`
`(19) United States
`(12) Patent Application Publication
`Liu et al.
`
`(54) APPARATUS, METHODS AND SYSTEMS
`FOR ANONYMOUS COMMUNICATION
`
`(76)
`
`Inventors: Christina Ying Liu, Vancouver, WA
`(US); William Ho Chang, Vancouver,
`WA(US)
`
`Correspondence Address:
`SMITH-HILLAND BEDELL
`12670 N W BARNES ROAD
`SUITE 104
`PORTLAND, OR 97229
`
`(21) Appl. No.:
`
`09/947,116
`
`(22) Filed:
`
`Sep. 4, 2001
`
`Related U.S. Application Data
`
`(63) Non-provisional of provisional application No.
`60/230,021, filed on Sep. 5, 2000.
`
`11111111111111111111111111111111111111111111111111111111111111
`US 20020027901Al
`
`(10) Pub. No.: US 2002/0027901 Al
`Mar. 7, 2002
`(43) Pub. Date:
`
`Publication Classification
`
`Int. Cl? ..................................................... H04L 12/66
`(51)
`(52) U.S. Cl. ........................... 370/352; 370/338; 370/349
`
`ABSTRACT
`(57)
`Anonymous voice communication between a first station
`and a second station is facilitated by providing an interface
`that allows input of a transaction specification from at least
`one of the first and second stations. A reference code
`associated with the transaction is generated, there being a
`defined relationship between the reference code and the
`address of the second station for voice communication. The
`reference code is supplied to the first station, and a voice
`communication request and the reference code are received
`from the first station. The reference code is used to recover
`said address and a channel for voice communication is
`opened between said first and second stations. Voice com(cid:173)
`munication can thereby be established between the first and
`second stations without providing the address of the second
`station to the first station.
`
`PACKET DATA
`NETWORK
`
`TRANSACTION
`SPECf!CAT10N
`32
`
`20
`
`14
`
`22
`
`WEB
`SERVER 1
`
`WEB
`SERVERn
`
`CONTROLLER
`UNIT
`
`)
`I
`I
`
`CQNt.ECT10N
`NSTRIXTION
`34
`
`30
`
`I
`
`I
`I
`I
`
`~~
`
`I
`I
`I
`I
`I
`
`I . I • \
`
`' '
`
`,.---.I-=--v-'6
`INTERNET
`ENABLED
`DEVICE
`
`\
`
`\r5
`
`I
`I
`\
`I
`I
`1
`I
`I
`
`I
`
`/
`
`)
`I
`I
`I
`I
`I
`I
`I
`I
`I
`\
`\
`
`.----------'----¥~
`\
`VOICE
`' ' ENABLED
`DEVICE
`
`I
`I
`
`I
`I
`
`Google 1008
`U.S. Patent No. 9,445,251
`
`
`
`Patent Application Publication Mar. 7, 2002 Sheet 1 of 6
`
`US 2002/0027901 A1
`
`INTERNET
`ENABLED
`DEVICE
`
`I
`I
`I
`
`1~
`
`I
`I
`I
`l
`I
`\
`
`' I
`' \
`
`I
`
`\
`
`J
`I
`J
`
`PACKET DATA
`NETWORK
`
`20
`
`14
`
`WEB
`SERVER 1
`
`WEB
`SERVERn
`
`71.
`
`®.ECOON
`tlSTRUCIDN
`34
`
`CONTROLLER
`UNIT
`
`CON!'ETION
`NSTRU:TION
`34
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`\
`I
`\
`\
`\
`\
`
`COIIM.NCATION
`lt1ANAGEMfNT
`
`30
`
`FIG.1
`
`INTERNET
`ENABLED
`DEVICE
`
`6
`
`\
`
`\
`
`\('5
`
`I
`
`I
`I
`
`/
`
`I
`
`VOICE
`ENABLED
`DEVICE
`
`
`
`Patent Application Publication Mar. 7, 2002 Sheet 2 of 6
`
`US 2002/0027901 Al
`
`~ I
`~ <0
`~
`I
`~--r-
`
`1
`
`I
`I
`I
`I
`I
`I
`I
`c::
`I
`~ 5c
`._L..--------.--1 c:: z
`I
`I-::>
`z
`I 8
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`~-t---1
`~ L--~
`I
`\J~
`I
`I ~
`I
`I
`'---. - - - - - - - - - - - - . - - - _j
`
`
`
`96
`
`94
`
`92
`
`90
`
`NETWORK
`INTERFACES
`
`POWER SYSTEM
`
`CLOCK SYSTEM
`
`SECURI1Y SYSTEM
`
`~24
`
`98
`
`0
`
`2
`
`PROCESSOR
`
`MEMORY
`
`OPERATING
`SYSTEM
`
`APPLICATIONS
`
`BUS
`
`VOICE PROCESSING l--89
`SYSTEM
`
`FIG. 3
`
`'t:l
`
`I")
`
`~ .....
`
`""C
`~ .....
`~ = .....
`>
`'t:l -....
`.... 0 =
`""C = -a -....
`.... 0 =
`
`I")
`
`~ .....
`
`~
`~
`;"i
`~-..J
`
`N c c
`
`N
`
`'JJ. =-~
`~ .....
`
`~
`0 ......,
`0'1
`
`Cj
`'JJ.
`
`N c c
`~ c c
`N
`-..J
`'0 c
`'"""' >
`'"""'
`
`
`
`Patent Application Publication Mar. 7, 2002 Sheet 4 of 6
`
`US 2002/0027901 Al
`
`118
`
`USE OTHER
`COMMUNICATION
`MEANS
`
`USERS CONDUCT ON-LINE
`TRANSACTIONS
`
`TRANSACTION
`SPECIFICATIONS
`SUBMITTED
`
`REQUEST
`ANONYMOUS VOICE
`CONVERSATION?
`
`SERVER PASSES CONNECTION
`INSTRUCTION
`
`110
`
`112
`
`116
`N
`
`120
`
`122
`
`CONTROLLER UNIT
`GENERATES REFERENCE CODE
`FOR CONNECTION
`
`124
`
`DELIVERY OF REFERENCE
`CODE AND OTHER
`INFORMATION
`
`ASSIGNED USER
`MANUALLY RECORDS
`THE CONFIRMATION
`
`CONFIRMATION
`AUTOMATICALLY STORED
`
`128
`
`FIG.4A
`
`
`
`Patent Application Publication Mar. 7, 2002 Sheet 5 of 6
`
`US 2002/0027901 Al
`
`140
`
`42
`
`CONNECTION PROGRAM
`REMINDS ASSIGNED USER
`OF THE CONNECTION
`
`CONNECTION PROGRAM
`AUTOMATICALLY MAKES
`CONNECTION
`
`ASSIGNED USER INPUTS
`REFERENCE CODE
`
`CONTROLLER UNIT
`RETRIEVES CONNECllON
`INSTRUCTION
`
`134
`
`36
`
`REJECT THE
`CONNECTION
`
`48
`
`CONTROLLER UNIT
`PROVIDES FURTHER
`ASSISTANCE
`
`152
`
`CONNECTION
`TIME, DURATION,
`SATISFACTION
`
`44
`
`CONTROLLER UNIT ROUTES
`THE CALL TO THE CALLED
`PARTY
`
`CONTROLLER UNIT
`TRANSMITS CONNECllON
`REPORTS
`
`FIG.4B
`
`
`
`REMINDER:
`You are scheduled to call fv. 1
`betweenG:1 0 pm
`to 6:30pm.(
`Do you want to be connected now?
`
`'112
`
`You are being
`connected
`
`FIG.5
`
`Do you want me to
`remind you by G :30pm?
`
`.....
`
`90
`
`EXPERT:J.Y.
`EXPERTISE: CAREER COACH
`CHARGING METHOD: $1.00/ MIN
`YOU HAVE REQUESTED TO BE
`CONNECTED IMMEDIATELY.
`PRESS NOW TO PROCEED.
`92
`
`--4
`
`FIG.6
`
`I")
`
`~ .....
`
`""C
`~ .....
`~ = .....
`~ 't:l -....
`.... 0 =
`~ -a -....
`.... 0 =
`
`I")
`
`~ .....
`
`~
`~ :-;
`~-..J
`
`N c c
`
`N
`
`'JJ. =(cid:173)~
`~ .....
`0'1
`0 ......,
`0'1
`
`Cj
`'JJ.
`
`N c c
`~ c c
`N
`-..J
`'0 c
`""""' >
`""""'
`
`
`
`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`1
`
`APPARATUS, METHODS AND SYSTEMS FOR
`ANONYMOUS COMMUNICATION
`
`CROSS-REFERENCE TO RELATED
`APPLICATION
`
`[0001] This application claims benefit of Provisional
`Application No. 60/230,021 filed Sep. 5, 2000, the entire
`disclosure of which is hereby incorporated by reference
`herein for all purposes.
`
`BACKGROUND OF THE INVENTION
`
`[0002] The Internet is a collection of computer networks
`from which users obtain and share information. The Internet
`has evolved from the ARPAnet to become the largest com(cid:173)
`puter network in the world. The Internet supports various
`services. Of these services, the World Wide Web (the
`"Web") and email are among the most widely used. Of these,
`the Web comprises a collection of hundreds of millions of
`documents ("Web pages") written in mark up languages
`such as HTML, XML, and WML.
`
`[0003]
`In Internet transmissions, Transaction Control Pro(cid:173)
`tocol/Internet Protocol ("TCP/IP") is the communication
`standard. TCP!IP is a suite of protocols enabling communi(cid:173)
`cation between each node of the network. With the increas(cid:173)
`ing bandwidth being offered by network carriers, not only
`data but also voice, audio and video are increasingly being
`transmitted through the network.
`
`[0004] The evolution of the Internet continues and, in so
`doing, drives Internet-related product development, includ(cid:173)
`ing in hardware, software and protocols. The Internet is
`extending in wireless communication and handheld devices.
`As an example, Internet-enabled cellular phones (such as
`smart and super phones) combine the features of cellular
`phones with the ability to access the Internet. As another
`example, certain personal digital assistants ("PDAs") are
`directed to couple standard features with wireless access to
`the Internet. These phones, PDAs and other handheld
`devices exploit protocols such as, but not limited to, WAP,
`Web clipping, HDML or CHTML. Through these Internet(cid:173)
`enabled devices, it is anticipated that users will not only
`place phone calls, organize their schedules and/or otherwise
`exploit the respective device's standard functionality, but
`also access the Internet for browsing the Web, obtaining
`information, communicating (e.g., via email) and the like. In
`so doing, it is also anticipated that the device's standard
`features and the Internet's benefits will both be enhanced.
`
`[0005] The evolution of the Internet also implicates an
`evolution, if not revolution, in the infrastructure of commu(cid:173)
`nication networks. Today, people generally obtain personal
`access to the Internet by dialing up Internet service provid(cid:173)
`ers; the dial up may be carried for example over circuit(cid:173)
`switched networks ("CSN"), typically via local telecommu(cid:173)
`nications providers. In dial up, CSNs establish a physical
`circuit, which is dedicated exclusively to the call between
`the parties.
`
`[0006] While generally available to users, CSNs appear to
`be in relative decline, being increasingly supplanted by
`packet-switched technologies. Packet-switched technolo(cid:173)
`gies significantly increase a network's speed and capacity. In
`packet-switched networks, traffic is digitized, compressed,
`and transported as packets. These networks enable the
`
`packets of a particular transmission to travel through various
`channels from source to destination. Moreover, these net(cid:173)
`works enable traffic in varied media types, including voice,
`audio, video, text, data and facsimile. In enabling the varied
`types, moreover, the networks may deploy technologies
`(e.g., ATM), which enable significant features, such as
`quality of service, wherein priorities are assigned to and
`among the media types (e.g., so that packets of voice
`communications arrive timely, thereby ensuring adequate
`fidelity for the conversation).
`
`[0007] Packet-switched networks follow open standards.
`Accordingly, these networks enhance the ability of service
`providers to deploy new services, including high-bandwidth
`services for Internet use or otherwise (e.g., television pro(cid:173)
`gramming and/or video on demand). By comparison, in
`circuit-switched networks, the call control functionality and
`the service logic tend to be buried within the switch.
`Moreover, the functionality generally is proprietary to the
`switch vendors. As such, new services generally are
`deployed at the discretion of the switch vendor, not the
`service providers.
`
`[0008]
`In addition to hardware, software, protocols and
`infrastructure, the evolution of the Internet also implicates
`development of new and improved services. Already, mar(cid:173)
`ketplaces on the Internet (i.e., virtual marketplaces) are well
`known and increasingly diverse in direction, content and
`business model. Ebay, Yahoo, E*Trade and Amazon are
`examples, each facilitating transactions, including the sell(cid:173)
`ing, buying and auctioning of merchandise and the provision
`of services, with and among enterprises and individuals. The
`merchandise and services comprise a wide variety, from
`books to automobiles, to stocks, to calendaring, that seems
`ever expanding in breadth.
`
`[0009] Overcoming the geographic constraints of physical
`proximity, the Internet also introduces increasing and new
`opportunities for people to meet and interact with each other.
`Communities on the Internet (i.e., virtual communities) are
`well known and increasingly diverse in style, content and
`target participants. Virtual communities typically offer ser(cid:173)
`vices and associated tools, such as chat rooms, email and
`Web publishing. Through these services and tools, virtual
`communities enable their participants to communicate,
`including to express their respective views, share common
`interest(s) and otherwise interact as if in the physical world,
`and increasingly in ways not available in the physical world.
`
`[0010] Virtual marketplaces may facilitate the exchange or
`trading of ideas, knowledge and information between and
`among individuals and entities (sometimes referred to col(cid:173)
`lectively herein as "participants"). These virtual market(cid:173)
`places ("information marketplaces") tend to have an express
`or implied premise, understanding or foundation: individu(cid:173)
`als and entities have one or more interests and/or areas of
`expertise that can or should be (a) shared with or provided
`to participants, (b) nurtured/advanced by interaction with
`participants, and/or (c) otherwise communicated to or with
`other participants for some derived benefit of either or both
`participants.
`
`[0011]
`In an example of a transaction in a contemplated
`information marketplace, a participant (the "initiator") posts
`a question, inquiry or view ("posting") at a selected Web site
`of the marketplace. The initiator has the goal of obtaining
`one or more of answers, information, direction, responses or
`
`
`
`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`2
`
`interaction ("response") from or with one or more partici(cid:173)
`pants. The initiator may choose to direct the posting to
`selected participants ("experts"). The initiator preferably is
`enabled to select experts based on the experts'identified or
`claimed interest/expertise. The initiator may have identified
`interests and expertise. Indeed, the initiator may also be an
`expert in the marketplace and, conversely, the expert may
`also be an initiator in the marketplace.
`[0012] A contemplated information marketplace prefer(cid:173)
`ably supports provision of the qualifications or characteris(cid:173)
`tics of its experts, initiators and/or participants and may do
`so variously. In an example case, the marketplace publishes
`qualifications/characteristics (e.g., on Web sites or page(s)).
`The qualifications/characteristics may be mandated or vol(cid:173)
`untary, or a combination. The qualifications/characteristics
`may, particularly in the case of initiators, be selectable by the
`participant. The qualifications/characteristics may include
`various data, such as, among others, profile descriptions,
`transaction history (e.g., in the marketplace), ratings (e.g.,
`marketplace, participant, expert and/or initiator provided),
`comments and reviews (e.g., marketplace, participant,
`expert and/or initiator provided), fee schedules or other
`forms of pricing. Profile descriptions may include, among
`other things, certifications (e.g., marketplace, professional,
`or governmental), specialties, sub-area(s) of interest/exper(cid:173)
`tise, education, years of practice, awards, geographic loca(cid:173)
`tion, and geographic scope or limitation on the interest/
`include(cid:173)
`expertise. Profile descriptions may
`also
`particularly for initiators--qualifications or characteristics
`in the field of the posting, transaction history in the field of
`the posting, credit rating, age, education level, and geo(cid:173)
`graphic location.
`
`[0013] Once an initiator selects one or more experts, a next
`step is to establish a communication link between the
`initiator and an expert for posting and response (an "infor(cid:173)
`mation transaction"). A communication link may be vari(cid:173)
`ously provided, including via email, online chat and instant
`messaging. However, a drawback of email is that it relies on
`text communication (e.g.,
`typing), with
`its attendant
`mechanical challenges. Another drawback of email is the
`time lag ("latency") between sending an email and receiving
`a response. Yet another drawback of email is that it has a low
`level of interactivity and, as such, tends to be impersonal,
`ambiguous and inefficient in communication. Accordingly,
`email tends to hinder experts in providing a response,
`particularly one suited to and satisfying of the initiator's
`needs.
`[0014] Online chat and instant messaging tend to be more
`interactive than email. Even so, each also again relies on text
`communication. Moreover, by their nature, chat and instant
`messaging tend to introduce an emphasis on speed in that
`text communication (e.g., fast typing). This emphasis gen(cid:173)
`erally is undesirable. Indeed, this emphasis can be a sub(cid:173)
`stantial hindrance for people either who are not familiar or
`adept with keyboards, who are physically excluded from
`keyboard use and/or whose written language is not based on
`Roman characters (e.g., those using symbol-based written
`languages, such as Chinese). Moreover, this emphasis may
`be specifically undesirable and the hindrance exacerbated in
`the context of an information instruction (e.g., initiators
`and/or experts in an information marketplace find the
`emphasis on rapid typing to be detrimental to an information
`instruction).
`
`[0015] Given these drawbacks, a contemplated informa(cid:173)
`tion marketplace preferably supplants or supplements email,
`online chat and instant messaging with other forms of
`Internet-based or Internet-related communication. Such
`forms of communication typically rely-at least in part-an
`voice communication. These forms include audio and/or
`audio/video conferencing, with or without text communica(cid:173)
`tion. These forms are desirable in their enhanced interactiv(cid:173)
`ity, reduced latency and de-emphasis on writing, particularly
`rapid writing. As such, these forms tend to provide more
`personal, direct, clear and efficient communication. These
`forms are simply more natural. Accordingly, these forms
`tend to be particularly desirable for initiators and experts
`alike in the context of an information marketplace.
`[0016] Although voice communication tends to be more
`direct, efficient and otherwise desirable than e-mail, chat,
`and instant messaging, voice communication also tends to
`have some drawbacks. In particular, voice communication
`generally is subject to a lower level of anonymity (whether
`real or perceived) than is typically associated with each of
`email, chat and instant messaging.
`[0017] Anonymity typically characterizes interaction and
`other communication via the Internet. For example, people
`are enabled to interact and otherwise communicate in cyber
`space without revealing much, if any, personal information,
`such as legal names or phone numbers.
`[0018]
`Internet users tend to prefer anonymity for various
`reasons. As an example, an employee using the Internet to
`search for a new job desires anonymity so as to preclude any
`revelation of their identity to a current employer, supervisors
`and/or colleagues. As another example, an individual who
`has provided personal financial data to an online planner
`may desire anonymity so that the data is not associated with
`the individual's identity (such association potentially trans(cid:173)
`forming the raw data into valuable information). As yet
`another example, members of Internet communities use
`various kinds of substitute names (e.g., aliases, nicknames or
`user names) in communicating with each other.
`
`[0019] The shortfall of anonymity in voice communica(cid:173)
`tions -particularly conversations conducted via the stan(cid:173)
`dard telephone system-tends to introduce problems with
`privacy, particularly expectations of privacy. A common
`such problem is the receipt of unwanted phone calls. These
`unwanted calls can be annoying (e.g., telephone calls from
`tele-marketers), disturbing (e.g., contact from objectionable
`political organizations) and even frightening (e.g., intrusions
`from ostensibly dangerous individuals). Perhaps because
`voice communication is direct, unwanted calls tend to be
`difficult to terminate. Perhaps because telephone conversa(cid:173)
`tions are more personal, people tend not to fully block,
`automatically reject or otherwise absolutely deal with calls
`from unknown sources, which calls have a tendency to be
`unwanted but which could cause desirable or important calls
`to be missed (e.g., a friend of family member calling for
`emergency assistance).
`[0020] Based at least in part on concerns about unwanted
`calls, people remain reluctant to disclose their phone num(cid:173)
`bers, particularly their home telephone and personal cellular
`numbers. This reluctance also tends to reflect, at least in part,
`the perception that phone numbers enable the recipients to
`more readily discover personal information about the person
`that disclosed the number, such as name and physical
`
`
`
`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`3
`
`address. This reluctance also tends to result in slow accep(cid:173)
`tance and lesser use among Internet users of voice commu(cid:173)
`nication (i.e., as compared to email, chat and instant mes(cid:173)
`saging), whether such communication is Internet-based or
`Internet-related (e.g., via standard telephone service (also
`known as the plain old telephone system ("POTS")), but
`initiated by or in connection with Internet services).
`
`[0021]
`It is desirable, then, to integrate voice communi(cid:173)
`cation and anonymity. An example of such integration may
`be illustrated in the context of an information marketplace.
`There, an initiator determines to conduct an information
`instruction with a selected expert via voice communication.
`To do so, the initiator submits a request for voice commu(cid:173)
`nication with the selected expert, the submission being
`through the Internet to the operator or other infrastructure of
`the information marketplace (or other service or system that
`supports linking by voice communication). The marketplace
`contacts the selected expert. The contact may be via (a) the
`Internet, so as to support voice communication as voice over
`Internet protocol ("VoiP") or (b) telephone service. In either
`case, if the contact results in establishing a voice commu(cid:173)
`nication link with the expert, the marketplace maintains that
`link (e.g., puts the expert on hold) while establishing voice
`connection with the initiator before connecting the expert
`and the initiator. The marketplace makes that connection, in
`one case, by linking the initiator and the expert over the
`Internet, with the marketplace either interposed in the trans(cid:173)
`mission of packets or enabling direct transmission. In
`another case, the marketplace bridges between the initiator
`communicating over the Internet (e.g., VoiP) and the expert
`communicating via standard telephony. In yet another case,
`the marketplace connects by contacting the initiator by
`telephone and, once the initiator is on the line, connecting
`the initiator with the expert who is also linked by telephone.
`In each and any case, a connection is made and voice
`communication is enabled, characterized by enhanced sup(cid:173)
`port for anonymity.
`
`[0022]
`Integration of anonymity and voice communication
`in this form tends to have shortfalls. One of the shortfalls is
`that a party may be contacted, without advance notice and at
`any time by the marketplace, responsive to any initiator's
`request. That scope of contact tends to deprive the contacted
`party of control over their respective schedules, which in
`turn, tends to degrade productivity and efficiency in their
`work and to reduce the quality of their personal time. Indeed,
`without advance notice of calls in an information market(cid:173)
`place, an expert may be induced to keep the telephone
`proximate at all times, so as to either take calls in interrup(cid:173)
`tion of other work or play and/or to forestall work or play in
`anticipation of calls (e.g., calls that might never arise). This
`tends to have enhanced relevance in the commercial or
`professional context, wherein the expert seeks to provide
`high quality and highly responsive service to clients (e.g.,
`initiators) so as to, among other things, keep clients satisfied
`and otherwise happy with the provided services (e.g., to
`avoid unanswered calls).
`
`[0023] One solution to this shortfall is to support specified
`times and/or time range(s) during which a party (e.g., an
`expert of an information marketplace) is committed to be
`available for receipt of calls from the information market(cid:173)
`place. In the information marketplace, these times and
`ranges are office hours. During an expert's office hours, the
`expert commits, or even guarantees, to be present to receive
`
`calls from the marketplace. At the same time, the expert
`benefits by enhanced knowledge of and personal control
`over, when such calls, if any, may arise.
`
`[0024] This solution, however, also has shortfalls. In the
`information marketplace, one shortfall is its tendency to
`reduce, from an already finite number of experts available
`via the marketplace, the number of experts actually available
`at any given time. That is, at any given time, it is to be
`expected that, via the marketplace, less than all of the
`experts are within their office hours. Moreover, even if a
`particular expert is within their office hours, a reduced
`supply of experts will tend to reduce the frequency at which
`requests result in a connection (e.g., the expert will have an
`increased chance of being busy with another, earlier initia(cid:173)
`tor).
`
`[0025] Another shortfall is that the initiator will generally
`attempt to contact the expert promptly, if not immediately or
`substantially immediately, after indicating interest in con(cid:173)
`tact, and this might not be convenient for the expert even if
`the initiator attempts to make contact within the expert's
`office hours.
`
`[0026] As another example, a service or system supporting
`integration may assign individuals and entities respective
`user codes, each of which uniquely identifies the particular
`user. To support such codes, the service/system stores the
`codes, e.g., in one or more databases. Preferably, the service/
`system associates the codes with the telephone number
`and/or contact information of the respective individuals and
`entities.
`
`[0027] The service/system may use the user codes vari(cid:173)
`ously. For example, in a virtual chat room context, the
`service/system may enable participants to place an adver(cid:173)
`tisement (e.g., in a publication, such as a physical or virtual
`magazine) carrying the telephone number of the marketplace
`and citing the user code. In that circumstance, an observer of
`the advertisement may contact the participant by placing a
`telephone call to the marketplace and entering the user code.
`The service/system then establishes the communication link
`to the participant, e.g., by placing the observer on hold,
`retrieving the participant's telephone number by association
`with the user code, contacting the participant and, once the
`participant is contacted and found to be available, connect(cid:173)
`ing the participant with the calling observer. In this manner,
`the observer does not know the actual phone number of the
`participant, thus preserving the participant's anonymity.
`
`[0028] This design is suitable for chat rooms where par(cid:173)
`ticipants talk to each other casually, and the system only
`needs to identify different participants. However, user code
`is not sufficient to identify and describe different transac(cid:173)
`tions having different transaction specifications and connec(cid:173)
`tion criteria among participants, as in the context of an
`information marketplace where participants buy and sell
`information.
`
`[0029] As still another example, a service or system sup(cid:173)
`porting integration of anonymity and voice communication
`may assign each user a contact code, the contact code
`identifying each user as a party to a scheduled voice com(cid:173)
`munication. The contact code may be one or more groups of
`alphanumeric characters (e.g., if the contact code comprises
`a call code and password, it may be provided as one or two
`numbers). In supporting contact codes, the service/system
`
`
`
`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`4
`
`enables the parties to place separate telephone calls (through
`the public switched telephone network or via the Internet) to
`the service/system (or related infrastructure) at a scheduled
`time. Upon connection with the service/system, each party
`enters their respective contact codes (e.g., through their
`telephone keypads). The service/system compares the con(cid:173)
`tact codes entered by the parties and connects the telephone
`calls if the contact codes are proper (e.g., the codes must
`either match exactly or match in accordance with predeter(cid:173)
`mined criteria).
`
`[0030] Yet another example is an extension of the contact
`code feature. In this case, the service/system creates, after
`the first successful connection between two parties, a record
`indicative of these two parties and/or of the connection.
`Based on that record, the service/system may be configured
`to connect either party to the other when, in the future, one
`party dials into the system and inputs their contact code.
`That is, the service/system places a call to the non-calling
`party, rather than requiring the non-calling party to dial in.
`In such case, the service/system may be configured to
`support (a) provision of information to the called party about
`the calling party, e.g., upon the service/system contacting the
`called party, (b) a request that the called party enter their
`contact code, (c) a combination of these. The service/system
`may be configured so that either or both parties may elect in
`or out of this feature.
`
`[0031]
`In addition to the shortfall of using user code, this
`method requires participants placing separate phone calls to
`the service/system at the same time.
`
`SUMMARY OF THE INVENTION
`
`[0032]
`It has now been recognized that the services/
`systems described above do not allow one or more parties to
`specify the nature of the transaction, e.g. with respect to time
`or time interval, billing arrangements, and other variables.
`
`[0033]
`In accordance with a first aspect of the invention
`there is provided a method of facilitating anonymous voice
`communication between a first station and a second station,
`at least the second station having an address for voice
`communication, the method comprising providing an inter(cid:173)
`face that allows input of a transaction specification from at
`least one of the first and second stations, generating a
`reference code associated with the transaction, there being a
`defined relationship between the reference code and said
`address, supplying the reference code to at least the first
`station, receiving a voice communication request from the
`first station, receiving the reference code from the first
`station, using the reference code to recover said address, and
`opening a channel for voice communication between said
`first and second stations, whereby voice communication can
`be established between the first and second stations without
`providing said address to the first station.
`
`[0034]
`In accordance with a second aspect of the invention
`there is provided a method of establishing anonymous voice
`communication between a first station and a second station,
`at least the second station having an address for voice
`communication, the method comprising supplying a trans(cid:173)
`action specification from at least one of the first and second
`stations to a controller, generating a reference code associ(cid:173)
`ated with the transaction at the controller, there being a
`defined relationship between the reference code and said
`address, supplying the reference code from the controller to
`
`at least the first station, making a voice communication
`request from the first station to the controller, supplying the
`reference code from the first station to the controller, using
`the controller to recover said address from the reference
`code, and opening a channel for voice communication
`between said first and second stations.
`
`[0035]
`In accordance with a third aspect of the invention
`there is provided an apparatus for facilitating anonymous
`voice communication between a first party and a second
`party, at least the second party having an address for voice
`communication, including a means for enabling negotiation
`of a transaction specification, a means for generating a
`reference code, there being a defined relationship between
`the reference code and said address, and for supplying the
`reference code to the first party, a means for receiving a
`voice communication request from the first party and for
`receiving the reference code from the first party, a means for
`using the reference code to recover said address, and a
`means for opening a voice communication channel between
`said first party and said address without supplying said
`address to the first party.
`
`[0036] A preferred embodiment of the invention facilitates
`anonymous voice communication between parties involved
`in online transactions.
`
`[0037]
`In a preferred embodiment of the invention, either/
`both parties are able to schedule individually or in coordi(cid:173)
`nation one or more future (and/or immediate) appointments
`for voice communication while preserving anonymity.
`
`[0038] A preferred embodiment of the invention allows
`transacting parties to specify their mutually agreed connec(cid:173)
`tion criteria, such as connection time frame, which party
`should initiate the connection, charging method and duration
`of the communication. Referring to the example of an expert
`community, experts are not restricted to their office hours
`without knowing when, if ever, they will be contacted by the
`system for servicing a user request. On the other hand, users
`would be able to have access to all