throbber
111111
`
`(19) United States
`(12) Patent Application Publication
`Liu et al.
`
`(54) APPARATUS, METHODS AND SYSTEMS
`FOR ANONYMOUS COMMUNICATION
`
`(76)
`
`Inventors: Christina Ying Liu, Vancouver, WA
`(US); William Ho Chang, Vancouver,
`WA(US)
`
`Correspondence Address:
`SMITH-HILLAND BEDELL
`12670 N W BARNES ROAD
`SUITE 104
`PORTLAND, OR 97229
`
`(21) Appl. No.:
`
`09/947,116
`
`(22) Filed:
`
`Sep. 4, 2001
`
`Related U.S. Application Data
`
`(63) Non-provisional of provisional application No.
`60/230,021, filed on Sep. 5, 2000.
`
`11111111111111111111111111111111111111111111111111111111111111
`US 20020027901Al
`
`(10) Pub. No.: US 2002/0027901 Al
`Mar. 7, 2002
`(43) Pub. Date:
`
`Publication Classification
`
`Int. Cl? ..................................................... H04L 12/66
`(51)
`(52) U.S. Cl. ........................... 370/352; 370/338; 370/349
`
`ABSTRACT
`(57)
`Anonymous voice communication between a first station
`and a second station is facilitated by providing an interface
`that allows input of a transaction specification from at least
`one of the first and second stations. A reference code
`associated with the transaction is generated, there being a
`defined relationship between the reference code and the
`address of the second station for voice communication. The
`reference code is supplied to the first station, and a voice
`communication request and the reference code are received
`from the first station. The reference code is used to recover
`said address and a channel for voice communication is
`opened between said first and second stations. Voice com(cid:173)
`munication can thereby be established between the first and
`second stations without providing the address of the second
`station to the first station.
`
`PACKET DATA
`NETWORK
`
`TRANSACTION
`SPECf!CAT10N
`32
`
`20
`
`14
`
`22
`
`WEB
`SERVER 1
`
`WEB
`SERVERn
`
`CONTROLLER
`UNIT
`
`)
`I
`I
`
`CQNt.ECT10N
`NSTRIXTION
`34
`
`30
`
`I
`
`I
`I
`I
`
`~~
`
`I
`I
`I
`I
`I
`
`I . I • \
`
`' '
`
`,.---.I-=--v-'6
`INTERNET
`ENABLED
`DEVICE
`
`\
`
`\r5
`
`I
`I
`\
`I
`I
`1
`I
`I
`
`I
`
`/
`
`)
`I
`I
`I
`I
`I
`I
`I
`I
`I
`\
`\
`
`.----------'----¥~
`\
`VOICE
`' ' ENABLED
`DEVICE
`
`I
`I
`
`I
`I
`
`Apple Inc. 1008
`U.S. Patent No. 9,445,251
`
`

`

`Patent Application Publication Mar. 7, 2002 Sheet 1 of 6
`
`US 2002/0027901 A1
`
`INTERNET
`ENABLED
`DEVICE
`
`I
`I
`I
`
`1~
`
`I
`I
`I
`l
`I
`\
`
`' I
`' \
`
`I
`
`\
`
`J
`I
`J
`
`PACKET DATA
`NETWORK
`
`20
`
`14
`
`WEB
`SERVER 1
`
`WEB
`SERVERn
`
`71.
`
`®.ECOON
`tlSTRUCIDN
`34
`
`CONTROLLER
`UNIT
`
`CON!'ETION
`NSTRU:TION
`34
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`\
`I
`\
`\
`\
`\
`
`COIIM.NCATION
`lt1ANAGEMfNT
`
`30
`
`FIG.1
`
`INTERNET
`ENABLED
`DEVICE
`
`6
`
`\
`
`\
`
`\('5
`
`I
`
`I
`I
`
`/
`
`I
`
`VOICE
`ENABLED
`DEVICE
`
`

`

`Patent Application Publication Mar. 7, 2002 Sheet 2 of 6
`
`US 2002/0027901 Al
`
`~ I
`~ <0
`~
`I
`~--r-
`
`1
`
`I
`I
`I
`I
`I
`I
`I
`c::
`I
`~ 5c
`._L..--------.--1 c:: z
`I
`I-::>
`z
`I 8
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`~-t---1
`~ L--~­
`I
`\J~
`I
`I ~
`I
`I
`'---. - - - - - - - - - - - - . - - - _j
`
`

`

`96
`
`94
`
`92
`
`90
`
`NETWORK
`INTERFACES
`
`POWER SYSTEM
`
`CLOCK SYSTEM
`
`SECURI1Y SYSTEM
`
`~24
`
`98
`
`0
`
`2
`
`PROCESSOR
`
`MEMORY
`
`OPERATING
`SYSTEM
`
`APPLICATIONS
`
`BUS
`
`VOICE PROCESSING l--89
`SYSTEM
`
`FIG. 3
`
`'t:l
`
`I")
`
`~ .....
`
`""C
`~ .....
`~ = .....
`>
`'t:l -....
`.... 0 =
`""C = -a -....
`.... 0 =
`
`I")
`
`~ .....
`
`~
`~
`;"i
`~-..J
`
`N c c
`
`N
`
`'JJ. =-~
`~ .....
`
`~
`0 ......,
`0'1
`
`Cj
`'JJ.
`
`N c c
`~ c c
`N
`-..J
`'0 c
`'"""' >
`'"""'
`
`

`

`Patent Application Publication Mar. 7, 2002 Sheet 4 of 6
`
`US 2002/0027901 Al
`
`118
`
`USE OTHER
`COMMUNICATION
`MEANS
`
`USERS CONDUCT ON-LINE
`TRANSACTIONS
`
`TRANSACTION
`SPECIFICATIONS
`SUBMITTED
`
`REQUEST
`ANONYMOUS VOICE
`CONVERSATION?
`
`SERVER PASSES CONNECTION
`INSTRUCTION
`
`110
`
`112
`
`116
`N
`
`120
`
`122
`
`CONTROLLER UNIT
`GENERATES REFERENCE CODE
`FOR CONNECTION
`
`124
`
`DELIVERY OF REFERENCE
`CODE AND OTHER
`INFORMATION
`
`ASSIGNED USER
`MANUALLY RECORDS
`THE CONFIRMATION
`
`CONFIRMATION
`AUTOMATICALLY STORED
`
`128
`
`FIG.4A
`
`

`

`Patent Application Publication Mar. 7, 2002 Sheet 5 of 6
`
`US 2002/0027901 Al
`
`140
`
`42
`
`CONNECTION PROGRAM
`REMINDS ASSIGNED USER
`OF THE CONNECTION
`
`CONNECTION PROGRAM
`AUTOMATICALLY MAKES
`CONNECTION
`
`ASSIGNED USER INPUTS
`REFERENCE CODE
`
`CONTROLLER UNIT
`RETRIEVES CONNECllON
`INSTRUCTION
`
`134
`
`36
`
`REJECT THE
`CONNECTION
`
`48
`
`CONTROLLER UNIT
`PROVIDES FURTHER
`ASSISTANCE
`
`152
`
`CONNECTION
`TIME, DURATION,
`SATISFACTION
`
`44
`
`CONTROLLER UNIT ROUTES
`THE CALL TO THE CALLED
`PARTY
`
`CONTROLLER UNIT
`TRANSMITS CONNECllON
`REPORTS
`
`FIG.4B
`
`

`

`REMINDER:
`You are scheduled to call fv. 1
`betweenG:1 0 pm
`to 6:30pm.(
`Do you want to be connected now?
`
`'112
`
`You are being
`connected
`
`FIG.5
`
`Do you want me to
`remind you by G :30pm?
`
`.....
`
`90
`
`EXPERT:J.Y.
`EXPERTISE: CAREER COACH
`CHARGING METHOD: $1.00/ MIN
`YOU HAVE REQUESTED TO BE
`CONNECTED IMMEDIATELY.
`PRESS NOW TO PROCEED.
`92
`
`--4
`
`FIG.6
`
`I")
`
`~ .....
`
`""C
`~ .....
`~ = .....
`~ 't:l -....
`.... 0 =
`~ -a -....
`.... 0 =
`
`I")
`
`~ .....
`
`~
`~ :-;
`~-..J
`
`N c c
`
`N
`
`'JJ. =(cid:173)~
`~ .....
`0'1
`0 ......,
`0'1
`
`Cj
`'JJ.
`
`N c c
`~ c c
`N
`-..J
`'0 c
`""""' >
`""""'
`
`

`

`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`1
`
`APPARATUS, METHODS AND SYSTEMS FOR
`ANONYMOUS COMMUNICATION
`
`CROSS-REFERENCE TO RELATED
`APPLICATION
`
`[0001] This application claims benefit of Provisional
`Application No. 60/230,021 filed Sep. 5, 2000, the entire
`disclosure of which is hereby incorporated by reference
`herein for all purposes.
`
`BACKGROUND OF THE INVENTION
`
`[0002] The Internet is a collection of computer networks
`from which users obtain and share information. The Internet
`has evolved from the ARPAnet to become the largest com(cid:173)
`puter network in the world. The Internet supports various
`services. Of these services, the World Wide Web (the
`"Web") and email are among the most widely used. Of these,
`the Web comprises a collection of hundreds of millions of
`documents ("Web pages") written in mark up languages
`such as HTML, XML, and WML.
`
`[0003]
`In Internet transmissions, Transaction Control Pro(cid:173)
`tocol/Internet Protocol ("TCP/IP") is the communication
`standard. TCP!IP is a suite of protocols enabling communi(cid:173)
`cation between each node of the network. With the increas(cid:173)
`ing bandwidth being offered by network carriers, not only
`data but also voice, audio and video are increasingly being
`transmitted through the network.
`
`[0004] The evolution of the Internet continues and, in so
`doing, drives Internet-related product development, includ(cid:173)
`ing in hardware, software and protocols. The Internet is
`extending in wireless communication and handheld devices.
`As an example, Internet-enabled cellular phones (such as
`smart and super phones) combine the features of cellular
`phones with the ability to access the Internet. As another
`example, certain personal digital assistants ("PDAs") are
`directed to couple standard features with wireless access to
`the Internet. These phones, PDAs and other handheld
`devices exploit protocols such as, but not limited to, WAP,
`Web clipping, HDML or CHTML. Through these Internet(cid:173)
`enabled devices, it is anticipated that users will not only
`place phone calls, organize their schedules and/or otherwise
`exploit the respective device's standard functionality, but
`also access the Internet for browsing the Web, obtaining
`information, communicating (e.g., via email) and the like. In
`so doing, it is also anticipated that the device's standard
`features and the Internet's benefits will both be enhanced.
`
`[0005] The evolution of the Internet also implicates an
`evolution, if not revolution, in the infrastructure of commu(cid:173)
`nication networks. Today, people generally obtain personal
`access to the Internet by dialing up Internet service provid(cid:173)
`ers; the dial up may be carried for example over circuit(cid:173)
`switched networks ("CSN"), typically via local telecommu(cid:173)
`nications providers. In dial up, CSNs establish a physical
`circuit, which is dedicated exclusively to the call between
`the parties.
`
`[0006] While generally available to users, CSNs appear to
`be in relative decline, being increasingly supplanted by
`packet-switched technologies. Packet-switched technolo(cid:173)
`gies significantly increase a network's speed and capacity. In
`packet-switched networks, traffic is digitized, compressed,
`and transported as packets. These networks enable the
`
`packets of a particular transmission to travel through various
`channels from source to destination. Moreover, these net(cid:173)
`works enable traffic in varied media types, including voice,
`audio, video, text, data and facsimile. In enabling the varied
`types, moreover, the networks may deploy technologies
`(e.g., ATM), which enable significant features, such as
`quality of service, wherein priorities are assigned to and
`among the media types (e.g., so that packets of voice
`communications arrive timely, thereby ensuring adequate
`fidelity for the conversation).
`
`[0007] Packet-switched networks follow open standards.
`Accordingly, these networks enhance the ability of service
`providers to deploy new services, including high-bandwidth
`services for Internet use or otherwise (e.g., television pro(cid:173)
`gramming and/or video on demand). By comparison, in
`circuit-switched networks, the call control functionality and
`the service logic tend to be buried within the switch.
`Moreover, the functionality generally is proprietary to the
`switch vendors. As such, new services generally are
`deployed at the discretion of the switch vendor, not the
`service providers.
`
`[0008]
`In addition to hardware, software, protocols and
`infrastructure, the evolution of the Internet also implicates
`development of new and improved services. Already, mar(cid:173)
`ketplaces on the Internet (i.e., virtual marketplaces) are well
`known and increasingly diverse in direction, content and
`business model. Ebay, Yahoo, E*Trade and Amazon are
`examples, each facilitating transactions, including the sell(cid:173)
`ing, buying and auctioning of merchandise and the provision
`of services, with and among enterprises and individuals. The
`merchandise and services comprise a wide variety, from
`books to automobiles, to stocks, to calendaring, that seems
`ever expanding in breadth.
`
`[0009] Overcoming the geographic constraints of physical
`proximity, the Internet also introduces increasing and new
`opportunities for people to meet and interact with each other.
`Communities on the Internet (i.e., virtual communities) are
`well known and increasingly diverse in style, content and
`target participants. Virtual communities typically offer ser(cid:173)
`vices and associated tools, such as chat rooms, email and
`Web publishing. Through these services and tools, virtual
`communities enable their participants to communicate,
`including to express their respective views, share common
`interest(s) and otherwise interact as if in the physical world,
`and increasingly in ways not available in the physical world.
`
`[0010] Virtual marketplaces may facilitate the exchange or
`trading of ideas, knowledge and information between and
`among individuals and entities (sometimes referred to col(cid:173)
`lectively herein as "participants"). These virtual market(cid:173)
`places ("information marketplaces") tend to have an express
`or implied premise, understanding or foundation: individu(cid:173)
`als and entities have one or more interests and/or areas of
`expertise that can or should be (a) shared with or provided
`to participants, (b) nurtured/advanced by interaction with
`participants, and/or (c) otherwise communicated to or with
`other participants for some derived benefit of either or both
`participants.
`
`[0011]
`In an example of a transaction in a contemplated
`information marketplace, a participant (the "initiator") posts
`a question, inquiry or view ("posting") at a selected Web site
`of the marketplace. The initiator has the goal of obtaining
`one or more of answers, information, direction, responses or
`
`

`

`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`2
`
`interaction ("response") from or with one or more partici(cid:173)
`pants. The initiator may choose to direct the posting to
`selected participants ("experts"). The initiator preferably is
`enabled to select experts based on the experts'identified or
`claimed interest/expertise. The initiator may have identified
`interests and expertise. Indeed, the initiator may also be an
`expert in the marketplace and, conversely, the expert may
`also be an initiator in the marketplace.
`[0012] A contemplated information marketplace prefer(cid:173)
`ably supports provision of the qualifications or characteris(cid:173)
`tics of its experts, initiators and/or participants and may do
`so variously. In an example case, the marketplace publishes
`qualifications/characteristics (e.g., on Web sites or page(s)).
`The qualifications/characteristics may be mandated or vol(cid:173)
`untary, or a combination. The qualifications/characteristics
`may, particularly in the case of initiators, be selectable by the
`participant. The qualifications/characteristics may include
`various data, such as, among others, profile descriptions,
`transaction history (e.g., in the marketplace), ratings (e.g.,
`marketplace, participant, expert and/or initiator provided),
`comments and reviews (e.g., marketplace, participant,
`expert and/or initiator provided), fee schedules or other
`forms of pricing. Profile descriptions may include, among
`other things, certifications (e.g., marketplace, professional,
`or governmental), specialties, sub-area(s) of interest/exper(cid:173)
`tise, education, years of practice, awards, geographic loca(cid:173)
`tion, and geographic scope or limitation on the interest/
`include(cid:173)
`expertise. Profile descriptions may
`also
`particularly for initiators--qualifications or characteristics
`in the field of the posting, transaction history in the field of
`the posting, credit rating, age, education level, and geo(cid:173)
`graphic location.
`
`[0013] Once an initiator selects one or more experts, a next
`step is to establish a communication link between the
`initiator and an expert for posting and response (an "infor(cid:173)
`mation transaction"). A communication link may be vari(cid:173)
`ously provided, including via email, online chat and instant
`messaging. However, a drawback of email is that it relies on
`text communication (e.g.,
`typing), with
`its attendant
`mechanical challenges. Another drawback of email is the
`time lag ("latency") between sending an email and receiving
`a response. Yet another drawback of email is that it has a low
`level of interactivity and, as such, tends to be impersonal,
`ambiguous and inefficient in communication. Accordingly,
`email tends to hinder experts in providing a response,
`particularly one suited to and satisfying of the initiator's
`needs.
`[0014] Online chat and instant messaging tend to be more
`interactive than email. Even so, each also again relies on text
`communication. Moreover, by their nature, chat and instant
`messaging tend to introduce an emphasis on speed in that
`text communication (e.g., fast typing). This emphasis gen(cid:173)
`erally is undesirable. Indeed, this emphasis can be a sub(cid:173)
`stantial hindrance for people either who are not familiar or
`adept with keyboards, who are physically excluded from
`keyboard use and/or whose written language is not based on
`Roman characters (e.g., those using symbol-based written
`languages, such as Chinese). Moreover, this emphasis may
`be specifically undesirable and the hindrance exacerbated in
`the context of an information instruction (e.g., initiators
`and/or experts in an information marketplace find the
`emphasis on rapid typing to be detrimental to an information
`instruction).
`
`[0015] Given these drawbacks, a contemplated informa(cid:173)
`tion marketplace preferably supplants or supplements email,
`online chat and instant messaging with other forms of
`Internet-based or Internet-related communication. Such
`forms of communication typically rely-at least in part-an
`voice communication. These forms include audio and/or
`audio/video conferencing, with or without text communica(cid:173)
`tion. These forms are desirable in their enhanced interactiv(cid:173)
`ity, reduced latency and de-emphasis on writing, particularly
`rapid writing. As such, these forms tend to provide more
`personal, direct, clear and efficient communication. These
`forms are simply more natural. Accordingly, these forms
`tend to be particularly desirable for initiators and experts
`alike in the context of an information marketplace.
`[0016] Although voice communication tends to be more
`direct, efficient and otherwise desirable than e-mail, chat,
`and instant messaging, voice communication also tends to
`have some drawbacks. In particular, voice communication
`generally is subject to a lower level of anonymity (whether
`real or perceived) than is typically associated with each of
`email, chat and instant messaging.
`[0017] Anonymity typically characterizes interaction and
`other communication via the Internet. For example, people
`are enabled to interact and otherwise communicate in cyber
`space without revealing much, if any, personal information,
`such as legal names or phone numbers.
`[0018]
`Internet users tend to prefer anonymity for various
`reasons. As an example, an employee using the Internet to
`search for a new job desires anonymity so as to preclude any
`revelation of their identity to a current employer, supervisors
`and/or colleagues. As another example, an individual who
`has provided personal financial data to an online planner
`may desire anonymity so that the data is not associated with
`the individual's identity (such association potentially trans(cid:173)
`forming the raw data into valuable information). As yet
`another example, members of Internet communities use
`various kinds of substitute names (e.g., aliases, nicknames or
`user names) in communicating with each other.
`
`[0019] The shortfall of anonymity in voice communica(cid:173)
`tions -particularly conversations conducted via the stan(cid:173)
`dard telephone system-tends to introduce problems with
`privacy, particularly expectations of privacy. A common
`such problem is the receipt of unwanted phone calls. These
`unwanted calls can be annoying (e.g., telephone calls from
`tele-marketers), disturbing (e.g., contact from objectionable
`political organizations) and even frightening (e.g., intrusions
`from ostensibly dangerous individuals). Perhaps because
`voice communication is direct, unwanted calls tend to be
`difficult to terminate. Perhaps because telephone conversa(cid:173)
`tions are more personal, people tend not to fully block,
`automatically reject or otherwise absolutely deal with calls
`from unknown sources, which calls have a tendency to be
`unwanted but which could cause desirable or important calls
`to be missed (e.g., a friend of family member calling for
`emergency assistance).
`[0020] Based at least in part on concerns about unwanted
`calls, people remain reluctant to disclose their phone num(cid:173)
`bers, particularly their home telephone and personal cellular
`numbers. This reluctance also tends to reflect, at least in part,
`the perception that phone numbers enable the recipients to
`more readily discover personal information about the person
`that disclosed the number, such as name and physical
`
`

`

`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`3
`
`address. This reluctance also tends to result in slow accep(cid:173)
`tance and lesser use among Internet users of voice commu(cid:173)
`nication (i.e., as compared to email, chat and instant mes(cid:173)
`saging), whether such communication is Internet-based or
`Internet-related (e.g., via standard telephone service (also
`known as the plain old telephone system ("POTS")), but
`initiated by or in connection with Internet services).
`
`[0021]
`It is desirable, then, to integrate voice communi(cid:173)
`cation and anonymity. An example of such integration may
`be illustrated in the context of an information marketplace.
`There, an initiator determines to conduct an information
`instruction with a selected expert via voice communication.
`To do so, the initiator submits a request for voice commu(cid:173)
`nication with the selected expert, the submission being
`through the Internet to the operator or other infrastructure of
`the information marketplace (or other service or system that
`supports linking by voice communication). The marketplace
`contacts the selected expert. The contact may be via (a) the
`Internet, so as to support voice communication as voice over
`Internet protocol ("VoiP") or (b) telephone service. In either
`case, if the contact results in establishing a voice commu(cid:173)
`nication link with the expert, the marketplace maintains that
`link (e.g., puts the expert on hold) while establishing voice
`connection with the initiator before connecting the expert
`and the initiator. The marketplace makes that connection, in
`one case, by linking the initiator and the expert over the
`Internet, with the marketplace either interposed in the trans(cid:173)
`mission of packets or enabling direct transmission. In
`another case, the marketplace bridges between the initiator
`communicating over the Internet (e.g., VoiP) and the expert
`communicating via standard telephony. In yet another case,
`the marketplace connects by contacting the initiator by
`telephone and, once the initiator is on the line, connecting
`the initiator with the expert who is also linked by telephone.
`In each and any case, a connection is made and voice
`communication is enabled, characterized by enhanced sup(cid:173)
`port for anonymity.
`
`[0022]
`Integration of anonymity and voice communication
`in this form tends to have shortfalls. One of the shortfalls is
`that a party may be contacted, without advance notice and at
`any time by the marketplace, responsive to any initiator's
`request. That scope of contact tends to deprive the contacted
`party of control over their respective schedules, which in
`turn, tends to degrade productivity and efficiency in their
`work and to reduce the quality of their personal time. Indeed,
`without advance notice of calls in an information market(cid:173)
`place, an expert may be induced to keep the telephone
`proximate at all times, so as to either take calls in interrup(cid:173)
`tion of other work or play and/or to forestall work or play in
`anticipation of calls (e.g., calls that might never arise). This
`tends to have enhanced relevance in the commercial or
`professional context, wherein the expert seeks to provide
`high quality and highly responsive service to clients (e.g.,
`initiators) so as to, among other things, keep clients satisfied
`and otherwise happy with the provided services (e.g., to
`avoid unanswered calls).
`
`[0023] One solution to this shortfall is to support specified
`times and/or time range(s) during which a party (e.g., an
`expert of an information marketplace) is committed to be
`available for receipt of calls from the information market(cid:173)
`place. In the information marketplace, these times and
`ranges are office hours. During an expert's office hours, the
`expert commits, or even guarantees, to be present to receive
`
`calls from the marketplace. At the same time, the expert
`benefits by enhanced knowledge of and personal control
`over, when such calls, if any, may arise.
`
`[0024] This solution, however, also has shortfalls. In the
`information marketplace, one shortfall is its tendency to
`reduce, from an already finite number of experts available
`via the marketplace, the number of experts actually available
`at any given time. That is, at any given time, it is to be
`expected that, via the marketplace, less than all of the
`experts are within their office hours. Moreover, even if a
`particular expert is within their office hours, a reduced
`supply of experts will tend to reduce the frequency at which
`requests result in a connection (e.g., the expert will have an
`increased chance of being busy with another, earlier initia(cid:173)
`tor).
`
`[0025] Another shortfall is that the initiator will generally
`attempt to contact the expert promptly, if not immediately or
`substantially immediately, after indicating interest in con(cid:173)
`tact, and this might not be convenient for the expert even if
`the initiator attempts to make contact within the expert's
`office hours.
`
`[0026] As another example, a service or system supporting
`integration may assign individuals and entities respective
`user codes, each of which uniquely identifies the particular
`user. To support such codes, the service/system stores the
`codes, e.g., in one or more databases. Preferably, the service/
`system associates the codes with the telephone number
`and/or contact information of the respective individuals and
`entities.
`
`[0027] The service/system may use the user codes vari(cid:173)
`ously. For example, in a virtual chat room context, the
`service/system may enable participants to place an adver(cid:173)
`tisement (e.g., in a publication, such as a physical or virtual
`magazine) carrying the telephone number of the marketplace
`and citing the user code. In that circumstance, an observer of
`the advertisement may contact the participant by placing a
`telephone call to the marketplace and entering the user code.
`The service/system then establishes the communication link
`to the participant, e.g., by placing the observer on hold,
`retrieving the participant's telephone number by association
`with the user code, contacting the participant and, once the
`participant is contacted and found to be available, connect(cid:173)
`ing the participant with the calling observer. In this manner,
`the observer does not know the actual phone number of the
`participant, thus preserving the participant's anonymity.
`
`[0028] This design is suitable for chat rooms where par(cid:173)
`ticipants talk to each other casually, and the system only
`needs to identify different participants. However, user code
`is not sufficient to identify and describe different transac(cid:173)
`tions having different transaction specifications and connec(cid:173)
`tion criteria among participants, as in the context of an
`information marketplace where participants buy and sell
`information.
`
`[0029] As still another example, a service or system sup(cid:173)
`porting integration of anonymity and voice communication
`may assign each user a contact code, the contact code
`identifying each user as a party to a scheduled voice com(cid:173)
`munication. The contact code may be one or more groups of
`alphanumeric characters (e.g., if the contact code comprises
`a call code and password, it may be provided as one or two
`numbers). In supporting contact codes, the service/system
`
`

`

`US 2002/0027901 Al
`
`Mar. 7, 2002
`
`4
`
`enables the parties to place separate telephone calls (through
`the public switched telephone network or via the Internet) to
`the service/system (or related infrastructure) at a scheduled
`time. Upon connection with the service/system, each party
`enters their respective contact codes (e.g., through their
`telephone keypads). The service/system compares the con(cid:173)
`tact codes entered by the parties and connects the telephone
`calls if the contact codes are proper (e.g., the codes must
`either match exactly or match in accordance with predeter(cid:173)
`mined criteria).
`
`[0030] Yet another example is an extension of the contact
`code feature. In this case, the service/system creates, after
`the first successful connection between two parties, a record
`indicative of these two parties and/or of the connection.
`Based on that record, the service/system may be configured
`to connect either party to the other when, in the future, one
`party dials into the system and inputs their contact code.
`That is, the service/system places a call to the non-calling
`party, rather than requiring the non-calling party to dial in.
`In such case, the service/system may be configured to
`support (a) provision of information to the called party about
`the calling party, e.g., upon the service/system contacting the
`called party, (b) a request that the called party enter their
`contact code, (c) a combination of these. The service/system
`may be configured so that either or both parties may elect in
`or out of this feature.
`
`[0031]
`In addition to the shortfall of using user code, this
`method requires participants placing separate phone calls to
`the service/system at the same time.
`
`SUMMARY OF THE INVENTION
`
`[0032]
`It has now been recognized that the services/
`systems described above do not allow one or more parties to
`specify the nature of the transaction, e.g. with respect to time
`or time interval, billing arrangements, and other variables.
`
`[0033]
`In accordance with a first aspect of the invention
`there is provided a method of facilitating anonymous voice
`communication between a first station and a second station,
`at least the second station having an address for voice
`communication, the method comprising providing an inter(cid:173)
`face that allows input of a transaction specification from at
`least one of the first and second stations, generating a
`reference code associated with the transaction, there being a
`defined relationship between the reference code and said
`address, supplying the reference code to at least the first
`station, receiving a voice communication request from the
`first station, receiving the reference code from the first
`station, using the reference code to recover said address, and
`opening a channel for voice communication between said
`first and second stations, whereby voice communication can
`be established between the first and second stations without
`providing said address to the first station.
`
`[0034]
`In accordance with a second aspect of the invention
`there is provided a method of establishing anonymous voice
`communication between a first station and a second station,
`at least the second station having an address for voice
`communication, the method comprising supplying a trans(cid:173)
`action specification from at least one of the first and second
`stations to a controller, generating a reference code associ(cid:173)
`ated with the transaction at the controller, there being a
`defined relationship between the reference code and said
`address, supplying the reference code from the controller to
`
`at least the first station, making a voice communication
`request from the first station to the controller, supplying the
`reference code from the first station to the controller, using
`the controller to recover said address from the reference
`code, and opening a channel for voice communication
`between said first and second stations.
`
`[0035]
`In accordance with a third aspect of the invention
`there is provided an apparatus for facilitating anonymous
`voice communication between a first party and a second
`party, at least the second party having an address for voice
`communication, including a means for enabling negotiation
`of a transaction specification, a means for generating a
`reference code, there being a defined relationship between
`the reference code and said address, and for supplying the
`reference code to the first party, a means for receiving a
`voice communication request from the first party and for
`receiving the reference code from the first party, a means for
`using the reference code to recover said address, and a
`means for opening a voice communication channel between
`said first party and said address without supplying said
`address to the first party.
`
`[0036] A preferred embodiment of the invention facilitates
`anonymous voice communication between parties involved
`in online transactions.
`
`[0037]
`In a preferred embodiment of the invention, either/
`both parties are able to schedule individually or in coordi(cid:173)
`nation one or more future (and/or immediate) appointments
`for voice communication while preserving anonymity.
`
`[0038] A preferred embodiment of the invention allows
`transacting parties to specify their mutually agreed connec(cid:173)
`tion criteria, such as connection time frame, which party
`should initiate the connection, charging method and duration
`of the communication. Referring to the example of an expert
`community, experts are not restricted to their office hours
`without knowing when, if ever, they will be contacted by the
`system for servicing a user request. On the other hand, users
`would be able to have access to

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket