[go: up one dir, main page]

WO2000033547A2 - Procédé pour gérer des services à numéros personnels - Google Patents

Procédé pour gérer des services à numéros personnels Download PDF

Info

Publication number
WO2000033547A2
WO2000033547A2 PCT/FI1999/000989 FI9900989W WO0033547A2 WO 2000033547 A2 WO2000033547 A2 WO 2000033547A2 FI 9900989 W FI9900989 W FI 9900989W WO 0033547 A2 WO0033547 A2 WO 0033547A2
Authority
WO
WIPO (PCT)
Prior art keywords
contactability
chain
person
surveillance system
contacted
Prior art date
Application number
PCT/FI1999/000989
Other languages
English (en)
Other versions
WO2000033547A3 (fr
Inventor
Ari Hynninen
Juha-Pekka Jauhiainen
Original Assignee
Elisa Communications Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Elisa Communications Oyj filed Critical Elisa Communications Oyj
Priority to EP99958222A priority Critical patent/EP1133880A2/fr
Publication of WO2000033547A2 publication Critical patent/WO2000033547A2/fr
Publication of WO2000033547A3 publication Critical patent/WO2000033547A3/fr
Priority to NO20012398A priority patent/NO20012398L/no

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42229Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • H04Q3/005Personal communication services, e.g. provisions for portability of subscriber numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/12Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal

Definitions

  • the present invention relates to a method, according to the preamble to Claim 1, for implementing a contactability service and a method, according to the preamble to Claim 9 for changing the active contactability chain in a contactability service.
  • Methods of this kind of can be used in connection with the contactability systems offered in a telephone system.
  • the customer such as the person to be contacted
  • the contactability chain can incorporate, for example, 1 - 5 telephone numbers.
  • a call made to the call number of the person to be contacted is first connected to the first number in the contactability chain, and, if the first number does not respond within a set time, the call is connected to the second number in the contactability chain. If there is no response from the second number either, the call is connected down the chain.
  • a contactability chain has only a single response location.
  • the customer's contactability chains can be designed so that, for example, one contactability chain is designed for working time spent at the workplace, another for work trips, and a third for leisure time.
  • several contactability chains can be linked to a single call number, only one of the contactability chains can be active for connecting calls made to the call number. Indeed, the intention is to control the contactability service in such a way that the most suitable contactability chain for each situation is selected as the active chain.
  • connections between the contactability chains i.e. changing one active contactability chain to another, take place by, for instance, calling a certain service number, in which, after possible password verification, the contactability chain to be valid from the moment in question onwards is defined by audio-frequency keying-in. It has also been possible to change between the contactability chains using time control, so that a change from one contactability chain to another is always made at a predetermined moment.
  • a drawback in the state of the art is it is relatively difficult to change the active contactability chain by means of a telephone subscriber connection. For this reason, the person to be contacted may not necessarily be bothered to change the contactability chain, for example, should she or he leave the workplace. If the person to be contacted has to change the active contactability chain only on very rare occasions, the method can be easily forgotten. In such cases, it is easy to forget to switch the contactability chain back to the normal one, so that calls may be routed to the wrong connection for several days. Even time control of the contactability service is not a good solution to these problems.
  • the invention is intended to create an entirely new type of contactability service, in which the contactability chain that is active can be changed automatically, without a separate contactability chain changing procedure.
  • the invention is based on the creation of a data communications link between the contactability service and the access surveillance system of the organization of the customer of the contactability service, by means of which the state, in the access surveillance system, of the person to be contacted, i.e. the customer, can be transmitted to the contactability service.
  • At least two contactability chains are created in the contactability service for each call number, i.e. contactability number.
  • One contactability chain is then set to correspond to each state of the access surveillance system. After this, the state data of the access surveillance system can be received in the contactability service and a suitable contactability chain can be connected to be active, according to the changes reported by the access surveillance system.
  • the method according to the invention for implementing a contactability service is characterized by what is stated in the characterizing section of Claim 1.
  • the method according to the invention for changing the active contactability chain in a contactability service is characterized by what is stated in the characterizing section of Claim 9 .
  • the active contactability chain of a contactability service can be changed flexibly.
  • the contactability chain changes automatically to the correct chain in connection with the control of the access surveillance system. This also improves the reliability of the control of the contactability service, as normally people are used to operate the access surveillance system correctly and certainly and lapses of memory are unusual.
  • the invention also has preferred embodiments that offer several additional benefits.
  • a preferred embodiment of the invention using a WWW user-interface has the additional advantage that persons who can be contacted through the WWW user- interface can alter the settings of the contactability service from any location at all from where a data communications link can be made to the system.
  • connection of the contactability chains can be implemented automatically, the person being contacted does not have to actively remember the contactability chains optimized for various situations and actively connect them.
  • the invention also allows the sensible implementation and use of contactability service embodiments incorporating even a very large number of personal contactability chains.
  • Figure 1 shows one method according to the invention and one system applicable to its use.
  • Figure 2 shows one such system and method, by means of which a contactability service can be updated.
  • the system of Figure 1 includes the central unit 2 of an access surveillance system and a connected access surveillance system with a terminal device 1.
  • the system also includes a server 3 controlling the contactability service, as well as a telephone network Service Control Point (SCP) 4 with a related database 5.
  • SCP Service Control Point
  • the system further includes data communications links formed between server 3 and central unit 2, and between server 3 and SCP 4.
  • the data communications link is preferably a continuous connection, which can be implemented either as a modem connection or as a permanent data communications network connection.
  • the system of Figure 1 can be used to change the active contactability chain of a personal contactability service, for example, by carrying out the following procedures:
  • the person to be contacted uses the terminal device 1 of the access surveillance system and changes her or his state in the access surveillance system, for example to check her or himself out of the workplace.
  • Terminal device 1 then sends a signal concerning the change in the state data to the access surveillance system's central unit 2.
  • the central unit 2 transmits the state data change signal in turn to the server 3 controlling the contactability service.
  • the signal to be sent contains at least the data required to identify the customer of the contactability service and her or his new state.
  • Server 3 receives the change signal and updates the state data change in the control data of the correct customer.
  • the server changes the correct contactability chain to become active by informing SCP 4 of the change.
  • Server 3 then sends a call-routing change request to SCP 4.
  • SCP 4 sends confirmation of the change request to server 3.
  • SCP 4 makes the requested changes in its call-routing data.
  • the invention can be used to connect access surveillance to a contactability service in such a way that the validity of a person's contactability chains can be controlled automatically.
  • This permits the reliable implementation of flexible and correctly-timed control of a contactability service.
  • the behaviour of the invention will be examined with the aid of a simple example.
  • the person to be contacted i.e. a customer of the contactability service, arrives at work in the morning and, on arrival, checks her or himself into the workplace using terminal device 1 at the access surveillance point.
  • the person can, for example, also give the worktime monitoring system additional information, if required by the system.
  • the person can activate the contactability chain intended for time normally spent at the workplace.
  • Other contactability chains can be, for example, intended for worktime spent outside the workplace, for leave or sick leave, and for work trips and conferences.
  • the contactability changes can be as follows, for example:
  • the person When leaving the workplace to take care of work duties, the person checks her or himself out of the access surveillance system with a suitable code and, if necessary, enters additional information in the worktime monitoring system. Checking-out then activates an update in the contactability system, for example, according to Figure 1, when the contactability chain intended for worktime spent outside the workplace is set to be active.
  • the final response location is often defined to be voice mail.
  • the call can be routed, for example, to an audio response unit (IVR, Interactive Voice Response), which plays a predetermined message and possibly also records a message left by the caller to the person to be contacted.
  • IVR Interactive Voice Response
  • An access surveillance system can be exploited in an advanced way, in connection with the invention, to control voice mail.
  • several different messages for different situations can be placed in the voice mail, the message placed at any one time being selected on the basis of the information contained in the access surveillance system.
  • a person trying to make contact can therefore be told the reason why the person sought cannot be contacted at the moment.
  • Specific messages can be recorded for situations such as the following: the person to be contacted is on leave, the person to be contacted is on a business trip, the person to be contacted is at lunch, and the person to be contacted is in a meeting.
  • the selection of a suitable message for each call routed to the voice mail can be implemented, for example, so that access surveillance system 2 or server 3 controlling the contactability service has a telecommunications link to the audio response unit and uses this telecommunications link to define the message to be active at a specific time.
  • the audio response unit then retrieves the defined message from the recording.
  • the definition of the type of message can be sent to the audio response unit in a signal message to be sent together with the call to be routed, in which case a separate telecommunications will not necessarily be required. It is also possible to arrange an individual telephone number for each separate message, so that the telephone number of the voice mail in the contactability chain is changed to correspond to the current situation.
  • the number of contactability chains available in connection with the invention is not restricted. For example, there can be two, three, or more contactability chains.
  • the number of phone numbers, i.e. response locations, included in the contactability chains is also not restricted.
  • the contactability chains may contain one or more response locations.
  • a contactability chain also refers to an individual response location, which is used in the system in the same way as a longer contactability chain.
  • a contactability chain can be any length at all, very long chains, of more than five response locations, are generally not used in practice, because the call is often terminated before it reaches the end of the chain.
  • the number and length of the contactability chains can also vary for different people using the same contactability service. In addition, the same person may have several contactability chains of different length while even the number of her or his contactability chains can be increased or reduced.
  • the invention makes it possible to define one's own contactability chains even for rare situations.
  • Such contactability chains for rare situations can be switched on, for example, by an access surveillance or worktime monitoring check-in/out that differs from a normal one.
  • Such check-in/out alternatives may be, for instance, Leave (+ period of time), Work Trip (+ period of time), Sick Leave (+ period of time).
  • the contactability chain can also be switched on through the control service for the contactability chains, without a change signal obtained from the access surveillance.
  • each check-in/out code of the access surveillance system may be set to correspond to some specifically defined contactability chain. If there are more check-in/out codes, several different check- in/out codes of the person to be contacted can be set to correspond to the same contactability chain or chains.
  • check-in/out codes which do not correspond to any contactability chain at all, are left in the system for a customer of the contactability service, a contactability chain that is totally unsuitable for the prevailing situation may remain active when such check-in/out codes are used.
  • check-in/out code can correspond to more than one contactability chain, but not at one time.
  • a system in which the activation of the contactability chain is affected not only by the check-in/out code, but also by the time of day.
  • a certain check-in/out code could be set to correspond, for example, to one contactability chain in the morning and to another at all other times.
  • the system must also take into account the physical location of the access surveillance system terminal device 1 being used. If checking-in/out takes place in some other unit of the organization than that in which the permanent workplace of the person checking-in/out is located, it may be necessary to connect some other contactability chain to be active than the chain that would be activated if the person were to activate the same check-in/out code at the terminal device 1 in her or his own workplace. In this case, checking-in, for example, on the terminal device 1 of one's own workplace will activate a contactability chain, in which the telephone number of the person's office is first, but checking in at another facility of the same organization will activate a contactability chain, in which the number of the person's mobile phone is first.
  • a delay can also be programmed into the system, for changes of certain contactability chains. This will be necessary, for example, if the terminal device 1 of the access surveillance system is located far from the office of the person to be contacted. In such cases, activation of the contactability chain routing calls to the office, for example, can be slightly delayed, to give the person time to get to his or her office. In connection with the invention, the change of state can thus be set to alter to set the active contactability chain either essentially in real time or after a set delay.
  • the invention can also be applied advantageously in an access surveillance system without an access surveillance system terminal device 1 , of the kind described above, operated by manual stamping.
  • an access surveillance system instead of a terminal device 1 requiring keying-in, it is possible to use operating devices carried by persons, which interact automatically with detection devices connected to the access surveillance system. It is certainly also possible to combine both features in an access surveillance system, i.e. to use both a terminal device 1 as described in the previous examples and portable operating devices.
  • the operating device carried by persons linked to the access surveillance system may be, for example, a smart card, such as a chip card.
  • One very suitable operating device is the person's mobile phone, which can act as an operating device in the access surveillance system, either independently or through an accessory fitted to it.
  • the task of the detection devices of the access surveillance system is, in turn, to detect the operating devices carried by persons and to notify the access surveillance system of their observations relating to each operating device.
  • Detection can be arranged, for example, by means of electromagnetic interaction.
  • Particularly suitable electromagnetic waves are radio waves, such as microwaves, and infrared waves.
  • the operating device carried by a person within the sphere of the access surveillance system for example, a mobile phone or a piece of clothing incorporating a smart device, uses Bluetooth technology to communicate with the detection device of the access surveillance system.
  • the detection devices it is possible to place detection devices in every room in a facility and create a highly advanced and automatic contactability service, by means of which calls can be routed to the required person, with exceptional precision.
  • the invention can also be applied in such a way that the data to be sent from the access surveillance system 1, 2 to the system 3 controlling the contactability service is not sent in an actual state-data form.
  • the system can be set to operate so that central unit 2 of the access surveillance system converts the state-data into other such pointer data, which commands system 3 controlling the contactability service to activate the desired contactability chain.
  • central unit 2 of the access surveillance system may also call the contactability chains using, for example, a name or sequence number.
  • the method according to the invention for implementing a contactability service can thus, in general, be applied in a method, in which a contactability number is defined for the person to be contacted and at least two contactability chains are created, in each of which there is at least one response location.
  • the contactability chains are connected to the contactability number in the call control system 3, 4, in such a way that calls made at any moment to the contactability number can be routed to the response locations in a manner defined by a single active contactability chain.
  • a data communications link is also created between the call control system 3, 4 and the person to be contacted, and at least two states of the access surveillance system 1, 2, concerning the person being contacted, are defined to each indicate one contactability chain for the person to be contacted. If, after this, the call control system 3, 4 is set to receive data, transmitted from the access surveillance system 1, 2, through a data communications link, to indicate the state of the access surveillance system 1 , 2, for defining the contactability chain, the contactability chain indicated at each moment by the data received can be set as the active contactability chain in the call control system 3, 4.
  • the actual definitions and alterations to the response locations of the contactability chains, or the correspondences of the access surveillance state codes and contactability chains, can be made for individual users by means of, for example, a WWW user- interface, dual tone multi-frequency dialling, or SMS/UUS messages. Definitions can also be made from one centre, using, for example the access surveillance system or an external control system. The system can also be designed in such a way that, as described above, it is also possible to change the contactability chain that is active at the moment in question, independently of the prevailing access surveillance check-in/out code.
  • the system controlling the contactability service must identify the customer making the call to the control number and access the customer's contactability chains from its memory. The identification of the customer must also be verified, for example, using a password.
  • customer identification is implemented by giving each customer of the contactability service her or his own contactability service control number. In this case, the controlling system already knows on the basis of the B-subscriber number, who the person making contact should be and a sufficient procedure is to access this customer's data from the memory and verify her or his identity. Such a system significantly reduces the load on the control system, compared to the normal manner of carrying out corresponding customer searches, i.e.
  • WWW World Wide Web
  • Programming through a WWW user-interface can, on the other hand, be made using nearly any terminal device connected to the Internet data network.
  • the updating procedure based on a WWW user-interface is described in greater detail in the following example.
  • a WWW-based or similar user-interface can be used to update the contactability chains of a contactability service in a system including a terminal device 7 used by the customer, a public data net 6 such as the Internet, to which terminal device 7 can be connected, a server 3, connected to the public data network 6, of the contactability service provider, a telephone network SCP device 4 connected to server 3, and a database 5 connected to SCP device 4.
  • the customer uses terminal device 7 to contact the website of the control service of the contactability service.
  • the control service identifies the customer.
  • Server 3 provides the customer with her or his personal contactability chains for viewing.
  • Server 3 checks that the alterations are permitted, then sends an update request for the contactability chains to SCP 4.
  • SCP 4 sends confirmation of reception of the update request to server 3.
  • SCP 4 updates the contactability chains.
  • Server 3 informs the customer that an update request for the changes made by her or him has been sent to SCP 4.
  • control operations carried out in the SCP described above can be carried out in an IP device or external server, instead of in the SCP.
  • the contactability chain can also be implemented in such a way that two parallel connections are located in a single response location of the contactability chain, in which case the call will ring simultaneously in both connections.
  • the invention can also be applied in such a way that, for example, calls coming to the call number of a small or medium-sized company are routed to certain telephone numbers, depending on which persons are present at the workplace, according to the company's access surveillance system.
  • This type of embodiment can be used, for instance, in a small company, in which it is wished to receive, if possible, all calls made to the company's number, as long as at least one employee is present at the workplace.
  • the system could operate in such a way that, when an employee comes to work at the weekend and checks her or himself into the access surveillance system, calls made to the company's call number are routed to this employee, instead of to the automatic answering device. When the workplace become empty again, calls are once again routed to the automatic answering device.
  • the essential part of the invention is that information collected by the access surveillance system is used to control the contactability service.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne un procédé permettant de mettre en oeuvre un service de contactabilité. Selon ce procédé, on définit un numéro de contactabilité pour une personne que l'on souhaite contacter, et l'on crée au moins deux chaînes de contactabilité, chacune d'entre elles comprenant au moins un emplacement de réponse. Puis l'on relie ces chaînes de contactabilité au numéro de contactabilité d'un système de gestion des communications (3, 4), de sorte que les communications adressées à ce numéro de contactabilité à tout moment peuvent être acheminées vers les emplacements de réponse, selon une procédure définie par une chaîne de contactabilité active. Selon cette invention, on crée par ailleurs une liaison de communication de données entre ledit système de gestion des communications (3, 4) et un système de surveillance d'accès (1, 2) utilisé par la personne que l'on souhaite contacter, tout en définissant par ailleurs au moins deux états pour ce système de surveillance d'accès (1, 2) concernant cette personne, afin d'indiquer quelle chaîne de contactabilité est destinée à cette personne. Si le système de gestion des communications (3, 4) peut ensuite recevoir, par l'intermédiaire de ladite liaison de communication de données, des données en provenance du système de surveillance d'accès (1, 2) indiquant l'état de ce dernier afin de définir la chaîne de contactabilité, le système de gestion des communications (3, 4) peut alors choisir la chaîne de contactabilité indiquée par les données reçues à tout moment comme étant la chaîne de contactabilité active.
PCT/FI1999/000989 1998-11-27 1999-11-29 Procédé pour gérer des services à numéros personnels WO2000033547A2 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP99958222A EP1133880A2 (fr) 1998-11-27 1999-11-29 Proc d pour g rer des services num ros personnels
NO20012398A NO20012398L (no) 1998-11-27 2001-05-15 Fremgangsmåte vedrörende tjeneste for kontroll av personlig nummer

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI982581 1998-11-27
FI982581A FI106234B (fi) 1998-11-27 1998-11-27 Menetelmä tavoitettavuuspalvelun ohjaamiseksi

Publications (2)

Publication Number Publication Date
WO2000033547A2 true WO2000033547A2 (fr) 2000-06-08
WO2000033547A3 WO2000033547A3 (fr) 2000-08-10

Family

ID=8553002

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI1999/000989 WO2000033547A2 (fr) 1998-11-27 1999-11-29 Procédé pour gérer des services à numéros personnels

Country Status (4)

Country Link
EP (1) EP1133880A2 (fr)
FI (1) FI106234B (fr)
NO (1) NO20012398L (fr)
WO (1) WO2000033547A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002019675A1 (fr) * 2000-08-22 2002-03-07 Elisa Communications Oyj Procede et systeme d'assistance d'operateur de central telephonique

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60170341A (ja) * 1984-02-14 1985-09-03 Nec Corp 交換方式
DE3824190C2 (de) * 1988-06-15 1997-01-23 Bosch Gmbh Robert Verfahren zum gegenseitigen Datenaustausch zwischen einer Kommunikations-Vermittlungsanlage und einer Personalzeit-Erfassungsanlage
DE3820315C1 (en) * 1988-06-15 1989-06-22 Telenorma Telefonbau Und Normalzeit Gmbh, 6000 Frankfurt, De Method for two-way interchange of data between a communications switching system and a staff time recording system
CA2076434C (fr) * 1991-10-09 1996-07-02 Gary Joe Grimes Methode de transfert de communications utilisant un indicateur de localisation d'appele
EP0657076B1 (fr) * 1992-08-26 1999-06-09 Bellsouth Corporation Procede de telecommunications par numero personnel
JP2636677B2 (ja) * 1993-06-02 1997-07-30 日本電気株式会社 半導体集積回路
CA2117934A1 (fr) * 1993-12-02 1995-06-03 Steven C. Salimando Methodes automatiques de localisation et de retransmission d'appels
DE19711907A1 (de) * 1997-03-21 1998-10-01 Siemens Ag System zur Erfassung von Daten, insbesondere Arbeitszeitdaten
US6009333A (en) * 1997-08-14 1999-12-28 Executone Information Systems, Inc. Telephone communication system having a locator and a scheduling facility

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002019675A1 (fr) * 2000-08-22 2002-03-07 Elisa Communications Oyj Procede et systeme d'assistance d'operateur de central telephonique

Also Published As

Publication number Publication date
FI106234B (fi) 2000-12-15
NO20012398D0 (no) 2001-05-15
EP1133880A2 (fr) 2001-09-19
FI982581A0 (fi) 1998-11-27
FI982581A7 (fi) 2000-05-28
NO20012398L (no) 2001-07-12
WO2000033547A3 (fr) 2000-08-10

Similar Documents

Publication Publication Date Title
US4740788A (en) Method of providing location dependent visitor dispatching service
US6005870A (en) Method for called party control of telecommunications network services
US5206899A (en) Arrangement for outbound telecommunications
US4752951A (en) Method of providing location dependent person locator service
US6697473B2 (en) Automated personalized telephone management system
CA2100699C (fr) Methode de transmission de profils d'utilisateurs de telephones portatifs au moyen d'un ordinateur central
US6061433A (en) Dynamically changeable menus based on externally available data
US7280535B1 (en) Method for public access to private phone numbers and other telephonic peripherals using a caller access code
US5475748A (en) Automatic telephone system with function for multiple out-dialed calls per caller
US6130938A (en) Automatic call forwarding
JP2706013B2 (ja) 通信交換機に対してファンクションを指定する方法および顧客信号を処理する装置
US5912956A (en) System and method for anonymously establishing telephonic connections
US5574776A (en) Call redirection feature for relay services
EP0608613A2 (fr) Acheminement d'appel basé sur une numérotation avec suffise
US20090124240A1 (en) System and a method for connecting telephone calls directly on the basis of a text query
EP0810765A2 (fr) Voies multiples de couverture d'appel appelées indépendamment
US5884159A (en) Method of spawning a communication service
MXPA01000879A (es) Metodo y sistema para proveer identificacion de llamador mejorada.
MXPA01000887A (es) Metodo y sistema para proveer identificacion de llamador mejorada.
JPH08256209A (ja) 通信システムとパーソナル特定化通信サービス提供方法
FI95525B (fi) Informaatiojärjestelmä puhelinvaihdetta varten
KR20000005104A (ko) 호출 루팅
US5905944A (en) Secure communication of access information
WO2000033547A2 (fr) Procédé pour gérer des services à numéros personnels
US6111942A (en) Communication transfer apparatus

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): NO US

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): NO US

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 1999958222

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09856735

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 1999958222

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1999958222

Country of ref document: EP