throbber
(12) UK Patent Application (19) GB (11) 2 365 664 (13) A
`
`(43) Date of A Publication 20.02.2002
`
`(51)
`
`INT CL7
`H04M 3/42
`
`(52) UK CL (Edition T)
`H4K KF54
`
`(56)
`
`Documents Cited
`EP 0719059 A2
`EP 0520194 A2
`WO91/11874 A1
`US 5329578A
`
`EP 0531268 A2
`EP 0152908 A2
`WO 91/07838 A1
`
`(58)
`
`Field of Search
`UK CL (Edition S ) H4K KF54
`INT CL7 H04M 1/57 3/42, H04O 3/00
`Online databases: WPI, EPODOC, PAJ
`
`(21) Application No 0106915.2
`
`(22) Date of Filing 20.03.2001
`
`(30) Priority Data
`(31) 0006614
`
`(32) 20.03.2000
`
`(33) GB
`
`(71) Applicant(s)
`Pressurecell Limited
`(Incorporated in the United Kingdom)
`Heron House, Albert Square, MANCHESTER,
`M60 SGT, United Kingdom
`
`(72)
`
`lnventor(s)
`Andrew David Kirkwood
`
`(74) Agent and/or Address for Service
`Wilson Gunn M'Caw
`41-51 Royal Exchange, Cross Street, MANCHESTER,
`M2 78D, United Kingdom
`
`(54) Abstract litle
`Improved communication system
`
`(57) A communication system which enables users to communicate with each other includes a unique user
`identification code assigned to each user. The system also includes an information storage device which
`stores each unique user identifier and associated with each user identifier as a user profile which provides
`routing information for communication between respective users.
`
`I Emeraencv I
`I
`I Default
`I Mobile
`I Wor11
`Home
`
`I
`
`I
`
`I
`
`Country
`Tel.Number
`Voice Mail
`Fax
`E-mail
`Address
`
`Posti:ode
`Contact Categories
`
`1 ,~1
`kmv•.~I
`777iJYI
`Jt;p I' , •
`
`l~~e--'L I
`
`~
`
`Fnii.2b
`
`Bus,iess Ass. I Friends
`Wor11
`Access
`Mobile
`Emergency
`
`Access Profiles
`
`lfamilv
`Mon-Fri
`Mon-Fri
`Sat
`Sun
`
`IMore
`8am-8pm Work
`8prn-8am Mobile
`Work • Voice mai
`Wor11- Voice mai
`Fn!,2c
`
`G)
`CD
`
`Name
`
`String ID
`
`1~1
`
`Ian Jones
`Ga!y Rodgers
`ga,ythefish
`Tamara Maw
`tamaram
`Jase Fisher
`janefisher2
`Personal Contact Ust
`
`VAN
`
`Ac=Profile
`
`✓
`Friend
`✓ Business Ass.
`I
`I
`✓ Famly
`X
`Barred
`fi,f,2d
`
`D&
`Password
`
`Personal
`Communication
`Profile
`
`Personal
`Contact
`List
`
`~2a
`
`At least one drawing originally filed was informal and the print reproduced here is taken from a later filed formal copy.
`
`This print takes account of replacement documents submitted after the date of filing to enable the application to comply
`with the formal requirements of the Patents Rules 1995
`
`)>
`
`

`

`(12) UK Patent Application (19) GB (11) 2 365 664 (13) A
`
`(43) Date of A Publication 20.02.2002
`
`(51)
`
`INT CL7
`H04M 3/42
`
`(52) UK CL (Edition T)
`H4K KF54
`
`(56)
`
`Documents Cited
`EP 0719059 A2
`EP 0520194 A2
`WO91/11874 A1
`US 5329578A
`
`EP 0531268 A2
`EP 0152908 A2
`WO 91/07838 A1
`
`(58)
`
`Field of Search
`UK CL (Edition S ) H4K KF54
`INT CL7 H04M 1/57 3/42, H04O 3/00
`Online databases: WPI, EPODOC, PAJ
`
`(21) Application No 0106915.2
`
`(22) Date of Filing 20.03.2001
`
`(30) Priority Data
`(31) 0006614
`
`(32) 20.03.2000
`
`(33) GB
`
`(71) Applicant(s)
`Pressurecell Limited
`(Incorporated in the United Kingdom)
`Heron House, Albert Square, MANCHESTER,
`M60 SGT, United Kingdom
`
`(72)
`
`lnventor(s)
`Andrew David Kirkwood
`
`(74) Agent and/or Address for Service
`Wilson Gunn M'Caw
`41-51 Royal Exchange, Cross Street, MANCHESTER,
`M2 78D, United Kingdom
`
`(54) Abstract litle
`Improved communication system
`
`(57) A communication system which enables users to communicate with each other includes a unique user
`identification code assigned to each user. The system also includes an information storage device which
`stores each unique user identifier and associated with each user identifier as a user profile which provides
`routing information for communication between respective users.
`
`I Emeraencv I
`I
`I Default
`I Mobile
`I Wor11
`Home
`
`I
`
`I
`
`I
`
`Country
`Tel.Number
`Voice Mail
`Fax
`E-mail
`Address
`
`Posti:ode
`Contact Categories
`
`1 ,~1
`kmv•.~I
`777iJYI
`Jt;p I' , •
`
`l~~e--'L I
`
`~
`
`Fnii.2b
`
`Bus,iess Ass. I Friends
`Wor11
`Access
`Mobile
`Emergency
`
`Access Profiles
`
`lfamilv
`Mon-Fri
`Mon-Fri
`Sat
`Sun
`
`IMore
`8am-8pm Work
`8prn-8am Mobile
`Work • Voice mai
`Wor11- Voice mai
`Fn!,2c
`
`G)
`CD
`
`Name
`
`String ID
`
`1~1
`
`Ian Jones
`Ga!y Rodgers
`ga,ythefish
`Tamara Maw
`tamaram
`Jase Fisher
`janefisher2
`Personal Contact Ust
`
`VAN
`
`Ac=Profile
`
`✓
`Friend
`✓ Business Ass.
`I
`I
`✓ Famly
`X
`Barred
`fi,f,2d
`
`D&
`Password
`
`Personal
`Communication
`Profile
`
`Personal
`Contact
`List
`
`~2a
`
`At least one drawing originally filed was informal and the print reproduced here is taken from a later filed formal copy.
`
`This print takes account of replacement documents submitted after the date of filing to enable the application to comply
`with the formal requirements of the Patents Rules 1995
`
`)>
`
`

`

`,,.--_,
`
`..
`
`r
`
`. ..
`. ..
`. . . ... . .
`. ..
`. . .
`. . . . . .
`. .
`
`•
`
`• • •
`
`,.. ,r
`
`•
`
`•
`
`.---userA---
`1
`
`-11-
`
`-13-
`
`-16-
`
`--userB--
`.....
`1
`1
`
`-12-
`
`-14-
`
`-17-
`
`-18-
`
`-19-
`
`F,g_1_
`
`D&
`Password
`I
`
`I
`Personal
`Contact
`List
`
`I
`Personal
`Communication
`Profile
`
`F~.2a
`
`

`

`. ..
`. ..
`. . . ... . . . ..
`. . .
`. . . . . .
`. . .
`
`e ~ •
`
`•
`
`•
`
`•
`
`• • •
`
`Mobile
`Work
`Home
`Country
`Tel. Number
`Voice Mail
`Fax
`E-mail
`Address
`
`Postcode
`Contact Categories
`
`~ /' r,,/J I
`1111~·- -
`!th-I)"'- - :::-,,, -c...2 .. Adl
`' - J\c-!\ [\ '!
`
`!Ckkk V
`
`1
`
`-
`
`•
`
`I'' ' ,,',; k- -::: ~
`f&/ki,, 1
`,~--Z"'lJ'.Yj
`I ~--.. --Z'.:A I
`FIE:i.2b
`
`Business Ass. I Friends
`Work
`Access
`Mobile
`Emergency
`
`Access Profiles
`
`!Family
`Mon-Fri
`Mon-Fri
`Sat
`Sun
`
`I More
`8am-8pm Work
`8pm-8am Mobile
`Work - Voice mail
`Work - Voice mail
`
`Fn-!:i.2c
`
`Name
`
`String ID
`
`VAN
`
`Access Profile
`
`ijones21
`Ian Jones
`garythefish
`Gary Rodgers
`tamaram
`Tamara Maw
`janefisher2
`Jane Fisher
`Personal Contact List
`
`Friend
`Business Ass.
`Family
`Barred
`
`✓
`✓
`✓
`X
`F,..l,_2d
`
`

`

`2365664
`
`-1-
`
`IMPROVEP COMMUNICATION SYSTEM
`
`The
`
`invention relates to an
`
`improved communication system
`
`particularly although not exclusively for use with a telecommunications
`
`network.
`
`5
`
`Communication over telecommunication networks is well known and
`
`such communication can be voice or data communication using various
`
`system devices for example, telephones (fixed line or mobile) and/or
`
`personal computers (PC's) linked to the network. Each system device linked
`
`to the network is required to be uniquely identified on the network. For
`
`10
`
`example, each telephone linked to the telecommunication network is
`
`identified by a unique multiple digit telephone number. Communication
`
`between telephones over the network is effected by identifying to the
`
`network, the unique identification of the telephone with whom contact is
`
`desired to be made. Similarly, for data communication using PC's over the
`
`15
`
`telecommunication network, each computer linked to the network is
`
`uniquely identified by an Internet protocol address and communication
`
`between computers over the network is effected by reference to that
`
`Internet protocol address. Further each user of each computer is uniquely
`
`identified by an e-mail address and communication between respective users
`
`20
`
`is effected by reference to that e-mail address.
`
`A problem arises insofar as a single user of a telecommunication
`
`network may use a number of different system devices to communicate
`
`

`

`-2-
`
`over the network and thus, for example, a user may use voice and/or data
`
`communication over the network using a PC, fixed line and/or mobile
`
`telephone. In these circumstances such a user will require a multiplicity of
`
`unique identifiers, one for each of the devices used for communication over
`
`5
`
`the network. This means that for each user of a network there can be
`
`many different unique identifiers associated with that user.
`
`A simple example of this would be where a user has a fixed line
`
`telephone at home with a first unique telephone number, a personal mobile
`
`telephone with a second unique telephone number, a fixed line telephone at
`
`10
`
`work with a third unique telephone number and a PC at home for data
`
`communication, for example, by electronic mail (e-mail} with a fourth unique
`
`identifier in the form of an e-mail address.
`
`It is an object of the present invention to provide an improved
`
`communication system, particularly but not exclusively for use over a
`
`15
`
`telecommunications network, in which each user, no matter how many
`
`system devices they use to communicate over the network, can be
`
`identified by one unique identifier which permits communication with any
`
`one or more of the users system devices linked to the network.
`
`Thus and in accordance with a first aspect of the present invention
`
`20
`
`therefore there is provided an improved communication system comprising
`
`a plurality of system communication devices each having assigned thereto
`
`a unique device identifier which identifies each respective communication
`
`

`

`. . . .
`
`t
`
`~
`
`'
`
`.
`
`,,
`
`·,
`
`I
`
`-3-
`
`device on the system, each of said system devices being linked via a
`
`telecommunication network, and an information storage device through
`
`which all communication between respective system devices is routed,
`
`wherein said storage device includes a unique user identifier for each user
`
`5
`
`of any one or more of said system devices and associated with each user
`
`identifier
`
`is a user profile which defines
`
`routing
`
`information
`
`for
`
`communication between respective users.
`
`With this arrangement it is possible to provide a communication
`
`system in which each user is identifiable by a single identifier regardless of
`
`10
`
`the number of system devices they operate and communication can be
`
`made with that user using selected ones of the system devices by use of
`
`the single user identifier.
`
`Thus and in accordance with a second aspect of the present invention
`
`therefore there is provided a communication system which enables users to
`
`15
`
`communicate with each other, each respective user having a unique user
`
`identification code assigned thereto, said system including an information
`
`storage device which stores each said unique user identifier and associated
`
`with each user identifier is a user profile which provides routing information
`
`for communication between respective users.
`
`20
`
`The invention will now be described by way of example only and with
`
`reference to the accompanying drawings in which:
`
`Fig. 1
`
`shows a diagrammatic representation of one form of
`
`

`

`-4-
`
`communication system in accordance with the present
`
`invention; and
`
`Figs. 2a-2d show, in schematic form, the manner in which data is
`
`stored in the data storage device of the system of Fig.
`
`5
`
`1.
`
`Referring now to Fig. 1, there is shown one form of communication
`
`system
`
`in accordance with
`
`the present
`
`invention
`
`for use with a
`
`telecommunications network.
`
`The system 10 includes a plurality of devices under the control of
`
`10
`
`user A and a plurality of devices under the control of user B linked to a
`
`telecommunications network 18. Each of the system devices can comprise
`
`one or more of the following devices,
`
`fixed
`
`line telephones, mobile
`
`telephones and/or personal computer
`
`(PC)
`
`for data and/or voice
`
`communications over the network. For the purposes of explanation of the
`
`15
`
`system, the embodiment described will be a system in which each of user
`
`A and B communicate over the network using a fixed line telephone 11, 1 2
`
`a mobile telephone 13, 14 and a personal computer 16, 17.
`
`Each of the devices under the control of user A and user B are linked
`
`via a telecommunications network 18 and are also linked by the network 1 8
`
`20
`
`to a data storage device 19 in the form of a remote server.
`
`Whilst for ease of explanation only two users A and B are shown in
`
`the drawing, it will, of course, be appreciated that any number of users can
`
`

`

`. . ... ,.
`
`"'
`
`. '
`
`-5-
`
`use the system and each of these users may have as many devices linked
`
`to the telecommunications network for communication as is necessary or
`
`desirable for their purposes.
`
`Each of the devices linked to the network 18 have a unique device
`
`5
`
`identifier which identifies that device on the network. Thus for example,
`
`each fixed line or mobile telephone has a unique telephone number
`
`associated therewith and each PC which is connected to the system has a
`
`unique Internet protocol address and each user of each computer has a
`
`unique electronic mail address which identifies that computer or user of the
`
`10
`
`computer on the network 18. In practice, each PC will be connected to the
`
`telecommunications network 18 via one or more Internet service providers
`
`(ISP) who will provide a link to the telecommunications network.
`
`The telecommunications network 18 comprises a worldwide network
`
`which allows data and voice transmission across the network from any
`
`15
`
`number of devices connected thereto.
`
`The data storage device 19 comprises a remote computer server
`
`upon which is held, in database format, information relating to each system
`
`user, i.e. user A and user Bin the embodiment described.
`
`Referring now to Fig. 2.
`
`20
`
`In the database held on the remote server 19, each user of the
`
`system is assigned a unique user identification code which can identify that
`
`user uniquely on the telecommunications network 18. Each user of the
`
`

`

`-6-
`
`system is also assigned a suitable password which is retained in the
`
`database associated with the unique user identification code.
`
`Associated with each unique user identification code and password
`
`within the database are two further sets of information. Firstly, information
`
`5
`
`regarding the user is stored in the database as a personal communication
`
`profile. The information stored in the profile is stored in accordance with
`
`5 different fields.
`
`In the particular embodiment described, these fields are
`
`identified as home, work, mobile, default and emergency fields, however,
`
`it will be appreciated that in practice, these fields can contain any desired
`
`10
`
`information as necessary or as deemed appropriate and indeed any number
`
`of fields can be used to store information in the profile as desired. A
`
`representation of one example of a personal communication profile is shown
`
`in Fig. 2b. Each field can contain sub-fields containing further information
`
`in relation to a user relating to that field.
`
`15
`
`By way of example, and as shown more clearly in Fig. 2b, the home
`
`field can contain the following sub-fields.
`
`20
`
`1 .
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`Country of location of the user;
`
`Home telephone number of the user;
`
`Voicemail telephone number for the user;
`
`Home facsimile telephone number for the user;
`
`Home address for the user; and
`
`Postcode of the home address of the user.
`
`

`

`..
`
`~ i
`
`•
`
`. . . .
`.
`
`•
`
`•
`
`1
`
`-7-
`
`7.
`
`Web site address for the user (not shown in the Figure).
`
`The work field can contain information relating to the users work and
`
`will in all probability contain similar sub-fields to those mentioned for the
`
`home field.
`
`5
`
`The mobile field contains information relating to the users mobile
`
`phone such as for example, the telephone number of the mobile phone and
`
`perhaps also the provider.
`
`The default field contains information concerning the default location
`
`where communication over the network 18 is to be directed in default
`
`10
`
`circumstances. The default location can comprise a home telephone
`
`number, mobile telephone number or any other number or device identifier
`
`as required or as necessary.
`
`The emergency field contains contact details for use in an emergency
`
`and may therefore contain similar details to those provided in the home field
`
`15
`
`and/or the unique user identification code of other users who are to be
`
`contacted in an emergency.
`
`Secondly, as shown in Fig. 2a, the database contains a second set
`
`of information determined by the user regarding other users with whom the
`
`user wishes to be able to communicate with over the network 18. This
`
`20
`
`information is contained within a personal contact list had in the database
`
`and each personal contact has information stored, for example in the
`
`following fields, relating to that contact, as shown in Fig. 2d. The
`
`

`

`information stored can be, for example:-
`
`-8-
`
`1 .
`
`2.
`
`3.
`
`Contact name;
`
`Unique user
`
`identification code on
`
`the system for that
`
`particular contact;
`
`Voice activation name {as hereinafter defined) for the contact;
`
`5
`
`and
`
`4.
`
`An access profile for that contact.
`
`The contact name field is self explanatory and simply contains a
`
`contact name. So far as the user identification code for the contact is
`
`10
`
`concerned, as previously explained, this field will contain the unique
`
`identification code which identifies the contact on the system.
`
`The voice activation name field contains, for each contact, a voice
`
`activation identifier. A voice activation name is a unique name given to
`
`each contact which, when a user is using voice communication on the
`
`15
`
`system enables the user to establish communication with the contact over
`
`the network simply by providing the voice activation name to the system.
`
`The access profile field is shown more clearly in Fig. 2c, and
`
`information relating to different categories according to which each contact
`
`in the contact list can be categorised. In the example shown, four fields are
`
`20
`
`provided which define four different categories of contact. Each category
`
`field includes sub-fields setting out which of the fields in the personal
`
`communication profile of the user are accessible to the contact and also the
`
`

`

`. ~
`
`'
`
`;
`
`- --
`
`times when such fields are available.
`
`-9-
`
`In Fig. 2c the access profile field in the database contains, for
`
`example, the following sub-fields although in practice any number of sub(cid:173)
`
`fields can be used as desired or as appropriate:-
`
`5
`
`1.
`
`2.
`
`3.
`
`Business associates;
`
`Friends; and
`
`Family.
`
`Each of these sub-fields may have additional sub-fields associated
`
`therewith to determine the fields, or sub-fields,
`
`from
`
`the personal
`
`10
`
`connection profile which each of these category of contacts have access to
`
`and at what times.
`
`Thus, for example, business associates may be permitted access to
`
`the work telephone number of a user, for example, from Monday to Friday
`
`between the hours of 8 am to 8 pm, and also the mobile telephone number
`
`15
`
`of the user between the same times and may be afforded access only to the
`
`emergency field at any other time. Contacts classified as friends or family
`
`will also have similar access profiles associated with them giving them
`
`access to the personal information profile on a basis defined by the user.
`
`The operation of the system of the invention will now be described
`
`20
`
`by reference to an example.
`
`In order to use the system, a user will subscribe to the system and
`
`when subscribing, each user will choose or will be allocated a unique user
`
`

`

`-10-
`
`identification code and each user will choose a password to be associated
`
`with this user identification code. After subscription, the user can access
`
`the system using any system device of the type mentioned above connected
`
`to the telecommunications network and access can be effected via voice or
`
`5
`
`data communication. Once a user has identified himself to the system
`
`correctly, by identifying the correct user identification code and password,
`
`the system will prompt the user to set up his personal communication profile
`
`by providing the information to the system and this information provided is
`
`stored in the relevant field in the database held on the remote server 19.
`
`10
`
`Similarly, the system will prompt the user to provide the information
`
`necessary for the personal contact list and the access profiles for each
`
`contact. Once this information has all been provided to the system, it is
`
`held in the database. The user is then in a position to use the system to
`
`communicate with other users.
`
`15
`
`Thus, if a first user, user A, wishes to communicate with a second
`
`user, user B, over the telecommunications network 18, the user contacts
`
`the system and may be required to provide their unique identification code
`
`and password which are then checked by the system with those held in the
`
`database on the remote server. Alternatively, it may be not be necessary
`
`20
`
`for user A to enter a password to enter the system, the system may be
`
`configured
`
`to
`
`recognise
`
`that
`
`the user
`
`identification code entered
`
`corresponds to the unique device identifier of the device used to access the
`
`

`

`-11-
`
`system in the personal communication profile of that user. The system will
`
`require a password to be entered for certain functions to be carried out, e.g.
`
`deletion or barring of names.
`
`If the information provided is correct user A is then allowed access
`
`5
`
`to the system. To contact user B, user A provides the system with the user
`
`identification code for user B.
`
`They system will then refer to the
`
`information held in the database in the contact name sub-field to ascertain
`
`whether user A is a known contact of user B. If user A is contained in the
`
`contact name sub-field of user B's contact list then the access profile field
`
`10
`
`for user B is referred to. Depending upon the category in which user B has
`
`assigned user A to in the access profile will determine the access which
`
`user A has to the fields of user B's personal communication profile. Thus
`
`if user A is a friend of user B, and is categorised as such in the access
`
`profile field, then user B may have determined that such contacts should be
`
`15
`
`allowed access to the home telephone field during the hours of 8 pm to 8
`
`am on Monday to Friday and the work telephone field between the hours of
`
`8 am to 8 pm. Thus if user A is using the system at 8.15 pm, his request
`
`to establish contact with user B will be directed to user B's home telephone.
`
`If user A meets a person at a social occasion who is not a known
`
`20
`
`contact and wishes to communicate with this person over the network 18,
`
`it will be necessary for the other person to subscribe to the system, if they
`
`have not done so already. Once they have subscribed to the system, user
`
`

`

`-12-
`
`A can give the person his unique user identification code.
`
`After receipt of user A's user identification code, the new contact can
`
`communicate with user A in the following manner. The new contact enters
`
`the system in the manner mentioned above and then provides the system
`
`5
`
`with user A's user identification code. The system will then ask the new
`
`contact to provide details which will be entered into the relevant field in the
`
`contact list of the new contact and these will be stored in the database.
`
`After all this information has been provided to the system, user A will
`
`appear on the contact list for the new contact and user A's contact details
`
`10
`
`will appear in the appropriate sub-fields to that field. The new contact can
`
`now make communication with user A using the system over the network
`
`18.
`
`After updating his contact list, the system will interrogate user A's
`
`personal contact list within the database and will determine that the new
`
`15
`
`contact is not contained within that list. Because an access profile will not
`
`be present in the database for the new contact, the new contact will only
`
`be allowed to communicate with user A using the information contained
`
`within the default field only. This is one example of a default circumstance.
`
`This means that user A can, by for example, setting the default field within
`
`20
`
`his personal communication profile as his works telephone number, restrict
`
`the communication which new contacts can make with him. The new
`
`contacts details are then added into user A's contact list and it is noted in
`
`

`

`the list that this contact is a new contact.
`
`-13-
`
`The next time that user A uses the system, the system will inform
`
`user A that the new contact has contacted him and will ask whether user
`
`A wishes to retain user B's details within his personal contact list. If user
`
`5
`
`A wishes
`
`to
`
`retain
`
`these details within
`
`the database
`
`for
`
`further
`
`communication, the system will ask user A to allocate access profiles to
`
`these contact details for the new contact. If user A does not wish to retain
`
`the new contacts details within his personal contact list then the system will
`
`simply delete these details from the database held on server 19.
`
`10
`
`If user A wishes to contact the new contact then user A will simply
`
`enter the system and will ask the system to communicate with the new
`
`contacts' user identification code. The system will then determine from the
`
`new contacts contact details held on the database that user A is in the new
`
`contacts contact list and has a particular access profile.
`
`In accordance with
`
`15
`
`the access profile, the system will allow communication with the new
`
`contact accordingly. Obviously, the reverse will apply if the new contact
`
`wishes to contact user A.
`
`If any user of the system wishes
`
`to change
`
`their personal
`
`communication profile, all the user need do is enter the system in the
`
`20
`
`manner mentioned above and modify the appropriate field, or sub-field, in
`
`the profile. Any amendments made are stored in the database located on
`
`the remove server 19. This may occur if a user moves house, or changes
`
`

`

`e-mail address etc.
`
`-14-
`
`If at any stage a user decides that they do not wish to be contacted
`
`any further by any one or more of the contacts contained in their contact
`
`list field on the database, then they can access the system and amend the
`
`5
`
`appropriate field in the access profile for the contact with whom they do not
`
`wish to have further contact and can mark their access profile as barred.
`
`This means that if that contact attempts to contact the user through the
`
`system by asking for contact with their user identification code, the system
`
`will check the user personal contact details and will recognise that
`
`10
`
`communication with that contact is no longer permissible and will therefore
`
`not allow the contact to communicate with the user.
`
`If desired, the above system could be configured such that any
`
`attempted continued communication with a user who has requested no
`
`further communication could be monitored whereby,
`
`if continued
`
`15
`
`communication was requested this could be referred to appropriate
`
`authorities for action to ascertain the attempted communication.
`
`It will be appreciated that the system herein described offers
`
`significant advantages over other communication systems using a
`
`telecommunications network. For example, having a unique code which
`
`20
`
`identifies a user and which is not dependent on any unique identifier linked
`
`to any devices with which the user may wish to communicate makes
`
`communication between users much simpler. Further, by allowing a user
`
`

`

`.
`
`i-
`
`,
`
`..
`'
`
`•
`I
`
`.. --
`
`•
`
`"'
`•
`
`-15-
`
`to set parameters
`
`in
`
`their access profile as
`
`to how they may be
`
`communicated with, and by whom and at what time, allows considerably
`
`more user regulation of communication over the system. Still further,
`
`security is enhanced since no user communicating with other users need
`
`5
`
`disclose any personal
`
`information since all
`
`that
`
`is
`
`required
`
`for
`
`communication is a user identification code.
`
`It is of course to be understood that the invention is not intended to
`
`be restricted to the details of the above embodiment which are described
`
`by way of example only.
`
`10
`
`Thus
`
`for example, whilst
`
`in
`
`the embodiments described a
`
`telecommunications network is used, it is envisaged that a similar system
`
`can be used for communicating by conventional letter mail and in these
`
`circumstances the letter would be addressed to the unique identification
`
`code of the intended recipient. The postal authorities would then have
`
`15
`
`access to the database held on the server 19 and would ensure the letter
`
`is delivered in accordance with the personal communication profile and
`
`access profile for the sender as stored in the database.
`
`Also, it is possible for a location field to be included in the user's
`
`personal communication profile, or a contact access profile, whereby
`
`20
`
`different parameters can be stored associated with different locations which
`
`are user or contact may be. The choice of location can then be made by a
`
`user of the system when contacting a contact whether that be a location of
`
`

`

`the user or the contact.
`the userorthe contact
`
`-16-
`-15-
`
`

`

`. . ... ,
`
`CLAIMS
`
`-17-
`
`1.
`
`An improved communication system comprising a plurality of system
`
`communication devices each having assigned thereto a unique device
`
`identifier which identifies each respective communication device on
`
`5
`
`the system, each of said system devices being
`
`linked via a
`
`telecommunications network, and an information storage device
`
`through which all communication between respective system devices
`
`is routed, wherein said storage device includes a unique user
`
`identifier for each user of any one or more of said system devices and
`
`10
`
`associated with each user identifier is a user profile which defines
`
`routing information for communication between respective users.
`
`2.
`
`A communication system which enables users to communicate with
`
`each other, each respective user having a unique user identification
`
`code assigned thereto, said system including an information storage
`
`15
`
`device which stores each said unique user identifier and associated
`
`with each user identifier is a user profile which provides routing
`
`information for communication between respective users.
`
`3.
`
`A system according to Claim 1 or Claim 2 wherein the system
`
`communication devices comprise any one or more of the following
`
`20
`
`devices, fixed line telephone, mobile telephone and or personal
`
`computer (PC)
`
`for data and/or voice communications over the
`
`

`

`-18-
`
`network.
`
`4.
`
`A system according to any one of Claims 1 to 3 wherein the
`
`information storage device comprises a data storage device in the
`
`form of a remote server.
`
`5
`
`5.
`
`A system according to Claim 4 wherein information relating to each
`
`system user is held, in database format, on said remote server.
`
`6.
`
`A system according to any one of Claims 1 to 5 wherein each system
`
`user is also assigned a suitable password which is associated with
`
`the unique user identification code.
`
`10
`
`7.
`
`A system according to Claim 6 when dependent on Claim 4 wherein
`
`the password of each user is retained in database format associated
`
`with the unique user identification code.
`
`8.
`
`A system according to Claim 6 wherein a personal communication
`
`profile of each user of the system is stored
`
`in
`
`the database
`
`15
`
`associated with said unique user
`
`identification code and said
`
`password.
`
`9.
`
`A system according to Claim 6 wherein a personal contact list
`
`containing details of each user of the system with which a particular
`
`user wishes to have contact is also stored
`
`in said database
`
`

`

`...
`
`.. t .
`
`-19-
`
`associated with said unique user identification code and said
`
`password.
`
`10. A system according to Claim 9 wherein the personal contact list
`
`contains an access profile for each contact which includes routing
`
`5
`
`information for communication between a user and said contact.
`
`11. An
`
`improved communication system according
`
`to Claim 1
`
`substantially as hereinbefore described with reference to the
`
`accompanying drawings.
`
`12. A communication system according to Claim 2 substantially as
`
`10
`
`hereinbefore described with reference to the accompanying drawings.
`
`

`

`Application No:
`Claims searched:
`
`GB 0106915.2
`1-12
`
`Examiner:
`Date of search:
`
`Richard Nicholls
`28 November 2001
`
`INVESTOR IN PEOPLE
`
`Patents Act 1977
`Search Report under Section 17
`
`Databases searched:
`
`UK Patent Office collections, including GB, EP, WO & US patent specifications, in:
`
`UK Cl (Ed.S): H4K (KF54)
`
`Int Cl (Ed.7): H04M 1/57, 3/42 ; H04Q 3/00
`
`Other: Online databases: WPI, EPODOC, PAJ
`
`Documents considered to be relevant:
`
`Category Identity of document and relevant passage
`
`X
`
`X
`
`X
`
`X
`
`EP 0719059 A2
`
`(AT&T) see especially column 1 line 51-column 2
`line 10
`
`EP 0531268 A2
`
`(Ericsson) see especially column 3 lines 5-24
`
`EP 0520194 A2
`
`(Network Access) see especially column 2 line 38-
`column 3 line 4
`
`EP 0152908 A2
`
`(NEC) see especially page 3 line 13-page 4 line 17
`
`X WO 91/11874 Al
`
`(Sente) see especially page 6 lines 3-29
`
`X WO 91/07838 Al
`
`(Fuller)

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket