This application is based on and hereby claims priority to European Application No. 06004747.9 filed on Mar. 8, 2006, the contents of which are hereby incorporated by reference.
According to the related art, the use of telephone book data stored in a telephone book data bank of a server by a telephone or the realization of a regular and/or inverse telephone book search in the public/external telephone book is based on web-based mechanisms such as WAP or HTML pages (Wireless Application Protocol; Hyper-Text Markup Language) for example.
When reference is made to a telephone book data bank in the text below, then the content of this data bank includes not only a telephone directory (telephone book), but rather can also include any type and form of communication directory, e.g. a trade directory. A regular telephone book search is understood to mean the search for other information/data stored in the data bank for a known telephone number or call number. Conversely, an inverse search is the search for the telephone/call number associated with the stored information/data. The telephone/call number with the corresponding information/data forms one data record in the telephone book data bank; there are a plurality of such data records depending on the size of the data bank. The information/data forming the data record in each case together with the telephone/call number of a subscriber includes, in the case of a telephone directory for example, the name (e.g. first and last name), the place of residence, the street, the state/country, the zip code, the fax number, the email address etc. of the subscriber, while in the case of a trade directory the information/data further includes the category in the trade directory.
Further information on this related art is available on the internet, for example, at the following links:
www.slacky.de/docs/projects/isdnmonitor.html (use of the inverse search with Deutsche Telekom for Linux-based ISDN call monitoring based on the T-Com web page).
www.iir.at/pdfs/award2004 gewinner.pdf (3G telephone book for UMTS devices based on the SuperPages from Hutchison 3G Austria GmbH).
www.linuxforen.de/forums/showthread.php?t=189361 (script for using the inverse search of T-Com for the Linux VBOX answering machine, likewise based on the T-Com web page).
An aspect is to disclose a method and a telephone for use of telephone book data stored in a telephone book data bank of a server, with which the telephone book data is used in the telephone for telephony applications.
The underlying idea is to shift part of the telephone book query into the telephone and to initiate from the telephone a direct telephone book search in a telephone book data bank of a server by a dedicated protocol by transmitting search criteria (“embedded system” principle). In exchange the telephone receives the search results and can understand the semantics of the search results on the basis of tags in the dedicated protocol, so that it can directly use the data of the search results for telephone-specific operations, for example outgoing telephone calls, storing in a local telephone book, resolving call number information (CLIP information; Calling Line Identification Presentation) for incoming telephone calls. The results of the search are therefore further used or further processed immediately. It is thus possible for example to directly dial a call number found or to store it locally in a telephone book memory of the telephone. In addition, an incoming telephone call with calling line identification presentation (call with CLIP) can be directly assigned a name and possibly an address if the transmitted call number is not contained in the local telephone book memory.
The essence of the method described below is the use of the dedicated protocol for signaling instead of a web interface and its implementation in a telephone. Such a protocol is preferably defined together with a service provider for telephone book searches. Such a protocol may also be standardized.
The dedicated protocol is preferably designed for small proprietary “embedded systems” and may be both tailored to a service provider as well as proprietary. In addition, in principle the technical concept may also be utilized for other services.
In principle two embodiments may be realized for the above-mentioned protocol:
It should be noted with respect to both approaches that different business models may be used:
free use of the service,
chargeable use of the service as “pay per use” or as a monthly flat fee.
The main application area is telephones, for example Digital Enhanced Cordless Telecommunications (DECT), WLAN, Bluetooth, GSM, UMTS telephones, telephones with an ETHERNET connection etc., which are connected to a packet-switched network, for example the internet, and/or to a circuit-switched network, for example public switched telephone network (PSTN), integrated services digital network (ISDN), using “digital subscriber line (DSL)” technologies.
These and other aspects and advantages will become more apparent and more readily appreciated from the following description of the exemplary embodiment, taken in conjunction with the accompanying drawings of which:
Reference will now be made in detail to the preferred embodiments, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
The respective telephone TE designed in such a way is connected via the data terminal DEE and via a physical connection PVB to a server SE, and has access via the connection PVB to a telephone book data bank TBD assigned to the server SE. In addition, the telephone TE is physically connected via the data terminal DEE to a circuit-switched network LNW, which is the Public Switched Telephone Network (PSTN) for example. The server SE and the telephone book data bank TBD are assigned to a packet-switched network PNW, which is the internet for example.
So that the telephone TE, depending on the design, can access telephone book data stored in the telephone book data bank TBD—for example during a telephone book search—a dedicated protocol PK is used between the telephone TE and the server SE for the accesses; the telephone TE and the server SE communicate with one another according to the protocol. A login and/or authentication is provided as an optional feature of the protocol PK. This means that, when it wishes to access the server SE or telephone book data bank TBD respectively, as part of a telephone book search for example, the telephone TE must first log in to the server SE or the telephone book data bank TBD and/or be authenticated.
According to the dedicated protocol PK, with a first message M1 the telephone TE transmits to the server SE search criteria generated in the telephone TE and/or obtained by the telephone. In the case of an inverse telephone book search, the search criteria generated in the telephone are for example the respective call number of a subscriber to be searched for, and in the case of a regular search the name, the town, the street, the country, the zip code, the fax number and/or the email address for example. The search criterion obtained by the telephone is for example CLIP information transmitted to the telephone. After the search criteria have been transmitted, using a second message M2 to the telephone book data bank TBD the server SE initiates reading out of the data matching the search criteria for a search result from the telephone book data bank TBD. With a third message M3, the data found for the search result is transmitted from the telephone book data bank TBD to the server SE. The server SE then assembles the data obtained in a search result in the “XML” format for example and sends the search result to the telephone TE in a fourth message M4.
On the basis of the “<hm>” tag MK which indicates a fixed network home number, once it has received the search result the telephone TE can, immediately or following selection/confirmation by the telephone user, initiate a telephone call to the subscriber having the fixed network home number.
The other tags used “<In>”, “<fn>”, “<mb>”, “<fx>” MK indicate the following respectively: last name, first name, mobile phone number, fax number. There are also corresponding tags depending on the total number of data types used (e.g. name, town, street, country, zip code, fax number, email address etc.) in the telephone book data bank and in the telephone book search. The search result preferably contains a complete data record DS stored in the telephone book data bank TBD for the search criterion, or respectively each individual data record for all the data stored in the telephone book data bank TBD for the search criterion. It is however also possible to transmit only part of the data or an incomplete data record.
In contrast to the related art (
Before individual selected primary scenarios are discussed below—in relation to the description of FIGS. 3 and 4—in connection with the telephone book search on the basis of the explanations for
1. When searching in a telephone directory, if as a result of entering the character string “Meier” for a name as search criterion (complete character string entered), the search result contains a significantly larger number “n” than for example n=7 (individually specifiable limit value) data records (for example n=50, because such a number cannot be represented and output in a user-friendly manner on a telephone with a small telephone display in comparison with computer screens), then so-called ambiguity handling is preferably performed in the server supported by the dedicated protocol, during which, by transmitting further messages to the telephone, it is attempted at the server end to prompt the user to expand the search criterion, for example by offering more precise formulations of the search criterion used (for example transmitting first names from the plurality of data records), in order to limit or reduce the number of search results.
2. When searching in a telephone directory, if no data record can be found as a result of entering the character string “Ham” for a town and the character string “Barlow” for a name as search criterion (incomplete character string entered for town and complete character string entered for name) because the search criterion is ambiguous, ambiguity handling is again preferably performed in the server supported by the dedicated protocol, during which, by transmitting further messages to the telephone, it is attempted at the server end to prompt the user to optimize the search criterion, for example by offering more precise formulations of the character string used for the town (for example transmitting the names of towns stored in the data bank that begin with the character string entered, such as Hamburg, Hamm, Hammelbug, etc. for example), in order to obtain a search result.
3. When searching in a trade directory, if as a result of entering the character string “Bocholt” for a town, the character string “Schmidt, Schmitt, Schmid” for a name and a character string “doctor” for a trade as search criterion (complete character string entered in each case), the search result contains a significantly larger number “n” than for example n=5 (individually specifiable limit value) data records (for example n=25, because such a number cannot be represented and output in a user-friendly manner on a telephone with a small telephone display in comparison with computer screens), then again ambiguity handling is preferably performed in the server supported by the dedicated protocol, during which, by transmitting further messages to the telephone, it is attempted at the server end to prompt the user to expand the search criterion, for example by offering more precise formulations of the trade character string used (for example transmitting specific trades stored in the data bank under the category of “doctor”, such as general practitioner, dentist, ENT consultant, etc.), in order to limit or reduce the number of search results.
The units or components included in the representation of the message sequence are:
The message sequence illustrated begins with a call arriving at the telephone from either the circuit-switched network LNW (“case 3.1”) or from the packet-switched network PNW (“case 3.2”). In “case 3.1”, as a result of the activated CLIP functionality the circuit-switched network LNW transmits with a first message M1 the call number of the incoming call (subscriber) via the telephone/network interface TNS of the data terminal DEE to the central control unit ZSE of the cordless handset SLH, of the mobile telephone MTF or of the telephone handset THA, whereas in “case 3.2” again as a result of the activated CLIP functionality the packet-switched network PNW transmits with a second message M2 the call number of the incoming call (subscriber) via the telephone/network interface TNS to the central control unit ZSE.
If the central control unit ZSE of the telephone TE now wishes to perform an inverse telephone book search with the call number of the calling party received by CLIP and to access the server SE or the telephone book data bank TBD respectively for this purpose, it may for example be necessary for the telephone TE to log in on first accessing the server SE or the telephone book data bank TBD, or be authenticated in the case of a repeat access. For this purpose the central control unit ZSE of the telephone TE therefore sends with a third message M3 via the packet-switched network PNW a user name and a password, which the user has previously received by post or email from the operator of the server or of the telephone book data bank respectively and has on receipt entered via the keypad TAS, to the server SE, where the information is received by the server/network interface SNS. Unless the “inverse telephone book search” service is provided free by the service provider, in some circumstances it is expedient if the user name and the password are transmitted encrypted with the third message M3. The received user name and the password are transferred by the server/network interface SNS with a fourth message M4 to the control unit STE with the assigned user directory BVZ for verification. If it is also necessary (in the case of a chargeable service) to check whether the service user has paid the fees for the provision of the service, then this takes place in the service billing module DFA of the control unit STE. If the user name received and the password received are also contained in the user directory BVZ of the server SE, and any charges have been paid (positive verification), then a fifth message M5 with the content “Verification OK” is sent to the central control unit ZSE by the control unit STE with the assigned user directory BVZ and the service billing module DFA via the server/network interface SNS, the packet-switched network PNW and the telephone/network interface TNS of the telephone TE. Since the entire login/authentication process (messages M3-M5)—as already mentioned in the description of FIG. 2—is optional, this part of the message sequence is indicated by a dashed line in
Following successful login or authentication, the call number of the calling party/caller is sent as search criterion by the central control unit ZSE with a sixth message M6 via the telephone/network interface TNS, the packet-switched network PNW to the server SE, where it is received by the server/network interface SNS and forwarded to the control unit STE. The search criterion/the call number is then transferred by the control unit STE with a seventh message M7 to the telephone book data bank TBD for the data bank search. As a result of this data bank search, with an eighth message M8 the control unit STE reads a data record from the telephone book data bank TBD, assembles a search result from the data record and with a ninth message M9 transmits the search result with the data record via the server/network interface SNS, the packet-switched network PNW and the telephone/network interface TNS of the telephone TE to the protocol interpreter PKI of the central control unit ZSE. The protocol interpreter PKI interprets the received search result with the aid of the tags MK used in accordance with the dedicated protocol PK during the structuring of the data in the data record (cf.
The units or components included in the representation of the message sequence are:
The message sequence illustrated begins with the feature “telephone book search” being selected by the telephone user TEB on the keypad TAS. Following this, the telephone book search is started by the central control unit ZSE with a first message M1. In response to this, with a second message M2 the central control unit ZSE transmits a selection menu “inverse/regular search” to the display DPL of the user interface BSS. The telephone user TEB then makes a selection of “inverse/regular search” on the keypad TAS and the search type selected is notified to the central control unit ZSE with a third message M3. With a fourth message M4 the central control unit ZSE then transmits a search screen to the display DPL of the user interface BSS. Using the keypad TAS, the telephone user TEB enters search criteria in the search screen which are notified to the central control unit ZSE with a fifth message M5.
If the central control unit ZSE of the telephone TE now wishes to perform an inverse/regular telephone book search with the search criteria entered by the telephone user TEB and to access the server SE or the telephone book data bank TBD respectively for this purpose, it may for example again be necessary for the telephone TE to log in on first accessing the server SE or the telephone book data bank TBD, or be authenticated in the case of a repeat access. For this purpose the central control unit ZSE of the telephone TE therefore sends with a sixth message M6 via the packet-switched network PNW a user name and a password, which the user has previously received by post or email from the operator of the server or of the telephone book data bank respectively and has on receipt entered via the keypad TAS, to the server SE, where the information is received by the server/network interface SNS. Unless the “inverse/regular telephone book search” service is provided free by the service provider, in some circumstances it is expedient if the user name and the password are transmitted encrypted with the sixth message M6. The received user name and the password are transferred by the server/network interface SNS with a seventh message M7 to the control unit STE with the assigned user directory BVZ for verification. If it is also necessary (in the case of a chargeable service) to check whether the service user has paid the fees for the provision of the service, then this takes place in the service billing module DFA of the control unit STE. If the user name received and the password received are also contained in the user directory BVZ of the server SE, and any charges have been paid (positive verification), then an eighth message M8 with the content “Verification OK” is sent to the central control unit ZSE by the control unit STE with the assigned user directory BVZ and the service billing module DFA via the server/network interface SNS, the packet-switched network PNW and the telephone/network interface TNS of the telephone TE. Since the entire login/authentication process (messages M6-M8)—as already mentioned in the description of FIG. 2—is optional, this part of the message sequence is again indicated by a dashed line in
Following successful login or authentication, the search criteria entered by the telephone user TEB according to messages M1 . . . M5 are sent by the central control unit ZSE with a ninth message M9 via the telephone/network interface TNS, the packet-switched network PNW to the server SE, where they are received by the server/network interface SNS and forwarded to the control unit STE. The search criteria are then transferred by the control unit STE with a tenth message M10 to the telephone book data bank TBD for the data bank search. As a result of this data bank search, with an eleventh message M11 the control unit STE reads at least one data record from the telephone book data bank TBD, assembles a search result from the data record(s) and with a twelfth message M12 transmits the search result with the data record(s), for example in the form of a list, via the server/network interface SNS, the packet-switched network PNW and the telephone/network interface TNS of the telephone TE to the protocol interpreter PKI of the central control unit ZSE. The protocol interpreter PKI interprets the received search result with the aid of the tags MK used in accordance with the dedicated protocol PK during the structuring of the data in the data record (cf.
The telephone user TEB then makes a data record selection using the keypad TAS and the data record selected is notified to the central control unit ZSE with a fourteenth message M14. With a fifteenth message M15 the central control unit ZSE then transmits an operation menu to the display DPL of the user interface BSS, which is output there, and with which the telephone user TEB is offered the option of either storing the selected data record [“option a)”] or performing a dialing operation with which a telephone connection is established to the subscriber identified by the selected data record with the corresponding call number [“option b)”]. In the case of “option a)”, a key for storing the data record in the telephone book data memory TBS is activated by the telephone user TEB via the keypad TAS, with the result that the central control unit ZSE stores the data record in the telephone book data memory TBS in accordance with a sixteenth message M16. In the case of “option b)”, a dialing key is activated by the telephone user TEB via the keypad TAS and the call number corresponding to the selected data record is then transmitted by the central control unit ZSE via the telephone/net-work interface TNS either with a seventeenth message M17 to the circuit-switched network LNW (“case 4.1”) or with an eighteenth message M18 to the packet-switched network PNW (“case 4.2”).
The system also includes permanent or removable storage, such as magnetic and optical discs, RAM, ROM, etc. on which the process and data structures of the present invention can be stored and distributed. The processes can also be distributed via, for example, downloading over a network such as the Internet. The system can output the results to a display device, printer, readily accessible memory or another computer on a network.
A description has been provided with particular reference to preferred embodiments thereof and examples, but it will be understood that variations and modifications can be effected within the spirit and scope of the claims which may include the phrase “at least one of A, B and C” as an alternative expression that means one or more of A, B and C may be used, contrary to the holding in Superguide v. DIRECTV, 358 F3d 870, 69 USPQ2d 1865 (Fed. Cir. 2004).
Number | Date | Country | Kind |
---|---|---|---|
06004747.9 | Mar 2006 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2007/052188 | 3/8/2007 | WO | 00 | 11/23/2007 |