105 and consumer 101 the
2s system may alternate temporarily disconnecting the merchant 105 and the
consumer 101 from the call. If the consumer is using a calling card, the
consumer is queried for his PIN, step 216. Of course, if the consumer is
calling from home a PIN may not be necessary. While the customer is
queried for his PIN, step 216, the merchant is also queried to enter the
3o transaction amount, step 218. The consumer and merchant then each return
the information requested, steps 220 and 222, respectively. In returning the
information requested both the consumer and the merchant may also be
requested or allowed to return additional information pertaining to the
transaction. For example, the consumer may input his name and address,
_g_

CA 02324114 2000-09-15
WO 99149404 PC'T/US99/06195
step 224, and have this information recorded by the service provider 111.
Likewise, the merchant may input its name and the items purchased, step
226, and have this information recorded by the service provider 111. This
additional information provided by the merchant may be disclosed to the
s consumer or vice versa. Furthermore, the merchant may forward the
information by way of an audible invoice or an invoice on the Internet to the
service provider. However, the additional information is not needed to
consummate the sale. This is the case because both parties to the
transaction already know the item selected and the price.
io The service provider then checks the consumer and merchant records
to select an appropriate form of payment and the availability of funds on the
part of the consumer, step 227. As illustrated by FIG. 2, step 227 involves
the
service provider accessing the eCard server 115. It should be noted that
although in the above description the service provider system 111 is
is described as collecting information from the consumer and the merchant, the
service provider system 111 may also function as traffic cop allowing the
eCard server 115 to request, collect, and manage the entire transaction.
Once the method of payment is selected the service provider plays the
product description and price to the consumer, step 230, and receives
2o confirmation from the consumer, step 232. Once confirmation is received the
consumer and merchant are then reconnected, step 235.
in a second embodiment of our invention, and as illustrated in FIG. 3,
the consumer may also purchase items over the Internet using an application
available on the World Wide Web (Web). The consumer begins the
2s transaction by dialing into an Internet Service Provider (ISP) modem pool,
inputting a user identification code and password, step 302. The ISP then
validates the user and establishes a connection to a Web page from which the
customer negotiates an item and price, step 304. The consumer then clicks
on a eCard icon, step 306, on the Web page used to negotiate the
3o transaction; note that the Web page may be the Web page of the consumer
or some other trusted third party. As a result two new connections are
created, one from the consumer to the eCard server, connection 308, and one
from the eCard server to the merchant, step 310. The eCard server then
queries the consumer for his calling card PIN, step 312. At the same time, the
-9-

CA 02324114 2000-09-15
WO 99/49404 PCT/US99/06195
merchant is requested to enter the amount of the transaction on an invoice or
purchase order 314. As was the case in the previous embodiment of our
invention, the consumer and merchant may optionally record a message
indicating any other specific terms related to the transaction, steps 318 and
s 320, respectively. Using voice, a Web page, or off-line email the service
provider system may optionally play a recording of the customer's voice and
name. The system then checks the customer and merchant records , step
330, to select an appropriate form of payment (typically on the calling card
account, but possibly on a credit card, ATM, etc.). The system then confirms
io to the customer, step 336, the product description and price and also
receives
confirmation from the customer, step 338. After customer confirmation, step
338, the consumer is again free to roam the Web and make another
purchase.
The above description has been presented only to illustrate and
is describe the invention. It is not intended to be exhaustive or to limit the
invention to any precise form disclosed. Many modifications and variations
are possible in light of the above teaching. The embodiments were chosen
and described in order to best explain the principles of the invention and its
practical application to enable others skilled in the art to best utilize the
2o invention on various embodiments and with various modifications as are
suited to the particular use contemplated.
-io-

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: IPC expired 2012-01-01
Inactive: IPC expired 2012-01-01
Inactive: IPC deactivated 2011-07-29
Inactive: IPC from MCD 2006-03-12
Inactive: First IPC derived 2006-03-12
Inactive: IPC from MCD 2006-03-12
Time Limit for Reversal Expired 2003-03-24
Application Not Reinstated by Deadline 2003-03-24
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2002-03-22
Inactive: Cover page published 2000-12-15
Inactive: First IPC assigned 2000-12-07
Letter Sent 2000-12-01
Letter Sent 2000-12-01
Inactive: Acknowledgment of national entry - RFE 2000-12-01
Application Received - PCT 2000-11-29
Amendment Received - Voluntary Amendment 2000-09-16
All Requirements for Examination Determined Compliant 2000-09-15
Request for Examination Requirements Determined Compliant 2000-09-15
Application Published (Open to Public Inspection) 1999-09-30

Abandonment History

Abandonment Date Reason Reinstatement Date
2002-03-22

Maintenance Fee

The last payment was received on 2001-02-01

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Request for examination - standard 2000-09-15
Basic national fee - standard 2000-09-15
Registration of a document 2000-09-15
MF (application, 2nd anniv.) - standard 02 2001-03-22 2001-02-01
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
TELCORDIA TECHNOLOGIES INC.
Past Owners on Record
ERNEST SAMUEL COHEN
MUNIR COCHINWALA
NAVEEN SURI
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2000-12-14 1 8
Description 2000-09-14 10 577
Abstract 2000-09-14 1 63
Claims 2000-09-14 2 87
Drawings 2000-09-14 3 40
Claims 2000-09-15 3 97
Reminder of maintenance fee due 2000-11-29 1 112
Notice of National Entry 2000-11-30 1 204
Courtesy - Certificate of registration (related document(s)) 2000-11-30 1 113
Courtesy - Certificate of registration (related document(s)) 2000-11-30 1 113
Courtesy - Abandonment Letter (Maintenance Fee) 2002-04-21 1 182
PCT 2000-09-14 3 130
PCT 2000-09-15 4 176