`
`(43) Date of A Publication 20.02.2002
`
`(51)
`
`INT CL7
`H04M 3/42
`
`(52) UK CL (Edition T)
`H4K KF54
`
`(56)
`
`Documents Cited
`EP 0719059 A2
`EP 0520194 A2
`WO91/11874 A1
`US 5329578A
`
`EP 0531268 A2
`EP 0152908 A2
`WO 91/07838 A1
`
`(58)
`
`Field of Search
`UK CL (Edition S ) H4K KF54
`INT CL7 H04M 1/57 3/42, H04O 3/00
`Online databases: WPI, EPODOC, PAJ
`
`(21) Application No 0106915.2
`
`(22) Date of Filing 20.03.2001
`
`(30) Priority Data
`(31) 0006614
`
`(32) 20.03.2000
`
`(33) GB
`
`(71) Applicant(s)
`Pressurecell Limited
`(Incorporated in the United Kingdom)
`Heron House, Albert Square, MANCHESTER,
`M60 SGT, United Kingdom
`
`(72)
`
`lnventor(s)
`Andrew David Kirkwood
`
`(74) Agent and/or Address for Service
`Wilson Gunn M'Caw
`41-51 Royal Exchange, Cross Street, MANCHESTER,
`M2 78D, United Kingdom
`
`(54) Abstract litle
`Improved communication system
`
`(57) A communication system which enables users to communicate with each other includes a unique user
`identification code assigned to each user. The system also includes an information storage device which
`stores each unique user identifier and associated with each user identifier as a user profile which provides
`routing information for communication between respective users.
`
`I Emeraencv I
`I
`I Default
`I Mobile
`I Wor11
`Home
`
`I
`
`I
`
`I
`
`Country
`Tel.Number
`Voice Mail
`Fax
`Address
`
`Posti:ode
`Contact Categories
`
`1 ,~1
`kmv•.~I
`777iJYI
`Jt;p I' , •
`
`l~~e--'L I
`
`~
`
`Fnii.2b
`
`Bus,iess Ass. I Friends
`Wor11
`Access
`Mobile
`Emergency
`
`Access Profiles
`
`lfamilv
`Mon-Fri
`Mon-Fri
`Sat
`Sun
`
`IMore
`8am-8pm Work
`8prn-8am Mobile
`Work • Voice mai
`Wor11- Voice mai
`Fn!,2c
`
`G)
`CD
`
`Name
`
`String ID
`
`1~1
`
`Ian Jones
`Ga!y Rodgers
`ga,ythefish
`Tamara Maw
`tamaram
`Jase Fisher
`janefisher2
`Personal Contact Ust
`
`VAN
`
`Ac=Profile
`
`✓
`Friend
`✓ Business Ass.
`I
`I
`✓ Famly
`X
`Barred
`fi,f,2d
`
`D&
`Password
`
`Personal
`Communication
`Profile
`
`Personal
`Contact
`List
`
`~2a
`
`At least one drawing originally filed was informal and the print reproduced here is taken from a later filed formal copy.
`
`This print takes account of replacement documents submitted after the date of filing to enable the application to comply
`with the formal requirements of the Patents Rules 1995
`
`)>
`
`
`
`(12) UK Patent Application (19) GB (11) 2 365 664 (13) A
`
`(43) Date of A Publication 20.02.2002
`
`(51)
`
`INT CL7
`H04M 3/42
`
`(52) UK CL (Edition T)
`H4K KF54
`
`(56)
`
`Documents Cited
`EP 0719059 A2
`EP 0520194 A2
`WO91/11874 A1
`US 5329578A
`
`EP 0531268 A2
`EP 0152908 A2
`WO 91/07838 A1
`
`(58)
`
`Field of Search
`UK CL (Edition S ) H4K KF54
`INT CL7 H04M 1/57 3/42, H04O 3/00
`Online databases: WPI, EPODOC, PAJ
`
`(21) Application No 0106915.2
`
`(22) Date of Filing 20.03.2001
`
`(30) Priority Data
`(31) 0006614
`
`(32) 20.03.2000
`
`(33) GB
`
`(71) Applicant(s)
`Pressurecell Limited
`(Incorporated in the United Kingdom)
`Heron House, Albert Square, MANCHESTER,
`M60 SGT, United Kingdom
`
`(72)
`
`lnventor(s)
`Andrew David Kirkwood
`
`(74) Agent and/or Address for Service
`Wilson Gunn M'Caw
`41-51 Royal Exchange, Cross Street, MANCHESTER,
`M2 78D, United Kingdom
`
`(54) Abstract litle
`Improved communication system
`
`(57) A communication system which enables users to communicate with each other includes a unique user
`identification code assigned to each user. The system also includes an information storage device which
`stores each unique user identifier and associated with each user identifier as a user profile which provides
`routing information for communication between respective users.
`
`I Emeraencv I
`I
`I Default
`I Mobile
`I Wor11
`Home
`
`I
`
`I
`
`I
`
`Country
`Tel.Number
`Voice Mail
`Fax
`Address
`
`Posti:ode
`Contact Categories
`
`1 ,~1
`kmv•.~I
`777iJYI
`Jt;p I' , •
`
`l~~e--'L I
`
`~
`
`Fnii.2b
`
`Bus,iess Ass. I Friends
`Wor11
`Access
`Mobile
`Emergency
`
`Access Profiles
`
`lfamilv
`Mon-Fri
`Mon-Fri
`Sat
`Sun
`
`IMore
`8am-8pm Work
`8prn-8am Mobile
`Work • Voice mai
`Wor11- Voice mai
`Fn!,2c
`
`G)
`CD
`
`Name
`
`String ID
`
`1~1
`
`Ian Jones
`Ga!y Rodgers
`ga,ythefish
`Tamara Maw
`tamaram
`Jase Fisher
`janefisher2
`Personal Contact Ust
`
`VAN
`
`Ac=Profile
`
`✓
`Friend
`✓ Business Ass.
`I
`I
`✓ Famly
`X
`Barred
`fi,f,2d
`
`D&
`Password
`
`Personal
`Communication
`Profile
`
`Personal
`Contact
`List
`
`~2a
`
`At least one drawing originally filed was informal and the print reproduced here is taken from a later filed formal copy.
`
`This print takes account of replacement documents submitted after the date of filing to enable the application to comply
`with the formal requirements of the Patents Rules 1995
`
`)>
`
`
`
`,,.--_,
`
`..
`
`r
`
`. ..
`. ..
`. . . ... . .
`. ..
`. . .
`. . . . . .
`. .
`
`•
`
`• • •
`
`,.. ,r
`
`•
`
`•
`
`.---userA---
`1
`
`-11-
`
`-13-
`
`-16-
`
`--userB--
`.....
`1
`1
`
`-12-
`
`-14-
`
`-17-
`
`-18-
`
`-19-
`
`F,g_1_
`
`D&
`Password
`I
`
`I
`Personal
`Contact
`List
`
`I
`Personal
`Communication
`Profile
`
`F~.2a
`
`
`
`. ..
`. ..
`. . . ... . . . ..
`. . .
`. . . . . .
`. . .
`
`e ~ •
`
`•
`
`•
`
`•
`
`• • •
`
`Mobile
`Work
`Home
`Country
`Tel. Number
`Voice Mail
`Fax
`Address
`
`Postcode
`Contact Categories
`
`~ /' r,,/J I
`1111~·- -
`!th-I)"'- - :::-,,, -c...2 .. Adl
`' - J\c-!\ [\ '!
`
`!Ckkk V
`
`1
`
`-
`
`•
`
`I'' ' ,,',; k- -::: ~
`f&/ki,, 1
`,~--Z"'lJ'.Yj
`I ~--.. --Z'.:A I
`FIE:i.2b
`
`Business Ass. I Friends
`Work
`Access
`Mobile
`Emergency
`
`Access Profiles
`
`!Family
`Mon-Fri
`Mon-Fri
`Sat
`Sun
`
`I More
`8am-8pm Work
`8pm-8am Mobile
`Work - Voice mail
`Work - Voice mail
`
`Fn-!:i.2c
`
`Name
`
`String ID
`
`VAN
`
`Access Profile
`
`ijones21
`Ian Jones
`garythefish
`Gary Rodgers
`tamaram
`Tamara Maw
`janefisher2
`Jane Fisher
`Personal Contact List
`
`Friend
`Business Ass.
`Family
`Barred
`
`✓
`✓
`✓
`X
`F,..l,_2d
`
`
`
`2365664
`
`-1-
`
`IMPROVEP COMMUNICATION SYSTEM
`
`The
`
`invention relates to an
`
`improved communication system
`
`particularly although not exclusively for use with a telecommunications
`
`network.
`
`5
`
`Communication over telecommunication networks is well known and
`
`such communication can be voice or data communication using various
`
`system devices for example, telephones (fixed line or mobile) and/or
`
`personal computers (PC's) linked to the network. Each system device linked
`
`to the network is required to be uniquely identified on the network. For
`
`10
`
`example, each telephone linked to the telecommunication network is
`
`identified by a unique multiple digit telephone number. Communication
`
`between telephones over the network is effected by identifying to the
`
`network, the unique identification of the telephone with whom contact is
`
`desired to be made. Similarly, for data communication using PC's over the
`
`15
`
`telecommunication network, each computer linked to the network is
`
`uniquely identified by an Internet protocol address and communication
`
`between computers over the network is effected by reference to that
`
`Internet protocol address. Further each user of each computer is uniquely
`
`identified by an e-mail address and communication between respective users
`
`20
`
`is effected by reference to that e-mail address.
`
`A problem arises insofar as a single user of a telecommunication
`
`network may use a number of different system devices to communicate
`
`
`
`-2-
`
`over the network and thus, for example, a user may use voice and/or data
`
`communication over the network using a PC, fixed line and/or mobile
`
`telephone. In these circumstances such a user will require a multiplicity of
`
`unique identifiers, one for each of the devices used for communication over
`
`5
`
`the network. This means that for each user of a network there can be
`
`many different unique identifiers associated with that user.
`
`A simple example of this would be where a user has a fixed line
`
`telephone at home with a first unique telephone number, a personal mobile
`
`telephone with a second unique telephone number, a fixed line telephone at
`
`10
`
`work with a third unique telephone number and a PC at home for data
`
`communication, for example, by electronic mail (e-mail} with a fourth unique
`
`identifier in the form of an e-mail address.
`
`It is an object of the present invention to provide an improved
`
`communication system, particularly but not exclusively for use over a
`
`15
`
`telecommunications network, in which each user, no matter how many
`
`system devices they use to communicate over the network, can be
`
`identified by one unique identifier which permits communication with any
`
`one or more of the users system devices linked to the network.
`
`Thus and in accordance with a first aspect of the present invention
`
`20
`
`therefore there is provided an improved communication system comprising
`
`a plurality of system communication devices each having assigned thereto
`
`a unique device identifier which identifies each respective communication
`
`
`
`. . . .
`
`t
`
`~
`
`'
`
`.
`
`,,
`
`·,
`
`I
`
`-3-
`
`device on the system, each of said system devices being linked via a
`
`telecommunication network, and an information storage device through
`
`which all communication between respective system devices is routed,
`
`wherein said storage device includes a unique user identifier for each user
`
`5
`
`of any one or more of said system devices and associated with each user
`
`identifier
`
`is a user profile which defines
`
`routing
`
`information
`
`for
`
`communication between respective users.
`
`With this arrangement it is possible to provide a communication
`
`system in which each user is identifiable by a single identifier regardless of
`
`10
`
`the number of system devices they operate and communication can be
`
`made with that user using selected ones of the system devices by use of
`
`the single user identifier.
`
`Thus and in accordance with a second aspect of the present invention
`
`therefore there is provided a communication system which enables users to
`
`15
`
`communicate with each other, each respective user having a unique user
`
`identification code assigned thereto, said system including an information
`
`storage device which stores each said unique user identifier and associated
`
`with each user identifier is a user profile which provides routing information
`
`for communication between respective users.
`
`20
`
`The invention will now be described by way of example only and with
`
`reference to the accompanying drawings in which:
`
`Fig. 1
`
`shows a diagrammatic representation of one form of
`
`
`
`-4-
`
`communication system in accordance with the present
`
`invention; and
`
`Figs. 2a-2d show, in schematic form, the manner in which data is
`
`stored in the data storage device of the system of Fig.
`
`5
`
`1.
`
`Referring now to Fig. 1, there is shown one form of communication
`
`system
`
`in accordance with
`
`the present
`
`invention
`
`for use with a
`
`telecommunications network.
`
`The system 10 includes a plurality of devices under the control of
`
`10
`
`user A and a plurality of devices under the control of user B linked to a
`
`telecommunications network 18. Each of the system devices can comprise
`
`one or more of the following devices,
`
`fixed
`
`line telephones, mobile
`
`telephones and/or personal computer
`
`(PC)
`
`for data and/or voice
`
`communications over the network. For the purposes of explanation of the
`
`15
`
`system, the embodiment described will be a system in which each of user
`
`A and B communicate over the network using a fixed line telephone 11, 1 2
`
`a mobile telephone 13, 14 and a personal computer 16, 17.
`
`Each of the devices under the control of user A and user B are linked
`
`via a telecommunications network 18 and are also linked by the network 1 8
`
`20
`
`to a data storage device 19 in the form of a remote server.
`
`Whilst for ease of explanation only two users A and B are shown in
`
`the drawing, it will, of course, be appreciated that any number of users can
`
`
`
`. . ... ,.
`
`"'
`
`. '
`
`-5-
`
`use the system and each of these users may have as many devices linked
`
`to the telecommunications network for communication as is necessary or
`
`desirable for their purposes.
`
`Each of the devices linked to the network 18 have a unique device
`
`5
`
`identifier which identifies that device on the network. Thus for example,
`
`each fixed line or mobile telephone has a unique telephone number
`
`associated therewith and each PC which is connected to the system has a
`
`unique Internet protocol address and each user of each computer has a
`
`unique electronic mail address which identifies that computer or user of the
`
`10
`
`computer on the network 18. In practice, each PC will be connected to the
`
`telecommunications network 18 via one or more Internet service providers
`
`(ISP) who will provide a link to the telecommunications network.
`
`The telecommunications network 18 comprises a worldwide network
`
`which allows data and voice transmission across the network from any
`
`15
`
`number of devices connected thereto.
`
`The data storage device 19 comprises a remote computer server
`
`upon which is held, in database format, information relating to each system
`
`user, i.e. user A and user Bin the embodiment described.
`
`Referring now to Fig. 2.
`
`20
`
`In the database held on the remote server 19, each user of the
`
`system is assigned a unique user identification code which can identify that
`
`user uniquely on the telecommunications network 18. Each user of the
`
`
`
`-6-
`
`system is also assigned a suitable password which is retained in the
`
`database associated with the unique user identification code.
`
`Associated with each unique user identification code and password
`
`within the database are two further sets of information. Firstly, information
`
`5
`
`regarding the user is stored in the database as a personal communication
`
`profile. The information stored in the profile is stored in accordance with
`
`5 different fields.
`
`In the particular embodiment described, these fields are
`
`identified as home, work, mobile, default and emergency fields, however,
`
`it will be appreciated that in practice, these fields can contain any desired
`
`10
`
`information as necessary or as deemed appropriate and indeed any number
`
`of fields can be used to store information in the profile as desired. A
`
`representation of one example of a personal communication profile is shown
`
`in Fig. 2b. Each field can contain sub-fields containing further information
`
`in relation to a user relating to that field.
`
`15
`
`By way of example, and as shown more clearly in Fig. 2b, the home
`
`field can contain the following sub-fields.
`
`20
`
`1 .
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`Country of location of the user;
`
`Home telephone number of the user;
`
`Voicemail telephone number for the user;
`
`Home facsimile telephone number for the user;
`
`Home address for the user; and
`
`Postcode of the home address of the user.
`
`
`
`..
`
`~ i
`
`•
`
`. . . .
`.
`
`•
`
`•
`
`1
`
`-7-
`
`7.
`
`Web site address for the user (not shown in the Figure).
`
`The work field can contain information relating to the users work and
`
`will in all probability contain similar sub-fields to those mentioned for the
`
`home field.
`
`5
`
`The mobile field contains information relating to the users mobile
`
`phone such as for example, the telephone number of the mobile phone and
`
`perhaps also the provider.
`
`The default field contains information concerning the default location
`
`where communication over the network 18 is to be directed in default
`
`10
`
`circumstances. The default location can comprise a home telephone
`
`number, mobile telephone number or any other number or device identifier
`
`as required or as necessary.
`
`The emergency field contains contact details for use in an emergency
`
`and may therefore contain similar details to those provided in the home field
`
`15
`
`and/or the unique user identification code of other users who are to be
`
`contacted in an emergency.
`
`Secondly, as shown in Fig. 2a, the database contains a second set
`
`of information determined by the user regarding other users with whom the
`
`user wishes to be able to communicate with over the network 18. This
`
`20
`
`information is contained within a personal contact list had in the database
`
`and each personal contact has information stored, for example in the
`
`following fields, relating to that contact, as shown in Fig. 2d. The
`
`
`
`information stored can be, for example:-
`
`-8-
`
`1 .
`
`2.
`
`3.
`
`Contact name;
`
`Unique user
`
`identification code on
`
`the system for that
`
`particular contact;
`
`Voice activation name {as hereinafter defined) for the contact;
`
`5
`
`and
`
`4.
`
`An access profile for that contact.
`
`The contact name field is self explanatory and simply contains a
`
`contact name. So far as the user identification code for the contact is
`
`10
`
`concerned, as previously explained, this field will contain the unique
`
`identification code which identifies the contact on the system.
`
`The voice activation name field contains, for each contact, a voice
`
`activation identifier. A voice activation name is a unique name given to
`
`each contact which, when a user is using voice communication on the
`
`15
`
`system enables the user to establish communication with the contact over
`
`the network simply by providing the voice activation name to the system.
`
`The access profile field is shown more clearly in Fig. 2c, and
`
`information relating to different categories according to which each contact
`
`in the contact list can be categorised. In the example shown, four fields are
`
`20
`
`provided which define four different categories of contact. Each category
`
`field includes sub-fields setting out which of the fields in the personal
`
`communication profile of the user are accessible to the contact and also the
`
`
`
`. ~
`
`'
`
`;
`
`- --
`
`times when such fields are available.
`
`-9-
`
`In Fig. 2c the access profile field in the database contains, for
`
`example, the following sub-fields although in practice any number of sub(cid:173)
`
`fields can be used as desired or as appropriate:-
`
`5
`
`1.
`
`2.
`
`3.
`
`Business associates;
`
`Friends; and
`
`Family.
`
`Each of these sub-fields may have additional sub-fields associated
`
`therewith to determine the fields, or sub-fields,
`
`from
`
`the personal
`
`10
`
`connection profile which each of these category of contacts have access to
`
`and at what times.
`
`Thus, for example, business associates may be permitted access to
`
`the work telephone number of a user, for example, from Monday to Friday
`
`between the hours of 8 am to 8 pm, and also the mobile telephone number
`
`15
`
`of the user between the same times and may be afforded access only to the
`
`emergency field at any other time. Contacts classified as friends or family
`
`will also have similar access profiles associated with them giving them
`
`access to the personal information profile on a basis defined by the user.
`
`The operation of the system of the invention will now be described
`
`20
`
`by reference to an example.
`
`In order to use the system, a user will subscribe to the system and
`
`when subscribing, each user will choose or will be allocated a unique user
`
`
`
`-10-
`
`identification code and each user will choose a password to be associated
`
`with this user identification code. After subscription, the user can access
`
`the system using any system device of the type mentioned above connected
`
`to the telecommunications network and access can be effected via voice or
`
`5
`
`data communication. Once a user has identified himself to the system
`
`correctly, by identifying the correct user identification code and password,
`
`the system will prompt the user to set up his personal communication profile
`
`by providing the information to the system and this information provided is
`
`stored in the relevant field in the database held on the remote server 19.
`
`10
`
`Similarly, the system will prompt the user to provide the information
`
`necessary for the personal contact list and the access profiles for each
`
`contact. Once this information has all been provided to the system, it is
`
`held in the database. The user is then in a position to use the system to
`
`communicate with other users.
`
`15
`
`Thus, if a first user, user A, wishes to communicate with a second
`
`user, user B, over the telecommunications network 18, the user contacts
`
`the system and may be required to provide their unique identification code
`
`and password which are then checked by the system with those held in the
`
`database on the remote server. Alternatively, it may be not be necessary
`
`20
`
`for user A to enter a password to enter the system, the system may be
`
`configured
`
`to
`
`recognise
`
`that
`
`the user
`
`identification code entered
`
`corresponds to the unique device identifier of the device used to access the
`
`
`
`-11-
`
`system in the personal communication profile of that user. The system will
`
`require a password to be entered for certain functions to be carried out, e.g.
`
`deletion or barring of names.
`
`If the information provided is correct user A is then allowed access
`
`5
`
`to the system. To contact user B, user A provides the system with the user
`
`identification code for user B.
`
`They system will then refer to the
`
`information held in the database in the contact name sub-field to ascertain
`
`whether user A is a known contact of user B. If user A is contained in the
`
`contact name sub-field of user B's contact list then the access profile field
`
`10
`
`for user B is referred to. Depending upon the category in which user B has
`
`assigned user A to in the access profile will determine the access which
`
`user A has to the fields of user B's personal communication profile. Thus
`
`if user A is a friend of user B, and is categorised as such in the access
`
`profile field, then user B may have determined that such contacts should be
`
`15
`
`allowed access to the home telephone field during the hours of 8 pm to 8
`
`am on Monday to Friday and the work telephone field between the hours of
`
`8 am to 8 pm. Thus if user A is using the system at 8.15 pm, his request
`
`to establish contact with user B will be directed to user B's home telephone.
`
`If user A meets a person at a social occasion who is not a known
`
`20
`
`contact and wishes to communicate with this person over the network 18,
`
`it will be necessary for the other person to subscribe to the system, if they
`
`have not done so already. Once they have subscribed to the system, user
`
`
`
`-12-
`
`A can give the person his unique user identification code.
`
`After receipt of user A's user identification code, the new contact can
`
`communicate with user A in the following manner. The new contact enters
`
`the system in the manner mentioned above and then provides the system
`
`5
`
`with user A's user identification code. The system will then ask the new
`
`contact to provide details which will be entered into the relevant field in the
`
`contact list of the new contact and these will be stored in the database.
`
`After all this information has been provided to the system, user A will
`
`appear on the contact list for the new contact and user A's contact details
`
`10
`
`will appear in the appropriate sub-fields to that field. The new contact can
`
`now make communication with user A using the system over the network
`
`18.
`
`After updating his contact list, the system will interrogate user A's
`
`personal contact list within the database and will determine that the new
`
`15
`
`contact is not contained within that list. Because an access profile will not
`
`be present in the database for the new contact, the new contact will only
`
`be allowed to communicate with user A using the information contained
`
`within the default field only. This is one example of a default circumstance.
`
`This means that user A can, by for example, setting the default field within
`
`20
`
`his personal communication profile as his works telephone number, restrict
`
`the communication which new contacts can make with him. The new
`
`contacts details are then added into user A's contact list and it is noted in
`
`
`
`the list that this contact is a new contact.
`
`-13-
`
`The next time that user A uses the system, the system will inform
`
`user A that the new contact has contacted him and will ask whether user
`
`A wishes to retain user B's details within his personal contact list. If user
`
`5
`
`A wishes
`
`to
`
`retain
`
`these details within
`
`the database
`
`for
`
`further
`
`communication, the system will ask user A to allocate access profiles to
`
`these contact details for the new contact. If user A does not wish to retain
`
`the new contacts details within his personal contact list then the system will
`
`simply delete these details from the database held on server 19.
`
`10
`
`If user A wishes to contact the new contact then user A will simply
`
`enter the system and will ask the system to communicate with the new
`
`contacts' user identification code. The system will then determine from the
`
`new contacts contact details held on the database that user A is in the new
`
`contacts contact list and has a particular access profile.
`
`In accordance with
`
`15
`
`the access profile, the system will allow communication with the new
`
`contact accordingly. Obviously, the reverse will apply if the new contact
`
`wishes to contact user A.
`
`If any user of the system wishes
`
`to change
`
`their personal
`
`communication profile, all the user need do is enter the system in the
`
`20
`
`manner mentioned above and modify the appropriate field, or sub-field, in
`
`the profile. Any amendments made are stored in the database located on
`
`the remove server 19. This may occur if a user moves house, or changes
`
`
`
`e-mail address etc.
`
`-14-
`
`If at any stage a user decides that they do not wish to be contacted
`
`any further by any one or more of the contacts contained in their contact
`
`list field on the database, then they can access the system and amend the
`
`5
`
`appropriate field in the access profile for the contact with whom they do not
`
`wish to have further contact and can mark their access profile as barred.
`
`This means that if that contact attempts to contact the user through the
`
`system by asking for contact with their user identification code, the system
`
`will check the user personal contact details and will recognise that
`
`10
`
`communication with that contact is no longer permissible and will therefore
`
`not allow the contact to communicate with the user.
`
`If desired, the above system could be configured such that any
`
`attempted continued communication with a user who has requested no
`
`further communication could be monitored whereby,
`
`if continued
`
`15
`
`communication was requested this could be referred to appropriate
`
`authorities for action to ascertain the attempted communication.
`
`It will be appreciated that the system herein described offers
`
`significant advantages over other communication systems using a
`
`telecommunications network. For example, having a unique code which
`
`20
`
`identifies a user and which is not dependent on any unique identifier linked
`
`to any devices with which the user may wish to communicate makes
`
`communication between users much simpler. Further, by allowing a user
`
`
`
`.
`
`i-
`
`,
`
`..
`'
`
`•
`I
`
`.. --
`
`•
`
`"'
`•
`
`-15-
`
`to set parameters
`
`in
`
`their access profile as
`
`to how they may be
`
`communicated with, and by whom and at what time, allows considerably
`
`more user regulation of communication over the system. Still further,
`
`security is enhanced since no user communicating with other users need
`
`5
`
`disclose any personal
`
`information since all
`
`that
`
`is
`
`required
`
`for
`
`communication is a user identification code.
`
`It is of course to be understood that the invention is not intended to
`
`be restricted to the details of the above embodiment which are described
`
`by way of example only.
`
`10
`
`Thus
`
`for example, whilst
`
`in
`
`the embodiments described a
`
`telecommunications network is used, it is envisaged that a similar system
`
`can be used for communicating by conventional letter mail and in these
`
`circumstances the letter would be addressed to the unique identification
`
`code of the intended recipient. The postal authorities would then have
`
`15
`
`access to the database held on the server 19 and would ensure the letter
`
`is delivered in accordance with the personal communication profile and
`
`access profile for the sender as stored in the database.
`
`Also, it is possible for a location field to be included in the user's
`
`personal communication profile, or a contact access profile, whereby
`
`20
`
`different parameters can be stored associated with different locations which
`
`are user or contact may be. The choice of location can then be made by a
`
`user of the system when contacting a contact whether that be a location of
`
`
`
`the user or the contact.
`the userorthe contact
`
`-16-
`-15-
`
`
`
`. . ... ,
`
`CLAIMS
`
`-17-
`
`1.
`
`An improved communication system comprising a plurality of system
`
`communication devices each having assigned thereto a unique device
`
`identifier which identifies each respective communication device on
`
`5
`
`the system, each of said system devices being
`
`linked via a
`
`telecommunications network, and an information storage device
`
`through which all communication between respective system devices
`
`is routed, wherein said storage device includes a unique user
`
`identifier for each user of any one or more of said system devices and
`
`10
`
`associated with each user identifier is a user profile which defines
`
`routing information for communication between respective users.
`
`2.
`
`A communication system which enables users to communicate with
`
`each other, each respective user having a unique user identification
`
`code assigned thereto, said system including an information storage
`
`15
`
`device which stores each said unique user identifier and associated
`
`with each user identifier is a user profile which provides routing
`
`information for communication between respective users.
`
`3.
`
`A system according to Claim 1 or Claim 2 wherein the system
`
`communication devices comprise any one or more of the following
`
`20
`
`devices, fixed line telephone, mobile telephone and or personal
`
`computer (PC)
`
`for data and/or voice communications over the
`
`
`
`-18-
`
`network.
`
`4.
`
`A system according to any one of Claims 1 to 3 wherein the
`
`information storage device comprises a data storage device in the
`
`form of a remote server.
`
`5
`
`5.
`
`A system according to Claim 4 wherein information relating to each
`
`system user is held, in database format, on said remote server.
`
`6.
`
`A system according to any one of Claims 1 to 5 wherein each system
`
`user is also assigned a suitable password which is associated with
`
`the unique user identification code.
`
`10
`
`7.
`
`A system according to Claim 6 when dependent on Claim 4 wherein
`
`the password of each user is retained in database format associated
`
`with the unique user identification code.
`
`8.
`
`A system according to Claim 6 wherein a personal communication
`
`profile of each user of the system is stored
`
`in
`
`the database
`
`15
`
`associated with said unique user
`
`identification code and said
`
`password.
`
`9.
`
`A system according to Claim 6 wherein a personal contact list
`
`containing details of each user of the system with which a particular
`
`user wishes to have contact is also stored
`
`in said database
`
`
`
`...
`
`.. t .
`
`-19-
`
`associated with said unique user identification code and said
`
`password.
`
`10. A system according to Claim 9 wherein the personal contact list
`
`contains an access profile for each contact which includes routing
`
`5
`
`information for communication between a user and said contact.
`
`11. An
`
`improved communication system according
`
`to Claim 1
`
`substantially as hereinbefore described with reference to the
`
`accompanying drawings.
`
`12. A communication system according to Claim 2 substantially as
`
`10
`
`hereinbefore described with reference to the accompanying drawings.
`
`
`
`Application No:
`Claims searched:
`
`GB 0106915.2
`1-12
`
`Examiner:
`Date of search:
`
`Richard Nicholls
`28 November 2001
`
`INVESTOR IN PEOPLE
`
`Patents Act 1977
`Search Report under Section 17
`
`Databases searched:
`
`UK Patent Office collections, including GB, EP, WO & US patent specifications, in:
`
`UK Cl (Ed.S): H4K (KF54)
`
`Int Cl (Ed.7): H04M 1/57, 3/42 ; H04Q 3/00
`
`Other: Online databases: WPI, EPODOC, PAJ
`
`Documents considered to be relevant:
`
`Category Identity of document and relevant passage
`
`X
`
`X
`
`X
`
`X
`
`EP 0719059 A2
`
`(AT&T) see especially column 1 line 51-column 2
`line 10
`
`EP 0531268 A2
`
`(Ericsson) see especially column 3 lines 5-24
`
`EP 0520194 A2
`
`(Network Access) see especially column 2 line 38-
`column 3 line 4
`
`EP 0152908 A2
`
`(NEC) see especially page 3 line 13-page 4 line 17
`
`X WO 91/11874 Al
`
`(Sente) see especially page 6 lines 3-29
`
`X WO 91/07838 Al
`
`(Fuller)