WO2007058633A1 - An apparatus for communication and a method thereof - Google Patents

An apparatus for communication and a method thereof Download PDF

Info

Publication number
WO2007058633A1
WO2007058633A1 PCT/SG2006/000358 SG2006000358W WO2007058633A1 WO 2007058633 A1 WO2007058633 A1 WO 2007058633A1 SG 2006000358 W SG2006000358 W SG 2006000358W WO 2007058633 A1 WO2007058633 A1 WO 2007058633A1
Authority
WO
WIPO (PCT)
Prior art keywords
application software
party
communication
parties
processor
Prior art date
Application number
PCT/SG2006/000358
Other languages
French (fr)
Inventor
Cheh Ngee Goh
Original Assignee
Cheh Ngee Goh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cheh Ngee Goh filed Critical Cheh Ngee Goh
Publication of WO2007058633A1 publication Critical patent/WO2007058633A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/401Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • H04M3/42153Administration or customisation of services by subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/12Counting circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/38Displays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/16Automatic or semi-automatic exchanges with lock-out or secrecy provision in party-line systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42382Text-based messaging services in telephone networks such as PSTN/ISDN, e.g. User-to-User Signalling or Short Message Service for fixed networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/46Arrangements for calling a number of substations in a predetermined sequence until an answer is obtained
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
    • H04M3/4931Directory assistance systems

Definitions

  • the present invention relates to an apparatus and a method for communication between at least two parties.
  • VoIP Voice over Internet Protocol
  • PSTN Public Switched Telephone Network
  • VoIP calls may only be made using a computer or a VoIP phoneset allied to a specific service provider such as, for example Vonage, CallVantage from AT&T, and VoiceWing from Verizon.
  • a user still needs to dial a contact number to initiate communication with another party. This may be a labourious process for the user who repeatedly fails to contact a party who is contactable via several forms of communication like PSTN telephones, mobile phones, pagers, and instant message software running on computers such as, for example, Skype, Google Talk, MSN Messager, and the like.
  • VoIP call charges may be avoided if a person is contacted while using instant messaging software. Obtaining a computer and the charges levied by the VoIP service provider may be beyond the means of the poor. Similarly, VoIP calls are not accessible by the non-tech savvy, as the non-tech savvy are generally averse to computers and IT devices.
  • Another form of communication is instant messaging, facilitated by software such as, for example, AOL Instant Messenger, Skype, MSN Messenger, Yahoo! Messenger, ICQ and QQ.
  • the apparatus includes a processor; a networking device coupled to the processor; at least one storage device coupled to the processor, the storage device being either in the apparatus or a separate server; at least one actuator coupled to the processor; and an application software installed in the at least one storage device, the application software being used for communication between the at least two parties.
  • activation of the at least one actuator causes the processor to run the application software for communication between the at least two parties with the apparatus connected to a network through the networking device. It is preferable that the at least two parties are using at least one communication device like, for example, the apparatus itself, a computer and any device able to run the application software.
  • the apparatus may further include a device such as, for example, at least one text input device coupled to the processor; at least one audio input device coupled to the processor; at least one audio output device coupled to the processor; at least one image input device coupled to by the processor; at least one display device coupled to the processor; or any combination of the aforementioned.
  • a device such as, for example, at least one text input device coupled to the processor; at least one audio input device coupled to the processor; at least one audio output device coupled to the processor; at least one image input device coupled to by the processor; at least one display device coupled to the processor; or any combination of the aforementioned.
  • the at least one actuator is an object like a biased switch, a wireless signal receiver, a flip switch, or a sensor switch.
  • the activation of the at least one actuator may involves either a single action or a series of actions.
  • the application software may use selected contact data for each party stored in the at least one storage device for communication between the at least two parties.
  • the application software may be either partially installed or fully installed, with the partially installed application software operating in cooperation with a server-based application, the server-based application running in at least one server. It is preferable that the application software performs at least one check selected from the group consisting of: type of contact data, whether a receiving party is online, whether a receiving party is responsive, and any combination of the aforementioned.
  • the application software may also operatively couple with software selected from the group consisting of: AOL Instant Messenger, Skype, MSN Messenger, Yahoo! Messenger, ICQ, QQ, GoogleTalk, similar applications as the aforementioned and any combination of the aforementioned.
  • communication between the at least two parties is encrypted by the application software, where each party is able to obtain visual confirmation that the encryption is activated.
  • Each party may conveniently be able to activate encryption using a switch.
  • the method includes activating at least one actuator in an apparatus; running an application software stored in at least one storage device, the application software consequently obtaining contact data for at least one of the parties from the at least one storage device; and connecting the apparatus to a network with a networking device coupled to the apparatus.
  • the application software uses the contact data to enable communication between the at least two parties.
  • the at least one storage device may be on either the apparatus or a server.
  • the contact data may be either an internet address or a PSTN/mobile phone number and may be used by the application software in accordance with like "user preference", "likelihood of connection” score or cost of connection..
  • the at least one actuator may be an object like, for example, a biased switch, a wireless signal receiver, a flip switch, and a sensor switch. Activation of the at least one actuator may involve either a single action or a series of actions.
  • communication between the at least two parties may be encrypted by the application software.
  • Each party may be able to obtain visual confirmation that the encryption is activated and may be able to activate encryption using a switch.
  • the application software may be either partially installed or fully installed.
  • the partially installed application software may operates in cooperation with a server-based application, the server-based application running in at least one server.
  • the application software may perform at least one check selected from the group consisting of: type of contact data, whether a receiving party is online, whether a receiving party is responsive, and any combination of the aforementioned. It is advantageous that the application software may operatively couple with software selected from the group consisting of: AOL Instant
  • a method for generating a caller identification audio signal for an incoming call including: receiving a call; identifying the call with an identifier; associating the identifier with at least one entry linked to the identifier in a contact database; and using a text-to-speech software on the at least one entry to generate the caller identification audio signal.
  • the identifier may be either an internet address on a PSTN/mobile phone number.
  • Figure 1 shows a schematic diagram with a representation of the components of the apparatus of the present invention.
  • Figure 2 shows a process flow of the method of the present invention.
  • Figure 3 shows an encryption process used in the present invention.
  • Figure 4 shows a method for generating a caller identification audio signal for an incoming call.
  • FIG. 1 there is shown a schematic diagram of an apparatus 20 for communication between at least two parties.
  • the communication may refer to audio, video, text based or any combination of the aforementioned forms of communication.
  • the apparatus 20 may include a processor 22, the processor 22 being the
  • the apparatus 20 may indude a networking device 24 coupled to the processor 22.
  • the networking device 24 enables the apparatus 20 to connect to a network, where the network may be a restricted network or the internet. Where applicable, network may also include mobile phone and PSTN networks.
  • the storage device 26 may be a hard disk drive or flash memory, where data and applications required to enable the apparatus 20 to function in a preferred manner are stored.
  • the actuator 28 may be, for example, a biased switch, a wireless signal receiver, a flip switch, or a sensor switch.
  • the biased switch may be activated during either positive or negative activation.
  • the wireless signal receiver may be activated when an appropriate wireless signal is received.
  • the sensor switch may be activated by physical contact or sound input.
  • the actuator 28 may also have a biometrics sensor for additional security. The actual type of actuator 28 being used may depend on factors such as, for example, aesthetics, use-ability, durability, cost or any combination of the aforementioned.
  • Activation of the at least one actuator 28 may involve either a single action or a series of actions. For example, activating the actuator 28 (if only one was included in apparatus 20) once may invoke one action while activating the actuator 28 twice or thrice in quick succession may invoke other distinct actions. In another example, if more than one actuator 28 was included in the apparatus 20, a sequence in which the actuators 28 are activated or a combination of actuators 28 being activated may invoke distinct actions.
  • the storage device 26 may be installed with an application software 27, the application software 27 being used for communication between the at least two parties.
  • the application software 27 may include modules/routines for the processor 22 to enable communication between the at least two parties. Activation of the at least one actuator 28 may cause the processor 22 to run the application software 27 for communication between the at least two parties using the apparatus 20 connected to the network through the networking device 24.
  • the application software 27 may be either partially installed or fully installed in the storage device 26. It should be noted that the partially installed application software 27 may operate in cooperation with a server-based application to enable the desired functionality of the apparatus 20.
  • the external server may control the "connection to other party" aspect by linking the apparatus 20 with another party of the communication such that a user and the other party may engage in communication.
  • the application software 27 may be able to operatively couple with software like AOL Instant Messenger, Skype, GoogleTalk, MSN Messenger, Yahoo! Messenger, ICQ, QQ, and the like.
  • the application software 27 may be able to perform at least one check prior to commencing communication between at least two parties, such as, for example, type of contact data, whether a receiving party is online, whether a receiving party is responsive, or any combination of the aforementioned.
  • the apparatus 20 may include at least one audio input device 30 like a microphone coupled to the processor 22.
  • the audio input device 30 would be used to capture speech of a user during communication.
  • the display device 36 may be for the user to view still/moving images transmitted from the other party's end and/or for the user to view information about the communication, such as, for example, other party ID, other party location and so forth.
  • the apparatus 20 may further include a text-input module 25 like a keyboard coupled to the processor 22 to facilitate text-based communication.
  • the text-input module 25, audio input device 30, audio output device 32, image input device 34 and display device 36 may be add-on peripherals for the apparatus 20 that may be connected to the apparatus 20 either via cables or wirelessly.
  • Wireless connectivity of the peripheral devices may be enabled using wireless technologies, such as, for example, UWB, Bluetooth, infrared, or any form of radio frequency transmission.
  • the text-input module 25, audio input device 30, audio output device 32, image input device 34 and display device 36 may also be integrated into one or more peripheral devices.
  • the at least one display device 36 may be an externally connected large screen device or image projector.
  • the application software 27 may use contact data for each party stored in the at least one storage device 26 for communication between the at least two parties.
  • the contact data may be selectable from a database stored in the storage device 26.
  • the contact data may be stored on a remote storage server, or stored partially in the storage device 26 and partially on the remote storage server.
  • the contact data may include, for example, internet addresses (includes email addresses and Instant Messaging IDs) and PSTN/mobile phone numbers. All the stored contact data may be viewed using the display device 36 (if available).
  • a particular contact data may be selectable using controls which allow scrolling and selection within a large list of data entries, akin to controls used in mobile phones and portable digital entertainment devices. This would also include voice-activated selection as employed in many mobile phones.
  • a "user preference" score may be input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the user's most preferred contact point for each party, and subsequently to less preferred contact points for each party if necessary.
  • a "likelihood of connection" score may be input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the most likely contact point for each party, and subsequently to less likely contact points for each party if necessary.
  • the entries for each party may also be ranked in terms of (per unit) cost of connection so that calls made using the apparatus 20 may be connected firstly to the least costly contact point for each party, and subsequently to more costly contact points for each party if necessary.
  • Communication between the at least two parties may be encrypted by the application software 27. This enhances the security of communication between the at least two parties.
  • Encryption should preferably be carried out before data is sent to the network from the apparatus 20 as the data from the apparatus 20 may be compromised before reaching an external encryption server.
  • the parties in the communication should each have an encryption "key" usable with their respective communication apparatus such that sent encrypted data is able to be decrypted at the receiving end.
  • the apparatus 20 may have a specific encryption "key” for a specific contact (obtained from the stored database).
  • the encryption "key” may be entered using any known means of data input, such as, for example, via a keyboard (connected with a cable or connected wirelessly), via a computer/PDA (connected with a cable or connected wirelessly), via a secure download from a central server which accepts a central key to enable encryption between the parties, and so forth.
  • the apparatus 20 may include a switch 29 to activate/deactivate data encryption. It should be noted that voice, image and text data may all be encrypted.
  • the apparatus 20 may have an indicator such as an LED to denote whether data encryption mode has been activated. The indicator enables both the user and the receiving party to visually confirm that data encryption mode has been activated. Both the user and receiving party may have the choice whether to enable encryption during communication.
  • an encryption process 50 used in the present invention.
  • the process 50 is used to denote the process flow, and it should be noted that the data may be encrypted using any known encryption method in the field of cryptography.
  • the process 50 may be implemented where the data to be sent out from apparatus 20 is finalised (52) prior to transmission to the network. Subsequently, the apparatus 20 may check whether the data encryption mode has been activated (54). If no, data from apparatus 20 is not encrypted and directly sent to the network (53). If data encryption mode has been activated, a determination is made with regard to whether the party being contacted has an identical encryption "key" (56).
  • the user is notified that the party being contacted is unable to receive encrypted data (58), and data from apparatus 20 is not encrypted and directly sent to the network (53). If the party being contacted has a requisite identical encryption "key”, the requisite encryption "key” is obtained (60) and the data is encrypted (62). The encrypted data is then sent to the network (53).
  • the apparatus 20 should be set up in the following manner before it is able to function in the desired manner.
  • the contact data for each party is obtained from details such as, for example Skype ID, Yahoo! Messenger ID 1 GoogieTalk ID, MSN messenger ID, PSTN line number, personal mobile phone number and the like.
  • the apparatus 20 may attempt to make a call without any intervention from a server or the apparatus 20 may interact with the server to seek instructions on how to make a call.
  • a "user preference" score is input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the user's most preferred contact point for each party, and subsequently to less preferred contact points for each party if necessary.
  • a "likelihood of connection" score is input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the most likely contact point for each party, and subsequently to less likely contact points for each party if necessary.
  • the entries for each party may also be ranked in terms of (per unit) cost of connection, depending on a preference of the user.
  • the contact data may be modified and saved using, for example, a keyboard/keypad like interface for the user to directly input the data into the apparatus 20, a wired or wireless connection to a computer installed with software that allows the user to input the data into the apparatus 20, and remote input of data via the internet onto a server, where the server synchronises data with the apparatus 20 when the apparatus 20 is connected to the server.
  • a keyboard/keypad like interface for the user to directly input the data into the apparatus 20
  • a wired or wireless connection to a computer installed with software that allows the user to input the data into the apparatus 20, and remote input of data via the internet onto a server, where the server synchronises data with the apparatus 20 when the apparatus 20 is connected to the server.
  • the application software 27 may include a VoIP application that is based on the instant messaging model which requires that the party being contacted to permit the contacting party to make the contact.
  • the apparatus 20 may store a contact list of permitted parties, or such a list may be stored on a server. When a new contact is added, the contact data may be automatically updated in the list (either on the apparatus 20 or the server).
  • the method 80 may begin with a user activating at least one actuator in an apparatus (82).
  • the at least one actuator may be, for example, a biased switch, a wireless signal receiver, a flip switch, or a sensor switch.
  • the biased switch may be activated during either positive or negative activation.
  • the wireless signal receiver may be activated when an appropriate wireless signal is received.
  • the sensor switch may be activated by physical contact or sound input.
  • the actuator 28 may also have a biometrics sensor for additional security. Activation of the at least one actuator may involve either a single action or a series of actions.
  • activating the actuator may invoke one action while activating the actuator twice or thrice in quick succession may invoke other distinct actions.
  • a sequence in which the actuators are activated or a combination of actuators being activated may invoke distinct actions.
  • Activating the actuator would run an application software stored in at least one storage device
  • the application software consequently obtaining contact data for at least one of the parties from the at least one storage device.
  • the contact data may include, for example, internet addresses (includes email addresses and Instant Messaging IDs) and PSTN/mobile phone numbers.
  • the application software may be partially installed or fully installed.
  • the partially installed application software may operate in cooperation with a server-based application, with the server-based application running in at least one server.
  • the at least one storage device may also be on either the apparatus or a server.
  • the apparatus is connected to a network (84) through a networking device coupled to the apparatus.
  • the application software may use the contact data to enable communication between the at least two parties (88).
  • the application software may be able to operatively couple with software like AOL Instant Messenger, Skype, GoogleTalk, MSN Messenger, Yahoo! Messenger, ICQ, QQ, and the like.
  • the application software ascertains whether the contact data (data used in accordance with a criteria such as, for example, "user preference” score, "likelihood of connection” score or cost of connection for each user) is an internet address (90). If no, the application software connects to the PSTN/mobile phone number. If the receiving party responds (92) to a connection made by the application software, the user is able to commence communication (94). If the receiving party does not respond to the connection made by the application software, the application software ascertains whether is there any other contact data to be used for a subsequent connection attempt(s) (96). If there is no other contact data, the user gets an "receiving party unavailable" notification (98), such as, for example, a no connection tone.
  • a criteria such as, for example, "user preference” score, "likelihood of connection” score or cost of connection for each user.
  • the software connects to a next contact data (88), and the software ascertains whether the contact data is an internet address (90). If yes, the software then ascertains whether the receiving party is online (100). If the receiving party is not online, the user gets an "receiving party unavailable” notification (98) if there is no other contact data to be used for a subsequent connection attempt(s) (96). If the receiving party is online, the application software ascertains whether the receiving party responds to the user's call (102). If the receiving party does not respond, the user gets an "receiving party unavailable” notification (98) if there is no other contact data to be used for a subsequent connection attempt(s) (96). The user is only able to commence communication (104) if the receiving party responds to the user's call.
  • the aforementioned method may also be effective where communication between the at least two parties is encrypted. It should be noted that the data may be encrypted using any known encryption method in the field of cryptography. It should be noted that the aforementioned method allows for a systematic method to contact a party with a plurality of contact details, with all steps enabling the method being totally hidden from the user.
  • the method 150 includes receiving a call (152) which may be from any source such as, for example, an internet address or a PSTN/mobile phone number.
  • a call 152
  • the call is identified with an identifier (154), which is associated with the source of the call. It is then ascertained whether the identifier is associated with an entry in a contact database (156). If the identifier is not associated with any entry in the database, a standard "ringing" (only used as an example) sound will be generated (158).
  • a text-to-speech (TTS) software converts the at least one entry to generate the caller identification audio signal (162). For example, if the at least one entry is "John", a caller identification audio signal may be simply an audio reproduction of the word “John”, or "John” may be incorporated into a standard aurally reproduced phrase like "The incoming call is from "John”. On hearing the "ringing" sound (156) or the caller identification audio signal (162), the call may be answered (164) and the parties may begin a conversation (166).
  • TTS text-to-speech

Abstract

There is provided an apparatus for communication between at least two parties. The apparatus includes a processor, a networking device coupled to the processor; at least one storage device coupled to the processor, the storage device being either in the apparatus or a separate server; at least one actuator coupled to the processor; and an application software installed in the at least one storage device, the application software being used for communication between the at least two parties. Advantageously, activation of the at least one actuator causes the processor to run the application software for communication between the at least two parties with the apparatus connected to a network through the networking device. It is preferable that the at least two parties are using at least one communication device, like, for example, the apparatus itself, a computer and any device able to run the application software. A corresponding method is also disclosed.

Description

AN APPARATUS FOR COMMUNICATION AND A METHOD THEREOF
FIELD OF INVENTION
The present invention relates to an apparatus and a method for communication between at least two parties.
BACKGROUND
Recent advancements in technology have led to an increase in the forms of communication being made available to the masses, such as, for example, instant messaging, Voice over Internet Protocol (VoIP) calls, email-on-the-go and so forth. However, not everyone is receptive to these newer forms of communication. This group of people are those who are non-tech savvy, either because of circumstances or by choice. It should be noted that the numbers in such a group are not insignificant.
Communication is essential and is something that we cannot do without. Some of these newer forms of communication, and their problems will be discussed below.
The most common form of communication is through the use of telephones on a Public Switched Telephone Network (PSTN). With the advent of Voice over Internet Protocol (VoIP), international calls now cost significantly less compared to PSTN calls. Currently, VoIP calls may only be made using a computer or a VoIP phoneset allied to a specific service provider such as, for example Vonage, CallVantage from AT&T, and VoiceWing from Verizon. A user still needs to dial a contact number to initiate communication with another party. This may be a labourious process for the user who repeatedly fails to contact a party who is contactable via several forms of communication like PSTN telephones, mobile phones, pagers, and instant message software running on computers such as, for example, Skype, Google Talk, MSN Messager, and the like. Even if the VoIP phone has programmable "hot keys", it is still a labourious process for the user to contact a person who is contactable via several forms of communication. There is currently also no system for selecting the most economical way of making calls. VoIP call charges may be avoided if a person is contacted while using instant messaging software. Obtaining a computer and the charges levied by the VoIP service provider may be beyond the means of the poor. Similarly, VoIP calls are not accessible by the non-tech savvy, as the non-tech savvy are generally averse to computers and IT devices.
Another form of communication is instant messaging, facilitated by software such as, for example, AOL Instant Messenger, Skype, MSN Messenger, Yahoo! Messenger, ICQ and QQ.
Most of these software allow both tele and video conferencing. In order to use this form of communication, a user needs to have a computing platform with an operating system to run the software, and should be able to install and configure the software. Furthermore, the user needs to navigate the user interface of the software to utilise the communication facility. Yet again, a computer is required for this form of communication. In addition, the steps to utilise this form of communication would appear daunting to non-tech savvy people.
SUMMARY
There is provided an apparatus for communication between at least two parties. The apparatus includes a processor; a networking device coupled to the processor; at least one storage device coupled to the processor, the storage device being either in the apparatus or a separate server; at least one actuator coupled to the processor; and an application software installed in the at least one storage device, the application software being used for communication between the at least two parties. Advantageously, activation of the at least one actuator causes the processor to run the application software for communication between the at least two parties with the apparatus connected to a network through the networking device. It is preferable that the at least two parties are using at least one communication device like, for example, the apparatus itself, a computer and any device able to run the application software.
The apparatus may further include a device such as, for example, at least one text input device coupled to the processor; at least one audio input device coupled to the processor; at least one audio output device coupled to the processor; at least one image input device coupled to by the processor; at least one display device coupled to the processor; or any combination of the aforementioned.
Preferably, the at least one actuator is an object like a biased switch, a wireless signal receiver, a flip switch, or a sensor switch. The activation of the at least one actuator may involves either a single action or a series of actions. The application software may use selected contact data for each party stored in the at least one storage device for communication between the at least two parties. The application software may be either partially installed or fully installed, with the partially installed application software operating in cooperation with a server-based application, the server-based application running in at least one server. It is preferable that the application software performs at least one check selected from the group consisting of: type of contact data, whether a receiving party is online, whether a receiving party is responsive, and any combination of the aforementioned. The application software may also operatively couple with software selected from the group consisting of: AOL Instant Messenger, Skype, MSN Messenger, Yahoo! Messenger, ICQ, QQ, GoogleTalk, similar applications as the aforementioned and any combination of the aforementioned. Advantageously, communication between the at least two parties is encrypted by the application software, where each party is able to obtain visual confirmation that the encryption is activated. Each party may conveniently be able to activate encryption using a switch.
There is also provided a method for communication between at least two parties. The method includes activating at least one actuator in an apparatus; running an application software stored in at least one storage device, the application software consequently obtaining contact data for at least one of the parties from the at least one storage device; and connecting the apparatus to a network with a networking device coupled to the apparatus. Preferably, the application software uses the contact data to enable communication between the at least two parties. The at least one storage device may be on either the apparatus or a server. The contact data may be either an internet address or a PSTN/mobile phone number and may be used by the application software in accordance with like "user preference", "likelihood of connection" score or cost of connection..
The at least one actuator may be an object like, for example, a biased switch, a wireless signal receiver, a flip switch, and a sensor switch. Activation of the at least one actuator may involve either a single action or a series of actions.
It is advantageous that communication between the at least two parties may be encrypted by the application software. Each party may be able to obtain visual confirmation that the encryption is activated and may be able to activate encryption using a switch.
The application software may be either partially installed or fully installed. The partially installed application software may operates in cooperation with a server-based application, the server-based application running in at least one server. The application software may perform at least one check selected from the group consisting of: type of contact data, whether a receiving party is online, whether a receiving party is responsive, and any combination of the aforementioned. It is advantageous that the application software may operatively couple with software selected from the group consisting of: AOL Instant
Messenger, Skype, MSN Messenger, Yahoo! Messenger, ICQ, QQ, GoogleTalk, similar applications as the aforementioned and any combination of the aforementioned.
In another aspect of the present invention, there is provided a method for generating a caller identification audio signal for an incoming call, including: receiving a call; identifying the call with an identifier; associating the identifier with at least one entry linked to the identifier in a contact database; and using a text-to-speech software on the at least one entry to generate the caller identification audio signal. The identifier may be either an internet address on a PSTN/mobile phone number. DESCRIPTION OF DRAWINGS
In order that the present invention may be fully understood and readily put into practical effect, there shall now be described by way of non-limitative example only preferred embodiments of the present invention, the description being with reference to the accompanying illustrative drawings.
Figure 1 shows a schematic diagram with a representation of the components of the apparatus of the present invention. Figure 2 shows a process flow of the method of the present invention. Figure 3 shows an encryption process used in the present invention.
Figure 4 shows a method for generating a caller identification audio signal for an incoming call.
DESCRIPTION OF PREFERRED EMBODIMENTS
The drawings and the following discussion are intended to provide a brief, general description of a suitable environment in which the present invention may be implemented. As those skilled in the art will appreciate, the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like.
Referring to Figure 1 , there is shown a schematic diagram of an apparatus 20 for communication between at least two parties. It should be noted the communication may refer to audio, video, text based or any combination of the aforementioned forms of communication. The apparatus 20 may include a processor 22, the processor 22 being the
"brain" of the apparatus 20 that controls all processes and functions of the apparatus 20. The apparatus 20 may indude a networking device 24 coupled to the processor 22. The networking device 24 enables the apparatus 20 to connect to a network, where the network may be a restricted network or the internet. Where applicable, network may also include mobile phone and PSTN networks. There may also be at least one storage device 26 coupled to the processor 22. The storage device 26 may be a hard disk drive or flash memory, where data and applications required to enable the apparatus 20 to function in a preferred manner are stored.
There may also be at least one actuator 28 coupled to the processor 22. The actuator 28 may be, for example, a biased switch, a wireless signal receiver, a flip switch, or a sensor switch.
The biased switch may be activated during either positive or negative activation. Similarly, the wireless signal receiver may be activated when an appropriate wireless signal is received. Finally, the sensor switch may be activated by physical contact or sound input. The actuator 28 may also have a biometrics sensor for additional security. The actual type of actuator 28 being used may depend on factors such as, for example, aesthetics, use-ability, durability, cost or any combination of the aforementioned. Activation of the at least one actuator 28 may involve either a single action or a series of actions. For example, activating the actuator 28 (if only one was included in apparatus 20) once may invoke one action while activating the actuator 28 twice or thrice in quick succession may invoke other distinct actions. In another example, if more than one actuator 28 was included in the apparatus 20, a sequence in which the actuators 28 are activated or a combination of actuators 28 being activated may invoke distinct actions.
The storage device 26 may be installed with an application software 27, the application software 27 being used for communication between the at least two parties. The application software 27 may include modules/routines for the processor 22 to enable communication between the at least two parties. Activation of the at least one actuator 28 may cause the processor 22 to run the application software 27 for communication between the at least two parties using the apparatus 20 connected to the network through the networking device 24. The application software 27 may be either partially installed or fully installed in the storage device 26. It should be noted that the partially installed application software 27 may operate in cooperation with a server-based application to enable the desired functionality of the apparatus 20. The external server may control the "connection to other party" aspect by linking the apparatus 20 with another party of the communication such that a user and the other party may engage in communication. It should be noted that more than one external server may be employed in the present embodiment, where "other party" connection establishment activities may be done at the server level to minimise the processing load of the processor 22. The application software 27 may be able to operatively couple with software like AOL Instant Messenger, Skype, GoogleTalk, MSN Messenger, Yahoo! Messenger, ICQ, QQ, and the like. The application software 27 may be able to perform at least one check prior to commencing communication between at least two parties, such as, for example, type of contact data, whether a receiving party is online, whether a receiving party is responsive, or any combination of the aforementioned.
The apparatus 20 may include at least one audio input device 30 like a microphone coupled to the processor 22. The audio input device 30 would be used to capture speech of a user during communication. There may also be at least one audio output device 32 like a set of speakers or headphones coupled to the processor 22 for the user to hear speech from another party of the communication. In addition, there may be at least one image input device 34 like a webcam coupled to the processor 22, for the capture of still/moving images from the user end for transmission to the other party of the communication. There may also be at least one display device 36 such as, for example, a TFT, OLED, LCD, or CSTN screen coupled to the processor 22. The display device 36 may be for the user to view still/moving images transmitted from the other party's end and/or for the user to view information about the communication, such as, for example, other party ID, other party location and so forth. The apparatus 20 may further include a text-input module 25 like a keyboard coupled to the processor 22 to facilitate text-based communication. It should be noted that the text-input module 25, audio input device 30, audio output device 32, image input device 34 and display device 36 may be add-on peripherals for the apparatus 20 that may be connected to the apparatus 20 either via cables or wirelessly. Wireless connectivity of the peripheral devices may be enabled using wireless technologies, such as, for example, UWB, Bluetooth, infrared, or any form of radio frequency transmission. The text-input module 25, audio input device 30, audio output device 32, image input device 34 and display device 36 may also be integrated into one or more peripheral devices. In a possible embodiment of the present invention, the at least one display device 36 may be an externally connected large screen device or image projector.
The application software 27 may use contact data for each party stored in the at least one storage device 26 for communication between the at least two parties. The contact data may be selectable from a database stored in the storage device 26. Alternatively, the contact data may be stored on a remote storage server, or stored partially in the storage device 26 and partially on the remote storage server. The contact data may include, for example, internet addresses (includes email addresses and Instant Messaging IDs) and PSTN/mobile phone numbers. All the stored contact data may be viewed using the display device 36 (if available). A particular contact data may be selectable using controls which allow scrolling and selection within a large list of data entries, akin to controls used in mobile phones and portable digital entertainment devices. This would also include voice-activated selection as employed in many mobile phones. A "user preference" score may be input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the user's most preferred contact point for each party, and subsequently to less preferred contact points for each party if necessary. Alternatively, a "likelihood of connection" score may be input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the most likely contact point for each party, and subsequently to less likely contact points for each party if necessary. In another variation, the entries for each party may also be ranked in terms of (per unit) cost of connection so that calls made using the apparatus 20 may be connected firstly to the least costly contact point for each party, and subsequently to more costly contact points for each party if necessary.
Communication between the at least two parties may be encrypted by the application software 27. This enhances the security of communication between the at least two parties.
Encryption should preferably be carried out before data is sent to the network from the apparatus 20 as the data from the apparatus 20 may be compromised before reaching an external encryption server. The parties in the communication should each have an encryption "key" usable with their respective communication apparatus such that sent encrypted data is able to be decrypted at the receiving end. As such, the apparatus 20 may have a specific encryption "key" for a specific contact (obtained from the stored database). The encryption "key" may be entered using any known means of data input, such as, for example, via a keyboard (connected with a cable or connected wirelessly), via a computer/PDA (connected with a cable or connected wirelessly), via a secure download from a central server which accepts a central key to enable encryption between the parties, and so forth. The apparatus 20 may include a switch 29 to activate/deactivate data encryption. It should be noted that voice, image and text data may all be encrypted. The apparatus 20 may have an indicator such as an LED to denote whether data encryption mode has been activated. The indicator enables both the user and the receiving party to visually confirm that data encryption mode has been activated. Both the user and receiving party may have the choice whether to enable encryption during communication.
Referring to Figure 3, there is shown an encryption process 50 used in the present invention. The process 50 is used to denote the process flow, and it should be noted that the data may be encrypted using any known encryption method in the field of cryptography. It should be noted that the process 50 may be implemented where the data to be sent out from apparatus 20 is finalised (52) prior to transmission to the network. Subsequently, the apparatus 20 may check whether the data encryption mode has been activated (54). If no, data from apparatus 20 is not encrypted and directly sent to the network (53). If data encryption mode has been activated, a determination is made with regard to whether the party being contacted has an identical encryption "key" (56). If no, the user is notified that the party being contacted is unable to receive encrypted data (58), and data from apparatus 20 is not encrypted and directly sent to the network (53). If the party being contacted has a requisite identical encryption "key", the requisite encryption "key" is obtained (60) and the data is encrypted (62). The encrypted data is then sent to the network (53).
The apparatus 20 should be set up in the following manner before it is able to function in the desired manner. The contact data for each party is obtained from details such as, for example Skype ID, Yahoo! Messenger ID1 GoogieTalk ID, MSN messenger ID, PSTN line number, personal mobile phone number and the like. As there are different ways to contact each party, the apparatus 20 may attempt to make a call without any intervention from a server or the apparatus 20 may interact with the server to seek instructions on how to make a call.
A "user preference" score is input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the user's most preferred contact point for each party, and subsequently to less preferred contact points for each party if necessary. Alternatively, a "likelihood of connection" score is input for each entry for each party, so that calls made using the apparatus 20 may be connected firstly to the most likely contact point for each party, and subsequently to less likely contact points for each party if necessary. In another variation, the entries for each party may also be ranked in terms of (per unit) cost of connection, depending on a preference of the user. The contact data may be modified and saved using, for example, a keyboard/keypad like interface for the user to directly input the data into the apparatus 20, a wired or wireless connection to a computer installed with software that allows the user to input the data into the apparatus 20, and remote input of data via the internet onto a server, where the server synchronises data with the apparatus 20 when the apparatus 20 is connected to the server.
The application software 27 may include a VoIP application that is based on the instant messaging model which requires that the party being contacted to permit the contacting party to make the contact. The apparatus 20 may store a contact list of permitted parties, or such a list may be stored on a server. When a new contact is added, the contact data may be automatically updated in the list (either on the apparatus 20 or the server). There may be a reciprocal arrangement where the contact lists of both the party being called, and the calling party are simultaneously updated once one party is recognised as a permitted party so that both sides are able to contact each other in subsequent communication sessions. This reciprocal updating may be done by each party's apparatus 20 or by a server. Where updating of the contact list is done at a server level, the user would be able to access the list when the apparatus 20 is connected to the server.
Referring to Figure 2, there is shown a process flow of the method of the present invention. There is provided a method 80 for communication between at least two parties. The method 80 may begin with a user activating at least one actuator in an apparatus (82). The at least one actuator may be, for example, a biased switch, a wireless signal receiver, a flip switch, or a sensor switch. The biased switch may be activated during either positive or negative activation. Similarly, the wireless signal receiver may be activated when an appropriate wireless signal is received. Finally, the sensor switch may be activated by physical contact or sound input. The actuator 28 may also have a biometrics sensor for additional security. Activation of the at least one actuator may involve either a single action or a series of actions. For example, activating the actuator (if only one was included in apparatus) once may invoke one action while activating the actuator twice or thrice in quick succession may invoke other distinct actions. In another example, if more than one actuator was included in the apparatus, a sequence in which the actuators are activated or a combination of actuators being activated may invoke distinct actions.
Activating the actuator would run an application software stored in at least one storage device
(84), the application software consequently obtaining contact data for at least one of the parties from the at least one storage device. The contact data may include, for example, internet addresses (includes email addresses and Instant Messaging IDs) and PSTN/mobile phone numbers. The application software may be partially installed or fully installed. The partially installed application software may operate in cooperation with a server-based application, with the server-based application running in at least one server. The at least one storage device may also be on either the apparatus or a server.
Subsequently, the apparatus is connected to a network (84) through a networking device coupled to the apparatus. The application software may use the contact data to enable communication between the at least two parties (88). The application software may be able to operatively couple with software like AOL Instant Messenger, Skype, GoogleTalk, MSN Messenger, Yahoo! Messenger, ICQ, QQ, and the like.
The application software ascertains whether the contact data (data used in accordance with a criteria such as, for example, "user preference" score, "likelihood of connection" score or cost of connection for each user) is an internet address (90). If no, the application software connects to the PSTN/mobile phone number. If the receiving party responds (92) to a connection made by the application software, the user is able to commence communication (94). If the receiving party does not respond to the connection made by the application software, the application software ascertains whether is there any other contact data to be used for a subsequent connection attempt(s) (96). If there is no other contact data, the user gets an "receiving party unavailable" notification (98), such as, for example, a no connection tone.
If the application software has ascertained that there are other contact data (96), the software connects to a next contact data (88), and the software ascertains whether the contact data is an internet address (90). If yes, the software then ascertains whether the receiving party is online (100). If the receiving party is not online, the user gets an "receiving party unavailable" notification (98) if there is no other contact data to be used for a subsequent connection attempt(s) (96). If the receiving party is online, the application software ascertains whether the receiving party responds to the user's call (102). If the receiving party does not respond, the user gets an "receiving party unavailable" notification (98) if there is no other contact data to be used for a subsequent connection attempt(s) (96). The user is only able to commence communication (104) if the receiving party responds to the user's call.
The aforementioned method may also be effective where communication between the at least two parties is encrypted. It should be noted that the data may be encrypted using any known encryption method in the field of cryptography. It should be noted that the aforementioned method allows for a systematic method to contact a party with a plurality of contact details, with all steps enabling the method being totally hidden from the user.
Referring to Figure 4, there is shown a method 150 for generating a caller identification audio signal for an incoming call. The method 150 includes receiving a call (152) which may be from any source such as, for example, an internet address or a PSTN/mobile phone number. Next, the call is identified with an identifier (154), which is associated with the source of the call. It is then ascertained whether the identifier is associated with an entry in a contact database (156). If the identifier is not associated with any entry in the database, a standard "ringing" (only used as an example) sound will be generated (158). If the identifier is linked with at least one entry in the contact database (160); a text-to-speech (TTS) software converts the at least one entry to generate the caller identification audio signal (162). For example, if the at least one entry is "John", a caller identification audio signal may be simply an audio reproduction of the word "John", or "John" may be incorporated into a standard aurally reproduced phrase like "The incoming call is from "John". On hearing the "ringing" sound (156) or the caller identification audio signal (162), the call may be answered (164) and the parties may begin a conversation (166).
It should be noted that the aforementioned method 150 for generating a caller identification audio signal for an incoming call may be employed in the apparatus 20.
Whilst there has been described in the foregoing description preferred embodiments of the present invention, it will be understood by those skilled in the technology concerned that many variations or modifications in details of design or construction may be made without departing from the present invention.

Claims

1. An apparatus for communication between at least two parties, including: a processor; a networking device coupled to the processor; at least one storage device coupled to the processor, the storage device being either in the apparatus or a separate server; at least one actuator coupled to the processor; and an application software installed in the at least one storage device, the application software being used for communication between the at least two parties; wherein activation of the at least one actuator causes the processor to run the application software for communication between the at least two parties with the apparatus connected to a network through the networking device.
2. The apparatus of claim 1 , further including a device selected from the group consisting of: at least one text input device coupled to the processor; at least one audio input device coupled to the processor; at least one audio output device coupled to the processor; at least one image input device coupled to by the processor; at least one display device coupled to the processor; and any combination of the aforementioned.
3. The apparatus of claim 1, wherein the at least one actuator is an object selected from the group consisting of: a biased switch, a wireless signal receiver, a flip switch, and a sensor switch.
4. The apparatus of claim 1 , wherein the application software uses selected contact data for each party stored in the at least one storage device for communication between the at least two parties.
5. The apparatus of claim 1 , wherein the communication between the at least two parties is encrypted by the application software.
6. The apparatus of claim 5, wherein each party is able to obtain visual confirmation that the encryption is activated.
7. The apparatus of claim 5, wherein each party is able to activate encryption using a switch.
8. The apparatus of claim 5, wherein each party is able to activate encryption using a switch and consequently obtain visual confirmation that the encryption is activated.
9. The apparatus of claim 1 , wherein activation of the at least one actuator involves either a single action or a series of actions.
10. The apparatus of claim 1 , wherein the application software is of the form selected from the group consisting of: partially installed and fully installed.
11. The apparatus of claim 10, wherein partially installed application software operates in cooperation with a server-based application, the server-based application running in at least one server.
12. The apparatus of claim 1 , wherein the application software performs at least one check selected from the group consisting of: type of contact data, whether a receiving party is online, whether a receiving party is responsive, and any combination of the aforementioned.
13. The apparatus of claim 1 , wherein the application software operatively couples with software selected from the group consisting of: AOL Instant Messenger, Skype, MSN Messenger, Yahoo! Messenger, ICQ, QQ, GoogleTalk, similar applications as the aforementioned and any combination of the aforementioned.
14. The apparatus of claim 4, wherein the contact data is selected in order of criteria selected from the group consisting of: "user preference", "likelihood of connection" score and cost of connection.
15. The apparatus of claim 1 , wherein the at least two parties are using at least one communication device selected from the group consisting of: the apparatus itself, a computer and any device able to run the application software.
16. A method for communication between at least two parties, including: activating at least one actuator in an apparatus; running an application software stored in at least one storage device, the application software consequently obtaining contact data for at least one of the parties from the at least one storage device; and connecting the apparatus to a network with a networking device coupled to the apparatus; the application software using the contact data to enable communication between the at least two parties.
17. The method of claim 16, wherein the at least one actuator is an object selected from the group consisting of: a biased switch, a wireless signal receiver, a flip switch, and a sensor switch.
18. The method of claim 16, wherein activation of the at least one actuator involves either a single action or a series of actions.
19. The method of claim 16, wherein the communication between the at least two parties is encrypted by the application software.
20. The method of claim 19, wherein each party is able to obtain visual confirmation that the encryption is activated.
21. The method of claim 19, wherein each party is able to activate encryption using a switch.
22. The method of claim 19, wherein each party is able to activate encryption using a switch and consequently obtain visual confirmation that the encryption is activated.
23. The method of claim 16, wherein the application software is of the form selected from the group consisting of: partially installed and fully installed.
24. The method of claim 23, wherein partially installed application software operates in cooperation with a server-based application, the server-based application running in at least one server.
25. The method of claim 16, wherein the at least one storage device is on either the apparatus or a server.
26. The method of claim 16, wherein the contact data is either an internet address or a PSTN/mobile phone number.
27. The method of claim 16, where the contact data for at least one of the party is used by the application software in accordance with criteria selected from the group consisting of: "user preference", "likelihood of connection" score and cost of connection.
28. The method of claim 16, wherein the application software performs at least one check selected from the group consisting of: type of contact data, whether a receiving party is online, whether a receiving party is responsive, and any combination of the aforementioned.
29. The method of claim 16, wherein the application software operatively couples with software selected from the group consisting of: AOL Instant Messenger, Skype, MSN Messenger, Yahoo! Messenger, ICQ, QQ, GoogleTalk, similar applications as the aforementioned and any combination of the aforementioned.
30. An apparatus for communication between at least two parties using the method of claim 12.
31. A method for generating a caller identification audio signal for an incoming call, including: receiving a call; identifying the call with an identifier; associating the identifier with at least one entry linked to the identifier in a contact database; and using a text-to-speech software on the at least one entry to generate the caller identification audio signal.
32. The method of claim 31, wherein the identifier is either an internet address or a PSTN/mobile phone number.
33. The method of claim 31 used in the apparatus of claim 1.
PCT/SG2006/000358 2005-11-21 2006-11-21 An apparatus for communication and a method thereof WO2007058633A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US73862105P 2005-11-21 2005-11-21
US60/738,621 2005-11-21

Publications (1)

Publication Number Publication Date
WO2007058633A1 true WO2007058633A1 (en) 2007-05-24

Family

ID=38048932

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2006/000358 WO2007058633A1 (en) 2005-11-21 2006-11-21 An apparatus for communication and a method thereof

Country Status (1)

Country Link
WO (1) WO2007058633A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6614786B1 (en) * 1999-11-24 2003-09-02 Lucent Technologies Inc. Enhanced dual mode telephone for internet telephony
US20030219128A1 (en) * 2002-02-22 2003-11-27 Zarlink Semiconductor Limited Telephone subscriber unit and a semiconductor device for use in or with a telephone subscriber unit
US6671272B2 (en) * 1997-02-02 2003-12-30 Fonefriend Systems, Inc. Internet switch box, system and method for internet telephony
US6763226B1 (en) * 2002-07-31 2004-07-13 Computer Science Central, Inc. Multifunctional world wide walkie talkie, a tri-frequency cellular-satellite wireless instant messenger computer and network for establishing global wireless volp quality of service (qos) communications, unified messaging, and video conferencing via the internet
EP1494410A2 (en) * 2003-07-01 2005-01-05 Microsoft Corporation Method and device for instant messsaging
US20050117566A1 (en) * 2003-10-10 2005-06-02 Gary Davidson Using a handheld communication device with a hot spot network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6671272B2 (en) * 1997-02-02 2003-12-30 Fonefriend Systems, Inc. Internet switch box, system and method for internet telephony
US6614786B1 (en) * 1999-11-24 2003-09-02 Lucent Technologies Inc. Enhanced dual mode telephone for internet telephony
US20030219128A1 (en) * 2002-02-22 2003-11-27 Zarlink Semiconductor Limited Telephone subscriber unit and a semiconductor device for use in or with a telephone subscriber unit
US6763226B1 (en) * 2002-07-31 2004-07-13 Computer Science Central, Inc. Multifunctional world wide walkie talkie, a tri-frequency cellular-satellite wireless instant messenger computer and network for establishing global wireless volp quality of service (qos) communications, unified messaging, and video conferencing via the internet
EP1494410A2 (en) * 2003-07-01 2005-01-05 Microsoft Corporation Method and device for instant messsaging
US20050117566A1 (en) * 2003-10-10 2005-06-02 Gary Davidson Using a handheld communication device with a hot spot network

Similar Documents

Publication Publication Date Title
CN101036365B (en) Methods, devices and systems for providing availability data associated with data files to users of a presence service
US20060282450A1 (en) Method for Populating a Caller's Information to a Host-Based Address Book
US20070123287A1 (en) Method and apparatus for providing the status of a wireless communication device in a group network to other members in the group network
US20080182546A1 (en) Mobile phone capable of making internet calls, system and method using the same
US20070123286A1 (en) Method and apparatus for providing the status of a wireless communication device in a group network directly to other members in the group network
CN101848445B (en) Instant messaging method and device
US20090061832A1 (en) System and method for wireless call parking
US20080075049A1 (en) Thin client wireless communication device
JP2004260657A (en) Portable communication terminal device
CN1972322A (en) A mobile terminal with self-reminding function and self-reminding method
CN106101456A (en) A kind of method and device of call contact
US20080285727A1 (en) Communications Controller And Protocol
US7623642B2 (en) System and method for playing call indications for telecommunications systems at least partially implemented in computer file access networks
US20070243898A1 (en) Multi-handset cordless voice over IP telephony system
CN1980139A (en) Server apparatus and telephone terminal
EP1739937B1 (en) Electronic equipment and corresponding method for providing a reminder in a wireless communication system
KR20080046060A (en) Voip terminal apparatus, voip communication system and presence check method thereof
US20070286098A1 (en) Computerized telephony accessibility provider (CTAP) for provisioning a talking telephone device
US7953429B2 (en) Electronic communication device and method of operating telephone directory list in the same
US8385523B2 (en) System and method to facilitate voice message retrieval
CN114268691A (en) Call method, device, terminal equipment and readable storage medium
CN1812440A (en) Telephone outputting device and method utilizing external equipment
WO2007058633A1 (en) An apparatus for communication and a method thereof
KR20040022738A (en) SMS system of internet visual phone
KR100358729B1 (en) Information Technology Terminal Using Internet

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06813138

Country of ref document: EP

Kind code of ref document: A1